Monday, February 19, 2007

How IPv6 is already creating security problems

Computer Associates CEO John Swainson, the keynote speaker at last week's CA Expo '07 conference in Sydney, Australia, spoke about how the deployment of IPv6 will bring unavoidable and unknown security threats. He was quoted in SC Magazine:
“I don’t know what they will be but I can predict with a high degree of probability that it will happen,” he said.

"This is not something you can test in the lab, it’s something that emerges through practice.”

Swainson’s comments on IPv6 were part of a broader theme addressing the emerging complexities in IT infrastructure and their more complex insecurities.

“We’re talking about new complexities on top of existing complexities. As networks expand to include remote device types and additional applications [they] produce a wide variety of security threats,” he said.
The new Apple AirPort Extreme for 802.11n wireless networks demonstrates Swainson's point quite vividly. The device supports IPv6, and the default setting is for the device to set up an IPv6 tunnel over the IPv4 Internet and to provide IPv6 addresses to hosts on the local network with IPv6 enabled. For those using the device as their local firewall (which I'd argue is not a great idea--it's not really adequate to the task), while it will reject most incoming IPv4 connections, it will allow all IPv6 connections through. For those not using it as a firewall, if their actual firewall allows the IPv6 tunnel (and most firewalls allow all inbound connections out, which would allow the tunnel to be established), the tunnel then becomes a path through the firewall.

That is, if you put this device on your network in its default configuration, you've just completely opened up your internal systems to connections from any IPv6 host--your firewall may as well not be there, from an IPv6 perspective.

There is no "disable IPv6" option, but if you set the device to "Link Local" mode instead of "Tunnel" mode, it will only talk IPv6 to your internal network, not to the outside world.

My own home network runs IPv4 and IPv6, including wirelessly, but I have my wireless network as a separate network off my firewall, and have IPv6 firewall rules in place. It's my firewall that provides the tunnel to the IPv6 Internet. This means that any machines connected to my wireless network that want to communicate with machines on my wired network (like servers) need to pass traffic through the firewall to get to them. Also, as my firewall is an OpenBSD machine, it will not route (for security reasons) the 6to4 packets the Apple AirPort is using to create automatic IPv6 tunneling (though this makes IPv4-to-v6 migration even more difficult).

Note that in the comments on the Apple AirPort article at Ars Technica, one commenter says "The primary reason why the situation is so bad with IPv4, is that almost the entire address space is populated. Worms and virii can easily guess neighboring addresses, and since most of those are windows machines, they make great targets." This gives a false sense of safety to IPv6, as security researchers have already pointed out numerous ways in which worms can locate other IPv6 hosts despite the sparsely populated IP space (PDF).

Saturday, February 17, 2007

Carlos Mencia abuses copyright to suppress criticism

Comedian Carlos Mencia has had a video removed from YouTube on the grounds of copyright infringement. The video shows a confrontation between Joe Rogan and Carlos Mencia in which Rogan accuses Mencia of stealing other comedians' material--supported by clips of Mencia doing the same jokes as other comedians, and footage of multiple comedians agreeing that Mencia has stolen material.

Rogan and Mencia had the same agent, who dropped Rogan over this dispute.

The video is still on Google Video, and Joe Rogan gives an overview at his website. The Wikipedia entry on Carlos Mencia also describes this dispute.

(Via The Superficial.)

UPDATE (February 21, 2007): Ed Brayton (who himself has worked as a stand-up comic) offers his thoughts on this.

NFL abuses Digital Millennium Copyright Act

The broadcast of the Super Bowl contained this announcement: "This telecast is copyrighted by the NFL for the private use of our audience. Any other use of this telecast or of any pictures, descriptions, or accounts of the game without the NFL's consent, is prohibited."

Brooklyn Law School professor Wendy Seltzer, who founded the Chilling Effects clearinghouse of DMCA abuse, posted this piece of the Super Bowl broadcast as an example of a copyright holder exaggerating its rights--clearly the NFL does not own all pictures, descriptions, or accounts of the Super Bowl game.

