Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread Jan Claeys
Op zondag 29-11-2009 om 00:47 uur [tijdzone +0800], schreef John
McCabe-Dansted:
> There are also algorithms for extracting the password from XP as
> well...

XP passwords are compared to hashes, and you can't extract the password
from a hash.


-- 
Jan Claeys


-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread Matt Wheeler
2009/11/30 Jan Claeys :
> Op zondag 29-11-2009 om 00:47 uur [tijdzone +0800], schreef John
> McCabe-Dansted:
>> There are also algorithms for extracting the password from XP as
>> well...
>
> XP passwords are compared to hashes, and you can't extract the password
> from a hash.

There are brute-force password cracking methods, but including
something like that as
part of the Ubuntu installation would be a bad idea for several
reasons.

-- 
Matt Wheeler
m...@funkyhat.org

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread John Moser
On Mon, Nov 30, 2009 at 12:55 PM, Matt Wheeler  wrote:
> 2009/11/30 Jan Claeys :
>> Op zondag 29-11-2009 om 00:47 uur [tijdzone +0800], schreef John
>> McCabe-Dansted:
>>> There are also algorithms for extracting the password from XP as
>>> well...
>>
>> XP passwords are compared to hashes, and you can't extract the password
>> from a hash.
>
> There are brute-force password cracking methods, but including
> something like that as
> part of the Ubuntu installation would be a bad idea for several
> reasons.
>

List some not-silly reasons.  "Because people could use it for
theoretical/practicable attacks" is not a reason, because 1) you could
decline to reveal the password (but allow verification); and 2) there
are other tools for this that are just as accessable.

I guess I can give a longer example here, but I'd rather not get into
the specifics of this discussion:

In the state of the art, I can pop in a BackTrack CD, fix 1 line in
Kismet's config (is this automatic now?  It could be), run one
command, and drop keys for all the WEP networks around me.  There are
tools included that find "hidden" SSIDs and you can even find MAC
addresses in use to get around all the maze-like non-security.

I have made the argument that Ubuntu could contain a version of
Network-Manager (I prefer by default, but it could be an additional
package) that automatically does all the hidden SSID detection in the
background, and does some monitoring and WEP cracking, marking off
"Secured, broken" networks.

This usually brings up arguments that this is somehow "bad," but
doesn't explain exactly how it's bad.  It doesn't decrease security,
because well... if you want to "steal internet," you're a mostly
harmless leech; if you want to do something serious, you're going to
have the skills anyway.  I figure it would probably make it extremely
visible to the owners of 6 (of 7) WiFi networks reachable from my
apartment that their @*#$ is not secure when it becomes common
knowledge that most of that stuff is flat-out ignored and
automatically bypassed by some operating systems.

Cost-benefit arguments aside, it seems that the above extreme case
doesn't actually de-securify anything (it is, however, a good way to
make fun at hilariously bad security devices that actually got
released to market).  A quick and painless password cracking mechanism
(background, started as soon as the CD can see a partition with a SAM,
and time-restricted) doesn't seem like an issue to me.

Of course, I'm a very coarse person and have no desire to play nice.
Sure, I definitely advocate NOT flashing the cracked passwords in
peoples' faces, and keeping them in secured RAM (i.e. XOR'd with a
canary, in locked memory, until needed; or better, hash them out for
storage in shadow and clear the originals out of RAM).  But I see no
reason to care about the difference between "we could easily crack
these passwords" and "we have cracked these passwords," unless you're
uploading the passwords (hashed?) to Canonical for further use.

> --
> Matt Wheeler
> m...@funkyhat.org
>
> --
> Ubuntu-devel-discuss mailing list
> Ubuntu-devel-discuss@lists.ubuntu.com
> Modify settings or unsubscribe at: 
> https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss
>

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread Shentino
With regards to cracking tools being bad, I imagine they do come in handy
during security audits.

If there's going to be hacking tools out there anyway, the good guys may as
well have them too, since you can't really take them away from the bad guys.

