RE: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Matthew Black
Shouldn't a decent OS scrub RAM and disk sectors before allocating them to processes, unless that process enters processor privileged mode and sets a call flag? I recall digging through disk sectors on RSTS/E to look for passwords and other interesting stuff over 30 years ago. matthew black cal

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Simon Perreault
Le 2014-04-14 10:38, Matthew Black a écrit : > Shouldn't a decent OS scrub RAM and disk sectors before allocating them to > processes, unless that process enters processor privileged mode and sets a > call flag? I recall digging through disk sectors on RSTS/E to look for > passwords and other in

RE: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Matthew Black
Also on this same idea, in his book "The Puzzle Palace," James Bamford claims that we knew of the pending attack on Pearl Harbor but did nothing, because that would compromise we broke the Japanese Purple Cipher. matthew black california state university, long beach -Original Message-

RE: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Thijs Stuurman
I applaud their effort but please see https://blogs.akamai.com/2014/04/heartbleed-update-v3.html & http://lekkertech.net/akamai.txt Kind regards / Vriendelijke groet, IS Group Thijs Stuurman -Oorspronkelijk bericht- Van: Niels Bakker [mailto:niels=na...@bakker.net] Verzonden: Sunda

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Donald Eastlake
Matthew, On Mon, Apr 14, 2014 at 10:48 AM, Matthew Black wrote: > Also on this same idea, in his book "The Puzzle Palace," James Bamford > claims that we knew of the pending attack on Pearl Harbor but did nothing, > because that would compromise we broke the Japanese Purple Cipher. I assume you

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Mark Seiden
On Apr 13, 2014, at 7:52 AM, Randy Bush wrote: >>> the point of open source is that the community is supposed to be doing >>> this. we failed. >> Versus all of the closed source bugs that nobody can know of or do >> anything about? > > for those you can blame the vendor. this one is owned by

DMARC -> CERT?

2014-04-14 Thread Miles Fidelman
Just a thought. I keep thinking that Yahoo's publishing of their "p=reject" policy, and the subsequent massive denial of service to lost of list traffic might be viewed as a "computer security" incident. Anybody think that reporting via CERT channels might be an appropriate response? (I do,

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread TGLASSEY
Yes Matthew it should. The question is whether they do or not. Todd On 4/14/2014 7:38 AM, Matthew Black wrote: Shouldn't a decent OS scrub RAM and disk sectors before allocating them to processes, unless that process enters processor privileged mode and sets a call flag? I recall digging thro

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread TGLASSEY
Vladis is %100 on the money here. Lets take this a step farther and ask is there a criminal liability for the person who checked that code in - Oh you bet there is... Todd On 4/11/2014 5:49 PM, valdis.kletni...@vt.edu wrote: On Sat, 12 Apr 2014 07:56:01 +1000, Matt Palmer said: The interest

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Matthew Petach
On Mon, Apr 14, 2014 at 9:27 AM, TGLASSEY wrote: > Vladis is %100 on the money here. Lets take this a step farther and ask is > there a criminal liability for the person who checked that code in - Oh you > bet there is... > > Todd Thank you--I needed some humour in my morning, I was starting to

Re: DMARC -> CERT?

2014-04-14 Thread Laszlo Hanyecz
I don't see what the big deal is here. They don't want your messages and they made that clear. Their policy considers these messages spam. If you really want to get your mailing list messages through, then you need to evade their filters just like every other spammer has to. -Laszlo On Apr

Re: DMARC -> CERT?

2014-04-14 Thread Valdis . Kletnieks
On Mon, 14 Apr 2014 16:56:46 -, Laszlo Hanyecz said: > If you really want to get your mailing list messages through, The problem isn't the rest of us trying to mail to Yahoo. The problem is when Yahoo users post to lists that use DMARC, and the result is the yahoo user's mail getting bounce

Re: DMARC -> CERT?

2014-04-14 Thread Miles Fidelman
Isn't it the other way around? They don't want their users to be able to send to mailing lists. They receive traffic from the lists just fine. Their policy considers only effects mail originating from their users. Yahoo subscribers can receive messages form nanog just fine, but they can't s

Re: DMARC -> CERT?

