<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>The Guerilla CISO</title>
	<atom:link href="http://www.guerilla-ciso.com/feed" rel="self" type="application/rss+xml" />
	<link>http://www.guerilla-ciso.com</link>
	<description>Life in the Information Assurance Salt Mines</description>
	<lastBuildDate>Fri, 26 Oct 2012 01:36:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<site xmlns="com-wordpress:feed-additions:1">1079414</site>	<item>
		<title>DDoS Vocabulary and Mathematics</title>
		<link>http://www.guerilla-ciso.com/archives/2170</link>
					<comments>http://www.guerilla-ciso.com/archives/2170#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Fri, 26 Oct 2012 01:36:40 +0000</pubDate>
				<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Hack the Planet]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2170</guid>

					<description><![CDATA[<p>Some language and math that come in handy when you talk about or fight Distributed Denial of Service&#8230; Distributed Denial of Service: an attack that uses a number of attacking nodes that overwhelm the target with network, web, or application traffic.  DDoS implies 100 or more nodes attacking the same target, although just about everybody [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2170">DDoS Vocabulary and Mathematics</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Some language and math that come in handy when you talk about or fight Distributed Denial of Service&#8230;</p>
<p><strong>Distributed Denial of Service:</strong> an attack that uses a number of attacking nodes that overwhelm the target with network, web, or application traffic.  DDoS implies 100 or more nodes attacking the same target, although just about everybody has their own threshold for what consitutes &#8220;distributed&#8221;.</p>
<p><strong>Command and Control (C2):</strong> how the attackers get instructions to the attacking nodes.  This could be automated in the case of a botnet (and probably what defines a botnet if you think about it too hard) or done manually as in the case of some booter scripts, or, as in the case of hacktivists, done with IRC, flyers, manifestos, and forums.  Different C2 has different strengths and weaknesses.</p>
<p><strong>Node:</strong> a unique IP address that is participating in a DDoS. <em>Not to be confused with node.js.</em>  =)</p>
<p><strong>Lethality:</strong> The lethality of a DDoS is a function of the number of attacking nodes times the average bandwidth per node with efficiency multipliers for how high in the technology stack that the attack goes (layer 3/4 versus 5-7) and if the nodes all attack at the same time (determined by the quality of the attacker&#8217;s command and control (C2) ).  It really is a brute force numbers game for the most part.</p>
<p><strong>Average Bandwidth:</strong></p>
<ul>
<li>Home users in US: 1-2 Mbps</li>
<li>Home users in South America, Africa, South Asia: .5 Mbps</li>
<li>Home users in South Korea, Japan: 5Mbps</li>
<li>Virtual Private Server: 100Mbps</li>
<li>Core Routers: 1000Mbps and up</li>
</ul>
<p><strong>Number of Nodes:</strong> divide the total bandwidth of attack traffic received by the average node bandwidth to determine how many attacking nodes there are.  So, for example, a hacktivist army attacking a site and bringing 2Gbps of attack traffic has around 2,000-4,000 participants.</p>
<p><strong>Recruitment:</strong> how fast the attackers (botnet via malware, hacktivists, homebrew botnet, etc) can add nodes to the attack.  This could also be correlated with rates of infection for botnets consisting of home PC users, rates of exploits for servers, number of hacktivists joining in the campaign, etc.</p>
<p><strong>Attrition:</strong> how fast the attackers lose nodes.  This could be due to ISPs blocking node access due to detection of attack traffic or bandwidth caps, hacktivists headed off to work during the week, the end of a significant campaign, or the general lack of interest in the attack.</p>
<p><strong>Rate of Growth or Decay of an Attack:</strong> total size of attacking nodes plus recruitment minus attrition.</p>
<p style="text-align: center;"> <img decoding="async" loading="lazy" class="alignnone" title="Cute Bot Couple" src="http://farm6.staticflickr.com/5218/5456687652_53b1d19a53.jpg" alt="" width="500" height="500" /></p>
<p style="text-align: center;"><em>Cute Bot Couple photo by <a href="http://www.flickr.com/photos/ittybittiesforyou/">Jenn and Tony Bot</a></em></p>
<p style="text-align: center;"><em> </em></p>
<p>&nbsp;</p>
<p>&nbsp;<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1961" rel="bookmark" title="August 17, 2011">DDoS Planning: Business Continuity with a Twist</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2144" rel="bookmark" title="May 10, 2012">DDoS and Elections</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1865" rel="bookmark" title="September 29, 2010">Keeping Up With the DDoS Kids</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1891" rel="bookmark" title="November 2, 2010">My Month of Entertainment</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2049" rel="bookmark" title="August 23, 2011">The Rise of the Slow Denial of Service</a></li>
</ul>
<p><!-- Similar Posts took 6.427 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2170">DDoS Vocabulary and Mathematics</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2170/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2170</post-id>	</item>
		<item>
		<title>DDoS and Elections</title>
		<link>http://www.guerilla-ciso.com/archives/2144</link>
					<comments>http://www.guerilla-ciso.com/archives/2144#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Thu, 10 May 2012 11:42:20 +0000</pubDate>
				<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Hack the Planet]]></category>
		<category><![CDATA[cashcows]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[scalability]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2144</guid>

					<description><![CDATA[<p>I&#8217;ve noticed a trend over the past 6 months: DDoS traffic associated with elections.  A quick sampling of news will show the following: http://www.opendemocracy.net/od-russia/irina-borogan-andrei-soldatov/kremlin-and-hackers-partners-in-crime &#60;-Russia http://www.theregister.co.uk/2012/03/26/hong_kong_vote_hack/ &#60;-Hong Kong http://www.theregister.co.uk/2011/12/07/korean_election_ddos_row/ &#60;-Korea http://www.cbc.ca/news/politics/story/2012/03/27/pol-ndp-voting-disruption-deliberate.html &#60;-Canada (rybolov: yikes!) http://www.csoonline.com/article/700523/ddos-attackers-target-russian-election-webcams &#60;-Russia again Last week it picked up again with the re-inauguration of Vladimir Putin. http://en.ria.ru/russia/20120506/173265737.html http://www.washingtonpost.com/world/europe/peaceful-protest-turns-violent-in-moscow/2012/05/06/gIQAFti35T_story.html http://english.ruvr.ru/2012_05_06/73954450/ http://www.rferl.org/content/independent_russian_daily_hit_by_dos_attack_kommersant/24571463.html And then yesterday, Ustream and their awesome response: which, [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2144">DDoS and Elections</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ve noticed a trend over the past 6 months: DDoS traffic associated with elections.  A quick sampling of news will show the following:</p>
<ul>
<li><a href="http://www.opendemocracy.net/od-russia/irina-borogan-andrei-soldatov/kremlin-and-hackers-partners-in-crime">http://www.opendemocracy.net/od-russia/irina-borogan-andrei-soldatov/kremlin-and-hackers-partners-in-crime</a> &lt;-Russia</li>
<li><a href="http://www.theregister.co.uk/2012/03/26/hong_kong_vote_hack/">http://www.theregister.co.uk/2012/03/26/hong_kong_vote_hack/</a> &lt;-Hong Kong</li>
<li><a href="http://www.theregister.co.uk/2011/12/07/korean_election_ddos_row/">http://www.theregister.co.uk/2011/12/07/korean_election_ddos_row/</a> &lt;-Korea</li>
<li><a href="http://www.cbc.ca/news/politics/story/2012/03/27/pol-ndp-voting-disruption-deliberate.html">http://www.cbc.ca/news/politics/story/2012/03/27/pol-ndp-voting-disruption-deliberate.html</a> &lt;-Canada (rybolov: yikes!)</li>
<li><a href="http://www.csoonline.com/article/700523/ddos-attackers-target-russian-election-webcams">http://www.csoonline.com/article/700523/ddos-attackers-target-russian-election-webcams</a> &lt;-Russia again</li>
</ul>
<p>Last week it picked up again with the re-inauguration of Vladimir Putin.</p>
<ul>
<li><a href="http://en.ria.ru/russia/20120506/173265737.html">http://en.ria.ru/russia/20120506/173265737.html</a></li>
<li><a href="http://www.washingtonpost.com/world/europe/peaceful-protest-turns-violent-in-moscow/2012/05/06/gIQAFti35T_story.html">http://www.washingtonpost.com/world/europe/peaceful-protest-turns-violent-in-moscow/2012/05/06/gIQAFti35T_story.html</a></li>
<li><a href="http://english.ruvr.ru/2012_05_06/73954450/">http://english.ruvr.ru/2012_05_06/73954450/</a></li>
<li><a href="http://www.rferl.org/content/independent_russian_daily_hit_by_dos_attack_kommersant/24571463.html">http://www.rferl.org/content/independent_russian_daily_hit_by_dos_attack_kommersant/24571463.html</a></li>
</ul>
<p>And then yesterday, <a title="Ustream DDoS" href="http://venturebeat.com/2012/05/09/ustream-russia-ddos-attack/" target="_blank">Ustream and their awesome response</a>: which, in the Rybolov-paraphrased version read something like: &#8220;We shall go on to the end. We shall fight in France, we shall fight on the Interblagosphere, we shall fight with growing confidence and growing strength in our blocking capabilities, we shall defend our videostreams, whatever the cost may be. We shall fight on the routers, we shall fight on the load balancers, we shall fight in the applications and in the databases, we shall fight by building our own Russian subsite; we shall never surrender!!!!1111&#8221; (<a title="We Shall Fight Them On the Beaches" href="http://en.wikipedia.org/wiki/We_shall_fight_on_the_beaches" target="_blank">Ref</a>)</p>
<p style="text-align: center;"><em><img decoding="async" loading="lazy" class="alignnone" title="Afghanistan Presidential Election 2004" src="http://farm4.staticflickr.com/3132/2895027757_7b93ba151d.jpg" alt="Afghanistan Presidential Election 2004" width="500" height="375" /></em></p>
<p style="text-align: center;"><em>Afghanistan Presidential Elections 2004 photo by <a href="http://www.flickr.com/photos/rybolov/">rybolov</a>.</em></p>
<p>So why all this political activity?  A couple of reasons that I can point to:</p>
<ul>
<li><strong>Elections are a point-in-time.</strong>  It&#8217;s critical for one day.  Anything that has a short window of time is a good DDoS target.</li>
<li><strong>DDoS is easy to do.</strong>  Especially for the Russians.  Some of them already have big botnets they&#8217;re using for other things.</li>
<li><strong>Other DDoS campaigns.</strong>  Chaotic Actors (Anonymous and their offshoots and factions) have demonstrated that DDoS has at a minimum PR value and at the maximum financial and political value.</li>
<li><strong>Campaign sites are usually put up very quickly.</strong>  They don&#8217;t have much supporting infrastructure and full/paid/professional staffing.</li>
<li><strong>Elections are IRL Flash Mobs.</strong>  Traffic to a campaign site increases slowly at first then exponentially the closer you get to the day of the election.  This stresses what infrastructure is in place and design ideas that seemed good at the time but that don&#8217;t scale with the increased load.</li>
</ul>
<p>So is this the future of political campaigns?  I definitely think it is.  Just like any other type of web traffic, as soon as somebody figures out how to use the technology for their benefit (information sharing =&gt; eCommerce =&gt; online banking =&gt; political fundraising), a generation later somebody else figures out how to deny that benefit.</p>
<p>How to combat election DDoS:</p>
<ul>
<li>Have a plan.  You know that the site is going to get flooded the week of the election.  Prepare accordingly.  *ahem* Expect them.</li>
<li>Tune applications and do caching at the database, application, webserver, load balancer, content delivery network, etc.</li>
<li>Throw out the dynamic site.  On election day, people just want to know a handful of things.  Put those on a static version of the site and switch to that.  Even if you have to publish by hand every 30 minutes, it&#8217;s better than taking a huge outage.</li>
<li>Manage the non-web traffic.  SYN and UDP floods have been around for years and years and still work in some cases.  For these attacks, you need lots of bandwidth and something that does blocking: these point to a service provider that offers DDoS protection.</li>
</ul>
<p>It&#8217;s going to be an interesting November.<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1865" rel="bookmark" title="September 29, 2010">Keeping Up With the DDoS Kids</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1961" rel="bookmark" title="August 17, 2011">DDoS Planning: Business Continuity with a Twist</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1964" rel="bookmark" title="December 16, 2010">DojoCon DDoS Video</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2049" rel="bookmark" title="August 23, 2011">The Rise of the Slow Denial of Service</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2063" rel="bookmark" title="August 30, 2011">Apache Killer Effects on Target</a></li>
</ul>
<p><!-- Similar Posts took 6.752 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2144">DDoS and Elections</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2144/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2144</post-id>	</item>
		<item>
		<title>FedRAMP: It&#8217;s Here but Not Yet Here</title>
		<link>http://www.guerilla-ciso.com/archives/2121</link>
					<comments>http://www.guerilla-ciso.com/archives/2121#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Mon, 12 Dec 2011 15:38:28 +0000</pubDate>
				<category><![CDATA[DISA]]></category>
		<category><![CDATA[FISMA]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Outsourcing]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[800-37]]></category>
		<category><![CDATA[800-53]]></category>
		<category><![CDATA[800-53A]]></category>
		<category><![CDATA[accreditation]]></category>
		<category><![CDATA[C&A]]></category>
		<category><![CDATA[catalogofcontrols]]></category>
		<category><![CDATA[categorization]]></category>
		<category><![CDATA[certification]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloudcomputing]]></category>
		<category><![CDATA[comments]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[dhs]]></category>
		<category><![CDATA[fedramp]]></category>
		<category><![CDATA[fisma]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[infosharing]]></category>
		<category><![CDATA[itsatrap]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[moneymoneymoney]]></category>
		<category><![CDATA[omb]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2121</guid>