On Mon, Nov 30, 2009 at 10:47 AM, John Moser  wrote:

> On Mon, Nov 30, 2009 at 12:55 PM, Matt Wheeler  wrote:
> > 2009/11/30 Jan Claeys :
> >> Op zondag 29-11-2009 om 00:47 uur [tijdzone +0800], schreef John
> >> McCabe-Dansted:
> >>> There are also algorithms for extracting the password from XP as
> >>> well...
> >>
> >> XP passwords are compared to hashes, and you can't extract the password
> >> from a hash.
> >
> > There are brute-force password cracking methods, but including
> > something like that as
> > part of the Ubuntu installation would be a bad idea for several
> > reasons.
> >
>
> List some not-silly reasons.  "Because people could use it for
> theoretical/practicable attacks" is not a reason, because 1) you could
> decline to reveal the password (but allow verification); and 2) there
> are other tools for this that are just as accessable.
>
> I guess I can give a longer example here, but I'd rather not get into
> the specifics of this discussion:
>
> In the state of the art, I can pop in a BackTrack CD, fix 1 line in
> Kismet's config (is this automatic now?  It could be), run one
> command, and drop keys for all the WEP networks around me.  There are
> tools included that find "hidden" SSIDs and you can even find MAC
> addresses in use to get around all the maze-like non-security.
>
> I have made the argument that Ubuntu could contain a version of
> Network-Manager (I prefer by default, but it could be an additional
> package) that automatically does all the hidden SSID detection in the
> background, and does some monitoring and WEP cracking, marking off
> "Secured, broken" networks.
>
> This usually brings up arguments that this is somehow "bad," but
> doesn't explain exactly how it's bad.  It doesn't decrease security,
> because well... if you want to "steal internet," you're a mostly
> harmless leech; if you want to do something serious, you're going to
> have the skills anyway.  I figure it would probably make it extremely
> visible to the owners of 6 (of 7) WiFi networks reachable from my
> apartment that their @*#$ is not secure when it becomes common
> knowledge that most of that stuff is flat-out ignored and
> automatically bypassed by some operating systems.
>
> Cost-benefit arguments aside, it seems that the above extreme case
> doesn't actually de-securify anything (it is, however, a good way to
> make fun at hilariously bad security devices that actually got
> released to market).  A quick and painless password cracking mechanism
> (background, started as soon as the CD can see a partition with a SAM,
> and time-restricted) doesn't seem like an issue to me.
>
> Of course, I'm a very coarse person and have no desire to play nice.
> Sure, I definitely advocate NOT flashing the cracked passwords in
> peoples' faces, and keeping them in secured RAM (i.e. XOR'd with a
> canary, in locked memory, until needed; or better, hash them out for
> storage in shadow and clear the originals out of RAM).  But I see no
> reason to care about the difference between "we could easily crack
> these passwords" and "we have cracked these passwords," unless you're
> uploading the passwords (hashed?) to Canonical for further use.
>
> > --
> > Matt Wheeler
> > m...@funkyhat.org
> >
> > --
> > Ubuntu-devel-discuss mailing list
> > Ubuntu-devel-discuss@lists.ubuntu.com
> > Modify settings or unsubscribe at:
> https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss
> >
>
> --
> Ubuntu-devel-discuss mailing list
> Ubuntu-devel-discuss@lists.ubuntu.com
> Modify settings or unsubscribe at:
> https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss
>
-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread John Moser
On Mon, Nov 30, 2009 at 2:36 PM, Shentino  wrote:
> With regards to cracking tools being bad, I imagine they do come in handy
> during security audits.
> If there's going to be hacking tools out there anyway, the good guys may as
> well have them too, since you can't really take them away from the bad guys.
>

Yeah, but the issue here seems to be centered around the concept of
actively cracking passwords (locally, without reporting to anyone
anywhere, and possibly not even displaying the password to the user or
storing it plaintext anywhere) during the install process-- or more
basically, including something like that on the default install CD.

Again, for my part, I don't really see a problem with breaking what
can be broken and informing the user, "We could import these passwords
because they were insecure and could be broken by dictionary attack."
The effort in testing this, then actually doing the crack is roughly
twice as much as just doing the crack with the right tools first.

