Should Internet domain owners be allowed to hide their identity?

When you buy a new domain name, one of the first choices that you have to make is whether or not to hide whom you are. Every registrar has the ability to mask your contact information, what they call a proxy or private domain service. Typically, these services carry additional monthly fees to the annual domain registration itself. Examples include GoDaddy’s Domains by Proxy, Network Solutions’ Private Domain Registration and Name.com’s Whois Privacy, just to name a few.

The idea is that public disclosure of this information, usually available through the Whois protocol, can provide a target for unsolicited sales calls or spam. Of course, the proxy services can be also be used to protect potential criminal activity such as identity theft, cybersquatting, trademark infringements or to threaten the domain owner for blackmail. If someone needs to get in touch with the actual domain owner, they can apply for a court order or subpoena these services to divulge the contact information.

But as these services have blossomed, they have created a series of issues. There is no common oversight or governance of the proxies and none of them have any accreditation with any national or international Internet standards bodies. On top of this, notification of when a challenge to the proxy varies widely and there aren’t even a set of published best practices. Ideally, it would be nice if domain ownership could be discovered with something other than a subpoena in circumstances where a business is at risk, versus having a very motivated individual that is just trying to track down a specific domain for personal reasons (such as cyber-harassment).

Even the subpoena process isn’t predictable: the domain owner can drag their feet in responding to it, or can lawyer up and try to quash the motion. Or the proxied domain owner can abandon their original domain and open up a new domain that will require a new discovery process. Like many other things, on the Internet no one knows you are a dog, but they can’t easily find out if you are a cat either.

Here is where ICANN comes into play. Earlier this summer ICANN proposed a change to its rules on how domain proxy information can be used. A big change to the current rules is that commercial businesses that own domains won’t be eligible for these proxy services. While nothing has been finalized yet, as you might imagine ICANN has gotten numerous comments. Certainly, having a protected domain registration can be useful in certain circumstances, as the Electronic Frontier Foundation has mentioned here: ”The ability to speak anonymously protects people with unpopular or marginalized opinions, allowing them to speak and be heard without fear of harm. It also protects whistleblowers who expose crime, waste, and corruption.”

That may be true, but still it might be difficult to distinguish when a business or an individual registers a domain with any sort of accuracy. Let’s say I register my strom.com domain to my business, which is called David Strom Inc. (a legitimate corporation registered in Missouri), and want to obscure my contact details. Is that for my own personal purposes or do I have a legit business reason for doing so? If my business is in tech publishing, perhaps obscurity may protect me from harm if a vendor didn’t like my article and wanted to come visit my office and do me harm. Or perhaps it could be a personal reason; such as I don’t want someone who has harassed me in the past to know my current address.

ICANN’s final ruling can take months or years, since they rely on consensus and there are still unresolved issues. In the meantime, you need to do some homework if your business wants to make use of these proxy services. First, you should understand what your domain proxy service is actually promising, what they charge and what information they actually obscure from the standard Whois query. Second, you should know what happens if they receive a subpoena and how they will respond to releasing your contact information. In certain circumstance, the proxy service will put your information in the Whois data after someone sues them if it looks like your business is questionable or if the service might be liable financially. Third, this might be a good time to review all of your domain ownerships and see if any of the contact information is still accurate or any of the employees listed are no longer with your company. Finally, review the ICANN report that is linked above and make sure you understand the various nuances of the proxy world.

The tale of the ProxyHam project

If you are trying to exfiltrate some data from a location and don’t want anyone to capture your source IP address, the best way to do that is to have an anonymous proxy router that can disguise your real IP address behind its own. Such devices have existed for many years, but Ben Caudill has come along with a new version that he calls ProxyHam.

It works by connecting your network to the router’s Wi-Fi bridge, and in turn, it routes your data over a 900 MHz radio to a distant computer with a hi-gain antenna. The antenna picks up the signal and masks your IP address, keeping you at a distance, supposedly safe from detection.