The response--the NFL issued a DMCA takedown notice against her site for the posting, demonstrating that they not only exaggerate their rights, but are willing to abuse the law.

Thayer Verschoor's latest attempt at censoring academia

Arizona Senate Majority Leader Thayer Verschoor (R-Gilbert) is at it again, with a bill that prohibits any public school or college instructor from advocating or opposing a political candidate or issue. This is the same legislator who last year proposed a bill that would have required colleges and universities to "provide a student with alternative coursework if the student deems regular coursework to be personally offensive" where "a course, coursework, learning material or activity is personally offensive if it conflicts with the student’s beliefs or practices in sex, morality or religion."

While it is appropriate to define limits on partisan advocacy in public primary and secondary schools (where state educational standards define the curriculum and individual school districts set policy on appropriate classroom behavior), it doesn't make sense to do it at the college level, where professors have much broader freedom to create their own course curricula.

Verschoor was also one of several legislators accepting gifts from the Church of Scientology and sponsoring legislation for Scientology's Citizens Commission on Human Rights last year.

Painfully Unfunny

Are neo-conservatives really this humor-impaired?

This show comes off like something Kevin Trudeau should be involved with, somehow.

Friday, February 16, 2007

Ed Brayton fisks Jack Cashill on the Sternberg Affair

Jack Cashill has produced an error-ridden column at WorldNetDaily on the Sternberg affair, which Ed Brayton has ably debunked. I predict Cashill will not correct himself, and may even continue to repeat the same errors.

Thursday, February 15, 2007

How the invasion of Iraq was supposed to go

A Freedom of Information Act request has yielded a 2002 plan from U.S. Central Command about the invasion of Iraq.

A planning group convened by Gen. Tommy Franks under the coded compartment POLO STEP (a coded compartment created under Clinton for counter-terrorism plans including the targeting of Osama bin Laden) produced this PowerPoint of briefing slides.

The slides show that "key planning assumptions" included that "a broad-based, credible provisional government" would be in place "prior to D-Day," that "Iraqi regime has WMD capability," that "co-opted Iraqi units will occupy garrisons and not fight either U.S. forces or other Iraqi units," and that "Operations in Afghanistan transition to phase III (minimal air support over Afghanistan."

According to the plan, there would only be 5,000 U.S. troops left in Iraq as of December 2006.

(Hat tip to Jacob Sullum at the Reason Blog.)

Wednesday, February 14, 2007

Bush attempting to mislead on Iran

The Bush administration is trying to use innuendo and statements carefully crafted to imply falsehoods (or at least, things not known to be true) in order to justify war against Iran. Where the Department of Defense presented evidence that explosively formed penetrators (EFPs) used in Iraq were manufactured in Iran, Bush has made statements designed to imply, without explicitly stating, that the Iranian government is behind them. Reporters are also being told that the U.S. government has some solid evidence, but that it cannot be shared.

For specific details and criticisms, see:

Talking Points Memo (February 14, 2007)
TPM Muckraker (February 14, 2007)
Outside the Beltway (February 12, 2007)

The Pentagon's briefing PowerPoint on the EFPs can be found here. Interesting that the labels on the weapons shown in photographs include English wording, but that's not a sign that they weren't made in Iran, but only a consequence of the fact that English is the lingua franca of the arms trade.

UPDATE (February 27, 2007): A factory producing EFPs has been captured in Southern Iraq--and the parts that have identifiable origins did not come from Iran.

Jeff Han multitouch demo

Jeff Han (who gave a very interesting demo at the TED conference last year) has formed a company called Perceptive Pixel which makes even larger touch screens. This video is a demo of some of the interesting user interfaces that multitouch provides.

Tuesday, February 13, 2007

Three lottery stories

Sex offender wins $14 million in lottery (Jensen Beach, Florida).
Man with year to live wins $50,000 a year (Rochester, New York).
Bill would refuse lottery wins for sex offenders (Jefferson City, Missouri).

And Jamie Zawinski suggests a fourth:
Bill would refuse lottery wins for cancer victims.