					<description><![CDATA[<p>Contrary to what you might hear this week in the trade press, FedRAMP is not fully unveiled although there was some much-awaited progress. There was a memo that came out from the administration (PDF caveat).  Basically what it does is lay down the authority and responsibility for the Program Management Office and set some timelines.  [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2121">FedRAMP: It’s Here but Not Yet Here</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Contrary to what you might hear this week in the trade press, <a title="FedRAMP website" href="http://www.fedramp.gov" target="_blank">FedRAMP</a> is not fully unveiled although there was some much-awaited progress. There was <a href="http://www.cio.gov/fedrampmemo.pdf">a memo that came out from the administration</a> (PDF caveat).  Basically what it does is lay down the authority and responsibility for the Program Management Office and set some timelines.  This is good, and we needed it a year and a half ago.</p>
<p>However, people need to stop talking about how FedRAMP has solved all their problems because the entire program isn&#8217;t here yet.  Until you have a process document and a catalog of controls to evaluate, you don&#8217;t know how the program is going to help or hinder you, so all the press about it is speculation.<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1973" rel="bookmark" title="February 15, 2011">Reinventing FedRAMP</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1714" rel="bookmark" title="June 2, 2010">NIST Cloud Conference Recap</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/406" rel="bookmark" title="June 9, 2008">An Open Letter to NIST About SP 800-30</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1351" rel="bookmark" title="October 1, 2009">The Guerilla CISO Rants: Don&#8217;t Write a System Security Plan</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2013" rel="bookmark" title="April 26, 2011">Clouds, FISMA, and the Lawyers</a></li>
</ul>
<p><!-- Similar Posts took 5.232 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2121">FedRAMP: It’s Here but Not Yet Here</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2121/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2121</post-id>	</item>
		<item>
		<title>The &#8220;Off The Record&#8221; Track</title>
		<link>http://www.guerilla-ciso.com/archives/2099</link>
					<comments>http://www.guerilla-ciso.com/archives/2099#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Mon, 21 Nov 2011 18:58:30 +0000</pubDate>
				<category><![CDATA[Public Policy]]></category>
		<category><![CDATA[Speaking]]></category>
		<category><![CDATA[What Doesn't Work]]></category>
		<category><![CDATA[What Works]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[infosharing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[speaking]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2099</guid>

					<description><![CDATA[<p>So while I was at some conferences over the past couple of months, I had an awesome idea while sitting in a panel about data breaches, especially notification. While streaming conferences is pretty awesome for most content, I keep thinking that we need that as an industry we need the exact opposite: a track of [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2099">The “Off The Record” Track</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>So while I was at some conferences over the past couple of months, I had an awesome idea while sitting in a panel about data breaches, especially notification. While streaming conferences is pretty awesome for most content, I keep thinking that we need that as an industry we need the exact opposite: a track of the conference that is completely off-the-record.</p>
<p>Here in DC when we do smaller training sessions, we invoke the <a title="Book of Knowledge entry on Chatham House Rule" href="http://en.wikipedia.org/wiki/Chatham_House_Rule" target="_blank">Chatham House Rule</a>.  That is, the discussion is for non-attribution.  There are several reasons behind this:</p>
<ul>
<li>You don&#8217;t have to worry (too much, anyway) about vendors in attendance selling you something</li>
<li>It won&#8217;t end up in the press</li>
<li>It gets real information to people instead of things that are &#8220;fit for public consumption&#8221;</li>
</ul>
<p>My local area has a hackers association (No linkie, if you have minimal skill you can find it) that meets to talk about mostly technical stuff and what folks are working on.  I find that more and more often when I do a talk there I do it &#8220;Off the Record&#8221; for a wide variety of reasons:</p>
<ul>
<li>I don&#8217;t want the attackers to get more effective</li>
<li>I have half-baked ideas where I want/need feedback on if they are completely off-base</li>
<li>The subject matter is in a legal gray-area and I&#8217;m not a lawyer</li>
<li>I talk &#8220;on the record&#8221; all day every day about the same things</li>
<li>I can &#8220;test-drive&#8221; presentation material to see how it works</li>
<li>I can show nuts and bolts</li>
</ul>
<p>So, the point of all this is that maybe we need to start having more frank discussions about what the bad guys are doing &#8220;in the wild&#8221; if we want to stop them, and that involves talking with peers from other companies inside the same industry to see what they are getting hit with.</p>
<p style="text-align: center;"><em><img decoding="async" loading="lazy" class="aligncenter" title="Chatham House Rule" src="http://farm3.staticflickr.com/2503/4150834328_da4858e352.jpg" alt="Chatham House Rule" width="500" height="375" /></em></p>
<p style="text-align: center;"><em>Chatham House Rule photo by <strong id="yui_3_4_0_3_1321893609786_928"><a href="http://www.flickr.com/photos/markhillary/">markhillary</a></strong>.</em></p>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1383" rel="bookmark" title="October 16, 2009">Massively Scaled Security Solutions for Massively Scaled IT</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1818" rel="bookmark" title="August 13, 2010">Metricon 5 Wrapup</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/424" rel="bookmark" title="June 26, 2008">Civilians Ask &#8220;What&#8217;s With All the Privacy Act Kerfluffle?&#8221;</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1101" rel="bookmark" title="June 11, 2009">Privacy Camp DC on June 20th</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1328" rel="bookmark" title="September 21, 2009">Where is Rybolov?</a></li>
</ul>
<p><!-- Similar Posts took 4.244 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2099">The “Off The Record” Track</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2099/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2099</post-id>	</item>
		<item>
		<title>DHS is Looking for a CISO</title>
		<link>http://www.guerilla-ciso.com/archives/2105</link>
					<comments>http://www.guerilla-ciso.com/archives/2105#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Fri, 04 Nov 2011 20:38:02 +0000</pubDate>
				<category><![CDATA[FISMA]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Odds-n-Sods]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[itsatrap]]></category>
		<category><![CDATA[job]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2105</guid>

					<description><![CDATA[<p>Job announcement is here.  Share with anybody you think can do it.Similar Posts: Radio Nigel Why You Should Care About Security and the Government Help the Government, Become Literate SP 800-53A Now Finally Final Wanted: Some SCAP Wranglers</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2105">DHS is Looking for a CISO</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><a title="DHS CISO Job Announcement" href="http://www.usajobs.gov/GetJob/PrintPreview/301181700">Job announcement is here</a>.  Share with anybody you think can do it.<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/104" rel="bookmark" title="February 14, 2007">Radio Nigel</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/408" rel="bookmark" title="June 3, 2008">Why You Should Care About Security and the Government</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/276" rel="bookmark" title="October 22, 2007">Help the Government, Become Literate</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/429" rel="bookmark" title="July 1, 2008">SP 800-53A Now Finally Final</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1029" rel="bookmark" title="May 18, 2009">Wanted: Some SCAP Wranglers</a></li>
</ul>
<p><!-- Similar Posts took 2.770 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2105">DHS is Looking for a CISO</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2105/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2105</post-id>	</item>
		<item>
		<title>#RefRef the Vaporware DoS Tool</title>
		<link>http://www.guerilla-ciso.com/archives/2089</link>
					<comments>http://www.guerilla-ciso.com/archives/2089#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Fri, 23 Sep 2011 18:53:59 +0000</pubDate>
				<category><![CDATA[DDoS]]></category>
		<category><![CDATA[IKANHAZFIZMA]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[denial of service]]></category>
		<category><![CDATA[dos]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[lolcats]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2089</guid>

					<description><![CDATA[<p>Ah yes, you now know how I spend my Saturday mornings lately. Similar Posts: DDoS Planning: Business Continuity with a Twist The Rise of the Slow Denial of Service Training the Apache Killers Oh to be a Program Manager A Little Story About a Tool Named #RefRef</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2089">#RefRef the Vaporware DoS Tool</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Ah yes, you now know how I spend my Saturday mornings lately.</p>
<p><a href="http://cheezburger.com/View/5219233536"><img decoding="async" id="_r_a_5219233536" class="event-item-lol-image aligncenter" title="i gotz up at 7AM for #RefRef and all i kan haz is this t-shirt?" src="http://images.cheezburger.com/completestore/2011/9/19/e262a840-a973-4e77-ae37-1085399e24b1.jpg" alt="i gotz up at 7AM for #RefRef and all i kan haz is this t-shirt?" /></a><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1961" rel="bookmark" title="August 17, 2011">DDoS Planning: Business Continuity with a Twist</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2049" rel="bookmark" title="August 23, 2011">The Rise of the Slow Denial of Service</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2076" rel="bookmark" title="September 2, 2011">Training the Apache Killers</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/628" rel="bookmark" title="December 11, 2008">Oh to be a Program Manager</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2085" rel="bookmark" title="September 23, 2011">A Little Story About a Tool Named #RefRef</a></li>
</ul>
<p><!-- Similar Posts took 3.900 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2089">#RefRef the Vaporware DoS Tool</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2089/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2089</post-id>	</item>
		<item>
		<title>A Little Story About a Tool Named #RefRef</title>
		<link>http://www.guerilla-ciso.com/archives/2085</link>
					<comments>http://www.guerilla-ciso.com/archives/2085#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Fri, 23 Sep 2011 18:53:34 +0000</pubDate>
				<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[dos]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[scalability]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2085</guid>

					<description><![CDATA[<p>Let me tell you a little story. So September 17th was Constitution Day and was celebrated by protestors in most major cities across the US with a sizable percentage of folks on Wall Street in NYC.  In conjunction with this protest, a new Denial-of-Service tool, #RefRef, was supposed to be released.  It supposedly used some [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2085">A Little Story About a Tool Named #RefRef</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Let me tell you a little story.</p>
<p>So September 17th was Constitution Day and was celebrated by protestors in most major cities across the US with a sizable percentage of folks on Wall Street in NYC.  In conjunction with this protest, a new Denial-of-Service tool, #RefRef, was supposed to be released.  It supposedly used some SQL Injection techniques to put a file (originally listed as a JavaScript but Java is more believable) on application or database servers that then created massive amounts of OS load, thereby crippling the server.  The <a title="#RefRef Coverage" href="http://www.thetechherald.com/article.php/201130/7445/Anonymous-testing-LOIC-replacements-new-tool-uses-server-exploits" target="_blank">press coverage of the tool</a> does have the quote of the year: &#8220;“Imagine giving a large beast a simple carrot, [and then] watching the best choke itself to death.&#8221;  Seriously?</p>
<p>Then came the 17th.  I checked the site, whoa, there is some perl code there.  Then I read it and it sounded nothing like the tool as described.  Rumor around the Intertubes was that #RefRef was/is a hoax and that the people responsible were collecting donations for R&amp;D.</p>
<p>This is what we actually have for the tool that was released on the RefRef site does:</p>
<p style="padding-left: 30px;">GET /%20and%20(select+benchmark(99999999999,0x70726f62616e646f70726f62616e646f70726f62616e646f)) HTTP/1.1<br />
TE: deflate,gzip;q=0.3<br />
Connection: TE, close<br />
Host: localhost<br />
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8.1.12) Gecko/20080201Firefox/2.0.0.12</p>
<p>The way this works is that it requests a large amount of benchmark queries against the database.  This is very similar to SQL Injection in that the request contains database commands which are then passed by the application server to the database.  In this case, the SQL command is &#8220;benchmark&#8221; which executes the query multiple times to build test performance of the query.  As you would guess, it generates a ton of database server load.  However, it&#8217;s only applicable to MySQL.<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/2063" rel="bookmark" title="August 30, 2011">Apache Killer Effects on Target</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1865" rel="bookmark" title="September 29, 2010">Keeping Up With the DDoS Kids</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2089" rel="bookmark" title="September 23, 2011">#RefRef the Vaporware DoS Tool</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1961" rel="bookmark" title="August 17, 2011">DDoS Planning: Business Continuity with a Twist</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2049" rel="bookmark" title="August 23, 2011">The Rise of the Slow Denial of Service</a></li>
</ul>
<p><!-- Similar Posts took 5.640 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2085">A Little Story About a Tool Named #RefRef</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2085/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2085</post-id>	</item>
		<item>
		<title>Training the Apache Killers</title>
		<link>http://www.guerilla-ciso.com/archives/2076</link>
					<comments>http://www.guerilla-ciso.com/archives/2076#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Fri, 02 Sep 2011 16:50:36 +0000</pubDate>
				<category><![CDATA[DDoS]]></category>
		<category><![CDATA[IKANHAZFIZMA]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[lolcats]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2076</guid>

					<description><![CDATA[<p>Here at IKANHAZFIZMA, we&#8217;re training the next generation of Apache webserver Denial-of-Service gurus.  It involves punching bags, some nomz for the troops, and lots of requests for kibble. Similar Posts: The Rise of the Slow Denial of Service A Little Story About a Tool Named #RefRef DDoS and Elections DDoS Planning: Business Continuity with a [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2076">Training the Apache Killers</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Here at IKANHAZFIZMA, we&#8217;re training the next generation of Apache webserver Denial-of-Service gurus.  It involves punching bags, some nomz for the troops, and lots of requests for kibble.</p>
<p><a href="http://cheezburger.com/View/5159547904"><img decoding="async" id="_r_a_5159547904" class="event-item-lol-image aligncenter" title="ir in training" src="http://images.cheezburger.com/completestore/2011/9/2/3bacb70f-b638-4270-9875-0ecd9469d327.jpg" alt="ir in training" /></a><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/2049" rel="bookmark" title="August 23, 2011">The Rise of the Slow Denial of Service</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2085" rel="bookmark" title="September 23, 2011">A Little Story About a Tool Named #RefRef</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2144" rel="bookmark" title="May 10, 2012">DDoS and Elections</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1961" rel="bookmark" title="August 17, 2011">DDoS Planning: Business Continuity with a Twist</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1954" rel="bookmark" title="December 16, 2010">no rly, iz protest</a></li>
</ul>
<p><!-- Similar Posts took 4.180 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2076">Training the Apache Killers</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2076/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2076</post-id>	</item>
		<item>
		<title>Apache Killer Effects on Target</title>
		<link>http://www.guerilla-ciso.com/archives/2063</link>
					<comments>http://www.guerilla-ciso.com/archives/2063#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Tue, 30 Aug 2011 13:49:14 +0000</pubDate>
				<category><![CDATA[Hack the Planet]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[denial of service]]></category>
		<category><![CDATA[dos]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2063</guid>