Caudill was scheduled to speak at the DEF CON security conference earlier this month to show off his innovation, under the heading called the Anonymous Proxy Router Project. The presentation was supposed to demonstrate how to build an anonymous proxy router for a couple hundred bucks out of commonly available parts. Sadly, the session was canceled in July; the principles are mum as to the cause. Units that were built by Caudill’s company Rhino Security have been destroyed and aren’t for sale, and the source code is no longer available.

One reasonable explanation for why the talk was canceled is because it’s likely that ProxyHam breaks the law. First, FCC Part 97 has a prohibition against using encryption — such as the SSH or HTTPS protocols that you most certainly would be using with ProxyHam — over the 900 MHz band radio signals. Then, depending on where you place your ProxyHam or its equivalent, you could be doing something unauthorized on the target network, which comes under the Computer Fraud and Abuse Act.

Speculation about the router and the talk has run rampant, and some have noted that this mysterious cancellation all but ensures that Caudill and his anonymous proxy router will be the star of DEF CON — without ever even being demonstrated. “Ben Caudill used some routers and a Raspberry Pi to hack the media,” Brian Benchoff wrote on Hackaday. “If that doesn’t deserve respect, nothing does.”

Enterprise Impact of the Router

Certainly, the idea behind ProxyHam isn’t going away, and various folks around the Internet have stepped up to the challenge. I found three sources on how to build a similar version of the router. Benchoff covered the task for Hackaday, and an alternative anonymous proxy router was suggested by Samy Kamkar via TechWorm. And there is a third post from Robert Graham of Errata Security that shows yet another way to construct the device. All three versions cost about the same and have about the same minimal level of skill required to assemble the various parts.

This means that no matter what the motivations behind ProxyHam and its peers, enterprise IT managers should be on notice. They must be aware that these kinds of devices could be operating over their networks; it is only a matter of time.

The best defense is to make sure you tune your intrusion prevention filters. You can also use other tools to monitor what kinds of data leave your network. If you don’t have any outbound networking monitoring in place, now is the time to consider implementing such a tool. The ProxyHam router isn’t the only way data can be sent off-site: A simple connection to a personal Google Drive account is a lot less work and may be just as effective. But this issue is certainly worth more consideration because of the sheer impact it could have.

Windows XP just can’t get to its end-of-life fast enough

What does an electronic safe and a undersea fiber optic cable-laying ship have in common? Both are still using Windows XP as their underlying operating system. As Microsoft releases Windows 10 this week and we start getting those annoying upgrade messages, it might be amusing to note exactly how hard it is to rid XP from the entire world. Killing off kudzu is probably easier.

The ship is the Rene Descartes and is laying the latest high-speed fiber on behalf of Google and a consortium of telecoms between Japan and Oregon. It promises to carry traffic at 60 Tbps when it is lit up next year. The ship uses Windows XP to drive its very sensitive GPS systems to lay the cable very precisely on the seabed. In shallower waters, the cable is buried by robotic shovels so that commercial fishing boats and sea life don’t accidentally cut the cord. My guess is that these systems were designed a long time ago when XP was the current OS and it isn’t easy to update them. The French mathematician Descartes would agree, after all he once said: “It is only prudent never to place complete confidence in that by which we have even once been deceived.” Also, with all the dough at stake does anyone want to try to mess with a newer OS?

Okay, you can see why XP is used there. But how about a Brinks safe? Most of the safes that I have seen are room-plus sized things that have very heavy doors and very little to do with computers. Brinks also sells a model called the CompuSafe Galileo, which runs software that keeps track of the money that is inserted into it over the course of the day. The notion is that having this software can make it easier for businesses to manage their cash deposits and make sure that no one has their hand in the till, so to speak. Think of this as the industrial-sized version of your banking smartphone app, where you don’t have to actually deposit a check and wait for it to clear but still get credit to your account. The Brinks safe (pictured below) does the same, and can free up time that a business would normally spend on counting the cash and reconciling it with its bank deposits.

However, the safe also runs Windows XP and what is worse, sports a USB port on the outside. At the DefCon conference this week, security researchers showed how they could reboot the safe and take control of its systems, and mess with its underlying Microsoft Access database to open its door and steal the money inside. Yes, you are reading this correctly. All it took was 100 lines of code to make this happen.

And while most of you know the Italian astronomer Galileo, you might not recall one of his more pity quotes: “I do not feel obliged to believe that the same God who has endowed us with sense, reason, and intellect has intended us to forgo their use.” Great words to live by, as Brinks struggles to remove those USB drives and make XP really operate in Safe Mode.

Network security worst practices

I recently came across a company with amazingly poor security practices. Over the course of time, the company was so lax about tracking its laptops that many were either lost or stolen with sensitive customer data, of course kept unencrypted on the laptop’s hard drives. For many months, the company had no Internet firewall. It didn’t track any network egress traffic and didn’t routinely examine any of its network log files to see what what actually going on across its infrastructure. Routine software updates were ignored, many of which had security implications. And the final coup de grace: it never kept any records of who had administrative access to various critical resources.

None of these things are hard to do. All can be done with technology that is common at least ten years ago, in some cases 20 years old. All require some diligence, and staying on top of things, and having the personnel who are responsible for these tasks to actually be doing them on a routine basis. So what happened? You probably won’t be surprised when I tell you that all of these activities were common IT practice at several US government agencies. We aren’t even talking about government contractors (which also fall down on the security job). These are full-time employees, and at agencies that should know better, such as the SEC or NRC. People that handle sensitive stuff.

As an aside, both agencies are among the top places to work for midsized agencies.The SEC actually has two IT specialist job openings (at least for now) that pay quite well. Sounds like a pretty cushy position to me, since you probably spend your time playing computer games or surfing the web.

And I haven’t even gotten to the latest revelations about Chinese hacking into the database of people who have applied for security clearances, which has been happening over the last year. This gives new meaning to being “red flagged.” Quite literally, and one with five yellow stars on it too.

My story gets worse. I should mention that many users were found with that old bugaboo, using “password” as their access passwords. Really? This is more than embarrassing.

And all jokes aside about going with the lowest bidder or cost overruns on $500 toilet seats. These agencies don’t have to buy anything much to cover the basics.

If a private industry CIO had this sort of security record, they would never work in IT ever again, unless to become a motivational speaker and tell people what not to do. Instead, because they are the Feds, we just shake our heads and wonder what is going on, and some how give them a free pass to mess something else up again. It really boils my blood.

I recently had a friend of mine ask me to serve as a reference for his security clearance renewal interviews. So chances are my name is in the hands of the Chinese somewhere. It was an interesting moment for me: when I met the investigator, he showed me his credentials, and I joked with him that I wouldn’t know if they were legit or not, I didn’t even know the name of the agency that he was supposed to be working for. As my friend explained, they aren’t looking for youthful indiscretions (not that I knew him when he was younger) but things that he hasn’t revealed on his application that can somehow be used to compromise him. Too bad the network administrators already blew it for him and millions of other Americans that are serving their country.

Okay, we lived through Healthcare.gov and all that mess. We made it through some pretty massive screw-ups where our 57 different intelligence agencies couldn’t even share basic threat information, or where innocent people with names that are similar to the bad guys are flagged by the TSA. This takes government tech to a new low.

When we can’t have basic, simple IT security practice that just involves people doing their jobs, that gets my goat. This is not a technology problem, it is a leadership and people problem.

Tom’s Hardware: Bitdefender’s Box not recommended

IMG_0008When Bitdefender announced its Box, a new breed of security hardware, I was intrigued. It sadly over-reaches and isn’t quite ready for prime time, will be only useful in a very limited number of circumstances, and falls far short of being the kind of unique protective appliance that it promised.

It is a very unusual product: basically, it supplies the DHCP addresses in conjunction with your existing home router. But getting that combination to work reliability wasn’t pretty, and took weeks of effort too.

You can read my review in Tom’s Hardware today here.

Need help organizing your SAN Storage? Look at Datacore’s SANsymphony-V

If you have a lot of data stored on SANs, you might want to take a look at the latest offering from Datacore Software’s SAN Symphony. I have been testing various versions of this product for more than a decade, and my latest video screencast review can be found here. They make it easier to automatically move data between storage tiers (such as solid state hard drives and cloud repositories) and enable continuous data protection with just a single mouse click. There is also this nifty heat map as you see above that shows your most-active storage tiers.