> On Mon, Nov 30, 2009 at 10:47 AM, John Moser  wrote:
>>
>> On Mon, Nov 30, 2009 at 12:55 PM, Matt Wheeler  wrote:
>> > 2009/11/30 Jan Claeys :
>> >> Op zondag 29-11-2009 om 00:47 uur [tijdzone +0800], schreef John
>> >> McCabe-Dansted:
>> >>> There are also algorithms for extracting the password from XP as
>> >>> well...
>> >>
>> >> XP passwords are compared to hashes, and you can't extract the password
>> >> from a hash.
>> >
>> > There are brute-force password cracking methods, but including
>> > something like that as
>> > part of the Ubuntu installation would be a bad idea for several
>> > reasons.
>> >
>>
>> List some not-silly reasons.  "Because people could use it for
>> theoretical/practicable attacks" is not a reason, because 1) you could
>> decline to reveal the password (but allow verification); and 2) there
>> are other tools for this that are just as accessable.
>>
>> I guess I can give a longer example here, but I'd rather not get into
>> the specifics of this discussion:
>>
>> In the state of the art, I can pop in a BackTrack CD, fix 1 line in
>> Kismet's config (is this automatic now?  It could be), run one
>> command, and drop keys for all the WEP networks around me.  There are
>> tools included that find "hidden" SSIDs and you can even find MAC
>> addresses in use to get around all the maze-like non-security.
>>
>> I have made the argument that Ubuntu could contain a version of
>> Network-Manager (I prefer by default, but it could be an additional
>> package) that automatically does all the hidden SSID detection in the
>> background, and does some monitoring and WEP cracking, marking off
>> "Secured, broken" networks.
>>
>> This usually brings up arguments that this is somehow "bad," but
>> doesn't explain exactly how it's bad.  It doesn't decrease security,
>> because well... if you want to "steal internet," you're a mostly
>> harmless leech; if you want to do something serious, you're going to
>> have the skills anyway.  I figure it would probably make it extremely
>> visible to the owners of 6 (of 7) WiFi networks reachable from my
>> apartment that their @*#$ is not secure when it becomes common
>> knowledge that most of that stuff is flat-out ignored and
>> automatically bypassed by some operating systems.
>>
>> Cost-benefit arguments aside, it seems that the above extreme case
>> doesn't actually de-securify anything (it is, however, a good way to
>> make fun at hilariously bad security devices that actually got
>> released to market).  A quick and painless password cracking mechanism
>> (background, started as soon as the CD can see a partition with a SAM,
>> and time-restricted) doesn't seem like an issue to me.
>>
>> Of course, I'm a very coarse person and have no desire to play nice.
>> Sure, I definitely advocate NOT flashing the cracked passwords in
>> peoples' faces, and keeping them in secured RAM (i.e. XOR'd with a
>> canary, in locked memory, until needed; or better, hash them out for
>> storage in shadow and clear the originals out of RAM).  But I see no
>> reason to care about the difference between "we could easily crack
>> these passwords" and "we have cracked these passwords," unless you're
>> uploading the passwords (hashed?) to Canonical for further use.
>>
>> > --
>> > Matt Wheeler
>> > m...@funkyhat.org
>> >
>> > --
>> > Ubuntu-devel-discuss mailing list
>> > Ubuntu-devel-discuss@lists.ubuntu.com
>> > Modify settings or unsubscribe at:
>> > https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss
>> >
>>
>> --
>> Ubuntu-devel-discuss mailing list
>> Ubuntu-devel-discuss@lists.ubuntu.com
>> Modify settings or unsubscribe at:
>> https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss
>
>

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread Matt Wheeler
2009/11/30 John Moser :
> List some not-silly reasons.  "Because people could use it for
> theoretical/practicable attacks" is not a reason, because 1) you could
> decline to reveal the password (but allow verification); and 2) there
> are other tools for this that are just as accessable.

Mainly just the bad press that Ubuntu would get as a result. Can you
imagine the headlines there would be? "Ubuntu operating system hacks
Windows computers"

Technically speaking other tools are not "just as accessible" - who
else ships out free live CDs?

> I guess I can give a longer example here, but I'd rather not get into
> the specifics of this discussion:
>
> In the state of the art, I can pop in a BackTrack CD, fix 1 line in
> Kismet's config (is this automatic now?  It could be), run one
> command, and drop keys for all the WEP networks around me.  There are
> tools included that find "hidden" SSIDs and you can even find MAC
> addresses in use to get around all the maze-like non-security.
>
> I have made the argument that Ubuntu could contain a version of
> Network-Manager (I prefer by default, but it could be an additional
> package) that automatically does all the hidden SSID detection in the
> background, and does some monitoring and WEP cracking, marking off
> "Secured, broken" networks.

Again, while I have no problems with such tools being available, and
find them useful, I think it would be a bad move for such a public
distro such as Ubuntu to start including such tools by default, purely
from a marketing point of view. There's no way you're going to get “It
can be used to test how secure my network is” to fly with even most
tech press, let alone mainstream media.