					<description><![CDATA[<p>Oh noes, the web is broken.  Again.  This time it&#8217;s the Apache Killer.  This inspired a little ditty from @CSOAndy based on a Talking Heads tune: I can&#8217;t seem 2 handle the ranges I&#8217;m forked &#38; memlocked &#38; I Can&#8217;t spawn I can&#8217;t sleep &#8217;cause my net&#8217;s afire Don&#8217;t spawn me I&#8217;m a dead server [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2063">Apache Killer Effects on Target</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Oh noes, the web is broken.  Again.  This time it&#8217;s the Apache Killer.  This inspired a little ditty from <a title="Andy's Apache Killer" href="http://twitter.com/#!/csoandy/status/107188648897818624" target="_blank">@CSOAndy</a> based on a <a title="Psycho Killer" href="http://www.youtube.com/watch?v=-pCZ5E5tn4I" target="_blank">Talking Heads tune</a>:</p>
<p style="padding-left: 30px;"><em>I can&#8217;t seem 2 handle the ranges </em></p>
<p style="padding-left: 30px;"><em>I&#8217;m forked &amp; memlocked &amp; I Can&#8217;t spawn </em></p>
<p style="padding-left: 30px;"><em>I can&#8217;t sleep &#8217;cause my net&#8217;s afire</em></p>
<p style="padding-left: 30px;"><em>Don&#8217;t spawn me I&#8217;m a dead server</em></p>
<p style="padding-left: 30px;"><em>Apache Killer Qu&#8217;est-ce que c&#8217;est </em></p>
<p style="padding-left: 30px;"><em>da da da da da da da da da dos me now </em></p>
<p style="padding-left: 30px;"><em>Fork fork fork fork fork fork fork away</em></p>
<p>Going back to my blog post last week about <a href="http://www.guerilla-ciso.com/archives/2049">Slow Denial-of-Service</a>, let&#8217;s look at what Apache Killer is.  <a title="We Got Yer PCAP Here" href="http://www.hungryfishconsulting.com/apachekiller/ApacheKiller.pcap" target="_blank">Yes kan haz packet capture for packet monkeys</a> (caveat: 2.3MB worth of packets)</p>
<p><strong>Home on the Range</strong></p>
<p>The Apache vulnerability uses a HTTP header called &#8220;Range&#8221;.  Range is used for partial downloads, these are common in streaming video, in the &#8220;resume&#8221; feature for large downloads, and in some PDF/eDocument readers (Acrobat Reader does this in a big way).  That way, the client (which is almost never a web browser in this case) can request a specific byte range or multiple byte ranges of an object instead of requesting &#8220;the whole enchilada&#8221;.  This is actually a good thing because it reduces the amount of traffic coming from a webserver, that&#8217;s why it&#8217;s part of the HTTP spec.  However, the spec is broken in some ways:</p>
<ul>
<li>It has no upper limit on the number of ranges in a request.</li>
<li>It has no way to specify that a webserver is only servicing a specific number of ranges (maybe with a <a title="HTTP 416 Response" href="http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.4.17" target="_blank">416 response code</a>).</li>
<li type="_moz">The spec allows overlapping ranges.</li>
</ul>
<p>In the interests of science, I&#8217;ll provide a sample of Range request Apache combined logs so you can see how these work in the wild, <a title="206 Response Codes and Logs" href="http://www.hungryfishconsulting.com/apachekiller/206traffic.txt" target="_blank">have a look here</a> and the command used to make this monstrosity was this: zcat /var/log/apache2/www.guerilla-ciso.com.access.log.*.gz | awk &#8216;($9 ~ /206/)&#8217; | tail -n 500 &gt; 206traffic.txt</p>
<p><strong>Apache Killer</strong></p>
<p>Now for what Apache Killer does.  You can go check out the code at the listing on the <a title="Apache Killer" href="http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110820/848b4dca/attachment.obj" target="_blank">Full Disclosure Mailing List</a>.  Basic steps for this tool:</p>
<ul>
<li>Execute a loop to stitch together a Range header with multiple overlapping ranges</li>
<li>Stitch the Range into a HTTP request</li>
<li>Send the HTTP request via a net socket</li>
</ul>
<p>The request looks like this, note that there are some logic errors in how the Range is stitched together, some of the ranges have start values that are after the end value if the start &lt; 5 and the first range doesn&#8217;t have an end value:</p>
<p style="padding-left: 30px;">HEAD / HTTP/1.1<br />
Host: localhost<br />
Range:bytes=0-,5-0,5-1,5-2,5-3,5-4,5-5,5-6,5-7,5-8,5-9,5-10,5-11,<em><strong>&lt;rybolov deleted this for brevity&#8217;s sake&gt;</strong></em>5-1293,5-1294,5-1295,5-1296,5-1297,5-1298,5-1299<br />
Accept-Encoding: gzip<br />
Connection: close</p>
<p><strong>What The Apache Sees</strong></p>
<p>So this brings us to the effect on target.  The normal behavior for a Range request is to do something like the following:</p>
<ul>
<li>Load the object off disk (or from an application handler like php or mod_perl)</li>
<li>Return a 206 Partial Content</li>
<li>Respond with multiple objects to satisfy the ranges that were requested</li>
</ul>
<p>In the case of Apache Killer, Apache responds in the following way:</p>
<p style="padding-left: 30px;">HTTP/1.1 206 Partial Content<br />
Date: Tue, 30 Aug 2011 01:00:28 GMT<br />
Server: Apache/2.2.17 (Ubuntu)<br />
Last-Modified: Tue, 30 Aug 2011 00:18:51 GMT<br />
ETag: &#8220;c09c8-0-4abadf4c57e50&#8221;<br />
Accept-Ranges: bytes<br />
Vary: Accept-Encoding<br />
Content-Encoding: gzip<br />
Content-Length: 123040<br />
Connection: close<br />
Content-Type: multipart/byteranges; boundary=4abae89a423c2199d</p>
<p>Of course, in trying to satisfy the Range request, apache loads the object into memory but then there is a huge amount of ranges and because the ranges are overlapping, Apache has to load a new version of the object to satisfy each byte range.  This results in a memory fork.  It also keeps that server process busy, resulting in a process fork attack like a <a href="http://www.guerilla-ciso.com/archives/2049">Slow DoS</a> would also do.</p>
<p>The Apache access log (on a Debian derivative it&#8217;s in /var/log/apache2/access.log )</p>
<p>127.0.0.1 &#8211; &#8211; [29/Aug/2011:18:00:34 -0700] &#8220;HEAD / HTTP/1.1&#8221; 206 353 &#8220;-&#8221; &#8220;-&#8221;<br />
127.0.0.1 &#8211; &#8211; [29/Aug/2011:18:00:34 -0700] &#8220;HEAD / HTTP/1.1&#8221; 206 353 &#8220;-&#8221; &#8220;-&#8221;<br />
127.0.0.1 &#8211; &#8211; [29/Aug/2011:18:00:34 -0700] &#8220;HEAD / HTTP/1.1&#8221; 206 354 &#8220;-&#8221; &#8220;-&#8221;<br />
127.0.0.1 &#8211; &#8211; [29/Aug/2011:18:00:34 -0700] &#8220;HEAD / HTTP/1.1&#8221; 206 354 &#8220;-&#8221; &#8220;-&#8221;<br />
127.0.0.1 &#8211; &#8211; [29/Aug/2011:18:00:34 -0700] &#8220;HEAD / HTTP/1.1&#8221; 206 353 &#8220;-&#8221; &#8220;-&#8221;<br />
127.0.0.1 &#8211; &#8211; [29/Aug/2011:18:00:34 -0700] &#8220;HEAD / HTTP/1.1&#8221; 206 354 &#8220;-&#8221; &#8220;-&#8221;</p>
<p>Note that we&#8217;re giving a http response code of 206 (which is good) but there is no referrer or User-Agent.  Let&#8217;s filter that stuff out of a full referrer log with some simple shell scripting (<a title="Apache Log Foo" href="http://www.the-art-of-web.com/system/logs/" target="_blank">this site has an awesome guide to parsing apache logs</a>):</p>
<p style="padding-left: 30px;">tail -n 500 access.log | awk &#8216;($9 ~ /206/ )&#8217;</p>
<p>which says this:</p>
<p style="padding-left: 30px;">Grab the last 500 log lines.</p>
<p style="padding-left: 30px;">Find everything that is a 206 response code.</p>
<p>For me, the output is 499 copies of the log lines I showed above because it&#8217;s a test VM with no real traffic.  On a production server, you might have to use the entire access log (not just the last 500 lines) to get a larger sample of traffic.</p>
<p>I&#8217;ll also introduce a new fun thing: Apache mod_status.  On a Debian-ish box, you have the command &#8220;apachectl status&#8221; which just does a simple request from the webserver asking for /server-status.</p>
<p style="padding-left: 30px;">root@ubuntu:/var/log/apache2# apachectl status<br />
Apache Server Status for localhost</p>
<p style="padding-left: 30px;">Server Version: Apache/2.2.17 (Ubuntu)<br />
Server Built: Feb 22 2011 18:34:09<br />
__________________________________________________________________</p>
<p style="padding-left: 30px;">Current Time: Monday, 29-Aug-2011 20:49:57 PDT<br />
Restart Time: Monday, 29-Aug-2011 16:21:02 PDT<br />
Parent Server Generation: 0<br />
Server uptime: 4 hours 28 minutes 54 seconds<br />
Total accesses: 5996 &#8211; Total Traffic: 637.5 MB<br />
CPU Usage: u107.39 s2.28 cu0 cs0 &#8211; .68% CPU load<br />
.372 requests/sec &#8211; 40.5 kB/second &#8211; 108.9 kB/request<br />
1 requests currently being processed, 74 idle workers</p>
<p style="padding-left: 30px;">_________________W_______&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
_________________________&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br />
_________________________&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.</p>
<p style="padding-left: 30px;">Scoreboard Key:<br />
&#8220;_&#8221; Waiting for Connection, &#8220;S&#8221; Starting up, &#8220;R&#8221; Reading Request,<br />
&#8220;W&#8221; Sending Reply, &#8220;K&#8221; Keepalive (read), &#8220;D&#8221; DNS Lookup,<br />
&#8220;C&#8221; Closing connection, &#8220;L&#8221; Logging, &#8220;G&#8221; Gracefully finishing,<br />
&#8220;I&#8221; Idle cleanup of worker, &#8220;.&#8221; Open slot with no current process</p>
<p>The interesting part for me is the server process status codes.  In this case, I have one server (W)riting a reply (actually, servicing the status request since this is on a VM with no live traffic).  During an attack, all of the server process&#8217;s time is spent writing a response:</p>
<p style="padding-left: 30px;">root@ubuntu:/var/log/apache2# apachectl status<br />
Apache Server Status for localhost</p>
<p style="padding-left: 30px;">Server Version: Apache/2.2.17 (Ubuntu)<br />
Server Built: Feb 22 2011 18:34:09<br />
__________________________________________________________________</p>
<p style="padding-left: 30px;">Current Time: Monday, 29-Aug-2011 20:53:48 PDT<br />
Restart Time: Monday, 29-Aug-2011 16:21:02 PDT<br />
Parent Server Generation: 0<br />
Server uptime: 4 hours 32 minutes 45 seconds<br />
Total accesses: 7064 &#8211; Total Traffic: 760.8 MB<br />
CPU Usage: u128.49 s2.65 cu0 cs0 &#8211; .801% CPU load<br />
.432 requests/sec &#8211; 47.6 kB/second &#8211; 110.3 kB/request<br />
51 requests currently being processed, 24 idle workers</p>
<p style="padding-left: 30px;">___WW__WW__W_WW__W___WWW_&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
__WWWWW_W____WWW__WW_WWWW&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br />
WWWWWWWWWWWWWWWWWWWWWWWWW&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<br />
&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.</p>
<p style="padding-left: 30px;">Scoreboard Key:<br />
&#8220;_&#8221; Waiting for Connection, &#8220;S&#8221; Starting up, &#8220;R&#8221; Reading Request,<br />
&#8220;W&#8221; Sending Reply, &#8220;K&#8221; Keepalive (read), &#8220;D&#8221; DNS Lookup,<br />
&#8220;C&#8221; Closing connection, &#8220;L&#8221; Logging, &#8220;G&#8221; Gracefully finishing,<br />
&#8220;I&#8221; Idle cleanup of worker, &#8220;.&#8221; Open slot with no current process</p>
<p>Now for a Slow HTTP DoS, you get some of the memory consumption and the Apache process forking out of control, but all of the server processes are stuck doing (R)ead operations (IE, reading a request from clients) if you can even get a response (the mod_status query is also an HTTP request which means you&#8217;re doing in-band management during a DoS attack).  This is interesting to me as an item that helps me differentiate the attacks from a troubleshooting standpoint.</p>
<p><strong>Detecting and Mitigating</strong></p>
<p>This is always the fun part.  Detection should be something like the following, all of these I&#8217;ve given examples in this blog post for you:</p>
<ul>
<li>Apache forks new processes.  A simple &#8220;ps aux | grep apache | wc -l&#8221; compared with &#8220;grep MaxClients /etc/apache2/apache2.conf&#8221; should suffice.</li>
<li>Apache uses up tons of memory.  You can detect this using top, htop, or even ps.</li>
<li>Apache mod_status shows an excess of server daemons performing write options.</li>
<li>Apache combined access logs show an excess of 206 response code with no referrer and no User-Agent.</li>
</ul>
<p>As far as mitigation, the <a title="Apache Project Configs to Stop the Madness" href="http://people.apache.org/~dirkx/CVE-2011-3192.txt" target="_blank">Apache Project put out an awesome post on this</a>, something I can&#8217;t really top on the server itself.<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/2049" rel="bookmark" title="August 23, 2011">The Rise of the Slow Denial of Service</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2085" rel="bookmark" title="September 23, 2011">A Little Story About a Tool Named #RefRef</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1865" rel="bookmark" title="September 29, 2010">Keeping Up With the DDoS Kids</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2144" rel="bookmark" title="May 10, 2012">DDoS and Elections</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1961" rel="bookmark" title="August 17, 2011">DDoS Planning: Business Continuity with a Twist</a></li>
</ul>
<p><!-- Similar Posts took 6.688 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2063">Apache Killer Effects on Target</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2063/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2063</post-id>	</item>
		<item>
		<title>Noms and IKANHAZFIZMA</title>
		<link>http://www.guerilla-ciso.com/archives/2060</link>
					<comments>http://www.guerilla-ciso.com/archives/2060#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Fri, 26 Aug 2011 16:01:18 +0000</pubDate>
				<category><![CDATA[IKANHAZFIZMA]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[lolcats]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2060</guid>

