Apple iPhone “Jailbreak” FUD

Apple may well have good and fair reasons to keep users from “jailbreaking” their iPhones, however the arguments as presented in the article are just FUD:

http://www.eweek.com/c/a/Midmarket/Apple-Claims-Jailbreaking-iPhones-Could-Crash-Cell-Towers-803734/?kc=EWKNLNAV07312009STR1

If AT&T’s cell network is this vulnerable, we have far greater worries than a little iPhone hacking. After all, Apple’s argument is essentially to keep jailbreaking . . . → Read More: Apple iPhone “Jailbreak” FUD

Useful browser check…

Apparently a lot of compromised browsers purposefully send a modified “UserAgent“, for instance:

UserAgent Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; AntivirXP08; .NET CLR 1.1.4322; .NET CLR 2.0.50727; InfoPath.1; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)

that “AnitvirXP08” isn’t supposed to be there and best guess is it helps web sites that work . . . → Read More: Useful browser check…

A moment of mourning…

Time to hold a moment of mourning. It appears that WPA (fortunately not WPA 2 yet) has been cracked:

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9119258&source=NLT_AM&nlid=1

http://www.itworld.com/security/57285/once-thought-safe-wpa-wi-fi-encryption-cracked

I realize Erik Tews is probably a good person and all and probably believes he’s helping the world by finding this vulnerability before the “real” hackers do, but ultimately I’m . . . → Read More: A moment of mourning…

Just when you thought it was safe in the Universe again…

Dang, now that’s a hack allright:

http://government.zdnet.com/?p=3996&tag=nl.e539

Fortunately they missed the “Create Black Hole” setting…

RedHat gets hit this time…

It just goes to show, if you think you’re safe, you’re not. This time RedHat was hit:

http://blogs.zdnet.com/security/?p=1784&tag=nl.e550

This is pretty ugly since it involves the signing of certificates used to validate the RPM repositories and RPMs themselves. RedHat claims that the “passphrase“s for the certificates weren’t compromised, so no harm no foul. . . . → Read More: RedHat gets hit this time…

Brilliant article with x-Hannaford CIO

StorefrontBacktalk has a short but brilliant article with the former CIO, Bill Homa, of Hannaford grocery chain who suffered a major breach of credit card data:

http://storefrontbacktalk.com/story/071108homa

There are three particular points that stand out:

That Microsoft is still so hole ridden as to put your company at additional risk. That PCI is . . . → Read More: Brilliant article with x-Hannaford CIO

WPA versus WPA2?

So what’s the difference?

Not much or a lot depending on your opinion. WPA uses TKIP for key management, whereas WPA2 uses AES-CCMP. Usually depending on how the AP has been set up, you can use either (TKIP or AES-CCMP) interchangeably, thus using WPA or WPA2 as needed. Many older devices like those running Windows . . . → Read More: WPA versus WPA2?

WPA resources

When researching using WPA on Ciscos I ran into a lot of useful URLs as resources. If you’re in the same bind, you may find them helpful too:

http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801bd035.shtml http://articles.techrepublic.com.com/5100-1035-6148543.html http://articles.techrepublic.com.com/5100-1035-6148581.html http://i.t.com.com/i/tr/downloads/home/gou_secure-wireless-guide.pdf http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00801df0e4.shtml http://www.ccitraining.net/courses/cwls.shtml http://projectdream.org/publications/windows/eap-peap-cisco-windows-2003.html http://www.networkcomputing.com/1409/1409ws13.html http://www.cisco.com/en/US/products/hw/wireless/ps430/products_tech_note09186a008024aa4f.shtml http://cio.cisco.com/univercd/cc/td/doc/product/wireless/airo1100/accsspts/ap11icg/ivicgaut.htm http://www.networkworld.com/research/2002/0506whatisit.html http://tldp.org/HOWTO/html_single/8021X-HOWTO http://en.wikipedia.org/wiki/IEEE_802.1Q http://www.cisco.com/en/US/docs/wireless/access_point/12.2_15_JA/configuration/guide/s15vlan.html http://hardware.mcse.ms/archive80-2005-8-223677.html http://www.cisco.com/univercd/cc/td/doc/product/access/mar_3200/wlsnotes/cfwlsmod.htm http://www.cisco.com/univercd/cc/td/doc/solution/mblacrdg.pdf http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a00800a7af6.shtml http://www.cisco.com/warp/public/cc/pd/witc/ao1200ap/prodlit/wrsec_an.htm

Not a pretty list, but still good to . . . → Read More: WPA resources

What is 802.1x?

If you’re investigating things like enterprise WPA and/or NAC based network control you’ll probably run into the fact that it uses 802.1x protocol. So what is 802.1x?

Basically the long and short of it is IEEE 802.1x is just a protocol to pass EAP over wired/wireless LANs. EAP on the other hand is just a . . . → Read More: What is 802.1x?

If using WPA-PSK, use a long key!

If you must use WPA-PSK (meaning WPA with a pre-shared key, rather than WPA using 802.1x authentication via Radius), make sure your key is sufficiently long. Ideally 20 characters or more.

To quote:

Robert Moskowitz’s article, “Weakness in Passphrase Choice in WPA Interface,” describes a theoretical attack on WPA passwords. The tools WPA-psk-bf, CoWPAtty and . . . → Read More: If using WPA-PSK, use a long key!