UNIX Consulting and Expertise
Golden Apple Enterprises Ltd. » Error: Page not found

Security: How safe is your vendor’s source code? Comments Off on Security: How safe is your vendor’s source code?

News of the theft of Symantec’s Norton Anti-Virus source code has been rocking round the Internet today. InfosecIsland have some good coverage here and here.

The real issue here of course is not that source to a popular AV app has been stolen – the core problems, that a lot of the commentary seems to be missing, is that of due diligence and vendor control.

Most companies will do some sort of due diligence on their suppliers. It varies between industries, and what the software solution is going to be used for – but usually things like credit checks, lists of reference sites, etc. are done. Depending on what the software does, the due diligence can also include things like looking at recent security audit reports, viewing physical and virtual site security procedures, and sometimes even penetration testing of the vendor.

But how many companies check who else has their vendor’s source? Is it held in escrow somewhere (which is very often a contractual requirement)? How secure is the escrow provider? Has the vendor done any deals with third parties that gives them access to the source? How secure are *they*?

Symantec’s problems are much greater than the loss of the source to an older version of Norton’s AV. They’ve suffered reputational damage because of the lapses of a third party – something they have no control over. The damage here is particularly severe, because Symantec have been growing their enterprise security business.

Customers will be asking awkward questions about how much of that Norton AV source has made it into Symantec’s other enterprise solutions. They’ll also be asking Symantec what other products the breached third party had the source to. These concerns will count heavily against Symantec in any competitive tender, and the damage for Symantec will continue for a long while after the noise around this breach has subsided.

The lesson to be learned from this – for both customers and vendors – is what impact loss of control over your source code has on your security stance, and the risks that that poses to your business. Both of these need to be factored into any vendor assessment and risk analysis.

New Symbian apps for Nokia mobiles Comments Off on New Symbian apps for Nokia mobiles

You may have noticed the banner on the right of site, pointing to Nokia’s OVI store. Site updates and news are now available for download as an app for your Symbian mobile – grab it for free here.

I’ve been a big Nokia fan since the 9200 Communicator came out, all those years ago. Ahead of their time, the Communicators were everything a techie needed – a keyboard, a decent SSH app, serial connectivity to talk to device consoles, and a cracking email client. The current model, the E7, carries on this Communicator heritage, and really embodies the ‘converged device’ vision that Nokia have touted for quite some time.

Previously I’d been creating specific custom Symbian apps for clients, but have now started to roll out some of my most often used tools for download on Nokia’s OVI Store.

The main page for all of GAE’s apps can be found at http://store.ovi.com/publisher/GAE%20Ltd. Expect new apps, and more details of the existing ones, to be added to this site over the next month.

GCHQ Can You Crack It: Tips and Hints 1 comment

I’ve had a deluge of email about the GCHQ Can You Crack It challenge, asking for everything from the complete solution to some pointers. So here I’ll give some tips and hints that’ll help you work your way through it.

GCHQ only hire British citizens:
If you’re seriously doing this to look for a job, bear in mind that GCHQ will only hire you if you’re a British citizen, and have lived in the UK for the last 10 years. It’s a fun challenge, but if you’re from Sweden you’re not going to get a job at the end of it (but thanks for all the emails guys!).

You’ll want some sort of VM environment:
Really, I shouldn’t need to say this to anyone – but don’t trust random code from the Internet. Especially if it’s clear it’s coming from one of the top government security organisations. Grab Virtual Box and Backtrack and keep your main OS safe. I should stress that there’s nothing dodgy with anything in this challenge – but this is good practise and should be the first thing you do when tackling anything unknown.

The code in the image doesn’t reveal the keyword:
Look at the hex in the image. Some of the numbers there just don’t map to ASCII or EBDIC – not even in some of the wilder code pages. It’s not that easy.

There are three stages to reveal the keyword:
As you solve each stage, it will lead you to the next. Once you’ve solved the third stage, you’ll have the keyword you need.

Look for patterns in the hex:
I shouldn’t be giving too much away by drawing your attention to patterns in the hex. Yes, there are 16 numbers across – a word length maybe? But instead look at what those numbers are. Repeated numbers or letters are usually the sign of some sort of underlying pattern. If you’ve done any shellcode you should recognise 90 90 as NOPs.

Why is the code in an image instead of just text or HTML?
Think about this. How can information be conveyed in an image. Visual, yes – but what else? It’s a PNG – what else could that tell you?

Test your Google-fu:
This can be viewed as a shortcut, but also a good way to see if you’re on the right track. What else is being hosted on the challenge site? Besides, as with everything, there’s more than one way to solve a problem.