					<description><![CDATA[<p>Kickin&#8217; it old-school with some kitteh overflows Similar Posts: LOLCATS Take on Catalog of Controls LOLCATS and Firewalls Conflicker ala IKANHAZFIZMA IKANHAZFIZMA Tackles the Consensus Audit Guidelines Training the Apache Killers</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2060">Noms and IKANHAZFIZMA</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Kickin&#8217; it old-school with some kitteh overflows</p>
<p><a href="http://cheezburger.com/View/5125249024"><img decoding="async" id="_r_a_5125249024" class="event-item-lol-image aligncenter" title="iz noms stack overflow" src="http://images.cheezburger.com/completestore/2011/8/24/eb18a42b-613e-45c1-a662-32aeda14e294.jpg" alt="iz noms stack overflow" /></a><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/438" rel="bookmark" title="July 24, 2008">LOLCATS Take on Catalog of Controls</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/658" rel="bookmark" title="January 8, 2009">LOLCATS and Firewalls</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/873" rel="bookmark" title="April 1, 2009">Conflicker ala IKANHAZFIZMA</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/783" rel="bookmark" title="February 26, 2009">IKANHAZFIZMA Tackles the Consensus Audit Guidelines</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2076" rel="bookmark" title="September 2, 2011">Training the Apache Killers</a></li>
</ul>
<p><!-- Similar Posts took 1.943 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2060">Noms and IKANHAZFIZMA</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2060/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2060</post-id>	</item>
		<item>
		<title>The Rise of the Slow Denial of Service</title>
		<link>http://www.guerilla-ciso.com/archives/2049</link>
					<comments>http://www.guerilla-ciso.com/archives/2049#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Tue, 23 Aug 2011 13:48:32 +0000</pubDate>
				<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Hack the Planet]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2049</guid>

					<description><![CDATA[<p>Usually when you think about Denial of Service attacks nowadays, most people think up images of the Anonymous kids running their copy of LOIC in a hivemind or Russian Gangsters building a botnet to run an online protection racket.  Now there is a new-ish type of attack technique floating around which I believe will become [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2049">The Rise of the Slow Denial of Service</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Usually when you think about Denial of Service attacks nowadays, most people think up images of the Anonymous kids running their copy of LOIC in a hivemind or Russian Gangsters building a botnet to run an online protection racket.  Now there is a new-ish type of attack technique floating around which I believe will become more important over the next year or two: the slow http attacks.</p>
<p>Refs:</p>
<ul>
<li><a title="Slowloris" href="http://ha.ckers.org/slowloris/" target="_blank">Slowloris</a></li>
<li><a title="Slow HTTP Post" href="https://www.owasp.org/index.php/H.....t.....t....p.......p....o....s....t" target="_blank">Slow HTTP POST</a></li>
<li><a title="RUDY" href="http://code.google.com/p/r-u-dead-yet/" target="_blank">RU Dead Yet (RUDY)</a></li>
<li><a title="Tor's Hammer" href="http://packetstormsecurity.org/files/98831/Tors-Hammer-Slow-POST-Denial-Of-Service-Testing-Tool.html" target="_blank">Tor&#8217;s Hammer</a></li>
<li><a title="XerXes" href="http://www.youtube.com/watch?v=K1tHLgznNDo" target="_blank">XerXes</a></li>
</ul>
<p><strong>How Slow DOS Works</strong></p>
<p>Webservers run an interesting version of process management.  When you start an Apache server, it starts a master process that spawns a number of listener processes (or threads) as defined by StartServers (5-10 is a good starting number).  Each listener serves a number of requests, defined by MaxRequestsPerChild (1000 is a good number here), and then dies to be replaced by another process/thread by the master server.  This is done so that if there are any applications that leak memory, they won&#8217;t hang.  As more requests are received, more processes/threads are spawned up to the MaxClients setting.  MaxClients is designed to throttle the number of processes so that Apache doesn&#8217;t <a title="Forkbomb" href="http://en.wikipedia.org/wiki/Fork_bomb" target="_blank">forkbomb</a> and the OS become unmanageable because it&#8217;s <a title="Thrashing" href="http://en.wikipedia.org/wiki/Thrashing_%28computer_science%29" target="_blank">thrashing to swap</a>.  There are also some rules for weaning off idle processes but those are immaterial to what we&#8217;re trying to do today.</p>
<p><a title="Apache Stress Testing" href="http://www.guerilla-ciso.com/archives/1299">Go read my previous post on Apache tuning and stress testing for the background on server pool management</a>.</p>
<p>What happens in a slow DOS is that the attack tools sends an HTTP request that never finishes.  As a result, each listener process never finishes its quota of MaxRequestsPerChild so that it can die.  By sending a small amount of never-complete requests, Apache gladly spawns new processes/threads up to MaxClients at which point it fails to answer requests and the site is DOS&#8217;ed.  The higher the rate of listener process turnover, the faster the server stops answering requests.  For a poorly tuned webserver configuration with MaxClients set too high, the server starts thrashing to swap before it hits MaxClients and to top it off, the server is unresponsive even to ssh connections and needs a hard boot.</p>
<p>The beauty of this is that the theoretical minimum number of requests to make a server hang for a well-tuned Apache is equal to MaxClients.  This attack can also take out web boundary devices: reverse proxies, Web Application Firewalls, Load Balancers, Content Switches, and anything else that receives HTTP(S).</p>
<p style="text-align: center;"><em><img decoding="async" loading="lazy" class="alignnone" title="POST" src="http://farm1.static.flickr.com/172/402592837_b80291e5c4_z.jpg" alt="" width="480" height="640" /></em></p>
<p style="text-align: center;"><em>Post photo by <a href="http://www.flickr.com/photos/salim/">Salim Virji</a>.</em></p>
<p><strong>Advantages to Slow DOS Attacks</strong></p>
<p>There are a couple of reasons why slow DOS tools are getting research and development this year and I see them growing in popularity.</p>
<ul>
<li>Speed and Simplicity:  Slow DOS attacks are quick to take down a server.  One attacker can take down a website without trying to build a botnet or cooordinate attack times and targets with 3000 college students and young professionals.</li>
<li>TOR:  With volume-based attacks like the Low Orbit Ion Cannon, it doesn&#8217;t make sense to route attack traffic through TOR.  TOR adds latency, throttles the amount of requests that the attacker can send, and might eventually fail before the target&#8217;s network does.  Using TOR keeps the defender from tracking you back to your real location.</li>
<li>Server Logging: Because the request is never completed, most servers don&#8217;t make a log.  This makes it very hard to detect or troubleshoot which means it takes longer to mitigate.  I&#8217;m interested in exceptions if you know specifics on which webserver/tool combinations make webtraffic logs.</li>
<li>IDS Evasion: Most DOS tools are volume-based attack.  There are IDS rules to detect these: usually by counting the number of TCP SYN traffic coming from each IP address in a particular span of time and flagging the traffic when a threshold is exceeded.  By using a slow DOS tool that sends requests via SSL, IDS has no idea that you&#8217;re sending it slow DOS traffic.</li>
<li>Stay out of the <em>&#8220;Crowbar Hotel&#8221;</em>:  Use the Ion Cannon, make logs on the target system, go to jail.  Use slow DOS with TOR and SSL, leave less traces, avoid having friends that will trade you for a pack of cigarettes.</li>
</ul>
<p><strong>Defenses</strong></p>
<p>This part is fun, and by that I mean &#8220;it sucks&#8221;.  There are some things that help, but there isn&#8217;t a single solution that makes the problem go away.</p>
<ul>
<li>Know how to detect it.  This is the hard one.  What you&#8217;re looking for is Apache spawned out to MaxClients but not logging a comparative volume of traffic.  IE, the servers are hung up waiting for that one last request to finish and shucking all other requests.</li>
<ul>
<li>&#8220;ps aux | grep apache2 | grep start | wc -l&#8221; is equal to MaxClients +2.</li>
<li>Your webserver isn&#8217;t logging the normal amount of requests.  Use some grep-foo and &#8220;wc -l&#8221; to compare traffic from: a month ago, a day ago, an hour ago, and the last 5 minutes.</li>
</ul>
<li>Disable POST as a method if you don&#8217;t need it.  Some of the more advanced techniques rely on the fact that POST can contain more headers and more body data.</li>
<li>Use an astronomically high number of servers.  If your server processes can timeout and respawn faster than the slow DOS can hang them, you win.  If you had maybe 3000 servers, you wouldn&#8217;t have to worry about this.  Don&#8217;t have 3000 servers, I might have some you could use.</li>
<li>Set a lower connection timeout.  Something like 15-30 seconds will keep Apache humming along.</li>
<li>Limit the request size.  1500 bytes is pretty small, 3K is a pretty good value to set.  Note that this needs testing, it will break some things.</li>
<li>Block TOR exit nodes before the traffic reaches your webservers (IE, at layer 3/4).  <a title="TOR FAQ on Blocking Exit Nodes" href="https://www.torproject.org/docs/faq-abuse#Bans" target="_blank">TOR has a list of these</a>.</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/2063" rel="bookmark" title="August 30, 2011">Apache Killer Effects on Target</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1299" rel="bookmark" title="August 28, 2009">Stress-Test Apache with Intent to Tune: BSOFH Tip for the Software Masochist</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1865" rel="bookmark" title="September 29, 2010">Keeping Up With the DDoS Kids</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2076" rel="bookmark" title="September 2, 2011">Training the Apache Killers</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2085" rel="bookmark" title="September 23, 2011">A Little Story About a Tool Named #RefRef</a></li>
</ul>
<p><!-- Similar Posts took 8.139 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2049">The Rise of the Slow Denial of Service</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2049/feed</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2049</post-id>	</item>
		<item>
		<title>DDoS Planning: Business Continuity with a Twist</title>
		<link>http://www.guerilla-ciso.com/archives/1961</link>
					<comments>http://www.guerilla-ciso.com/archives/1961#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Wed, 17 Aug 2011 14:06:00 +0000</pubDate>
				<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[moneymoneymoney]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1961</guid>

					<description><![CDATA[<p>So since I&#8217;ve semi-officially been granted the title of &#8220;The DDoS Kid&#8221; after some of the incident response, analysis, and talks that I&#8217;ve done, I&#8217;m starting to get asked a lot about how much the average DDoS costs the targeted organization.  I have some ideas on this, but the simplest way is to recycle Business [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1961">DDoS Planning: Business Continuity with a Twist</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>So since I&#8217;ve semi-officially been granted the title of &#8220;The DDoS Kid&#8221; after some of the incident response, analysis, and talks that I&#8217;ve done, I&#8217;m starting to get asked a lot about how much the average DDoS costs the targeted organization.  I have some ideas on this, but the simplest way is to recycle Business Continuity/Disaster Recovery figures but with some small twists.</p>
<p>Scoping:</p>
<ul>
<li>Plan on a 4-day attack.  A typical attack duration is 2-7 days.</li>
<li>Consider an attack on the &#8220;main&#8221; (www) site and anything else that makes money (shopping cart, product pages)</li>
</ul>
<p>Direct:</p>
<ul>
<li>Downtime: one day&#8217;s worth of downtime for both peak times (for most eCommerce sites, that&#8217;s Thanksgiving to January 5th) and low-traffic times x  (attack duration).</li>
<li>Bandwidth: For services that charge by the bit or CPU cycle such as cloud computing or some ISP services, the direct cost of the usage bursting.  The cost per bit/cpu/$foo is available from the service provider, multiply your average rate for peak times by 1000 (small attack) or 10000 (large attack) x (attack duration) worth of usage.  This is the only big difference in cost from BCP/DR data.</li>
<li>Mitigation Services:  Figure $5K to $10K for a DDoS mitigation service x (duration of attack).</li>
</ul>
<p>Indirect:</p>
<ul>
<li>Increased callcenter load: A percentage (10% as a starting guess) of user calls to the callcenter x (average dollar cost per call) x (attack duration).</li>
<li>Increased physical &#8220;storefront&#8221; visits: A percentage (10%) of users now have to go to a physical location x (attack duration).</li>
<li>Customer churn: customer loss due to frustration.  Figure 2-4% customer loss x (attack duration).</li>
</ul>
<p>Brand damage, these vary from industry to industry and attack to attack:</p>
<ul>
<li>Increased marketing budget: Percentage increase in marketing budget.  Possible starting value is 5%.</li>
<li>Increased customer retention costs: Percentage increase in customer retention costs.  Possible starting value is 10%.</li>
</ul>
<p>Note that it&#8217;s reasonably easy to create example costs for small, medium, and large attacks and do planning around a medium-sized attack.</p>
<p>However we recycle BCP/DR figures for an outage, mitigation of the attack is different:</p>
<ul>
<li>For high-volume attacks, you will need to rely on service providers for mitigation simply because of their capacity.</li>
<li>Fail-over to a secondary site means that you now have two sites that are overwhelmed.</li>
<li>Restoration of service after the attack is more like recovering from a hacking attack than resuming service at the primary datacenter.</li>
</ul>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/2144" rel="bookmark" title="May 10, 2012">DDoS and Elections</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1865" rel="bookmark" title="September 29, 2010">Keeping Up With the DDoS Kids</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1964" rel="bookmark" title="December 16, 2010">DojoCon DDoS Video</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2049" rel="bookmark" title="August 23, 2011">The Rise of the Slow Denial of Service</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2085" rel="bookmark" title="September 23, 2011">A Little Story About a Tool Named #RefRef</a></li>
</ul>
<p><!-- Similar Posts took 5.198 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1961">DDoS Planning: Business Continuity with a Twist</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1961/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1961</post-id>	</item>
		<item>
		<title>Realistic NSTIC</title>
		<link>http://www.guerilla-ciso.com/archives/2023</link>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Wed, 10 Aug 2011 13:32:20 +0000</pubDate>
				<category><![CDATA[NIST]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[infosharing]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[nstic]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2023</guid>

					<description><![CDATA[<p>OK, it&#8217;s been out a couple of months now with the usual &#8220;ZOMG it&#8217;s RealID all over again&#8221; worry-mongers raising their heads. So we&#8217;re going to go through what NSTIC is and isn&#8217;t and some &#8220;colorful&#8221; (or &#8220;off-color&#8221; depending on your opinion) use cases for how I would (hypothetically, of course) use an Identity Provider [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2023">Realistic NSTIC</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>OK, it&#8217;s been out a couple of months now with the usual &#8220;ZOMG it&#8217;s RealID all over again&#8221; worry-mongers raising their heads.</p>
<p>So we&#8217;re going to go through what NSTIC is and isn&#8217;t and some &#8220;colorful&#8221; (or &#8220;off-color&#8221; depending on your opinion) use cases for how I would (hypothetically, of course) use an Identity Provider under NSTIC.</p>
<p><strong>The Future Looks Oddly Like the Past</strong></p>
<p>There are already identity providers out there doing part of NSTIC: Google Authenticator, Microsoft Passport, FaceBook Connect, even OpenID fits into part of the ecosystem.  My first reaction after reading the NSTIC plan was that the Government was letting the pioneers in the online identity space take all the arrows and then swoop in to save the day with a standardized plan for the providers to do what they&#8217;ve been doing all along and to give them some compatibility.  I was partially right, NSTIC is the Government looking at what already exists out in the market and helping to grow those capabilities by providing some support as far as standardizations and community management.  And that&#8217;s the plan all along, but it makes sense: would you rather have experts build the basic system and then have the Government adopt the core pieces as the technology standard or would you like to have the Government clean-room a standard and a certification scheme and push it out there for people to use?</p>
<p><strong>Not RealID Not RealID Not RealID</strong></p>
<p>Many people think that NSTIC is RealID by another name.  Aaron Titus did a pretty good job at <a title="NSTIC as a National ID" href="http://www.aarontitus.net/blog/2011/04/26/nstic-as-a-national-id/" target="_blank">debunking some of these hasty conclusions</a>.  The interesting thing about NSTIC for me is that the users can pick which identity or persona that they use for a particular use.  In that sense, it actually gives the public a better set of tools for determining how they are represented online and ways to keep these personas separate.  For those of you who haven&#8217;t seen some of the organizations that were consulted on NSTIC, their numbers include the <a title="EFF" href="http://www.eff.org" target="_blank">EFF</a> and the <a title="CDT" href="http://www.cdt.org/" target="_blank">Center for Democracy and Technology</a> (BTW, donate some money to both of them, please).  A primary goal of NSTIC is to help website owners verify that their users are who they say they are and yet give users a set of privacy controls.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><em><img decoding="async" loading="lazy" class="alignnone" title="Stick in the Mud" src="http://farm4.static.flickr.com/3216/2388013466_2f024dfd06.jpg" alt="Stick in the Mud" width="500" height="442" /></em></p>
<p style="text-align: center;"><em>Stick in the Mud photo by <a href="http://www.flickr.com/photos/jurvetson/">jurvetson</a>.</em></p>
<p><strong>Now on to the use cases, I hope you like them:</strong></p>
<p>I have a computer at home.  I go to many websites where I have my public persona, Rybolov the Hero, the Defender of all Things Good and Just.  That&#8217;s the identity that I use to log into my official FaceBook account, use teh Twitters, log into LinkedIn&#8211;basically any social networking and blog stuff where I want people to think I&#8217;m a good guy.</p>
<p>Then I use a separate, non-publicized NSTIC identity to do all of my online banking.  That way, if somebody manages to &#8220;gank&#8221; one of my social networking accounts, they don&#8217;t get any money from me.  If I want to get really paranoid, I can use a separate NSTIC ID for each account.</p>
<p>At night, I go creeping around trolling on the Intertubes.  Because I don&#8217;t want my &#8220;Dudley Do-Right&#8221; persona to be sullied by my dark, emoting, impish underbelly or to get an identity &#8220;pwned&#8221; that gives access to my bank accounts, I use the &#8220;Rybolov the Troll&#8221; NSTIC  ID.  Or hey, I go without using a NSTIC ID at all.  Or I use an identity from an identity provider in a region *cough Europe cough* that has stronger privacy regulations and is a couple of jurisdiction hops away but is still compatible with NSTIC-enabled sites because of standards.</p>
<p><strong>Keys to Success for NSTIC:</strong></p>
<p>Internet users have a choice: You pick how you present yourself to the site.</p>
<p>Website owners have a choice: You pick the NSTIC ID providers that you support.</p>
<p>Standards: NIST just formalizes and adopts the existing standards so that they&#8217;re not controlled by one party.  They use the word &#8220;ecosystem&#8221; in the NSTIC description a lot for a reason.<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/245" rel="bookmark" title="August 29, 2007">Bacn&#8211;It&#8217;s Cooked Spam</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1714" rel="bookmark" title="June 2, 2010">NIST Cloud Conference Recap</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2010" rel="bookmark" title="April 14, 2011">LOLCATS and NSTIC</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1035" rel="bookmark" title="May 22, 2009">When Standards Aren&#8217;t Good Enough</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/399" rel="bookmark" title="May 19, 2008">More on Georgia&#8217;s FISMA Reporting</a></li>
</ul>
<p><!-- Similar Posts took 6.036 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2023">Realistic NSTIC</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2023</post-id>	</item>
		<item>
		<title>Clouds, FISMA, and the Lawyers</title>
		<link>http://www.guerilla-ciso.com/archives/2013</link>
					<comments>http://www.guerilla-ciso.com/archives/2013#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Tue, 26 Apr 2011 16:28:12 +0000</pubDate>
				<category><![CDATA[FISMA]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Outsourcing]]></category>
		<category><![CDATA[800-37]]></category>
		<category><![CDATA[800-53]]></category>
		<category><![CDATA[accreditation]]></category>
		<category><![CDATA[certification]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloudcomputing]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[fisma]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2013</guid>

					<description><![CDATA[<p>Interesting blog post on Microsoft&#8217;s TechNet, but the real gem is the case filing and summary from the DoJ (usual .pdf caveat applies).  Basically the Reader&#8217;s Digest Condensed Version is that the Department of Interior awarded a cloud services contract to Microsoft for email.  The award was protested by Google for a wide variety of [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2013">Clouds, FISMA, and the Lawyers</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Interesting <a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2011/04/11/google-s-misleading-security-claims-to-the-government-raise-serious-questions.aspx" target="_blank">blog post on Microsoft&#8217;s TechNet</a>, but the real gem is the <a href="http://blogs.technet.com/cfs-filesystemfile.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-82-95/2465.Item-2-_2D002D00_-2011_2D00_04_2D00_08-Government-Redacted-Brief-for-Judgment-on-the-Pleadings.pdf" target="_blank">case filing and summary from the DoJ</a> (usual .pdf caveat applies).  Basically the Reader&#8217;s Digest Condensed Version is that the Department of Interior awarded a cloud services contract to Microsoft for email.  The award was protested by Google for a wide variety of reasons, you can go read the full thing for all the whinging.</p>
<p>But this is the interesting thing to me even though it&#8217;s mostly tangential to the award protest:</p>
<ul>
<li>Google has an ATO under SP 800-37 from GSA for its Google Apps Premiere.</li>
<li>Google represents Google Apps for Government as having an ATO which, even though 99% of the security controls could be the same, is inaccurate as presented.</li>
<li>DOI rejected Google&#8217;s cloud because it had state and local (sidenote: does this include tribes?) tenants which might not have the same level of &#8220;security astuteness&#8221; as DOI.  Basically what they&#8217;re saying here is that if one of the tenants on Google&#8217;s cloud doesn&#8217;t know how to secure their data, it affects all the tenants.</li>
</ul>
<p>So this is where I start thinking.  I thunk until my thinker was sore, and these are the conclusions I came to:</p>
<ul>
<li>There is no such thing as &#8220;FISMA Certification&#8221;, there is a risk acceptance process for each cloud tenant.  Cloud providers make assertions of what common controls that they have built across all</li>
<li>Most people don&#8217;t understand what FISMA really means.  This is no shocker.</li>
<li>For the purposes of this award protest, the security bits do not matter because</li>
<li>This could all be solved in the wonk way by Google getting an ATO on their entire infrastructure and then no matter what product offerings they add on top of it, they just have to roll it into the &#8220;Master ATO&#8221;.</li>
<li>Even if the cloud infrastructure has an ATO, you still have to authorize the implementation on top of it given the types of data and the implementation details of your particular slice of that cloud.</li>
</ul>
<p>And then there&#8217;s the &#8220;back story&#8221; consisting of the <a title="Cobell v/s Salazar" href="http://en.wikipedia.org/wiki/Cobell_v._Salazar">Cobell case and how Interior was disconnected from the Internet several times and for several years</a>.  The Rybolov interpretation is that if Google&#8217;s government cloud potentially has tribes as a tenant, it increases the risk (both data security and just plain politically) to Interior beyond what they are willing to accept.</p>
<p style="text-align: center;"><em><img decoding="async" loading="lazy" class="alignnone" title="Obligatory Cloud Photo" src="http://farm4.static.flickr.com/3365/3450233884_808a7a8a33.jpg" alt="" width="500" height="335" /></em></p>
<p style="text-align: center;"><em>Obligatory Cloud photo by <a href="http://www.flickr.com/photos/jonicdao/">jonicdao</a>.</em></p>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1973" rel="bookmark" title="February 15, 2011">Reinventing FedRAMP</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1714" rel="bookmark" title="June 2, 2010">NIST Cloud Conference Recap</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1926" rel="bookmark" title="November 22, 2010">Coming Soon to a Cloud Near You&#8230;</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1622" rel="bookmark" title="June 7, 2010">How to Not Let FISMA Become a Paperwork Exercise</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2121" rel="bookmark" title="December 12, 2011">FedRAMP: It&#8217;s Here but Not Yet Here</a></li>
</ul>
<p><!-- Similar Posts took 5.064 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2013">Clouds, FISMA, and the Lawyers</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2013/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2013</post-id>	</item>
		<item>
		<title>LOLCATS and NSTIC</title>
		<link>http://www.guerilla-ciso.com/archives/2010</link>
					<comments>http://www.guerilla-ciso.com/archives/2010#respond</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Thu, 14 Apr 2011 13:16:04 +0000</pubDate>
				<category><![CDATA[IKANHAZFIZMA]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Public Policy]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[What Works]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[infosharing]]></category>
		<category><![CDATA[lolcats]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[scalability]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=2010</guid>

					<description><![CDATA[<p>Ref: NSTIC Ref: On the Internet&#8230; Similar Posts: Realistic NSTIC Et Tu, TIC? Hackers, Protesters, Iran, Twitter, and Lolcats Cyberlolcats Watch the Hackers at DefCon LOLCATS and Hackable Coffee Pots</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/2010">LOLCATS and NSTIC</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Ref: <a href="http://www.nist.gov/nstic/" target="_blank">NSTIC</a><br />
Ref: <a href="http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you%27re_a_dog" target="_blank">On the Internet&#8230;</a></p>
<p><a href="http://cheezburger.com/View/4634675712"><img decoding="async" id="_r_a_4634675712" class="event-item-lol-image aligncenter" title="on teh internetz..." src="http://images.cheezburger.com/completestore/2011/4/8/f165d20a-81e7-4fae-84ce-a3863dd6a36e.jpg" alt="on teh internetz..." /></a><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/2023" rel="bookmark" title="August 10, 2011">Realistic NSTIC</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/534" rel="bookmark" title="October 7, 2008">Et Tu, TIC?</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1183" rel="bookmark" title="July 2, 2009">Hackers, Protesters, Iran, Twitter, and Lolcats</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1255" rel="bookmark" title="July 30, 2009">Cyberlolcats Watch the Hackers at DefCon</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/445" rel="bookmark" title="August 20, 2008">LOLCATS and Hackable Coffee Pots</a></li>
</ul>
<p><!-- Similar Posts took 3.140 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/2010">LOLCATS and NSTIC</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/2010/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2010</post-id>	</item>
		<item>
		<title>Some Comments on SP 800-39</title>
		<link>http://www.guerilla-ciso.com/archives/1999</link>
					<comments>http://www.guerilla-ciso.com/archives/1999#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Wed, 06 Apr 2011 18:37:51 +0000</pubDate>
				<category><![CDATA[FISMA]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[What Works]]></category>
		<category><![CDATA[800-37]]></category>
		<category><![CDATA[800-39]]></category>
		<category><![CDATA[accreditation]]></category>
		<category><![CDATA[assurance]]></category>
		<category><![CDATA[auditor]]></category>
		<category><![CDATA[C&A]]></category>
		<category><![CDATA[certification]]></category>
		<category><![CDATA[comments]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[datacentric]]></category>
		<category><![CDATA[fisma]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1999</guid>

					<description><![CDATA[<p>You should have seen Special Publication 800-39 (PDF file, also check out more info on Fismapedia.org) out by now.  Dan Philpott and I just taught a class on understanding the document and how it affects security managers out them doing their job on a daily basis.  While the information is still fresh in my head, [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1999">Some Comments on SP 800-39</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>You should have seen <a href="http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf" target="_blank">Special Publication 800-39</a> (PDF file, also check out <a href="http://www.fismapedia.org/index.php?title=Category:NIST_SP_800-39" target="_blank">more info on Fismapedia.org</a>) out by now.  Dan Philpott and I just taught a class on understanding the document and how it affects security managers out them doing their job on a daily basis.  While the information is still fresh in my head, I thought I would jot down some notes that might help everybody else.</p>
<p><strong>The Good:</strong></p>
<p>NIST is doing some good stuff here trying to get IT Security and Information Assurance out of the &#8220;It&#8217;s the CISO&#8217;s problem, I have effectively outsourced any responsibility through the org chart&#8221; and into more of what DoD calls &#8220;mission assurance&#8221;.  IE, how do we go from point-in-time vulnerabilities (ie, things that can be <a href="http://www.first.org/cvss/" target="_blank">scored with CVSS</a> or tested through Security Test and Evaluation) to briefing executives on what the risk is to their organization (Department, Agency, or even business) coming from IT security problems.  It lays out an organization-wide risk management process and a framework (layer cakes within layer cakes) to share information up and down the organizational stack.  This is very good, and getting the mission/business/data/program owners to recognize their responsibilities is an awesome thing.</p>
<p><strong>The Bad:</strong></p>
<p>SP 800-39 is good in philosophy and a general theme of taking ownership of risk by the non-IT &#8220;business owners&#8221;, when it comes to specifics, it raises more questions than it answers.  For instance, it defines a function known as the Risk Executive.  As practiced today by people who &#8220;get stuff done&#8221;, the Risk Executive is like a board of the Business Unit owners (possibly as the Authorizing Officials), the CISO, and maybe a Chief Risk Officer or other senior executives.  But without the context and asking around to find out what people are doing to get executive buy-in, the Risk Executive seems fairly non-sequitor.  There are other things like that, but I think the best summary is &#8220;Wow, this is great, now how do I take this guidance and execute a plan based on it?&#8221;</p>
<p><strong>The Ugly:</strong></p>
<p>I have a pretty simple yardstick for evaluating any kind of standard or guideline: will this be something that my auditor will understand and will it help them help me?  With 800-39, I think that it is written abstractly and that most auditor-folk would have a hard time translating that into something that they could audit for.  This is both a blessing and a curse, and the huge recommendation that I have is that you brief your auditor beforehand on what 800-39 means to them and how you&#8217;re going to incorporate the guidance.<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1494" rel="bookmark" title="January 13, 2010">Opportunity Costs and the 20 Critical Security Controls</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1506" rel="bookmark" title="January 21, 2010">20 Critical Security Controls: What They Did Right and What They Did Wrong</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1714" rel="bookmark" title="June 2, 2010">NIST Cloud Conference Recap</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/471" rel="bookmark" title="September 19, 2008">Ooh, &#8220;The Word&#8221; is out on S 3474</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/446" rel="bookmark" title="August 19, 2008">Cloud Computing and the Government</a></li>
</ul>
<p><!-- Similar Posts took 6.614 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1999">Some Comments on SP 800-39</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1999/feed</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1999</post-id>	</item>
		<item>
		<title>Micro Digital Signatures Howto</title>
		<link>http://www.guerilla-ciso.com/archives/1988</link>
					<comments>http://www.guerilla-ciso.com/archives/1988#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Tue, 22 Feb 2011 14:56:11 +0000</pubDate>
				<category><![CDATA[Hack the Planet]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[What Works]]></category>
		<category><![CDATA[alice]]></category>
		<category><![CDATA[bob]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[signatures]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1988</guid>

					<description><![CDATA[<p>With RSA wrapping up, I figured I would do something fun with Alice, Bob, and crypto.  There is a need for small digital signatures (Micro Digital Signatures/&#8221;MicroDigiSigs&#8221; if I can be as bold as to think I can start a nerdy meme) and tools to support them over small message spaces such as The Twitters, [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1988">Micro Digital Signatures Howto</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>With RSA wrapping up, I figured I would do something fun with Alice, Bob, and crypto.  There is a need for small digital signatures (Micro Digital Signatures/&#8221;MicroDigiSigs&#8221; if I can be as bold as to think I can start a nerdy meme) and tools to support them over small message spaces such as The Twitters, SMS/Text Messaging, barcodes, jabber/xmpp, and probably tons of other things I haven&#8217;t even thought of.</p>
<p><a href="http://en.wikipedia.org/wiki/Elliptic_curve_cryptography" target="_blank">Elliptic Curve Cryptography (ECC)</a> provides a solution because of some inherent traits in the algorithms:</p>
<ul>
<li>Speed to compute</li>
<li>Low processor load</li>
<li>Small keys</li>
<li>Small signatures</li>
</ul>
<p>Some general-type info to know before we go further with this:</p>
<ul>
<li>OpenSSL 1.00 supports ECC functions.  This is teh awesome, thank you OpenSSL peoples.</li>
<li>You can check out the OpenSSL HOWTO, I derived a ton of info from this resource <a href="http://www.madboa.com/geek/openssl/" target="_blank">http://www.madboa.com/geek/openssl/</a></li>
<li>Issues with ECC support in OpenSSL:
<ul>
<li>ECC is poorly documented in OpenSSL.  Pls fix kthanx.</li>
<li>Some targets are missing from OpenSSL (ECC Digital Signature Algorithm signatures with SHA-256).</li>
</ul>
</li>
</ul>
<p>Now on to the step-by-step process.   Feel free to shoot holes in this, I&#8217;m sure there are tons of other ways to do things.</p>
<p><strong>Show all the available curves:</strong><br />
rybolov@ryzhe:~$ openssl ecparam -list_curves<br />
secp112r1 : SECG/WTLS curve over a 112 bit prime field<br />
secp112r2 : SECG curve over a 112 bit prime field<br />
secp128r1 : SECG curve over a 128 bit prime field<br />
secp128r2 : SECG curve over a 128 bit prime field<br />
secp160k1 : SECG curve over a 160 bit prime field<br />
secp160r1 : SECG curve over a 160 bit prime field<br />
secp160r2 : SECG/WTLS curve over a 160 bit prime field<br />
secp192k1 : SECG curve over a 192 bit prime field<br />
secp224k1 : SECG curve over a 224 bit prime field<br />
secp224r1 : NIST/SECG curve over a 224 bit prime field<br />
secp256k1 : SECG curve over a 256 bit prime field<br />
secp384r1 : NIST/SECG curve over a 384 bit prime field<br />
secp521r1 : NIST/SECG curve over a 521 bit prime field<br />
prime192v1: NIST/X9.62/SECG curve over a 192 bit prime field<br />
prime192v2: X9.62 curve over a 192 bit prime field<br />
prime192v3: X9.62 curve over a 192 bit prime field<br />
prime239v1: X9.62 curve over a 239 bit prime field<br />
prime239v2: X9.62 curve over a 239 bit prime field<br />
prime239v3: X9.62 curve over a 239 bit prime field<br />
prime256v1: X9.62/SECG curve over a 256 bit prime field<br />
sect113r1 : SECG curve over a 113 bit binary field<br />
sect113r2 : SECG curve over a 113 bit binary field<br />
sect131r1 : SECG/WTLS curve over a 131 bit binary field<br />
sect131r2 : SECG curve over a 131 bit binary field<br />
sect163k1 : NIST/SECG/WTLS curve over a 163 bit binary field<br />
sect163r1 : SECG curve over a 163 bit binary field<br />
sect163r2 : NIST/SECG curve over a 163 bit binary field<br />
sect193r1 : SECG curve over a 193 bit binary field<br />
sect193r2 : SECG curve over a 193 bit binary field<br />
sect233k1 : NIST/SECG/WTLS curve over a 233 bit binary field<br />
sect233r1 : NIST/SECG/WTLS curve over a 233 bit binary field<br />
sect239k1 : SECG curve over a 239 bit binary field<br />
sect283k1 : NIST/SECG curve over a 283 bit binary field<br />
sect283r1 : NIST/SECG curve over a 283 bit binary field<br />
sect409k1 : NIST/SECG curve over a 409 bit binary field<br />
sect409r1 : NIST/SECG curve over a 409 bit binary field<br />
sect571k1 : NIST/SECG curve over a 571 bit binary field<br />
sect571r1 : NIST/SECG curve over a 571 bit binary field<br />
c2pnb163v1: X9.62 curve over a 163 bit binary field<br />
c2pnb163v2: X9.62 curve over a 163 bit binary field<br />
c2pnb163v3: X9.62 curve over a 163 bit binary field<br />
c2pnb176v1: X9.62 curve over a 176 bit binary field<br />
c2tnb191v1: X9.62 curve over a 191 bit binary field<br />
c2tnb191v2: X9.62 curve over a 191 bit binary field<br />
c2tnb191v3: X9.62 curve over a 191 bit binary field<br />
c2pnb208w1: X9.62 curve over a 208 bit binary field<br />
c2tnb239v1: X9.62 curve over a 239 bit binary field<br />
c2tnb239v2: X9.62 curve over a 239 bit binary field<br />
c2tnb239v3: X9.62 curve over a 239 bit binary field<br />
c2pnb272w1: X9.62 curve over a 272 bit binary field<br />
c2pnb304w1: X9.62 curve over a 304 bit binary field<br />
c2tnb359v1: X9.62 curve over a 359 bit binary field<br />
c2pnb368w1: X9.62 curve over a 368 bit binary field<br />
c2tnb431r1: X9.62 curve over a 431 bit binary field<br />
wap-wsg-idm-ecid-wtls1: WTLS curve over a 113 bit binary field<br />
wap-wsg-idm-ecid-wtls3: NIST/SECG/WTLS curve over a 163 bit binary field<br />
wap-wsg-idm-ecid-wtls4: SECG curve over a 113 bit binary field<br />
wap-wsg-idm-ecid-wtls5: X9.62 curve over a 163 bit binary field<br />
wap-wsg-idm-ecid-wtls6: SECG/WTLS curve over a 112 bit prime field<br />
wap-wsg-idm-ecid-wtls7: SECG/WTLS curve over a 160 bit prime field<br />
wap-wsg-idm-ecid-wtls8: WTLS curve over a 112 bit prime field<br />
wap-wsg-idm-ecid-wtls9: WTLS curve over a 160 bit prime field<br />
wap-wsg-idm-ecid-wtls10: NIST/SECG/WTLS curve over a 233 bit binary field<br />
wap-wsg-idm-ecid-wtls11: NIST/SECG/WTLS curve over a 233 bit binary field<br />
wap-wsg-idm-ecid-wtls12: WTLS curvs over a 224 bit prime field<br />
Oakley-EC2N-3:<br />
IPSec/IKE/Oakley curve #3 over a 155 bit binary field.<br />
Not suitable for ECDSA.<br />
Questionable extension field!<br />
Oakley-EC2N-4:<br />
IPSec/IKE/Oakley curve #4 over a 185 bit binary field.<br />
Not suitable for ECDSA.<br />
Questionable extension field!</p>
<p><strong>ECC keys are specific to curves.  Make a key for secp256k1, it&#8217;s fairly standard (ie, specified in NIST&#8217;s DSA Signature Standard (DSS) as are all of the secp* curves).</strong></p>
<p>rybolov@ryzhe:~$ openssl ecparam -out key.test.pem -name prime256v1 -genkey<br />
rybolov@ryzhe:~$ cat key.test.pem<br />
&#8212;&#8211;BEGIN EC PARAMETERS&#8212;&#8211;<br />
BggqhkjOPQMBBw==<br />
&#8212;&#8211;END EC PARAMETERS&#8212;&#8211;<br />
&#8212;&#8211;BEGIN EC PRIVATE KEY&#8212;&#8211;<br />
MHcCAQEEIGkhtOzaKTpxETF9VNQc7Nu7SMX5/klNvObBbJo/riKsoAoGCCqGSM49<br />
AwEHoUQDQgAEXmD6Hz/c8rxVYe1klFTUVOxxKwT4nLRcOLREQnC5GL+qNayqx7d0<br />
Q+yal6sVSk013EbJr9Ukw/aiQzbrlcU1VA==<br />
&#8212;&#8211;END EC PRIVATE KEY&#8212;&#8211;</p>
<p><strong>Make a public key.  This is poorly documented and I had to extrapolate from the RSA key generation process.</strong><br />
rybolov@ryzhe:~$ openssl ec -in key.test.pem -pubout -out key.test.pub<br />
read EC key<br />
writing EC key</p>
<p>rybolov@ryzhe:~$ cat key.test.pub<br />
&#8212;&#8211;BEGIN PUBLIC KEY&#8212;&#8211;<br />
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEXmD6Hz/c8rxVYe1klFTUVOxxKwT4<br />
nLRcOLREQnC5GL+qNayqx7d0Q+yal6sVSk013EbJr9Ukw/aiQzbrlcU1VA==<br />
&#8212;&#8211;END PUBLIC KEY&#8212;&#8211;</p>
<p><strong>Make a test message:</strong><br />
rybolov@ryzhe:~$ echo &#8220;destroy all monsters&#8221; &gt; msg.test<br />
rybolov@ryzhe:~$ cat msg.test<br />
destroy all monsters</p>
<p><strong>Generate MD5, SHA-1, and SHA-256 hashes:</strong></p>
<p>rybolov@ryzhe:~$ openssl dgst -md5 msg.test<br />
MD5(msg.test)= a4a5e7ccfda28fdeb43697b6e619ed45<br />
rybolov@ryzhe:~a$ openssl dgst -sha1 msg.test<br />
SHA1(msg.test)= 4d1d1b917377448a66b94e1060e3a4c467bae01c<br />
rybolov@ryzhe:~$ openssl dgst -sha256 msg.test<br />
SHA256(msg.test)= efd54922696e25c7fed4023b116882d38cd1f0e4dcc35e38548eae9947aedd23</p>
<p><strong>Make a signature, note that every time you make a signature with ECC it will be different.</strong><br />
rybolov@ryzhe:~$ cat msg.test | openssl dgst -sha1 -sign key.test.pem -out test.sha1.sig</p>
<p>rybolov@ryzhe:~$ cat msg.test | openssl dgst -sha1 -sign key.test.pem<br />
0E!ÔøΩÔøΩÔøΩEÔøΩ-y<br />
ÔøΩÔøΩ1K2ÔøΩÔøΩ›§{!ÔøΩv4+ÔøΩÔøΩÔøΩÔøΩ WÔøΩ    ÔøΩcÔøΩÔøΩP≈ô—áÔøΩaÔøΩ*~)@aÔøΩ1ÔøΩJ&gt;ÔøΩdÔøΩ</p>
<p><strong>Make the signature readable/text by encoding it with Base64:</strong><br />
rybolov@ryzhe:~$ openssl enc -base64 -in test.sha1.sig<br />
MEUCIGbR7ftdgICMZCGefKfd6waMvOM23DJo3S0adTvNH5tYAiEAuJ6Qumt83ZsL<br />
sxDqJ1JNH7XzUl28M/eYf52ocMZgyrk=</p>
<p>rybolov@ryzhe:~$ wc -m test.sha1.sig.asc<br />
98</p>
<p>rybolov@ryzhe:~$ openssl enc -base64 -in test.sha1.sig &gt; test.sha1.sig.asc</p>
<p><strong>Validate the signature:</strong><br />
rybolov@ryzhe:~$ openssl dgst -sha1 -verify key.test.pub -signature test.sha1.sig msg.test<br />
Verified OK</p>
<p><strong>OpenSSL is dumb here because it can&#8217;t read base64:</strong><br />
rybolov@ryzhe:~$ openssl dgst -sha1 -verify key.test.pub -signature test.sha1.sig.asc msg.test<br />
Error Verifying Data<br />
3077905144:error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag:tasn_dec.c:1320:<br />
3077905144:error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error:tasn_dec.c:382:Type=ECDSA_SIG</p>
<p><strong>So we can use OpenSSL encode with the -d flag to make a binary version:</strong><br />
rybolov@ryzhe:~$ openssl enc -base64 -d -in test.sha1.sig.asc -out test.sha1.sig.bin<br />
rybolov@ryzhe:~$ cat test.sha1.sig.<br />
test.sha1.sig.asc  test.sha1.sig.bin<br />
rybolov@ryzhe:~$ cat test.sha1.sig.bin<br />
0E fÔøΩÔøΩÔøΩ]ÔøΩÔøΩÔøΩd!ÔøΩ|ÔøΩÔøΩÔøΩÔøΩÔøΩÔøΩ6ÔøΩ2hÔøΩ-u;ÔøΩÔøΩX!ÔøΩÔøΩÔøΩÔøΩk|›õ<br />
ÔøΩÔøΩ&#8217;RMÔøΩÔøΩR]ÔøΩ3ÔøΩÔøΩÔøΩÔøΩpÔøΩ` π<br />
rybolov@ryzhe:~$ openssl dgst -sha1 -verify key.test.pub -signature test.sha1.sig.bin msg.test<br />
Verified OK</p>
<p><strong>We can also do a prverify which is to verify the signature using the private key:</strong><br />
rybolov@ryzhe:~$ openssl dgst -sha1 -prverify key.test.pem -signature test.sha1.sig.bin msg.test<br />
Verified OK</p>
<p><strong>Now to use this whole thing, you&#8217;ll need concatenate the signature with the massage and add a delimiter or send 2 messages, one with the message, the other with the signature.  Any kind of special character like |!^% etc works great as a delimeter, so something like this works:</strong></p>
<p>MEUCIGbR7ftdgICMZCGefKfd6waMvOM23DJo3S0adTvNH5tYAiEAuJ6Qumt83ZsLsxDqJ1JNH7XzUl28M/eYf52ocMZgyrk=destroy all monsters</p>
<p>destroy all monsters|MEUCIGbR7ftdgICMZCGefKfd6waMvOM23DJo3S0adTvNH5tYAiEAuJ6Qumt83ZsLsxDqJ1JNH7XzUl28M/eYf52ocMZgyrk=</p>
<p><strong>Topics for further research:</strong></p>
<p>I haven&#8217;t talked at all about key distribution.  This gets real hard real fast just for the simple fact that you have to get an initial key to both ends of the conversation.  You can do key rotation inband, but that first hookup is a logistical effort.  Glad to hear ideas on this.</p>
<p>To get a smaller signature, use MD5 and secp112r1.  Normally you wouldn&#8217;t create digital signatures using MD5 (US Government standard is moving to SHA-256), but it&#8217;s a tradeoff in paranoia/crackability with signature size.  You have to do each of the steps manually because the objects for ECDSA only use SHA-1:</p>
<ul>
<li> Hash the command</li>
<li> Encrypt the hash using the private key</li>
<li> Convert the encrypted hash to base64</li>
</ul>
<p>You can use the OpenSSL shell prompt to save some keystrokes: openssl&lt;enter&gt;  You can also call OpenSSL as a C library, which should work nicely for embedded code.</p>
<p>I&#8217;m interested in building a comparison table of the following items, I just haven&#8217;t had time to build a script to compare all the data for me:</p>
<ul>
<li>ECC Curve</li>
<li>Time to Compute a Signature</li>
<li>Size of Signature</li>
<li>Relative key and signature strength</li>
</ul>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/793" rel="bookmark" title="March 5, 2009">FIPS and the Linux Kernel</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1541" rel="bookmark" title="February 10, 2010">QR Code Temporary Tattoos Howto</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/210" rel="bookmark" title="July 18, 2007">Declan McCullagh  and Anne Broache on &#8220;Will security firms detect police spyware?&#8221;</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/275" rel="bookmark" title="October 22, 2007">How to Get a Security Assessment the NIST Way</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1035" rel="bookmark" title="May 22, 2009">When Standards Aren&#8217;t Good Enough</a></li>
</ul>
<p><!-- Similar Posts took 7.649 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1988">Micro Digital Signatures Howto</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1988/feed</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1988</post-id>	</item>
		<item>
		<title>IKANHAZFIZMA Ponders &#8220;The Move to Cloud&#8221;</title>
		<link>http://www.guerilla-ciso.com/archives/1985</link>
					<comments>http://www.guerilla-ciso.com/archives/1985#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Thu, 17 Feb 2011 16:07:52 +0000</pubDate>
				<category><![CDATA[IKANHAZFIZMA]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloudcomputing]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[lolcats]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1985</guid>

