MS to force IT-security censorship
MS to force IT-security censorship. The Register Nov 2 2001 12:34AM ET [Computer security news]
software development, security, opinion
Archive for the ‘security’ Category.
MS to force IT-security censorship. The Register Nov 2 2001 12:34AM ET [Computer security news]
Microsoft released a new version of HFNetChk today.
A couple of errors were fixed with the utility itself, and the
readme.txt file was updated to include instructions on using HFNetChk if
you cannot or do not want to update to at least MS Internet Explorer 5.0
(these instructions might have been there before, but I don’t recall
seeing them).If you are not familiar with HFNetChk, it is an excellent tool for
determining whether your WinNT or Win2k systems (workstations and
servers) have the recommended hotfixes installed. You run it from a
Command Prompt and HFNetChk downloads the current patch list from
Microsoft then checks to see if the system is up-to-date. (The patch
list, in XML format, is saved to the default directory, so you can also
test systems that aren’t on the network.) Not only is the operating
system itself checked, but HFNetChk also knows how to check Exchange,
SQL and IIS. You can check systems across the network and can specify
multiple systems to be checked with one command. The output can be
redirected to file for detailed review and historic documentation
purposes.Using HFNetChk alone won’t completely secure your system, but it does
make the process of checking for missing patches more manageable.See http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31154 and
the links therein for more info.— Mark Medici mark@dbma.com
Brad Templeton:
Sample of Larry Ellison’s new National ID Card
“If you’re innocent, you have nothing to hide.”
WLAN VPN Support for Handhelds Ships. allNetDevices Oct 17 2001 3:58AM ET [Computer security news]
Major vendors tighten WLAN security
Oct 17, 2001 CNET
As part of the 802.1x standard, which has been approved but not implemented within 802.11b, the Windows XP client natively supports Extensible Authentication Protocol (EAP), which provides dynamic, session-specific wireless encryption keys, central user administration via specialized third-party Remote Authentication Dial-In User Service (RADIUS) servers, and mutual authentication between client and Access Point (AP) and AP to RADIUS server.
Windows XP is also compatible with EAP-Transport Level Security (EAP-TLS), which uses digital certificates for authentication. Windows XP’s integration of these features will significantly ease deployment of EAP solutions because separate client utilities will no longer be necessary. These capabilities will reduce the risk involved in using 802.11b within a corporate network.
Safeweb is a Fed Front. An enterprising Cryptome reader has discovered that the vaunted web privacy provider (already known to have CIA funding) Safeweb utilizes a Department of Defense server(s?) (anongo.com) as a proxy for user requests. [kuro5hin.org]
New York Times:
Attacks Expose Telephone’s Soft Underbelly
[via Slashdot]
Robert Fleck, Cigital: Wireless insecurity + ARP Poisoning (pdf) (FAQ)
Observations:
Related article:
DowJones: Security Experts Are on Alert Over Wireless-Hacking Technique. Quicken.com Oct 15 2001 6:32AM ET
“Mr. Fleck of Cigital combined those wireless vulnerabilities with an attack that has been identified and addressed in most wired networks. Known as ARP poisoning, from the acronym for address resolution protocol, the attack manipulates software in the circuit boards that connect computers to corporate networks. That software contains addresses of other connected machines; a skilled hacker can fool the software to make it seem like his machine has an authorized address to receive data packets on the network. An attacker who understood both techniques, Mr. Fleck said, could use a laptop with a wireless connection to enter a company’s wireless network, and then effectively tell machines on the wired portion of the network to pass all data packets through his laptop.
“The most obvious solution to the problem is to segregate the gateway device that acts as the front door for machines making wireless connections to a network. That can be done using routing devices or filtering programs known as firewalls.”
[via Moreover Computer security news]
USA ACT (PDF):
SEC. 217. INTERCEPTION OF COMPUTER TRESPASSER COM-
MUNICATIONS.
Chapter 119 of title 18, United States Code, is
amended
(1) in section 2510
(A) in paragraph (17), by striking and
at the end;
(B) in paragraph (18), by striking the pe-
riod and inserting a semicolon; and
(C) by inserting after paragraph (18) the
following:
(19) protected computer has the meaning set
forth in section 1030; and
(20) computer trespasser
(A) means a person who accesses a pro-
tected computer without authorization and thus
has no reasonable expectation of privacy in any
communication transmitted to, through, or from
the protected computer; and
(B) does not include a person known by
the owner or operator of the protected computer
to have an existing contractual relationship with
the owner or operator of the protected computer
for access to all or part of the protected com-
puter.; and
(2) in section 2511(2), by inserting at the end
the following:
(i) It shall not be unlawful under this chapter for
a person acting under color of law to intercept the wire
or electronic communications of a computer trespasser,
if
(i) the owner or operator of the protected com-
puter authorizes the interception of the computer
trespassers communications on the protected com-
puter;
(ii) the person acting under color of law is
lawfully engaged in an investigation;
(iii) the person acting under color of law has
reasonable grounds to believe that the contents of
the computer trespassers communications will be
relevant to the investigation; and
(iv) such interception does not acquire commu-
nications other than those transmitted to or from
the computer trespasser..
TechRepublic:
Groups vie for superiority in security standards competition
Oct 8, 2001
Judith N. Mottl