The post-Snowden era has been a good one for secure email

Email book coverTwo years ago a young man left his girlfriend and home with his laptops and a fantastic story that has changed the world and the way we think about our Internet privacy. I am of course talking about the flight and plight of Ed Snowden and his cache of secret documents about the massive NSA surveillance of electronic communications.

Whether you think Snowden is a patriot or a traitor or somewhere in between, it certainly has been an interesting couple of years in the secure email biz. It is a continued series of ironies, starting with the fact that Snowden had trouble convincing his chosen scribes to make use of encrypted email technology. (He isn’t the only one.) While he ultimately was successful in securing his communications with the press, another irony was how things ended up for him: now he is living in Russia, certainly not one of the most privacy-friendly places in the world. It is also ironic that his Russian residency has enabled his new career as a professional speaker, albeit using various remote video technologies since he can’t get on a plane because he doesn’t have a passport. (Part of me is envious of this, having to still give speeches the old fashioned way by getting on planes. But I am glad that I have my passport.)

But the ironies extend beyond Snowden’s life to more important matters. We have evidence that shows how the NSA abused numerous statutes in what they call “bulk metadata collection” of phone calls and emails. And we all now know what metadata means, and how former NSA director Michael Hayden said last year: “We kill people based on metadata.” Certainly, the Snowden effect is quite real, given the current debates in Congress over reauthorizing various legislative means for them to continue these practices.

And the ultimate irony of them all is another Snowden effect: while the NSA revelations have closed down several secure email providers such as Lavabit and Silent Circle, others have taken their place and encrypted email usage is most likely at an all-time high, thanks to the paranoid and prudent among us.

I have spent a lot of time listening to Snowden’s various public discussions, held at SxSW, with John Oliver for his HBO show, and at a recent conference at Princeton where he exchanged words with a New York Times reporter that broke some of the early stories. And while I am not sure where I stand on the traitor/patriot index, Snowden certainly has a lot of interesting things to say. It is clear that he has spent a good portion of his clandestine career preparing for his media close ups and photo ops. He also has a lot of time on his hands to keep up with current events.

I think Snowden has done more than just about anyone since Phil Zimmerman (the creator of PGP and now involved with DarkMail) to encourage email encryption usage. When Marshall Rose and I wrote a book about corporate email use back in 1998 (cover reproduced above), we said that secure email was “best described as a sucking chest wound.” For most of the last 17 years, secure email was more a curiosity and almost unknown and unused in corporate America. That changed two years ago, and it is catching on in more places.

It is still too difficult to use, as this story in Ars Technica takes you through how to deploy it on an individual basis. Maybe not a sucking chest wound, but still more than just a mere blister to be sure.

I am interested in hearing more about your own secure email usage, and it is partly motivated by a review that I am writing for Network World comparing several of the more useful business-oriented tools. Having used some of these products for decades, I welcome your own thoughts and will let you know when the review is published, probably later this summer.

And if you want to re-read a semi-serious blog post that I wrote last year where I thanked the NSA for enabling all sorts of activities, here you go.

SearchSecurity: The moving target defense and polymorphic protection

We all know what polymorphic malware is: the ability of malware to adapt to current conditions and try to evade security software to do its dirty business on a target computer. This type of malware can easily evade signature-based scanners and other standard means of detection since it is always changing the nature of its attack vectors whenever it executes. But what if we could harness this same behavior and use this defensively, so that we could do good instead of harm?

The idea is for the target computer to appear to be changing, so a piece of malware can’t easily infect it. That seems like a very sophisticated notion and it is gaining traction.

Indeed, polymorphism is just a new way of describing what many academic security researchers have long been calling a “moving target defense,” something that has been under study for quite some time. An Association of Computing Machinery (ACM) conference last November in Arizona covered many ways of implementing such a defense, such as with game theory and other advanced algorithms. Another academic paper goes into lots of implementation detail here.

These research projects have moved into the next stage with a new series of security products from vendors such as JumpSoft, Morphisec, Shape Security (now part of F5) and CyActive, among others. Each of these vendor’s products is still very early, but you can get an idea of what they are trying to do and how quickly this area is evolving.

Certainly, defending Internet-based assets has gotten more complex. Dudu Mimran has blogged about the growing digital gap because “security tools did not evolve at the same pace as IT infrastructure…. Polymorphic defense aims to undermine this prior knowledge foundation and to make attacks much more difficult to craft.” This is because many attackers rely on knowledge about particular operating systems, devices or applications, and then target their weaknesses with their exploits. Making systems harder to identify makes them harder to attack and thus improves online security. Mimram is the CTO for Morphisec, which plans on announcing its first product at the time of the RSA show in April.

Shape Security calls its ShapeShifter product “the first botwall” and is designed as an appliance to protect the user interface to your web servers. As they explain on their website, “The use of polymorphism lets you preserve the functionality of code while transforming how it is expressed. In this example, a simplified login form has certain attributes replaced with random strings. The resulting code breaks malware, bots, or other attacks programmed to submit that form, but renders identically to the original.” By using this polymorphic defense, you can block DDoS, man-in-the-browser, and account takeover attacks.  The appliance is installed behind the load balancer and with a few simple firewall rules to direct traffic to it can be up and running.

One way many websites have been protected in the past is by putting in place rate and volume and IP address limitations to prevent a large series of automated login attempts. Malware actors get around these limits by using a large database of stolen login credentials that are injected using a large-scale distributed botnet running on a huge number of IP addresses.  Another popular past method is to use CAPTCHAs to protect logins; this is falling out of fashion as a number of automated or large-scale manual methods have been developed to defeat them.

Shape’s appliance dynamically changes the underlying code of the protected website each time a page is viewed to defeat the types of scripts used in these kinds of login exploits.

“The ‘poly’ part is the cool factor of this approach in that changes to the architecture can be made continuously and on-the-fly, making the guesswork higher by magnitudes.  With polymorphism in place, attackers cannot build effective repurposable attacks against the protected area, “ says Mimram on his blog. He suggests that all polymorphic defenses share the following four attributes:

  • First, you start with some sort of trusted source that controls the dynamic changes to the host.
  • Next, you build a solution that isn’t easily identified with the typical attack patterns which makes them much more resilient.
  • You integrate the internal code changes in such a way that these changes aren’t readily apparent to external users or software programs.
  • On top of this, you harden your code to make reverse engineering and propagation very difficult.

CyActive uses bio-inspired algorithms as training data for a smart detector that can identify and stop future malware variants. Earlier this month PayPal acquired their technology, showing just how serious this market segment is getting.

JumpSoft claimed to protect all layer 7 applications with their code.

Whether these polymorphic defenses will prove vulnerable to even more sophisticated exploits isn’t yet clear. But at least turnabout is fair play, and the bad guys are finally getting a taste of their own evil-tasting medicine.

SearchSecurity.com: Postcards from the New Network Edge

With distributed workforces and mobile technologies, the network perimeter has evolved beyond the physical limits of most corporate campuses. The days when the perimeter was an actual boundary are a fond memory. Back then, firewalls did a decent job of protecting the network from outside threats, and intrusion prevention tools protected against insiders. But over time, the bad guys have gotten better: Spear phishing has made it easier to infiltrate malware, and poor password controls have made it easier to exfiltrate data. This means that the insiders are getting harder to detect, and IT assets are getting more distributed and harder to defend.

You can read my story in SearchSecurity here about four strategies for defending the new network edge. Or watch my video slideshow where I cover some additional points.

CDW StateTech Magazine: Review of Citrix XenMobile

xenmobile1Citrix has long offered mobile device management software in cloud and on-premises versions. The latest version, XenMobile 10, offers some welcome enhancements to the user experience and security. In my review for CDW’s State Tech Magazine, I walk through some of the notable features. Citrix sells three different software bundles under its XenMobile brand: XenMobile MDM, XenMobile App and XenMobile Enterprise editions.There are differences that you should be aware of.