<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Posts tagged "security" - nolan caudill&#39;s internet house</title>
    <link>https://nolancaudill.com/tags/security/</link>
    <description>Posts tagged "security" on nolan caudill&#39;s internet house</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 14 Apr 2013 07:00:00 +0000</lastBuildDate>
    <atom:link href="https://nolancaudill.com/tags/security/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How Secure is my Dropbox?</title>
      <link>https://nolancaudill.com/2013/04/14/how-secure-is-dropbox/</link>
      <pubDate>Sun, 14 Apr 2013 07:00:00 +0000</pubDate>
      <guid>https://nolancaudill.com/2013/04/14/how-secure-is-dropbox/</guid>
      <description>&lt;p&gt;The answer to this is: Secure as any other &amp;ldquo;private&amp;rdquo; content uploaded to the Internet, which is &amp;ldquo;not very.&amp;rdquo;
&lt;a href=&#34;https://www.dropbox.com/&#34;&gt;Dropbox&lt;/a&gt; is a widely-used service that lets you keep a specific directory in sync across many computers. Copy a file into the Dropbox folder on your work computer and it is nearly instantly available on your phone and your home computer. No more emailing files to yourself or scrambling to find a site that&amp;rsquo;ll let you upload a big file. They even give you a slick, web-based interface to browse your files.
This all sounds really easy and convenient which, unfortunately, usually means it&amp;rsquo;s not secure. The problem is that Dropbox stores your files on their servers encrypted in a way that they can read them.
First, what does one mean by &amp;ldquo;secure&amp;rdquo;? My definition of secure is that no one else in the world could possibly see the contents of something unless I let them. If it&amp;rsquo;s a text file, no one except me can read it; if it&amp;rsquo;s a photo, no one except me can see it.
For most of the files people want to share or sync, the security level of Dropbox is adequate. Disregarding that bug a couple of years ago &lt;a href=&#34;https://blog.dropbox.com/2011/06/yesterdays-authentication-bug/&#34;&gt;where anyone could log in with any password&lt;/a&gt;, Dropbox is password protected and they recently introduced two-factor authentication, where you have to type in both your password and a short-lived, always-changing set of numbers from your phone. All connections between you and Dropbox go over SSL. This means no one can snoop on files you send to Dropbox and no evil person can trick your computer into thinking they are Dropbox.
From my limited knowledge of Dropbox&amp;rsquo;s internals, gleaned from reading a few security analysis reports, they do encrypt your files before uploading them. The downside is that they &lt;a href=&#34;https://www.dropbox.com/help/28/en&#34;&gt;own the key to decrypt them&lt;/a&gt; &amp;ldquo;to ensure everyone has the ability to view and share files on the web painlessly.&amp;rdquo; Translated, this means that people-who-are-not-you can read your files.
I&amp;rsquo;ll assume that Dropbox, the company, follows industry standards for security. Only certain engineers get access to certain machines. Only certain support people get access to your files as necessary. Only code that&amp;rsquo;s been properly vetted for security bugs is deployed.
The weak spot in all of Dropbox&amp;rsquo;s efforts are the people. This isn&amp;rsquo;t a knock on Dropbox at all; people are the weakest spot in ANY security system.
&lt;a href=&#34;https://xkcd.com/538/&#34;&gt;&lt;img src=&#34;https://nolancaudill.com/images/external/security.png&#34; alt=&#34;&#34;&gt;&lt;/a&gt;
Servers are constantly barraged by people trying to break in, and they often succeed. Support people sometimes stray and snoop at files they they shouldn&amp;rsquo;t. Developers write bugs that let random people on the internet get access to things they shouldn&amp;rsquo;t. It happens, despite best efforts in engineering or culture. People make mistakes.
If you&amp;rsquo;re wanting to keep your music in sync between computers, or want to quickly send a photo to a friend, Dropbox is great. It&amp;rsquo;s incredibly convenient. If it&amp;rsquo;s a file that you wouldn&amp;rsquo;t want another person to have, like your password file or financial documents, you don&amp;rsquo;t give it to Dropbox.
There is one (and only one) workaround to this though. If you encrypt a file on your computer before giving it Dropbox, they won&amp;rsquo;t be able to read it. &lt;a href=&#34;https://agilebits.com/onepassword&#34;&gt;1Password&lt;/a&gt;, the popular password manager, takes this approach. They store your passwords in a file they then encrypt on your computer using high-grade encryption software. They then place this encrypted file into your Dropbox. Even if this file was to leak somehow, no one else but you could open it. Dropbox is purely the syncing service, which is still a handy thing to have.
