Friday, 19 September 2008

It's Talk Like a Pirate Day (as happens every September 19th), and Google's jumped into the fray with Pirate search. Try it here. Enjoy.





Add/Read: Comments [0]
Humor | Random Stuff
Friday, 19 September 2008 08:15:41 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Thursday, 18 September 2008

I wasn't going to write anything about the new Microsoft commercials, which I really like, despite the fact that I wrote about the two Seinfeld/Gates commercials.

But then I realized that the PC Guy in the commercials is Sean Siler. He's a real tech guy who actually works at Microsoft for a living - as opposed to being a professional actor. Here's his TechNet blog.

In fact, Sean epitomizes the "I'm a PC" message. We interviewed him not too long ago for RunAs Radio on the topic of IPv6 (he's the program manager for IPv6 at Microsoft). I thought you might be interested in hearing what Sean had to say at that time. He's wicked smart and a fun conversation.

It sounds like it's been an interesting evening for Sean, but he took the time to exchange a couple emails with me, which was cool of him. Congrats to Sean, and to Microsoft. Good start!

So, here you go - Our interview with Sean from a few months ago:

RunAs Radio #53: Sean Siler Sets Us Straight on IPv6! (download MP3)

And here are the three new commercials. Personally, I like 'em.




Oh and if you send an email to Sean's address as listed in the three videos, you'll get a reply. I'd post it here, but it'll be more fun if you do it yourself. :)



Add/Read: Comments [3]
Geek Out | RunAs Radio | Tech
Thursday, 18 September 2008 21:05:13 (Pacific Standard Time, UTC-08:00)
#  Trackback

It's really the classic case study in information (in)security and the need for strong authentication. With all due respect to the good people at Yahoo!, this opportunity to review Internet security mechanisms is too good and too useful to pass up.

By now, we all know Republican vice-presidential candidate Sarah Palin's Yahoo! email account was broken into on Tuesday night (read the link to get the details). Apparently (and fairly obviously), access was gained via the forgotten password mechanism on the Yahoo! webmail interface, which allowed the malicious person to reset the profile's password with just a few pieces of information about the Alaska governor (birthdate, ZIP code and a piece of info related to where she met her spouse) that could be easily discovered by searching Google. That fact that so much of Palin's life history has been documented on the Web makes her that much more vulnerable to knowledge-based security mechanism hacks. It should also be noted that some security questions are better (or stronger) than others, so it's important that questions you choose for online protection are not ones that can be answered with information available on the Internet.

We security folk frequently talk about something called "multifactor authentication." By "multifactor" we mean an authentication process that requires two or more of the following:

  • Something you know (passwords, user names, answers to questions)
  • Something you have (token, device, phone, etc.)
  • Something you are (physical fingerprint, voiceprint, or other biometric measure such as a verifiable, non-spoofable behavior (some call this "something you do"))

Most multifactor auth systems are pretty easy to recognize. You know them when you see them. Those key fobs or cards with the revolving digits that you have to provide at login are a common example. They're also fairly expensive and complicated. Some multifactor technologies are easier to use than others. There are a variety of behind-the scenes systems that track user behavior and other markers to determine if the person accessing an account is the legitimate user or a bad guy, for example. A well-designed and well-implemented system balances usability with security strength, and some systems yield higher results in that regard than others.

In this particular case, the bad guy was able to leverage only things he knew (found via a search engine) to change the password on the account and gain access to the Yahoo! Mail account. No other verification or mechanism was required. That's simply weak security in this day and age.

I walked through the account password reset system on my Yahoo! account, just so I could get a first-hand look at how it works and how simple it is to reset an account there. Honestly, it was a little too easy. Here are the details (you can click each image to see them full-size):

First of all, I selected the option on the login screen that says, "Forgot your ID or password?"


Next I was prompted either to supply an email address for reset, or to choose the option to reset without access to a registered email account (which to me was an immediate red flag). Obviously, I chose the latter.


This is where the security mechanism breaks down. I'm immediately asked to answer a "secret" security question. This process is called knowledge-based authentication. It's an additional layer of validation in a single-factor authentication scheme - I have to provide "something else I know." Even in my case it's information that could be fairly easily discovered (assuming I answered the question accurately). It should also be noted that in order to change my security question, I need to contact Yahoo! customer support (which I did).


Once I supply the correct answer to a single question, I'm immediately allowed to change my password. At this point it should be noted that if I was prompted to answer multiple questions in this validation workflow, using some randomization of questions and setting a time limit to answer each one, that would at least make it more difficult for someone to gain unauthorized access. Systems are available to do exactly that (I know, I used to manage a team that built one such authentication app).


I'm asked to verify my ZIP code and country (just for profile information), and that's it. Note that other analyses of this process seemed to say that providing the ZIP code and Country was required to reset, but that was not the case in my review. In fact, it appears the bad guy is just being handed that information after changing the password, for free. Take that info, stick it in your Google and smoke it: More search accuracy for the next phase in your attack. Not good.


I'm then notified that my account is now "up to date." I also got an email notifying me of the changes that were made to an account I had tied to the Yahoo! profile for communication purposes. At least I can rest assured that I'll get an email before the bad guy goes into my profile and removes that address from the account.


I think you're starting to get the picture. The authentication mechanism is only as strong as it's weakest part, and the fact that I have an option to reset without ever having to leave the browser window is a problem. Even changing the system to require that I receive an email (which is already the standard reset mechanism) would be better. As it stands today, that's an option, but not a requirement.

Many will argue that hey, it's just an email account, and that Yahoo! can't be expected to implement stronger security on their site as a requirement. I say that's flat out wrong (and what the account was or wasn't used for isn't particularly relevant to this analysis). Email is the number one mechanism used to move information - both innocuous and sensitive - among people. The fact that it's not the best mechanism for doing so ignores the fact that it's how people do things. There are a variety of options available to help ensure only authorized users can get access to email accounts. The fact they are not regularly implemented is a sad state of affairs.

There are many options to strengthen the identification and authentication processes. We can't discuss them all here, but a couple on my mind are described below.

Physical tokens - Making the jump from only having to remember a user name (which is usually the email address, so hardly a secret ) and a password to a scheme where one must carry a token and provide information from it in order to log in is quite a leap (carrying yet another piece of technology around doesn't exactly appeal to me), but it works. The costs associated with fulfilling, supporting and maintaining such a system are very real, and for Yahoo! may not be realistic. But there are systems available to those who know and choose to use them that can substially improve your authentication profile. Check out Omar Shahine's recent blog entry describing how he's securing his accounts in a few ways, including with an OpenID-integrated single-sign-on token system from Verisign.

But, even if you use an OpenID to sign in, what if your OpenID is a Yahoo! ID or other identity that you can reset with a single piece of discoverable knowledge? It still needs to be protected from unauthorized changes and access.

How to do that? There are several ways. I have a couple of favorites, but please feel free to share yours.

Require security changes to take place out of band - One option, probably quicker and less expensive to implement than physical tokens, is using something like an automated telephone call or text message to require the owner of the account to verify a change should be allowed. By registering one or more phone numbers when the account is created and requiring a unique secret be provided via that channel to authorize a change, one can sufficiently secure the account. Vidoop uses a system like this for resetting information on their OpenID accounts. It's simple and it works. It requires me to have the correct device (my phone), uses a different communication channel (the phone network, hence "out-of-band") to contact me and then verifies I am a legitimate user. It requires me to interact as part of any change.

But the technology options get even better: JanRain's myOpenID, for example, now has a feature called "CallVerfID" that equips your myOpenID for two-factor authentication via the phone. It's quick and easy to set up and instantly protects every login with a multifactor authentication mechanism. I found I was not able to use it with a couple phone services due to the way they answer the call (I should provide feedback about that, added to my to-do list), but when set up for my cell or home phone it works as advertised.

Expect more of this class of technology in the future. Think, for example, about voice biometrics: Is that really you that's answering your phone? That kind of technology would be very cool if it was reliable. It's a complicated but useful technology that's being refined even as we discuss this.

I would guess that "review of all Internet email accounts" has been added to every campaign manager's list of things to do deal with early in the vetting process (not to mention the Secret Service's list). Any of the technologies above would likely have prevented the malicious bad guy from accessing the Yahoo! email account.

In the security world, change only happens when enough people make enough noise, a regulator gives an order, or enough companies feel enough financial pain. This looks like one of those cases where noise is the better option. It's certainly better than regulatory mandates (which tend to create collateral damage), and waiting on big companies to suffer is not exactly a reliable plan.

So... Feeling okay? How safe is your account, really?



Add/Read: Comments [4]
IT Security | Tech
Thursday, 18 September 2008 19:26:05 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Wednesday, 17 September 2008

The third wave of official beta apps under the Windows Live name have been made available a bit early for download. Full information and download links are located over at liveside.net. The updated Windows Live apps are:

  • Messenger v9
  • Windows Live Movie Maker
  • Mail with Calendar synchronization
  • Writer
  • Photo Gallery
  • Family Safety
  • Outlook Connector

There are also non-English versions listed on the site and a few individual reviews posted at liveside.net:

The most noticeable change is a whole new UI scheme for the apps, but there are a number of other changes in there, as well. Messenger's look and feel is very different. I see Live Writer now has direct YouTube integration - nice move and probably one that took some serious discussion to make happen (understandably). Time to start digging in and seeing what else the new apps offer under the hood.



Add/Read: Comments [0]
Tech
Wednesday, 17 September 2008 09:45:40 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Tuesday, 16 September 2008

The latest version of SQL Server implements several object models through Powershell to let folks manage SQL Server without using the SQL management tools.

We've just published a new episode of the RunAs Radio podcast with Michiel Wories, in which we dive into SQL Server 2008's Powershell features. Michiel is certainly the one to know and share about these features: He joined Microsoft 7 1/2 years ago in the role of Senior Program Manager for Microsoft SQL Server and is currently working as a Principal Architect on defining the next generation SQL Server management platform infrastructure. Michiel's blog is at http://blogs.msdn.com/mwories/

RunAs Radio is a weekly Internet-audio talk show for IT Professionals presented in a high-quality podcast format. Since April 2007 RunAs Radio has brought experts in the field of IT to its 10,000+ listeners, to inform and entertain. Professionally produced interviews are about 30 minutes in length and pack a substantial amount of information for maximum benefit. For more information about RunAs Radio, visit http://www.runasradio.com. RunAs Radio is available on iTunes and the Zune Marketplace, as well as directly from the RunAs Radio web site.



Add/Read: Comments [2]
RunAs Radio | Tech
Tuesday, 16 September 2008 21:01:17 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Friday, 12 September 2008

I enjoy the fact that my DirecTV DVR (model HR21-200) records HD content for me. The quality is generally pretty darned good (it does 1080p video now after a recent a software upgrade), and it beats the heck out of anything else available to me in the boonies. The unit comes equipped with a 320GB (give or take) internal drive, which allows something like 30 hours max of HD recording. I found that when recording full seasons of a few shows like The Office or Lost in HD (and most of us will tend to add a few HD movies in the mix), the drive tends to fill up before I want it to.

So, I ordered a Cavalry 1TB external eSATA/USB 2 drive from Newegg.com, which arrived today. I've hooked it up and it's working. My new capacity numbers? Well, it depends on the specific content, but up to about 145 hours of HD content or as much as 1000 hours of SD programming (wow). Variables that affect actual video-time capacity includes resolution, compression (MPEG2 uses more space than the newer MPEG4) and how much motion there is in the video (since more motion means less compression benefit).

I wanted to document the simple setup steps here, so people can get theirs to work if they should want to do the same thing. You can find similar info on the 'net, but people seem to have a hard time with it. My drive came pre-formatted NTFS, which is fine. The DVR will wipe any file system on whatever drive you hook up. Below are the steps that one needs to follow in order to get the external drive up and running with the DVR. The order of the steps is crucial. Don't try to power up your hard drive after you start the DVR, for example.

First of all, if your external SATA drive is a Seagate FreeAgent, you will probably not have any luck, unless you have a HR20 DVR unit. I've heard many stories from people who bought a FreeAgent drive and tried to attach it, with no luck. So, while the FreeAgent drives are great for gneral storage, they are probably not what you want to buy to attach to your DirecTV receiver. My HR21-200 unit simply refused to work with my 750GB Seagate drive, so it's doing video editing duty now. Your mileage may vary, but my experience is that they just don't work.

To start using your new hard drive:

  1. Power down the DVR.
  2. Unplug the DVR from the wall power. This is important.
  3. Attach the external drive's eSATA cable to the back of the DVR unit.
  4. Power up the external hard drive first, and allow it to "spin up" (give it about a minute to be safe).
  5. After the hard drive has "spun-up," plug the DVR back into the wall power plug.
  6. Be patient (very patient) and wait for the DVR to restart. It's not dead. Be patient.
  7. After it does it's thing, you'll be able to watch TV again. Check your recorded items list and make sure it's blank.
  8. Run a recording test and make sure you can play back.

Note that the DVR's internal drive is completely bypassed when you add a new external hard drive - the system no longer sees it. So your recordings and what-have-you from the internal drive will not be available to view. However, in my experience if you restart the DVR without the external drive attached the internal drive "comes back to life" and you'll see your old recordings there.

Any scheduled recordings on your "To Do List" that you set up before adding the external hard drive will no longer be programmed. This is important - You will need to set up your recording schedules again. Head over to DirecTV's online scheduler or their mobile scheduling site at http://m.directv.com and sign in to start setting things up. I sometimes find the mobile site to be a bit easier to use, even on a desktop or laptop PC - especially since it lets me search by name.

Also, note that whatever you set up online may not be configured using the default recording setting you've established on your receiver, so be sure to go to the receiver's Manage Recordings list and review the new items that appear in your To Do list to make sure they're set to what you want. In my case, I had to make changes. Seems like recordings scheduled online should use the defaults you've established on your machine, but they didn't for me.

Once You Know, You NeweggMost importantly, you can look for good deals on decent external eSATA hard drives to do an inexpensive upgrade to your DVR. If you like spending lots of money, you could go to one of the sites that offers upgrade hardware services, but one such site sells essentially the same drive I bought and installed myself. Their price? $299.00, and that's just for the hardware. If you want your internal drive copied to the new drive, they can do that for an additional $59 - Not worth it to me.

How much did I pay for mine? $167.00 from Newegg. You can do the math. Shop around, prices are even lower now, and you can find an even better deal out there.



Add/Read: Comments [72]
Geek Out | Tech
Friday, 12 September 2008 16:32:53 (Pacific Standard Time, UTC-08:00)
#  Trackback