New Blackberry Curve
PostPosted:Thu Dec 11, 2008 11:07 pm
Your place for discussion about RPGs, gaming, music, movies, anime, computers, sports, and any other stuff we care to talk about...
https://tows.cc/phpBB2/
Secure Shell, which essentially allows secure TelNet style interface using a remote device. This version is for J2ME device in particular.Zeus wrote:To those of us not programming nerds, what is SSH?
Wrong. All of our computers are visible to the outside world - our desktops, file servers and experimental clusters. I've used DOE resources that only required an ssh login - getting that login and maintaining the passwords for that account were a pain in the ass, but it was on the internet. As are some computing resources we're using in Barcelona, Spain. I guarantee you that the DOE supercomputers that I've used are not compromised.If the server's ON the internet then your system is pretty much guaranteed to already be compromised.
It means that right now, as I type on my BlackBerry, I can reboot the web server, or log into MySQL and change every instance of the word "Zeus" to "poopyhead"...all while I "enjoy" this company Christmas party.Zeus wrote:So it's just a script which allows you to use your Curve to remotely control a Linux-based (or J2ME) device? What's the percentage of people that would use this? 0.05%?
I'm not being an ass, I'm actually asking an honest question. I may just be misunderstanding the use of such an option.
Wrong. Obviously there are exceptions to this rule as to whatever you're talking about with the DOE (still don't see why a desktop would EVER need an internet presence but whatever), but if you put a server on the internet you only open up the ports it requires in order to complete its purpose for being ON the internet. For example: Web server would normally only have 80 and 443 open (HTTP/HTTPS). While SSH would be used to administer it, this would be a port only open to the internal company network, NOT the internet. Administration of ANY internet server should be done via the internal network (or remotely through a VPN) unless there are some other decent compensating controls in place such as an ACL put on the access to SSH. Sure you have to trade off some convenience for security, but there are way too many exploits out these days for SSH, Apache, PHP, etc in the wild to take such an unnecessary risk as putting it out on the internet just so your admin doesn't need to VPN in.Kupek wrote:Wrong. All of our computers are visible to the outside world - our desktops, file servers and experimental clusters. I've used DOE resources that only required an ssh login - getting that login and maintaining the passwords for that account were a pain in the ass, but it was on the internet. As are some computing resources we're using in Barcelona, Spain. I guarantee you that the DOE supercomputers that I've used are not compromised.If the server's ON the internet then your system is pretty much guaranteed to already be compromised.
Our resources are visible to the world because if they weren't, they'd be useless. Companies don't put their resources on the internet because it's not needed - most people who are going to use it will be physically in the building, and those that won't can deal with VPNs. There is some risk with making a server visible to the world, and in the case where most people are going to be in the same physical location, it's not worth taking it.
Also keep in mind where Sine works: an ISP. I'm going to guess that some (most?) of the servers he deals with everyday, by definition of their jobs, have to be public to the internet.
Question still wasn't answered :-)SineSwiper wrote:It means that right now, as I type on my BlackBerry, I can reboot the web server, or log into MySQL and change every instance of the word "Zeus" to "poopyhead"...all while I "enjoy" this company Christmas party.Zeus wrote:So it's just a script which allows you to use your Curve to remotely control a Linux-based (or J2ME) device? What's the percentage of people that would use this? 0.05%?
I'm not being an ass, I'm actually asking an honest question. I may just be misunderstanding the use of such an option.
I never made such a claim, it's all about risk. A device is at much greater risk being on the internet like that, but as long as your company knows that, has mitigating factors (HIDS, NIDS, ACLs, etc) and accepts that risk then it's alright. I am a Information Security Analyst, this is what my job's all about: calculating risk and mitigating it. I've just been saying that in my professional analysis I would never find it acceptable to open up SSH on a server to the internet for people to work; that's what a VPN is for.Kupek wrote:Your claim that a computer visible to the internet is guaranteed to be compromised is wrong.
