greg hughes - dot net
Note that the contents of this site represent my own thoughts and opinions, not those of anyone else - like my employer - or even my dog for that matter. Besides, the dog would post things that make sense. I don't.
 Wednesday, 18 January 2006
I'm in Pittsburgh, after spending the day with some cyber-forensics folk and seeing first-hand how law enforcement, business and academia are working together and actually sharing real information with each other to fight cyber crime. It's really very cool - A lot like taking community policing to the online world and its players. And best part is, it's a community that works. Lots of creative thinking going on there. Like a candy store for a forensics geek.
It's also similar in ways to the success of business blogging, actually. Why do I mention that? Robert Scoble and Shel Israel are out and about these days promoting the launch of their new book, called Naked Conversations, and I noticed one similarity between community policing and corporate blogging: The desire and success in getting the real faces and personalities of important people who would otherwise be inaccessible out into the community - the movers and shakers of the make-something-happen variety. In a community policing model, we expose individual law enforcement officers, business workers and citizens from the community to each other in a collaborative communication environment, allowing each member to own a part of the problem and solution. The corporate/business blogging model can do effectively the same thing - opening up the hidden world of the big, bad business machine, breaking down the traditional corporate walls, making it individual and human and allowing the customer to take some participative ownership in how things happen.
Anyhow, Robert's in Pittsburgh today, too, and it's his birthday (Happy birthday, dude). He was here to speak at the university and to do some book promotion. We met up for a quick breakfast this morning and I grabbed a copy of his book from the Barnes and Noble store to read on the way home tonight. So far it looks pretty cool, fun to read and it appears to cover the bases quite well. Recommended.
Oh, and since every entry requires a tangent topic: There's free WiFi in the Pittsburgh airport, just like Portland. And Pittsburgh's a cool city - lots of old buildings and bridges. It's been a while since I was here last, I'd forgotten what it was like.
 Sunday, 15 January 2006
As tends to happen from time to time, some sudden attention on the 'net (starting with the Security Fix blog at Washington Post) has been paid in the last couple days to what has been misleadingly described in some places as a "flaw" in the Windows wireless networking functionality. In reality, that's not quite the case. Rather, the potential problem (which some might argue is actually a feature) is related to an understood standard computer configuration (some would say "as-designed") of the spec governing dynamic configuration of IPv4 link-local addresses (RFC 3927 - see part 5). The authors of the spec even noted the potential risks and discussed the importance of taking that risk into consideration in design and deployment:
"The use of IPv4 Link-Local Addresses may open a network host to new attacks. In particular, a host that previously did not have an IP address, and no IP stack running, was not susceptible to IP-based attacks. By configuring a working address, the host may now be vulnerable to IP-based attacks." (read the spec)
Unfortunately, some have stated incorrectly that this represents an unknown or recently-discovered security hole or flaw. That's just not the case. This is, however, something that people should be aware of if they use or manage portable computers with wireless networking cards.
The problem has to do with the fact that the last wireless network name (or SSID) you successfully connected with is reused and associated with the generic IP address that gets assigned when your wireless card can't find a network to associate with, so someone who is also assigned an IP In that block and who knows what they're doing might try to connect to your computer using that network name and the generic IP address subnet. Yeah, it's technical but it's not too hard to protect yourself.
The first thing you should already have in place - and if you don't, you need to take care of this now - is a firewall to protect access to and from your computer. It's amazing how many problems can be mostly or completely mitigated with a decent and properly configured firewall. If you block incoming traffic with the firewall, then access to the wireless adapter is nowhere near as big of a deal.
On the technical side, there are a couple things that can be done to resolve the specific issue at hand. The most logical (and second most technical) step is to configure the network adapter in Windows to only allow infrastructure connections (to access points), and not Ad-Hoc connections (to other wireless cards in peer-to-peer mode). This can be done individually (on a specific computer by the user or administrator) or in a more automated fashion across a security domain (see below).
On a Windows computer, you can also get all geeked out (this is a more technical step) and disable the feature that automatically assigns the generic dynamic IP address when DHCP server is present (this auto-assign feature is sometimes referred to as APIPA - see this page for details on disabling it if interested, but use at your own risk, it involves editing the registry). It's this common and predictable IP address space that could potentially allow someone else to try to snoop into your computer, if you had none of the other standard protections - like firewalls and directory security - in place.
An even better option - where available - is to have your Windows Domain administrators control the setting for any group of computers managed by the domain's Group Policy. To do this, navigate in the Group Policy editor to:
Computer Configuration > Windows Settings > Security Settings >Wireless Networks
You notice there's nothing listed in that section by default - That's because you have to create your own policy if you want to take advantage of the features available. To do so, right click in the empty space and choose to create a new wireless policy. You'll give it a friendly name and the wizard will walk you through the steps required to set up your new policy. On the properties page (see below), you'll note an option is available to specify the network types to which you want to allow access. You can choose "Access point (infrastructure) networks only." Note that selecting this will force all computers to which the policy is applied to access point networks (so the wireless peer-to-peer networking without an access point - which is exactly the issue we're trying to mitigate - will no longer work).

Some companies use these settings to ensure the only wireless networks that business computers access are ones that are pre-approved, but that means a tradeoff between security and convenience, and road warriors often desire and need to use public access points for any of a number of reasons. How deeply and widely you apply the policies is a business decision - just be sure to consider all the potential business effects and consequences.
Note again that fixing a problem in just one place or in just one layer is most certainly not the right way to solve problems like this. Rather, taking a defense-in-depth approach, where you block access at as many layers as possible, is the way to approach network security issues.
For example, let's go back to enabling the software firewall on your computer - whether it be the Windows Firewall that is part of Windows XP SP2, or a third party firewall by a company like Symantec or others. This is another critical layer. Having a properly configured firewall in place helps to ensure access to your computer is protected, even if the wireless connection is "open." Layering protections allows you to be sure the problems are kept out, and also provides a possible mechanism to temporarily relax any one of the protections when needed in order to accomplish a specific task.
People are certainly interesting, especially when given the ability and opportunity to say whatever's on their minds uninterrupted. Whether they should or not. Of course, "should" is a relative term, determined by both listener and speaker. And they won't always agree.
Brad Fitzpatrick - of LiveJournal fame - has created a continuous stream of public Internet audio blog posts recorded by LiveJournal users. I think I'll call it Brad's People Aggregator. It's colorful, random, strange and interesting. Sometimes funny, sometimes just crude. And you never know what you'll hear (good, bad or otherwise).
NOTE that the language and content of the audio posts is almost guaranteed to contain loud, crude, vulgar language.
People dial in to a number that allows them to post to their LiveJournal accounts. It's apparent that elevators and airports bring out interesting behavior in people. Now, I'm not so sure recording an audio post about your marijuana growing operation is really all that great an idea - but whatever. Also not convinced that talking about the court date you just had and how you have to go to the mental health office for your appointment is a great idea, but again, whatever... It's certainly an honest and unique slice of the real world, and that means real people (along with their collective reasoning, language, intelligence and behavior).
I suppose it's a great way to discuss and complain about stuff, but in a way where no one is there to tell you why you're SO FREAKIN' WRONG. Heh. Hmmm, there's probably some serious psychology to be done there - Something about how our interconnected world actually makes us more isolated even though everyone is so "close."
Here's the link...
Enjoy.
 Saturday, 14 January 2006
I laughed out loud for some reasons when I read some of Trevin's comments from his trip to the Consumer Electronics Show earlier this month, where he listed a number of not-so-hot items from the super-mega-tradeshow of the gadget industry.
One of the more amusing categories in his post is "Wierdest celebrities coupling: Snoop Dogg and Donny Osmond."
XM had Snoop Dogg appear, then about 30 mins (later) they had Donny Osmond. They had to have met at some point -- wtf did they talk about?
Snoop Dogg: "Hey Don-dogg, what's the shizzle?"
Donny: "What?"
Snoop Dogg: "Fo sho"
Donny: "What?"
Snoop Dogg: "Peace out dogg"
Donny: "What?"
Heh!
 Friday, 13 January 2006
 Thursday, 12 January 2006
From CBC in Canada comes a hilarious video from Rick Mercer's show - The Mercer Report - demonstrating the latest in apparel for the Blackberry user. Should be mandated by OSHA in all high-tech office settings:
Check out the Blackberry Helmet Video at:
http://www.cbc.ca/mercerreport/videos/blackberry.wvx
(note - in non-USA style, there's some slightly-blurred-out nudity in this, so if you can't handle it, don't click - but hey, the video is funny)
© Copyright 2012 Greg Hughes

This work is licensed under a Creative Commons License.
 | This page was rendered at Friday, 13 July 2012 09:59:00 (Pacific Standard Time, UTC-08:00)
newtelligence dasBlog 2.1.8015.804
|
"Computers used to take up entire buildings, now they just take up our entire lives."
- Unknown
"So how do you know what is the right path to choose to get the result that you desire? And the honest answer is this... You won't. And accepting that greatly eases the anxiety of your life experience."
Syndication [XML] and .net Alerts
For lazy, highly-technical or enlightened people, get this site's content without the use of a web browser. I use FeedDemon for this, but you can choose your own. Subscribe - click the icon for my feed... or sign up for Microsoft Alerts to receive updates through your MSN Messenger, e-mail, or mobile device. Click the orange button thingie to sign up with your Passport account: 
Contact
Drop me an email: Phone: 503-766-2258
Add me to MSN Messenger
Monthly Archive
June, 2012 (1) |
November, 2011 (1) |
October, 2011 (7) |
July, 2011 (1) |
May, 2011 (1) |
April, 2011 (1) |
January, 2011 (2) |
December, 2010 (3) |
November, 2010 (2) |
October, 2010 (1) |
September, 2010 (1) |
July, 2010 (1) |
June, 2010 (13) |
May, 2010 (4) |
April, 2010 (10) |
February, 2010 (1) |
January, 2010 (2) |
December, 2009 (1) |
November, 2009 (2) |
September, 2009 (2) |
August, 2009 (1) |
July, 2009 (2) |
June, 2009 (4) |
May, 2009 (7) |
April, 2009 (3) |
March, 2009 (5) |
February, 2009 (1) |
January, 2009 (10) |
December, 2008 (7) |
November, 2008 (7) |
October, 2008 (18) |
September, 2008 (18) |
August, 2008 (18) |
July, 2008 (35) |
June, 2008 (16) |
May, 2008 (12) |
April, 2008 (16) |
March, 2008 (22) |
February, 2008 (32) |
January, 2008 (9) |
December, 2007 (6) |
November, 2007 (4) |
October, 2007 (19) |
September, 2007 (36) |
August, 2007 (19) |
July, 2007 (17) |
June, 2007 (16) |
May, 2007 (13) |
April, 2007 (11) |
March, 2007 (5) |
February, 2007 (14) |
January, 2007 (16) |
December, 2006 (16) |
November, 2006 (4) |
October, 2006 (23) |
September, 2006 (14) |
August, 2006 (21) |
July, 2006 (34) |
June, 2006 (25) |
May, 2006 (20) |
April, 2006 (20) |
March, 2006 (17) |
February, 2006 (34) |
January, 2006 (30) |
December, 2005 (23) |
November, 2005 (39) |
October, 2005 (30) |
September, 2005 (49) |
August, 2005 (31) |
July, 2005 (21) |
June, 2005 (35) |
May, 2005 (53) |
April, 2005 (54) |
March, 2005 (60) |
February, 2005 (27) |
January, 2005 (59) |
December, 2004 (70) |
November, 2004 (58) |
October, 2004 (55) |
September, 2004 (64) |
August, 2004 (53) |
July, 2004 (65) |
June, 2004 (50) |
May, 2004 (49) |
April, 2004 (26) |
March, 2004 (20) |
February, 2004 (26) |
January, 2004 (28) |
December, 2003 (12) |
October, 2003 (8) |
September, 2003 (11) |
August, 2003 (1) |
On this page
Search and Translate this Site
Blog Posting Categories
Navigation Links
Blogroll
Scott Adams' Dilbert Blog
Scott Adams is the creator of Dilbert, and his blog is an incredibly smart, clever and often funny (sometimes very serious) look at the world. Everyone should read this blog. |
Alex Scoble
Alex is a former coworker who blogs about a variety of IT-related topics. |
Brent Strange
Brent is a cool dude and a great QA guy that I used to work with. His blog is, appropriately, focused on QA and testing technology. |
Chris Brooks
Chris was formerly my boss at work and is an avid board gamer and photographer. He always has some new info about top-notch board games you may have never heard of, so if you're into them, you should check out this blog. |
Chris Pirillo
Lockergnome by trade, Chris is always up to something new. If you are not familiar with the Lockergnome newsletters, be sure to check them out, too. |
Matthew Lapworth
Matt's a software developer and friend. He seems to enjoy extreme sports. That's fine as long as he doesn't, like, die or something. |
Milind Pandit
Milind writes about all sorts of interesting stuff. We worked toegther for eight years, and he worked at our employer longer than I, which pretty much makes him old as dirt in company time. :) |
MSFT Security Bulletins [RSS]
RSS feed for all Microsoft security bulletins provides an always-up-to-date list of updates along with complete descriptions of each. |
neopoleon.com
Rory Blyth is one of the funniest and most thought-provoking bloggers I read. And I blame him for everything. Literally. |
Scott Hanselman
Scott's computerzen blog is a popular spot for all things .NET and innovative. I used to work with him, but then he went off to Microsoft. He's one of the smartest guys I know, and arguably the best technical presenter around. |
Sign In
Who Links Here
Total Posts: 1889 This Year: 0 This Month: 0 This Week: 0 Comments: 3450
Android (7) Apple (67) AudioBlogging (42) Aviation (2) Blogging (154) Fireworks (5) Geek Out (130) GnomeDex (20) Google Voice (1) Helping Others (27) Home Servers (5) Humor (144) IT Security (218) Kineflex Artificial Disc Surgery (16) Management (8) Microsoft Office (4) Mobile (139) Movies (31) Mt. St. Helens (13) Office 2003 (52) OneNote (29) Personal Stories (163) Photography (29) Random Stuff (642) RSS Stuff (47) RunAs Radio (28) Safe Computing (39) SharePoint (56) Tablet PC (42) Tech (1036) Things that Suck (69) Windows (6) Windows Media Technology (27)
|