2014-04-14 Thread Laszlo Hanyecz
By their statement it's obvious that yahoo doesn't care about what they broke. It's unfortunate that email has become so centralized that one entity can cause so much 'trouble'. Maybe it's a good opportunity to encourage the affected mailing list subscribers to use their own domains for email,

Re: DMARC -> CERT?

2014-04-14 Thread William Herrin
On Mon, Apr 14, 2014 at 1:03 PM, wrote: > The problem is when Yahoo users post to lists that use DMARC, and the > result is the yahoo user's mail getting bounced or dumped on the postmaster. Basically, this is just like old ORBS. If you were an ISP, you had to check your local users' IP addresse

Re: DMARC -> CERT?

2014-04-14 Thread Christopher Morrow
On Mon, Apr 14, 2014 at 1:25 PM, Laszlo Hanyecz wrote: > By their statement it's obvious that yahoo doesn't care about what they > broke. It's > unfortunate that email has become so centralized that one entity can cause so > much 'trouble'. Maybe it's a good opportunity to encourage the affecte

Re: DMARC -> CERT?

2014-04-14 Thread Matthew Petach
On Mon, Apr 14, 2014 at 10:25 AM, Laszlo Hanyecz wrote: > By their statement it's obvious that yahoo doesn't care about what they > broke. It's unfortunate that email has become so centralized that one > entity can cause so much 'trouble'. Maybe it's a good opportunity to > encourage the affecte

Re: DMARC -> CERT?

2014-04-14 Thread Miles Fidelman
Christopher Morrow wrote: On Mon, Apr 14, 2014 at 1:25 PM, Laszlo Hanyecz wrote: By their statement it's obvious that yahoo doesn't care about what they broke. It's unfortunate that email has become so centralized that one entity can cause so much 'trouble'. Maybe it's a good opportunity to

Re: DMARC -> CERT?

2014-04-14 Thread Jim Popovitch
On Mon, Apr 14, 2014 at 1:33 PM, Matthew Petach wrote: > > So, I take it you prefer a world in which there's no sender > validation, and receiving floods of spoofed sender email > spam is just part of the price of being on the internet? That is clearly not what this issue is about. > I'm finding

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Scott Howard
On Sun, Apr 13, 2014 at 9:52 AM, Niels Bakker wrote: > At least one vendor, Akamai is helping out now: > http://marc.info/?l=openssl-users&m=139723710923076&w=2 > I hope other vendors will follow suit. Although it appears they may now be regretting doing so... http://www.techworld.com.au/articl

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Patrick W. Gilmore
On Apr 14, 2014, at 15:47 , Scott Howard wrote: > On Sun, Apr 13, 2014 at 9:52 AM, Niels Bakker wrote: >> At least one vendor, Akamai is helping out now: >> http://marc.info/?l=openssl-users&m=139723710923076&w=2 >> I hope other vendors will follow suit. > > > Although it appears they may now

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread William Herrin
On Mon, Apr 14, 2014 at 3:59 PM, Patrick W. Gilmore wrote: > I applaud Akamai for trying, for being courageous enough to post > code, and for bucking the trend so many other companies are > following by being more secretive every year. > > Or we can flame anyone who tries, then wonder why no one i

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Doug Barton
On 04/14/2014 12:59 PM, Patrick W. Gilmore wrote: On Apr 14, 2014, at 15:47 , Scott Howard wrote: On Sun, Apr 13, 2014 at 9:52 AM, Niels Bakker wrote: At least one vendor, Akamai is helping out now: http://marc.info/?l=openssl-users&m=139723710923076&w=2 I hope other vendors will follow sui

Re: DMARC -> CERT?

2014-04-14 Thread Scott Howard
On Mon, Apr 14, 2014 at 11:24 AM, Jim Popovitch wrote: > DMARC hasn't cut down on yahoo spam so far. Yahoo's spam problem was > (is?) centered on account hijacks. > I just checked my spam folder for the past month. Out of about 80 messages "from" Yahoo, I can see about 3 that went via Yahoo's

Re: DMARC -> CERT?

2014-04-14 Thread Christopher Morrow
On Mon, Apr 14, 2014 at 4:10 PM, Scott Howard wrote: > Whilst I don't agree with the way that Yahoo has done this (particularly > around communication), how could they have communicated this better? how can we all learn from this? -chris

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread bmanning
On Mon, Apr 14, 2014 at 03:59:21PM -0400, Patrick W. Gilmore wrote: > On Apr 14, 2014, at 15:47 , Scott Howard wrote: > > On Sun, Apr 13, 2014 at 9:52 AM, Niels Bakker > > wrote: > > >> At least one vendor, Akamai is helping out now: > >> http://marc.info/?l=openssl-users&m=139723710923076&w=2

Re: DMARC -> CERT?

2014-04-14 Thread Doug Barton
On 04/14/2014 01:20 PM, Christopher Morrow wrote: On Mon, Apr 14, 2014 at 4:10 PM, Scott Howard wrote: Whilst I don't agree with the way that Yahoo has done this (particularly around communication), how could they have communicated this better? how can we all learn from this? The obvious on

Re: DMARC -> CERT?

2014-04-14 Thread Matthias Leisi
On Mon, Apr 14, 2014 at 10:20 PM, Christopher Morrow < morrowc.li...@gmail.com> wrote: > On Mon, Apr 14, 2014 at 4:10 PM, Scott Howard wrote: > > Whilst I don't agree with the way that Yahoo has done this (particularly > > around communication), > > how could they have communicated this better? h

Re: DMARC -> CERT?

2014-04-14 Thread Christopher Morrow
On Mon, Apr 14, 2014 at 4:28 PM, Doug Barton wrote: > The obvious ones would have been to announce a flag day somewhere far enough > in advance to give list software devs time to adapt, and to work with list > software devs on a solution. where would they communicate this? on the blog that matt p

Re: DMARC -> CERT?

2014-04-14 Thread Christopher Morrow
On Mon, Apr 14, 2014 at 4:34 PM, Matthias Leisi wrote: > They could have communicated, as in "listen folks, we are going to make a > critical change that will affect mailing lists (etc...) in four weeks time". communicated it where? > They could have made the change not late on a Friday afternoo

Re: DMARC -> CERT?

2014-04-14 Thread Jim Popovitch
On Mon, Apr 14, 2014 at 4:38 PM, Christopher Morrow wrote: > On Mon, Apr 14, 2014 at 4:28 PM, Doug Barton wrote: >> The obvious ones would have been to announce a flag day somewhere far enough >> in advance to give list software devs time to adapt, and to work with list >> software devs on a solu

Re: DMARC -> CERT?

2014-04-14 Thread Scott Howard
On Mon, Apr 14, 2014 at 1:39 PM, Christopher Morrow wrote: > On Mon, Apr 14, 2014 at 4:34 PM, Matthias Leisi > wrote: > > They could have communicated, as in "listen folks, we are going to make a > > critical change that will affect mailing lists (etc...) in four weeks > time". > > communicated

Re: DMARC -> CERT?

2014-04-14 Thread Doug Barton
On 04/14/2014 01:38 PM, Christopher Morrow wrote: On Mon, Apr 14, 2014 at 4:28 PM, Doug Barton wrote: The obvious ones would have been to announce a flag day somewhere far enough in advance to give list software devs time to adapt, and to work with list software devs on a solution. where woul

Re: DMARC -> CERT?

2014-04-14 Thread Jim Popovitch
On Mon, Apr 14, 2014 at 4:39 PM, Christopher Morrow wrote: > On Mon, Apr 14, 2014 at 4:34 PM, Matthias Leisi wrote: >> They could have communicated, as in "listen folks, we are going to make a >> critical change that will affect mailing lists (etc...) in four weeks time". > > communicated it wher

Re: DMARC -> CERT?

2014-04-14 Thread Christopher Morrow
On Mon, Apr 14, 2014 at 4:44 PM, Scott Howard wrote: > On Mon, Apr 14, 2014 at 1:39 PM, Christopher Morrow > wrote: >> >> On Mon, Apr 14, 2014 at 4:34 PM, Matthias Leisi >> wrote: >> > They could have communicated, as in "listen folks, we are going to make >> > a >> > critical change that will a

Re: DMARC -> CERT?

2014-04-14 Thread Jim Popovitch
On Mon, Apr 14, 2014 at 4:44 PM, Doug Barton wrote: > On 04/14/2014 01:38 PM, Christopher Morrow wrote: >> >> On Mon, Apr 14, 2014 at 4:28 PM, Doug Barton wrote: >>> >>> The obvious ones would have been to announce a flag day somewhere far >>> enough >>> in advance to give list software devs time

Re: DMARC -> CERT?

2014-04-14 Thread Rich Kulawiec
On Mon, Apr 14, 2014 at 10:33:40AM -0700, Matthew Petach wrote: > So, I take it you prefer a world in which there's no sender > validation, and receiving floods of spoofed sender email > spam is just part of the price of being on the internet? Sender validation means NOTHING in a world with hundre

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Scott Howard
On Mon, Apr 14, 2014 at 12:59 PM, Patrick W. Gilmore wrote: I applaud Akamai for trying, for being courageous enough to post code, and > for bucking the trend so many other companies are following by being more > secretive every year. > Just to be clear, so do I! As I said, the end result was n

Re: DMARC -> CERT?

2014-04-14 Thread Jim Popovitch
On Mon, Apr 14, 2014 at 4:52 PM, Christopher Morrow wrote: > > if you're going to do something that has the potential to affect (say, > for example) email to a wide set of people, most of which are NOT your > direct users, how do you go about making that public? > > 'the internet' isn't really a g

Re: DMARC -> CERT?

2014-04-14 Thread Miles Fidelman
Matthias Leisi wrote: On Mon, Apr 14, 2014 at 10:20 PM, Christopher Morrow < morrowc.li...@gmail.com> wrote: On Mon, Apr 14, 2014 at 4:10 PM, Scott Howard wrote: Whilst I don't agree with the way that Yahoo has done this (particularly around communication), how could they have communicated t

Re: DMARC -> CERT?

2014-04-14 Thread Miles Fidelman
Christopher Morrow wrote: On Mon, Apr 14, 2014 at 4:44 PM, Scott Howard wrote: On Mon, Apr 14, 2014 at 1:39 PM, Christopher Morrow wrote: On Mon, Apr 14, 2014 at 4:34 PM, Matthias Leisi wrote: They could have communicated, as in "listen folks, we are going to make a critical change that wil

Re: DMARC -> CERT?

2014-04-14 Thread Jim Popovitch
On Mon, Apr 14, 2014 at 5:24 PM, Miles Fidelman wrote: > Matthias Leisi wrote: >> >> On Mon, Apr 14, 2014 at 10:20 PM, Christopher Morrow < >> morrowc.li...@gmail.com> wrote: >> >>> On Mon, Apr 14, 2014 at 4:10 PM, Scott Howard wrote: Whilst I don't agree with the way that Yahoo has don

Re: Yahoo DMARC breakage

2014-04-14 Thread Jay Hennigan
On 4/10/14 4:29 AM, Rich Kulawiec wrote: > An aside: > > On Wed, Apr 09, 2014 at 05:15:59PM -0400, William Herrin wrote: >> Maybe this is a good thing - we can stop getting all the "sorry I'm >> out of the office" emails when posting to a list. > > I entirely support that goal, but my preferred s

RE: DMARC -> CERT?

2014-04-14 Thread rw...@ropeguru.com
Plus I guarantee that something this SIGNIFICANT would catch the attention of many tech news outlets, social sites, and many email lists if they had given due notice and allowed people time to digest the change. But, I guess since everything except their email has become pretty much irrelevant t

Re: DMARC -> CERT?

2014-04-14 Thread Leo Bicknell
On Apr 14, 2014, at 3:58 PM, Rich Kulawiec wrote: > As I've said many times, email forgery is not the problem. It's a symptom > of the problem, and the problem is "rotten underlying security" coupled > with "negligent and incompetent operational practice". But fixing that > is hard, and nobody

Re: DMARC -> CERT?

2014-04-14 Thread Miles Fidelman
Jim Popovitch wrote: On Mon, Apr 14, 2014 at 5:24 PM, Miles Fidelman wrote: Matthias Leisi wrote: On Mon, Apr 14, 2014 at 10:20 PM, Christopher Morrow < morrowc.li...@gmail.com> wrote: On Mon, Apr 14, 2014 at 4:10 PM, Scott Howard wrote: Whilst I don't agree with the way that Yahoo has don

Re: DMARC -> CERT?

2014-04-14 Thread Scott Howard
On Mon, Apr 14, 2014 at 2:29 PM, Jim Popovitch wrote: > >> They could have made the change not late on a Friday afternoon (or well > >> into the weekend for most of the world). > >> > >> > > On the weekend before tax filings are due in the US! And a couple of > days > > before Passover. > > and

Re: DMARC -> CERT?

2014-04-14 Thread Miles Fidelman
Leo Bicknell wrote: Ultimately the way to reduce spam is to catch spammers, prosecute them, and put them in prison. The way we keep all of those other crimes low is primarily by enforcement; making the punishment not worth the crime. With spam, the chance that a spammer will be punished is infi

Re: DMARC -> CERT?

2014-04-14 Thread Jim Popovitch
On Mon, Apr 14, 2014 at 5:48 PM, Scott Howard wrote: > On Mon, Apr 14, 2014 at 2:29 PM, Jim Popovitch wrote: >> >> >> They could have made the change not late on a Friday afternoon (or well >> >> into the weekend for most of the world). >> >> >> >> >> > On the weekend before tax filings are due i

RE: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Matthew Black
IIRC, the message was sent via courier instead of cable or telephone to prevent interception. Did the military not even trust its own cryptographic methods? Or did they not think withdrawal of the Japanese ambassador was not very critical? matthew black california state university, long beach F

Re: DMARC -> CERT?

2014-04-14 Thread Scott Howard
On Mon, Apr 14, 2014 at 2:59 PM, Jim Popovitch wrote: > 7-April: Monday, Yahoo's dmarc change kicks everyone in the groin, the > last full week before the US tax filing deadline. > The change was made on the previous Friday, so that date is largely irrelevant. 7-April: OpenSSL's *public* adviso

Re: DMARC -> CERT?

2014-04-14 Thread Scott Howard
ices were vulnerable at the time of > public disclosure, I think that's a very large assumption to make... > Based on the article below it would appear that Yahoo did NOT know about Heartbleed at the time of public disclosure. http://www.smh.com.au/it-pro/security-it/heartbleed-discl

Re: DMARC -> CERT?

2014-04-14 Thread John Levine
In article you write: >On Mon, Apr 14, 2014 at 4:10 PM, Scott Howard wrote: >> Whilst I don't agree with the way that Yahoo has done this (particularly >> around communication), > >how could they have communicated this better? how can we all learn from this? Well, telling people in advance that

Re: DMARC -> CERT?

2014-04-14 Thread Miles Fidelman
Jim Popovitch wrote: On Mon, Apr 14, 2014 at 5:48 PM, Scott Howard wrote: On Mon, Apr 14, 2014 at 2:29 PM, Jim Popovitch wrote: They could have made the change not late on a Friday afternoon (or well into the weekend for most of the world). On the weekend before tax filings are due in the

Re: DMARC -> CERT?

2014-04-14 Thread Jim Popovitch
On Mon, Apr 14, 2014 at 6:21 PM, Scott Howard wrote: > On Mon, Apr 14, 2014 at 2:59 PM, Jim Popovitch wrote: >> >> 7-April: Monday, Yahoo's dmarc change kicks everyone in the groin, the >> last full week before the US tax filing deadline. > > > The change was made on the previous Friday, so that

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Larry Sheldon
On 4/14/2014 9:38 AM, Matthew Black wrote: Shouldn't a decent OS scrub RAM and disk sectors before allocating them to processes, unless that process enters processor privileged mode and sets a call flag? I recall digging through disk sectors on RSTS/E to look for passwords and other interesting s

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Randy Bush
>> for those you can blame the vendor. this one is owned by the >> community. it falls on us to try to lower the probability of a next >> one by actively auditing source as our civic duty. > is that kind of like jury duty? if only it were more like literature, > which we could read for enjoyment

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Larry Sheldon
On 4/14/2014 2:59 PM, Patrick W. Gilmore wrote: Or we can flame anyone who tries, then wonder why no one is trying. Amen. I was just thinking, after reading the umpteenth message here about spam, about the times in the 1990's that I was literally driven away because I was trying to get ahe

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Larry Sheldon
On 4/14/2014 3:05 PM, William Herrin wrote: I thought vendors existed primarily as a place to hang the blame when dealing with a manager or customer who just doesn't get it. Truth value very high. Humor value, less than none. -- Requiescas in pace o email Two identifying characte

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Michael Thomas
On 4/14/14 4:06 PM, Randy Bush wrote: for those you can blame the vendor. this one is owned by the community. it falls on us to try to lower the probability of a next one by actively auditing source as our civic duty. is that kind of like jury duty? if only it were more like literature, which

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Seth David Schoen
Larry Sheldon writes: > On 4/14/2014 9:38 AM, Matthew Black wrote: > >Shouldn't a decent OS scrub RAM and disk sectors before allocating > >them to processes, unless that process enters processor privileged > >mode and sets a call flag? I recall digging through disk sectors on > >RSTS/E to look fo

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Nathan Angelacos
On 04/14/2014 07:14 PM, Michael Thomas wrote: It's much, much worse than that. I can still read code plenty fine, but bugs can be extremely obscure, and triply so with convoluted security code where people are actively going after you to find problems in most inventive ways. Openssl, etc, probab

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread John Levine
In article <534c68f4@cox.net> you write: >On 4/14/2014 9:38 AM, Matthew Black wrote: >> Shouldn't a decent OS scrub RAM and disk sectors before allocating >> them to processes, unless that process enters processor privileged >> mode and sets a call flag? I recall digging through disk sectors on

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Larry Sheldon
On 4/14/2014 7:50 PM, John Levine wrote: In article <534c68f4@cox.net> you write: On 4/14/2014 9:38 AM, Matthew Black wrote: Shouldn't a decent OS scrub RAM and disk sectors before allocating them to processes, unless that process enters processor privileged mode and sets a call flag? I rec

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Michael Thomas
On 04/14/2014 05:02 PM, Nathan Angelacos wrote: On 04/14/2014 07:14 PM, Michael Thomas wrote: It's much, much worse than that. I can still read code plenty fine, but bugs can be extremely obscure, and triply so with convoluted security code where people are actively going after you to find prob

Pearl Harbor

2014-04-14 Thread Donald Eastlake
This is getting pretty far afield so I thought I should at least change the subject. There was no initial withdrawal of the Japanese ambassador - it was the Japanese withdrawing from negotiations with the USA over USA demands -- essentially Japan declaring that it had given up on finding compromis

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Doug Barton
On 04/14/2014 05:50 PM, John Levine wrote: In article <534c68f4@cox.net> you write: On 4/14/2014 9:38 AM, Matthew Black wrote: Shouldn't a decent OS scrub RAM and disk sectors before allocating them to processes, unless that process enters processor privileged mode and sets a call flag? I r

Re: [[Infowarrior] - NSA blah blah blah blah....

2014-04-14 Thread bmanning
On Mon, Apr 14, 2014 at 07:47:46PM -0700, Doug Barton wrote: > >It must be quite a while. Unix systems have routinely cleared the RAM > >and disk allocated to programs since the earliest days. > > When you say "clear the disk allocated to programs" what do you mean > exactly? > "On a cl

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Matthew Petach
On Mon, Apr 14, 2014 at 7:47 PM, Doug Barton wrote: > On 04/14/2014 05:50 PM, John Levine wrote: > >> In article <534c68f4@cox.net> you write: >> >>> On 4/14/2014 9:38 AM, Matthew Black wrote: >>> Shouldn't a decent OS scrub RAM and disk sectors before allocating them to processes,

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Scott Howard
On Mon, Apr 14, 2014 at 6:00 PM, Larry Sheldon wrote: > Is the heartbleed bug not proof positive that it is not being done today? > On the contrary. Heartbleed is "proof" that memory IS cleared before being assigned to a *process*. The data available via the vulnerability is limited to data fro