Cisco has a client for Blackberry VPN. A quick google search confirms this. All you would have to do is download the VPN client to the phone and then the phone can have access to the network desired. That is just as secure as someone running into a Starbucks and getting on the wireless there and starting a VPN connection or starting a VPN connection from their home.Tessian wrote:I'm fully aware of what SSH does and how it's useful, but like Zeus I still fail to see how this is all that useful.
IT in businesses would have the most to gain... but if your company's security policies are worth their weight in toilet paper there's no way in hell you'd be able to use this during work. The Blackberry's sitting on the internet, how the hell are you getting SSH access to your servers inside your company's network? If the server's ON the internet then your system is pretty much guaranteed to already be compromised. The only option is through a VPN tunnel but as far as I know Blackberry isn't supported on most leading corporate VPN solutions (I know for a fact Juniper doesn't support it, and I doubt Cisco does either).
So maybe Sine can use this to admin the Shrine server, but how is this worthwhile for corporate IT?
Kupek is 100% spot on here.Kupek wrote:Tessian, I don't think you understand how I, and others like me, use computers. Remotely logging in is how we get work done. My desktop is on the internet so that I can use it. It allows me to use it for work from anywhere. You open up port 22 (which is used by ssh), and that's it. All other ports are closed - I'm not running a webserver on it.
I administer our computers using ssh, but that's only 5% of the time. The other 95% of the time, I use ssh to get my work done.
These are primarily computing resources. They exist for people to log into them and get work done. Your claim that a computer visible to the internet is guaranteed to be compromised is wrong. Almost every single machine I use during a day is visible to the outside world, and they're not compromised. Lots of people try - our logs are filled with attempts - but they don't get in.
What's the difference? Both grant you access to the internal network. Both use encrypted channels to access the servers. Both have been around for years. Both have the potential for getting broken into, if they aren't patched periodically.Tessian wrote:I definitely understand the uses of SSH and it's extremely popular, but why would you have 100+ workstations all on the internet with SSH open when instead you can have 1 hardened VPN appliance on the internet with HTTPS/IPSEC open that grants access to their workstations on SSH? It's still reachable anywhere and it's a single device to secure, not 100. That's what I'm not understanding; the existing technology out there to grant remote access would work just as well in this case, so why needlessly increase your risk? I don't see any additional benefit here.
I think Kupek was referring to his workstation at work and how at his office location they open port 22 internally from his client's firewall to his office network to allow connections from his workstation to the client's environment. My desktop is behind a firewall and all of our clients are behind their own firewalls as well. In order for me to have access over RDP or any windows ports (139 and 445) the firewall must allow that connection over our internal network. If I'm interpreting Kupek correctly he accesses his workstation similarly to how I access mine, either by VPN or Citrix SSL. Once he's established said connection he can then connect to his workstation and begin his remote administration when he is out of the office. In the office he would be at his desktop and already on the internal network which has all access to his client's servers over port 22. The only thing that it seems that is internet facing would be the servers he would connect to via VPN to authenticate his connection and allow him access. Kupek am I correct without going more specific?Tessian wrote:
Barret: I was unaware there is a Blackberry client for Cisco's IPSEC VPN, that's pretty cool. I have only largely worked with Juniper SSL VPNs and I know they do not (but they do support Windows Mobile). However, in the 2nd part of your post you say Kupek's 100% correct, yet you start talking about how you do this through remote access on a VPN (SSL Gateway = VPN), which was MY point not Kupek's. His shit is directly on the internet, there is no VPN in the middle. I totally agree with what you said, I never said VPNs weren't necessary, they're vital these days.
I didn't say that it was OS-specific, but that it was generally done that way, since SSH is more of a text-based protocol. Sure, at my work, I VPN to the network and then SSH into the box. But, that's because I'm on a Windows laptop going into a network that has lots of Windows servers, and SSH just doesn't work as well.Tessian wrote:Sine: You're wrong. VPNs are IN NO WAY OS specific! That's just flat out wrong. SSH is to RDP if you really want to make a comparison, SSH is not to VPN. Are SSH tunnels and SSL VPN tunnels similar? Very. But VPNs are a lot more better protected, flexible, and powerful than SSH is alone.
Ummm...if somebody gets into your VPN, they are in your network. Yes, they need to get the IPs, UN/PWs, etc., but there could be weak or common passwords in the system and you can still do a lot of damage just being in the network itself. (Sniffing, spamming, DoS, etc.)Tessian wrote:Nobody EVER said you use a DMZ model to hide security holes; any company with a semi-competent security program regularly scans for and patches vulnerabilities both internally and externally. The reason FOR a DMZ is that IF that server gets compromised at least it's still restricted to what it can reach on the internal network.
See? You said what I thought you'd say. "What's easier to maintain"? None of your servers should be any different than the rest, in terms of how and when you patch them. If all of the SSH servers are on the latest version, and the passwords are secure, there's no problem.Tessian wrote:If one of your 100 servers on the internet gets compromised your internal network is fucked. If all your internet systems are inside a DMZ that is properly ACLed then you are at a much lower risk. As I said: IT'S ALL ABOUT RISK. What's less risky and easier to maintain? 1 VPN server on the internet, or 100 servers on the internet? You have to keep them all secure and patched yes, but the risk of exposure and compromise is much less.
How the hell is this different than SSH? Your a and b pretty much sums up the only ways to compromise a SSH daemon. You think they didn't think about making "Secure SHell" secure? VPN is a SSL tunnel into the network, and SSH is a SSL tunnel to a server shell. It's about the same fucking difference!Tessian wrote:It's whole purpose is to provide a secure gateway into your network and is MUCH more hardened than any normal Unix server. The only way to compromise a VPN is to either a) attack a vulnerability in its transport mechanism such as middle-manning the SSL connection, or b) having a crappy VPN admin who didn't properly secure it.
Heh, I knew you would bring that up. Yeah, I'm pretty familiar with PCI myself. We went through some network reorganization for that a year or so ago. (Our mail servers and some web servers needed to be DMZed.)Tessian wrote:Most of this is moot, however, because if your company handles credit card transactions (and I can assume that an ISP would do this) then you MUST be certified by PCI-DSS. PCI is the set of 12 security controls that the credit card industry has said you MUST adhere to in order to do business with them.
Tessian wrote:I never made such a claim, it's all about risk.
Keep in mind I'm not in a company. I'm in a university. When I interned at IBM, everything was behind a VPN. But this was just as much about protecting company secrets as it was about preventing people from screwing up systems. Getting an account on a machine requires convincing whoever administers it to give you one - or stealing someones. Getting VPN access required approval from several levels of management.Tessian wrote:If the server's ON the internet then your system is pretty much guaranteed to already be compromised.
No it can't, or did you mean servers on SSH can be as secure as a VPN? Because that's a little closer to true. A DMZ basically says your internet facing servers are no longer trusted, so even if they are compromised their access is limited to what they can reach inside the network. This is outside of how you're even connecting to those servers. Now is a server with SSH in a DMZ as secure as a VPN that lets you connect to servers internally? That's debatable and largely depends on what is actually on that server running SSH. A VPN has a lot more control over how it functions than just SSH. With a VPN I can specify exactly what you have access to, what ports, and how much authentication I'll require. Hell, I can even check and make sure your AV is up to date before I let you log in or throw you into a secured ad-hoc desktop I can control.SineSwiper wrote:
Look, I'm not saying that a DMZed network isn't secure. I'm just saying that SSH is not some glass protocol that somebody can bang lightly to break in. A properly managed network of servers on SSH can be just as secure as a DMZed network.
pdaphonehome.com has a great community for PDA phones.Anarky wrote:So I totally got pissed last night at my cellphone and chucked it on the floor. It had been dropping calls and having odd hicups for the last few months. It still works... but I swapped my SIM card into the phone I had before, which still works great and has no issues.
So I want a new phone, but not sure I want to re-up the contract to take advantage of the price cut. Any suggestions? I am with AT&T
I was hoping to wait till more Android phones were on the market, but *sigh* no such luck. If I buy a smart phone though I gotta throw on a data plan... God I hate cellphones and contracts.
Any cellphone review sites to look at?