The sad part of encryption is all the tools are terribly hard to use. &lt;a href=&#34;http://www.truecrypt.org/&#34;&gt;TrueCrypt&lt;/a&gt; is probably the easiest of the bunch but there&amp;rsquo;s still a bit of learning curve to the terminology (partitions, volumes, and encryption algorithms?). I use &lt;a href=&#34;http://www.gnupg.org/&#34;&gt;GnuPG&lt;/a&gt; to encrypt my files, but that involves using a command-line interface, something most people aren&amp;rsquo;t (and probably shouldn&amp;rsquo;t have to be) comfortable using. &lt;a href=&#34;https://www.openssl.org/&#34;&gt;OpenSSL&lt;/a&gt; is the Swiss Army knife of all things encryption but using it properly is like knowing some secret wizard&amp;rsquo;s spell.
Dropbox can read anything you give to it, in the state you give it to them. Give them something that only you can read and you get the joy of having this file everywhere while still being the only one who can open and read it.
I&amp;rsquo;m not saying to not use Dropbox. It&amp;rsquo;s just a fact that any file uploaded to Dropbox, given enough time, stands a good chance of being seen by someone you don&amp;rsquo;t know, so adjust your file syncing accordingly.
&lt;em&gt;This post was inspired by &lt;a href=&#34;https://twitter.com/kellan/status/323092603761479681&#34;&gt;a Twitter message from Kellan&lt;/a&gt; yesterday.&lt;/em&gt;&lt;/p&gt;
</description>
    </item>
    <item>
      <title>Security vs Convenience</title>
      <link>https://nolancaudill.com/2012/12/18/15/</link>
      <pubDate>Tue, 18 Dec 2012 05:57:00 +0000</pubDate>
      <guid>https://nolancaudill.com/2012/12/18/15/</guid>
      <description>&lt;p&gt;Until a few months ago, my Flickr account was still using the same 6-letter password that Yahoo automatically assigned to me in the late 1990s. Most of my other accounts were using a variation of this password, with a dumb algorithm that used pieces of the site&amp;rsquo;s URL with some numbers attached. None of this was good.&lt;/p&gt;
&lt;p&gt;After &lt;a href=&#34;http://www.emptyage.com/post/28679875595/yes-i-was-hacked-hard&#34;&gt;Mat Honan&amp;rsquo;s terrible hacking fiasco&lt;/a&gt; this past summer, I realized that, yeah, this could happen to me too and I should just take care of locking everything down the best I can. Here&amp;rsquo;s the current state of how I&amp;rsquo;m staying safe online.&lt;/p&gt;
&lt;p&gt;The first major improvement I made is that I started &lt;strong&gt;using a password manager&lt;/strong&gt;, going with &lt;a href=&#34;https://lastpass.com&#34;&gt;LastPass&lt;/a&gt;. I&amp;rsquo;ve used a Linux laptop at home forever and use Macs at work and have an iPhone so I needed something that worked on these different systems. LastPass has an iPhone app, a Chrome plugin, and a nifty website so this worked for me. Quite a few of my friends use &lt;a href=&#34;https://agilebits.com/onepassword&#34;&gt;1Password&lt;/a&gt;, which works on the same principle of storing passwords in an strongly encrypted file. The main difference is that LastPass stores this encrypted file for you whereas 1Password requires you to take care of transporting, protecting, and syncing this file.&lt;/p&gt;
&lt;p&gt;After using a password manager for a few months, there&amp;rsquo;s no way I could go back to remembering a hundred or so slightly different passwords and often having to reset them due to forgetfulness.&lt;/p&gt;
&lt;p&gt;I then started making the effort that every time I hit a site that hadn&amp;rsquo;t been added to my LastPass account, I would change the password to a new, machine-generated password. I also started storing &lt;strong&gt;fake answers to security questions&lt;/strong&gt; alongside each password in a special notes field the manager provides. Now every site I log into has a long, hard-to-crack, and unique password with security questions that no one could answer.&lt;/p&gt;
&lt;p&gt;My current goal is to know only the password to my password manager with all the others locked away. The downside to this is all my passwords are protected by just one password which is a weak spot as passwords can be logged, guessed, or brute forced. Luckily, LastPass offers &lt;strong&gt;two-factor authentication&lt;/strong&gt; which means that people would need both the password and my phone that runs the Google Authenticator app.&lt;/p&gt;
&lt;h2 id=&#34;the-tricky-thing&#34;&gt;The tricky thing&lt;/h2&gt;
&lt;p&gt;Using two-factor authentication is incredibly secure but the tricky part to consider is what happens when I can&amp;rsquo;t access my phone, like in the case of the battery being dead, or stolen or lost in the worst case. Most services that offer two-factor authentication also give you the option to set up ahead of time a short list of one-time passwords. These should be generated and stored where you always have access to them. I store these in two spots: in my wallet and a symmetrically-encrypted file on my personal server for redundancy.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;Security and convenience sit on opposite ends of a spectrum. While it takes a little effort to set up, it makes your accounts much more secure from data leaks and hacking attempts and not having to remember multiple, insecure passwords is a burden one should be happy to be relieved of.&lt;/p&gt;
</description>
    </item>
    <item>
      <title>Nobody puts tarsnap in a corner</title>
      <link>https://nolancaudill.com/2011/11/24/nobody-puts-tarsnap-in-a-corner/</link>
      <pubDate>Thu, 24 Nov 2011 08:00:00 +0000</pubDate>
      <guid>https://nolancaudill.com/2011/11/24/nobody-puts-tarsnap-in-a-corner/</guid>
      <description>&lt;p&gt;I woke up this morning around 7:30 with my laptop (a Lenovo R61i running ArchLinux) not feeling quite as snappy as usual. After viewing &lt;em&gt;top&lt;/em&gt;, I saw where my nightly backup to tarsnap was still running, which kicks off via cron. This script usually takes 5 minutes, tops.&lt;/p&gt;
&lt;p&gt;My first feeling was that it was probably the couple of gigabytes of email that I backed up from Gmail yesterday, though even with the extra bits, my outbound bandwidth should have been able to allow that go through much faster than 4+ hours.&lt;/p&gt;
&lt;p&gt;So I attached to the running tarsnap process with &lt;em&gt;strace&lt;/em&gt;, just to see what it was doing. I saw lots of selects, receives, and sends, so it appeared to be sending things across the network, which was good.&lt;/p&gt;
&lt;p&gt;Seeing the network activity, even though it was behaving properly, set off alarms. A bunch of new files to backup wasn&amp;rsquo;t the only thing I changed yesterday: I had also switched out my Linksys WRT54GL&amp;rsquo;s router firmware with &lt;a href=&#34;http://www.polarcloud.com/tomato&#34;&gt;Tomato&lt;/a&gt;, mainly due to its extensive Quality-of-Service settings.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ve got a few streaming media devices around the house and I wanted to give them priority (based on MAC, static IP, network interface, etc).&lt;/p&gt;
&lt;p&gt;Another nice thing about Tomato is that comes with graphs. I love graphs, and Tomato gives you bandwidth graphs, broken down by timerange and NIC.&lt;/p&gt;
&lt;p&gt;Pulling up the graph verified that I had a block of outbound traffic start at 3am, but it was never rising above 30kbps. It was being capped.&lt;/p&gt;
&lt;p&gt;So I went back to the QoS interface and sure enough there was a class of traffic labeled &amp;ldquo;lowest&amp;rdquo; for &amp;ldquo;Bulk Traffic&amp;rdquo; (which matched any TCP/UDP packets heading out to a port 1024 or above) and it was being capped at 30kbps. While fiddling with the inbound limits in the QoS admin, I &lt;em&gt;completely&lt;/em&gt; glazed over the &lt;em&gt;outbound&lt;/em&gt; limit defaults. (Also, this is why I&amp;rsquo;m not a network operator.)&lt;/p&gt;
&lt;p&gt;Since this is the only outbound traffic of any significance through this router, and I run it at night to not interfere, I just disabled all outbound limits.&lt;/p&gt;
&lt;p&gt;Here&amp;rsquo;s the 24-hour bandwidth graph after turning the outbound limits off:&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://nolancaudill.com/images/tomato.png&#34; alt=&#34;&#34;&gt;&lt;/p&gt;
&lt;p&gt;The green is outbound traffic, being capped for several hours, and then spiking and then quickly finishing.&lt;/p&gt;
&lt;p&gt;So Tomato is awesome but is evil in that way that only computers can be, which is by doing exactly what you tell them to do.&lt;/p&gt;
</description>
    </item>
    <item>
      <title>Bad Microsoft</title>
      <link>https://nolancaudill.com/2007/11/19/bad-microsoft/</link>
      <pubDate>Mon, 19 Nov 2007 08:00:00 +0000</pubDate>
      <guid>https://nolancaudill.com/2007/11/19/bad-microsoft/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://tbcorp.homeip.net/blog/?p=636&#34;&gt;This&lt;/a&gt; is not good at all. And just as Microsoft was gaining &lt;em&gt;some&lt;/em&gt; amount of respect as being a secure platform.&lt;/p&gt;
</description>
    </item>
  </channel>
</rss>