You’ll need to be able to write code:
Not as in ‘encryption’, but as in ‘program’. I’ll be the first to admit my code is shocking – it’s very much ‘solve the problem at hand’ rather than writing something elegant or re-usable. You’ll need to raid your store of scripts, apps, and hacks. Have a search to find existing code that solves similar problems, and then modify it.

Don’t assume everything is straight ASCII:
I would suggest it’s a good idea of have a Base64 decoder (like the one I’ve written for Symbian phones) and an assembler/disassembler. You’ll need to have a good idea of how those things work – or you’ll need to put aside some time to get to grips with them before you proceed.

Hopefully these pointers will help answer – or lead to the answer – to the most common questions I’ve been asked so far. They shouldn’t give away too much of the game, but I’m hopeful that these tips will get you in the right mindset to crack on with the challenge (pun intended).

As with many puzzles like this – and with a lot of security related work in general – it’s not the raw skills that really matter. Don’t get disheartened because you can’t write in a certain language, or you scripting isn’t up to scratch. If you can think in the right way to see a way forward, to string together small hints of information to work out a plan, then you can quickly learn what you need to throw together a tool or script to help you.

At the end of the day, it’s that mindset that is the most useful and sought after skill in any security work.

Can you crack it – GCHQ’s Challenge Comments Off on Can you crack it – GCHQ’s Challenge

So by now you’ve probably heard of GCHQ’s Can You Crack It challenge. I’m not going to give the game away by explaining what to do, but GCHQ do deserve credit for trying to reach a new audience. They certainly know their targets – I couldn’t walk away from this until I’d worked it out, and it was challenging and fun. Good play there guys.

Historically GCHQ have recruited directly from Oxbridge, with a requirement of at least a 2:1 degree in the STEM subjects (Science, Technology, Engineering, Mathematics). In recent years, however, fewer students are taking these subjects – driven, in part, but the lack of jobs for graduates.

The problem for GCHQ is that the salaries on offer are meagre, to say the least. Littering their site with ‘cyber’ this and ‘cyber’ that is bad enough – but £31k per annum for a Senior Cyber Security Specialist position? With awareness of security issues rising across the IT industry, companies are paying top whack in order to attract the best talent.

GCHQ are competing against this, and despite a the recent UK Cyber Security Strategy allocating £650m to protect key UK assets, GCHQ still aren’t offering competitive salaries. Targeting graduates is one thing, but enticing top talent from the private sector is a different matter.

GCHQ should be applauded for this challenge. Not only has this raised the profile of the work they do, it’s also raised awareness of the sort of security challenges we can face. Critically, GCHQ have also acknowledged that their traditional recruiting methods are struggling to find suitable candidates these days, and they’re started trying to tap into a wider pool of talent.

There’s an interesting lesson there for any company that’s claiming it can’t find the right IT people in the current market conditions.

Solaris 11 is launched Comments Off on Solaris 11 is launched

The long wait is over, and Oracle have finally pushed Solaris 11 out of the door. It feels a bit odd to be talking about Oracle releasing a new version of Solaris, but given how long ago Solaris 10 came out, it’s good to see what they’ve been up to.

By now most people should be up to speed with the new features in Solaris 11, like the Automated Installer (AI) and the new IPS packaging system.

ZFS with encryption has been available since Solaris 11 Express was released a year ago. We’ve had a heads-up that support for 32bit x86 CPUs was being dropped, as was support for anything other than T and M class SPARC boxes.

However, there are some extra new features that have come to light with the FCS release:

  • Password caching for su – this is an implementation in PAM that’s similar to the ticketing system used in sudo. Darren Moffat has an entry in his blog that details how to enable it.
  • root is no longer a user, it’s a role. This been the case since Solaris 11 Express, and in OpenIndiana, but it needs repeating
  • Encrypted user home directories, using encrypted ZFS and delegated key management
  • SMF layers – basically allowing a way to apply and manage SMF properties and customisations. You can read more on Sean Wilcox’s blog here.
  • Many new zone tweaks – Immutable Zones, zone boot environments, and different packages in the global zone and other zones
  • Intel AESNI crypto functions have been added to OpenSSL. Previously in Solaris x86, the AESNI functions had been added to the kernel and pkcs11 libraries – now they’re available within OpenSSL as well.

If you can make it to Oracle’s City Office in London next Wednesday, the UK Oracle User Group Solaris SIG (yeah, I know, LOSUG was much less of a mouthful) are having a special Solaris 11 launch event, starting at 2pm and running through the normal meeting in the evening.

You can find more details on the Solaris SIG site here – it promises to be an interesting event that’s well worth attending.

Top of page / Subscribe to new Entries (RSS)