					<description><![CDATA[<p>Similar Posts: IKANHAZFIZMA Does Awareness Training Conflicker ala IKANHAZFIZMA Noms and IKANHAZFIZMA FedRAMP Released &#8220;Real Soon Now&#8221;, Lolcats Happy Lolcats Coming to you from the Cloud</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1985">IKANHAZFIZMA Ponders “The Move to Cloud”</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;"><a href="http://cheezburger.com/View/4464030976"><img decoding="async" id="_r_a_4464030976" class="event-item-lol-image aligncenter" title="iz teetering on desizhun" src="http://images.cheezburger.com/completestore/2011/2/14/fa9a0bac-38f8-44d7-8932-7a74816effd2.jpg" alt="iz teetering on desizhun" /></a></p>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/789" rel="bookmark" title="February 26, 2009">IKANHAZFIZMA Does Awareness Training</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/873" rel="bookmark" title="April 1, 2009">Conflicker ala IKANHAZFIZMA</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2060" rel="bookmark" title="August 26, 2011">Noms and IKANHAZFIZMA</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1850" rel="bookmark" title="September 30, 2010">FedRAMP Released &#8220;Real Soon Now&#8221;, Lolcats Happy</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1341" rel="bookmark" title="October 8, 2009">Lolcats Coming to you from the Cloud</a></li>
</ul>
<p><!-- Similar Posts took 2.412 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1985">IKANHAZFIZMA Ponders “The Move to Cloud”</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1985/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1985</post-id>	</item>
		<item>
		<title>Reinventing FedRAMP</title>
		<link>http://www.guerilla-ciso.com/archives/1973</link>
					<comments>http://www.guerilla-ciso.com/archives/1973#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Tue, 15 Feb 2011 14:09:42 +0000</pubDate>
				<category><![CDATA[FISMA]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[What Works]]></category>
		<category><![CDATA[accreditation]]></category>
		<category><![CDATA[C&A]]></category>
		<category><![CDATA[catalogofcontrols]]></category>
		<category><![CDATA[certification]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloudcomputing]]></category>
		<category><![CDATA[comments]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[fisma]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[infosharing]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1973</guid>

					<description><![CDATA[<p>“Cloud computing is about gracefully losing control while maintaining accountability even if the operational responsibility falls upon one or more third parties.” &#8211;CSA Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 Now enter FedRAMP.  FedRAMP is a way to share Assessment and Authorization information for a cloud provider with its Government tenants.  [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1973">Reinventing FedRAMP</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<blockquote><p><em>“Cloud computing is about gracefully losing control while maintaining accountability even if the operational responsibility falls upon one or more third parties.”</em><br />
&#8211;CSA Security Guidance for Critical Areas of Focus in Cloud Computing V2.1</p></blockquote>
<p>Now enter FedRAMP.  FedRAMP is a way to share Assessment and Authorization information for a cloud provider with its Government tenants.  In case you&#8217;re not &#8220;in the know&#8221;, you can go check out the draft process and supporting templates at <a href="http://www.fedramp.gov" target="_blank">FedRAMP.gov</a>.  So far a good idea, and I really do support what&#8217;s going on with FedRAMP, except for somewhere along the lines we went astray because we tried to kluge doctrine that most people understand over the top of cloud computing which most people also don&#8217;t really understand.</p>
<p>I&#8217;ve already done my part to submit comments officially, I just want to put some ideas out there to keep the conversation going. As I see it, these are/should be the goals for FedRAMP:</p>
<ul>
<li>Delineation of responsibilities between cloud provider and cloud tenant.  Also knowing where there are gaps.</li>
<li>Transparency in operations.  Understanding how the cloud provider does their security parts.</li>
<li>Transparency in risk.  Know what you&#8217;re buying.</li>
<li>Build maturity in cloud providers&#8217; security program.</li>
<li>Help cloud providers build a &#8220;Governmentized&#8221; security program.</li>
</ul>
<p>So now for the juicy part, how I would do a &#8220;clean room&#8221; implementation of FedRAMP on Planet Rybolov, &#8220;All the Authorizing Officials are informed, the Auditors are helpful, and every ISSO is above average&#8221;?  This is my &#8220;short list&#8221; of how to get the job done:</p>
<ul>
<li><strong>Authorization:</strong> Sorry, not going to happen on Planet Rybolov.  At least, authorization by FedRAMP, mostly because it&#8217;s a cheat for the tenant agencies&#8211;they should be making their own risk decisions based on risk, cost, and benefit.  Acceptance of risk is a tenant-specific thing based on the data types and missions being moved into the cloud, baseline security provided by the cloud provider, the security features of the products/services purchased, and the tenant&#8217;s specific configuration on all of the above.  However, FedRAMP can support that by helping the tenant agency by being a repository of information.</li>
<li><strong>800-53 controls:</strong> A cloud service provider manages a set of common controls across all of their customers.  Really what the tenant needs to know is what is not provided by the cloud service provider.  A simple RACI matrix works here beautifully, as does the phrase &#8220;This control is not applicable because XXXXX is not present in the cloud infrastructure&#8221;.  This entire approach of &#8220;build one set of controls definitions for all clouds&#8221; does not really work because not all clouds and cloud service providers are the same, even if they&#8217;re the same deployment model.</li>
<li><strong>Tenant Responsibilities:</strong> Even though it&#8217;s in the controls matrix, there needs to be an Acceptable Use Policy for the cloud environment.  A message to providers: this is needed to keep you out of trouble because it limits the potential impacts to yourself and the other cloud tenants.  Good examples would be &#8220;Do not put classified data on my unclassified cloud&#8221;.</li>
<li><strong>Use Automation:</strong> <a href="http://www.cloudaudit.org/" target="_blank">CloudAudit</a> is the &#8220;how&#8221; for FedRAMP.  It provides a structure to query a cloud (or the FedRAMP PMO) to find out compliance and security management information.  Using a tool, you could query for a specific control or get documents, policy statements, or even SCAP assessment content.</li>
<li><strong>Changing Responsibilities:</strong> Things change.  As a cloud provider matures, releases new products, or moves up and down the SPI stack ({Software|Platform|Infrastructure}as a Service), the balance of responsibilities change.  There needs to be a vehicle to disseminate these changes.  Normally in the IA world we do this with a Plan of Actions and Milestones but from the viewpoint of the cloud provider, this is more along the lines of a release schedule and/or roadmap.  Not that I&#8217;m personally signing up for this, but a quarterly/semi-annually tenant agency security meeting would be a good way to get this information out.</li>
</ul>
<p>Then there is the special interest comment:  I&#8217;ve heard some rumblings (and read some articles, shame on you security industry press for republishing SANS press releases) about how FedRAMP would be better accomplished by using the 20 Critical Security Controls.  Honestly, this is far from the truth: a set of controls scoped to the modern enterprise (General Support System supporting end users) or project (Major Application) does not scale to an infrastructure-and-server cloud. While it might make sense to use 20 CSC in other places (agency-wide controls), please do your part to squash this idea of using it for cloud computing whenever and wherever you see it.</p>
<p style="text-align: center;"><em><img decoding="async" loading="lazy" class="alignnone" title="Ramp" src="http://farm6.static.flickr.com/5093/5399371960_46c6baf99c_z.jpg" alt="Ramp" width="640" height="480" /></em></p>
<p style="text-align: center;"><em>Ramp photo by <a href="http://www.flickr.com/photos/ell-r-brown/">ell brown</a>.</em></p>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1714" rel="bookmark" title="June 2, 2010">NIST Cloud Conference Recap</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1653" rel="bookmark" title="May 25, 2010">Categories of Security Controls in Outsourcing</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2121" rel="bookmark" title="December 12, 2011">FedRAMP: It&#8217;s Here but Not Yet Here</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2013" rel="bookmark" title="April 26, 2011">Clouds, FISMA, and the Lawyers</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1622" rel="bookmark" title="June 7, 2010">How to Not Let FISMA Become a Paperwork Exercise</a></li>
</ul>
<p><!-- Similar Posts took 6.120 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1973">Reinventing FedRAMP</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1973/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1973</post-id>	</item>
		<item>
		<title>Happy New Year</title>
		<link>http://www.guerilla-ciso.com/archives/1968</link>
					<comments>http://www.guerilla-ciso.com/archives/1968#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Sat, 01 Jan 2011 05:19:27 +0000</pubDate>
				<category><![CDATA[IKANHAZFIZMA]]></category>
		<category><![CDATA[itsatrap]]></category>
		<category><![CDATA[lolcats]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1968</guid>

					<description><![CDATA[<p>Believe it or not, this is a friend&#8217;s cat named Little Phat Man, and we cat-sat him over Christmas.  Mrs Rybolov took the photo.  I&#8217;ve been trying to get Phat into a lolcat for a long time. Similar Posts: Snowmageddon Meets the IKANHAZFIZMA Lolcats Exhaustive Security Testing is Bad For You IKANHAZFIZMA and Transparency Look [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1968">Happy New Year</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Believe it or not, this is a friend&#8217;s cat named Little Phat Man, and we cat-sat him over Christmas.  Mrs Rybolov took the photo.  I&#8217;ve been trying to get Phat into a lolcat for a long time.</p>
<p style="text-align: center;"><a href="http://cheezburger.com/rybolov/lolz/View/4314690816"><img decoding="async" id="_r_a_4314690816" class="aligncenter" title="ikanhazfizma wishes you" src="http://images.cheezburger.com/completestore/2010/12/31/11eaa961-2412-4f57-887e-8d45de62a6af.jpg" alt="ikanhazfizma wishes you" /></a></p>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1556" rel="bookmark" title="February 11, 2010">Snowmageddon Meets the IKANHAZFIZMA Lolcats</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/435" rel="bookmark" title="July 17, 2008">Exhaustive Security Testing is Bad For You</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1335" rel="bookmark" title="September 24, 2009">IKANHAZFIZMA and Transparency</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1397" rel="bookmark" title="October 22, 2009">Look Out, Sir Bruce, IKANHAZFIZMA is Coming for You</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1346" rel="bookmark" title="September 21, 2009">CIO Council Guidelines on Social Media Meet IKANHAZFIZMA</a></li>
</ul>
<p><!-- Similar Posts took 2.177 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1968">Happy New Year</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1968/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1968</post-id>	</item>
		<item>
		<title>DojoCon DDoS Video</title>
		<link>http://www.guerilla-ciso.com/archives/1964</link>
					<comments>http://www.guerilla-ciso.com/archives/1964#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Thu, 16 Dec 2010 22:20:50 +0000</pubDate>
				<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[Speaking]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[What Doesn't Work]]></category>
		<category><![CDATA[What Works]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[operationpayback]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[scalability]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1964</guid>

					<description><![CDATA[<p>My DDoS presentation at DojoCon on Sunday.  A big thanks to Marcus J Carey for organizing the con and Adrian Crenshaw for doing the recording. Michael Smith, @rybolov DDoS from Adrian Crenshaw on Vimeo. Similar Posts: DojoCon 2009 Presentation Barcode Hacking DDoS and Elections Massively Scaled Security Solutions for Massively Scaled IT DDoS Planning: Business [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1964">DojoCon DDoS Video</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>My DDoS presentation at DojoCon on Sunday.  A big thanks to <a href="http://mjc.me/" target="_blank">Marcus J Carey</a> for organizing the con and <a href="http://www.irongeek.com/" target="_blank">Adrian Crenshaw</a> for doing the recording.</p>
<div align="center">
<iframe loading="lazy" src="http://player.vimeo.com/video/17854739" width="400" height="200" frameborder="0"></iframe></p>
<p><a href="http://vimeo.com/17854739">Michael Smith, @rybolov DDoS</a> from <a href="http://vimeo.com/user729137">Adrian Crenshaw</a> on <a href="http://vimeo.com">Vimeo</a>.</p>
</div>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/1409" rel="bookmark" title="November 7, 2009">DojoCon 2009 Presentation</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1481" rel="bookmark" title="January 13, 2010">Barcode Hacking</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2144" rel="bookmark" title="May 10, 2012">DDoS and Elections</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1383" rel="bookmark" title="October 16, 2009">Massively Scaled Security Solutions for Massively Scaled IT</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1961" rel="bookmark" title="August 17, 2011">DDoS Planning: Business Continuity with a Twist</a></li>
</ul>
<p><!-- Similar Posts took 3.614 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1964">DojoCon DDoS Video</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1964/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1964</post-id>	</item>
		<item>
		<title>no rly, iz protest</title>
		<link>http://www.guerilla-ciso.com/archives/1954</link>
					<comments>http://www.guerilla-ciso.com/archives/1954#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Thu, 16 Dec 2010 13:03:47 +0000</pubDate>
				<category><![CDATA[IKANHAZFIZMA]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[lolcats]]></category>
		<category><![CDATA[operationpayback]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1954</guid>

					<description><![CDATA[<p>Inspired by Anonymous, Operation Payback, and the &#8220;DDoS attacks as a legitimate form of protest?&#8221; article at ZDNet Similar Posts: Conflicker ala IKANHAZFIZMA Noms and IKANHAZFIZMA IKANHAZFIZMA Finds Caution Tape Training the Apache Killers #RefRef the Vaporware DoS Tool</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1954">no rly, iz protest</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Inspired by Anonymous, Operation Payback, and the <a href="http://www.zdnet.com/blog/igeneration/for-and-against-ddos-attacks-as-a-legitimate-form-of-protest/7167" target="_new">&#8220;DDoS attacks as a legitimate form of protest?&#8221; article</a> at ZDNet</p>
<p style="text-align: center;"><a href="http://cheezburger.com/View/4268498432"><img decoding="async" id="_r_a_4268498432" class="aligncenter" title="iz virtual kitteh sit-in" src="http://images.cheezburger.com/completestore/2010/12/16/c17e489f-7cdf-4946-ba64-14720d79d01a.jpg" alt="iz virtual kitteh sit-in" /></a></p>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/873" rel="bookmark" title="April 1, 2009">Conflicker ala IKANHAZFIZMA</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2060" rel="bookmark" title="August 26, 2011">Noms and IKANHAZFIZMA</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1466" rel="bookmark" title="January 7, 2010">IKANHAZFIZMA Finds Caution Tape</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2076" rel="bookmark" title="September 2, 2011">Training the Apache Killers</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/2089" rel="bookmark" title="September 23, 2011">#RefRef the Vaporware DoS Tool</a></li>
</ul>
<p><!-- Similar Posts took 2.084 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1954">no rly, iz protest</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1954/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1954</post-id>	</item>
		<item>
		<title>WikiLeaks: Coming to an Agency Near You</title>
		<link>http://www.guerilla-ciso.com/archives/1947</link>
					<comments>http://www.guerilla-ciso.com/archives/1947#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Thu, 09 Dec 2010 13:04:59 +0000</pubDate>
				<category><![CDATA[Rants]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[pwnage]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1947</guid>

					<description><![CDATA[<p>Nope, we&#8217;re not going to talk about ego trips, hidden agendas, or complete irresponsible transparency.  This blog post is about some of the fallout inside the Government security teams. The powers that be would like to remind you that downloading classified documents off the Intertubez does not make them unclassified.  An anonymous source that I [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1947">WikiLeaks: Coming to an Agency Near You</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Nope, we&#8217;re not going to talk about ego trips, hidden agendas, or complete irresponsible transparency.  This blog post is about some of the fallout inside the Government security teams.</p>
<p>The powers that be would like to remind you that downloading classified documents off the <a href="http://www.youtube.com/watch?v=_cZC67wXUTs" target="_blank">Intertubez</a> does not make them unclassified.  An anonymous source that I talked to last week gave me the info that they were busy tracking their users&#8217; browsing behaviors so that if you (the hypothetical you) went to WikiLeaks and downloaded a classified document, the InfoSec goon squad would show up outside your cubicle to shred your hard drive because you had just been responsible for a classified spillage&#8211;ie, your unclassified desktop now has classified material on it and as per procedure the only way to deal with the situation is to overwrite your hard drive and reimage it.  I have a couple thoughts about this:</p>
<ul>
<li>Where were the InfoSec goons when their users were getting drive-by malware from questionable sites?</li>
<li>If it&#8217;s on TV, it&#8217;s not a &#8220;secret&#8221; anymore.</li>
<li>Don&#8217;t our InfoSec teams have something better they can spend their time doing other than being the WikiLeaks monitor?</li>
</ul>
<p>And then there&#8217;s the Ambulance Chasing Department.  According to a different anonymous source, the vendors have descended upon the State Department hawking their security solutions, including this gem of a webinar.  Not quite sure what the webinar is on, except that they&#8217;re targeting you to sell something.</p>
<blockquote><p><em>From: Prism Microsystems<br />
</em></p>
<p><em>Sent: Wednesday, December 01, 2010 10:01 AM</em></p>
<p><em>To: user@state.gov</em></p>
<p><em>Subject: Webinar: Prevent &#8220;WikiLeaks-type&#8221; Data Loss</em></p>
<p><em>Webinar:  How to Prevent &#8220;WikiLeaks-type&#8221; Data Loss in Government Networks</em></p>
<p><em>Following the most recent publication of classified documents by WikiLeaks, government agencies are reviewing current provisions for protecting classified and top secret data &#8211; they are also researching best practices and alternative methods to monitor, prevent, and document data loss.</em></p>
<p><em>Attend this webinar to learn:</em></p>
<ul>
<li><em>how the leaks happened</em></li>
<li><em>telltale signs of a leak</em></li>
<li><em>what you can do to prevent them</em></li>
</ul>
</blockquote>
<p style="text-align: center;"><em><img decoding="async" loading="lazy" class="alignnone" title="The Leak" src="http://farm3.static.flickr.com/2079/1853626704_294bce8b9d.jpg" alt="" width="325" height="500" /><br />
</em></p>
<p style="text-align: center;"><em>Leak picture by <strong><a href="http://www.flickr.com/photos/jillallyn/">jillallyn</a></strong>.</em></p>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/407" rel="bookmark" title="June 2, 2008">Transparency in Government:  Just Give us the Data!</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/433" rel="bookmark" title="September 30, 2008">Workin&#8217; for the &#8216;Counters: an Analysis of my Love-Hate Relationship with the CPAs</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1035" rel="bookmark" title="May 22, 2009">When Standards Aren&#8217;t Good Enough</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/889" rel="bookmark" title="April 1, 2009">Preliminary Findings on Cybersecurity Review Now Out</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1197" rel="bookmark" title="July 14, 2009">Federated Vulnerability Management</a></li>
</ul>
<p><!-- Similar Posts took 7.306 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1947">WikiLeaks: Coming to an Agency Near You</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1947/feed</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1947</post-id>	</item>
		<item>
		<title>Interviewed for the &#8220;What It&#8217;s Like&#8221; Series for CSOOnline</title>
		<link>http://www.guerilla-ciso.com/archives/1936</link>
					<comments>http://www.guerilla-ciso.com/archives/1936#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Tue, 23 Nov 2010 13:57:08 +0000</pubDate>
				<category><![CDATA[Army]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[speaking]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1936</guid>

					<description><![CDATA[<p>Joan Goodchild interviewed me about some of my experiences in the big sandbox and how I was good enough at avoiding IEDs to make it there and home again&#8211;an abstract form of risk management. Go check it out.  And while you&#8217;re on the subject or for visuals to go along with the story, check out [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1936">Interviewed for the “What It’s Like” Series for CSOOnline</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Joan Goodchild interviewed me about some of my experiences in the big sandbox and how I was good enough at avoiding IEDs to make it there and home again&#8211;an abstract form of risk management. <a href="http://www.csoonline.com/article/638817/what-it-s-like-to-avoid-improvised-explosive-devices-ieds-" target="_blank">Go check it out</a>.  And while you&#8217;re on the subject or for visuals to go along with the story, <a href="http://www.flickr.com/photos/rybolov/sets/72157607288466995/" target="_blank">check out my Afghanistan set on Flickr</a>, a random set of them are below&#8230;.</p>
<p><strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/406" rel="bookmark" title="June 9, 2008">An Open Letter to NIST About SP 800-30</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1075" rel="bookmark" title="June 3, 2009">Working with Interpreters, a Risk Manager&#8217;s Guide</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/699" rel="bookmark" title="February 10, 2009">The Accreditation Decision and the Authorizing Official</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/601" rel="bookmark" title="November 11, 2008">Been There, Done That, Took Lots of Photos</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1447" rel="bookmark" title="December 13, 2009">Building A Modern Security Policy For Social Media and Government</a></li>
</ul>
<p><!-- Similar Posts took 3.719 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1936">Interviewed for the “What It’s Like” Series for CSOOnline</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1936/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1936</post-id>	</item>
		<item>
		<title>Evolving the Physical Hacking at Security Conferences</title>
		<link>http://www.guerilla-ciso.com/archives/1904</link>
					<comments>http://www.guerilla-ciso.com/archives/1904#comments</comments>
		
		<dc:creator><![CDATA[rybolov]]></dc:creator>
		<pubDate>Mon, 22 Nov 2010 13:54:28 +0000</pubDate>
				<category><![CDATA[Hack the Planet]]></category>
		<category><![CDATA[Rants]]></category>
		<category><![CDATA[Technical]]></category>
		<guid isPermaLink="false">http://www.guerilla-ciso.com/?p=1904</guid>

					<description><![CDATA[<p>There has been a fun evolution at hacker conference for the past couple of years: the inclusion of hackerspaces.  Hackerspaces fit nicely into the hacker ethos.  But I&#8217;ve also heard grumblings via the tubes about the relevance of projects that they bring to hacker conferences, something along the lines of &#8220;Why has every security conference [&#8230;]</p>
<p>The post <a href="http://www.guerilla-ciso.com/archives/1904">Evolving the Physical Hacking at Security Conferences</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>There has been a fun evolution at hacker conference for the past couple of years: the inclusion of hackerspaces.  Hackerspaces fit nicely into the hacker ethos.  But I&#8217;ve also heard grumblings via the tubes about the relevance of projects that they bring to hacker conferences, something along the lines of &#8220;Why has every security conference turned into a Maker Faire&#8221; (TM OReilly or somebody like that).  The behind-the-scenes info is that each hackerspace has their own feel and what kind of projects they&#8217;re &#8220;into&#8221; and you get what the local hackerspace brings.  While I consider hackerspaces booths at security cons to be pretty awesome, I have some suggestions for steering things back on track.</p>
<p>Things I would like to see in a petting zoo (yes, an &#8220;Evil Petting Zoo&#8221; and this is by no means an exhaustive list):</p>
<ul>
<li>RFID widgets and software</li>
<li>Mag stripe readers</li>
<li>Barcode readers/writers (Duh, I can help out here)</li>
<li>Wifi stupid pet tricks</li>
<li>Bluetooth</li>
<li>WRT Routers</li>
<li>Smartcards and readers/writers</li>
<li>Single-board/mini computers</li>
</ul>
<p>Of course, if you&#8217;re into any of these and have the hardware, software, or know-how, there is nothing keeping you from teaming up with hackerspaces at conferences and bringing some of your toys.  Sharing is caring, y&#8217;alls.  =)<strong>Similar Posts:</strong></p>
<ul class="similar-posts">
<li><a href="http://www.guerilla-ciso.com/archives/18" rel="bookmark" title="April 19, 2007">Security Awareness and Training</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1642" rel="bookmark" title="April 20, 2010">A Little Advice From Mike and Lee</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/42" rel="bookmark" title="March 28, 2007">My System Environment</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/1860" rel="bookmark" title="September 28, 2010">Because Life Isn&#8217;t Random Enough</a></li>
<li><a href="http://www.guerilla-ciso.com/archives/244" rel="bookmark" title="August 28, 2007">Debian and WPA</a></li>
</ul>
<p><!-- Similar Posts took 3.590 ms --></p><p>The post <a href="http://www.guerilla-ciso.com/archives/1904">Evolving the Physical Hacking at Security Conferences</a> first appeared on <a href="http://www.guerilla-ciso.com">The Guerilla CISO</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.guerilla-ciso.com/archives/1904/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1904</post-id>	</item>
	</channel>
</rss>