I'm all out of ideas, so apparently I only have 1. But I think it's a
good one :-)


Thanks

-- 
Matt Wheeler
m...@funkyhat.org

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread James Westby
On Mon Nov 30 13:47:34 -0500 2009 John Moser wrote:
> List some not-silly reasons.

You're serious? Ok.

  * Takes a long time to crack any password that's not in the dictionary and
more than a few characters long.
  * Rainbow tables would be too large to fit on the CD.
  * We can't know up-front whether we will be able to crack a particular
password. Therefore the installer would say "please wait" for some time,
probably as long as the entire rest of the install, then may have
nothing to show for it.
  * One OS intentionally "cracking" another would (perhaps rightly) not be
seen in a good light, regardless of how noble the reasons or careful
the implementation.
  * It's a feature of dubious value to begin with. After it had taken some
time doing its thing you would need to have the user type in the password
anyway to confirm (you can't assume, and you can't really show it to them).
This will take far longer than just asking for it in the first place, just
to have them type it in once, rather than twice, when they should be
used to typing it anyway (though those at UDS may find it ironic that I
am the one saying that :-).

Can we please spend our time on other worthwhile features and not argue about
whether "cracking" tools should exist for all to use or not?

Thanks,

James

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread Matt Wheeler
2009/11/30 James Westby :
> On Mon Nov 30 13:47:34 -0500 2009 John Moser wrote:
>> List some not-silly reasons.
>
> You're serious? Ok.
>
>  * Takes a long time to crack any password that's not in the dictionary and
>    more than a few characters long.
>  * Rainbow tables would be too large to fit on the CD.
>  * We can't know up-front whether we will be able to crack a particular
>    password. Therefore the installer would say "please wait" for some time,
>    probably as long as the entire rest of the install, then may have
>    nothing to show for it.
>  * One OS intentionally "cracking" another would (perhaps rightly) not be
>    seen in a good light, regardless of how noble the reasons or careful
>    the implementation.
>  * It's a feature of dubious value to begin with. After it had taken some
>    time doing its thing you would need to have the user type in the password
>    anyway to confirm (you can't assume, and you can't really show it to them).
>    This will take far longer than just asking for it in the first place, just
>    to have them type it in once, rather than twice, when they should be
>    used to typing it anyway (though those at UDS may find it ironic that I
>    am the one saying that :-).
>
> Can we please spend our time on other worthwhile features and not argue about
> whether "cracking" tools should exist for all to use or not?

Oh, yeah, plus this. My first reason was "it would take too long" -
then I must have had mental block!



-- 
Matt Wheeler
m...@funkyhat.org

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread John Moser


Matt Wheeler wrote:
> 2009/11/30 John Moser :
> 
> Mainly just the bad press that Ubuntu would get as a result. Can you
> imagine the headlines there would be? "Ubuntu operating system hacks
> Windows computers"

Agreed on marketing, though again I tend to not care.  It doesn't send 
information back anywhere and presents itself as a fairly useless tool 
for extracting the information to the human operator, this is just a 
useful feature.

> 
> Technically speaking other tools are not "just as accessible" - who
> else ships out free live CDs?

Download and burn is easier than mail to my house 5 months from now...


> 
> Again, while I have no problems with such tools being available, and
> find them useful, I think it would be a bad move for such a public
> distro such as Ubuntu to start including such tools by default, purely
> from a marketing point of view. There's no way you're going to get “It
> can be used to test how secure my network is” to fly with even most
> tech press, let alone mainstream media.
> 

Oh, that example was more for a technical argument.  Although I like to 
publicly hammer brokenness, and shipping a network-manager-cracker in 
the repos would pretty much do just that; shipping it by default would 
make even the most basic "low hanging fruit" argument about how "WEP 
makes you more secure than plaintext" visibly moot.

I can't actually see how this would be garnering bad press, aside from 
the business end (who wants the liability?)

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Install Wizard 'Looks Too Complicated'

2009-11-30 Thread Derek Broughton
James Westby wrote:

> On Mon Nov 30 13:47:34 -0500 2009 John Moser wrote:
>> List some not-silly reasons.
> 
> You're serious? Ok.
> 
>   * Takes a long time to crack any password that's not in the dictionary
>   and
> more than a few characters long.
>   * Rainbow tables would be too large to fit on the CD.

Actually, that's probably the best reason right there.  

-- 
derek


-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss