LinuxPlanet Casts

Media from the Linux Moguls

Archive for the ‘Samba’ Category

Two Factor Fail | TechSNAP 35

without comments

post thumbnail

Find out how some simple Social Engineering skills can earn you $45k, a drug cartel’s private cell network.

Plus: Are there better alternative’s to Windows Small Business server?

All that and more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Free Private Registration

GoDaddy Offer Code: techsnap17
Link: http://www.godaddy.com/domainaddon/private-registration.aspx?isc=techsnap17


Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

   
Subscribe via RSS and iTunes:

   

Show Notes:

Clever criminals defeat two-factor authentication using social engineering attack

  • The criminals accessed the mortgage account of a small business owner and made off with $45,000
  • Normally, sending a large sum of money or otherwise transacting with an account you have not done business with before, prompts the bank to engage its two factor authentication system
  • However the criminals managed to port the victims mobile phone number to their own device, causing them, rather than the victim, to receive the two factor authentication code. With this code in hand, they were able to complete the transfer
  • It seems the criminals made calls to the victims home and workplace, gathering information from him, and his family in order to obtain his mobile phone number, and the basic personal data required by the phone company to verify your identity when porting your phone number (usually only your date of birth)
  • The criminals also sent a text message to the victim, purporting to be his mobile provider, telling him they were having network problems, to try to avoid the victim becoming suspicious when not receiving any incoming calls
  • The victim’s bank has covered the $45,000 loss, as is standard practice for online banking fraud in Australia
  • The banks are seeking legislation giving them access to the telcos live database of number porting activities so they can prevent verification codes from being sent to
    recently ported numbers

New browser cache sniffing attack

  • The new attack allows a website to determine if you have been to specific other websites with a reasonable level of certainty
  • Unlike the older css :visited attacks that levered the browser’s history, the new attack leverages the browser cache. Previous attacks based on this same concept were unreliable because they were destructive, meaning, they caused the url they were probing to be cached, such that if you ran the test twice, it would then return a false positive.
  • The proof of concept creates an iframe pointing to about:blank, then, the javascript changes the source of the iframe to point it to the url it wants to test, If the browser does not instantly return the object from the cache, the source is changed back before navigation can be completed, and a cache miss is recorded. This method allows the script to determine if you have been to the site, without actually loading the site and causing it to be cached.
  • The test does not work against the actual page url, like youtube.com, but rather cachable objects, such as the CSS files or graphical logo of the site, that are generally cached got long periods of time.
  • This means the tool must constantly be updated as the target sites change their designs
  • There is currently no known resolution to this issue, save for disabling caching, however this is very detrimental to your web browsing performance

Mexican government shuts down Zeta’s private communications network

  • The Mexican military has completed an operation to shutdown a communications network along Mexico’s norther border. The network was used by drug runners to communicate and to track government security forces
  • The military confiscated more than 1,400 radios, 2,600 cell phones and other computer equipment
  • The equipment was often painted green and brown to camouflage it
  • The Mexican government says that this will be a severe blow to the drug runners, as they will no longer be able to track the activities of government security forces working against them
  • The estimated value of the equipment was $350,000
  • This raises the question, could a community effort create a private communications network spanning a large metro area that cheaply, and drive business away from the monopolistic telcos

Intel and Micron announce new 20nm 16gb (128 gigabit) NAND flash chips

  • The new smaller die size did not come with a reduction in the expected lifetime of the flash chips, unlike previous die shrinks

  • Intel attributes this to the use of a Hi-K/metal gate design, the first time this process has been used for NAND flash production

  • These new larger chips mean that we can expect to see SSDs with up to 2TB of capacity coming in the near future. IMFT (Intel Micron Flash Technologies) has already started mass producing 64 gigabit versions of the new chips

  • The 64Gbit chips use a page size of 8,192 bytes, whereas the 128Gbit dies will use 16,384 bytes. This means controllers and firmware and OSs will need to be updated to accommodate the new page sizes

  • The 128Gbit chips will also use the new ONFi 3 interface, allowing 333 MegaTransfers/sec instead of the 200 MT/s of ONFi 2


Feedback:

  • Q: EasyBreeze writes: I was wondering what the songs are you play as the themes for the TechSNAP roundup and feedback?

  • A: The intro and outro theme music was composed by Chris, and is a simple combination of a few stock clips. The feedback (Snap) and the round up (Disorganized Fun) are tracks created, and used by with permission from Ronald Jenkees

  • Q: Having worked as an IT Consultant for years on the Windows side of things, I am very well versed in Microsoft technology. What are my options for open source alternatives to a windows small business server.

  • A:

  • Samba 3
    • Can emulate a Windows NT 4 type domain controller
    • Works (barely) with Windows XP, I’ve not tried to do it with Vista or 7
    • Uses OpenLDAP to store the objects
    • Can only be managed using the Windows NT tools (not the tools that come built in to XP)
    • Allan used a system based on this setup to allow users to login to windows machines using the username and password they had created on our website for an Internet Cafe
    • 389 Directory Server (Open Source LDAP)
  • Samba4
    • Can emulates a full windows 2008 domain controller
    • Provides integration with bind 9 for full AD DNS
    • Build in LDAP with AD Schema to store the objects
    • Internal Kerberos server for authentication
  • Both of these are solutions are quite hacky, and really are not great solutions.

  • You can outsource or cloud source things like exchange servers

  • BizSpark licensing

Round Up:

Thanks to the TechSNAP Subreddit!

Holiday Reading:

The Master Switch: The Rise and Fall of Information Empires (Borzoi Books)

Price: $17.05

4.5 out of 5 stars (75 customer reviews)

112 used & new available from $5.45

Thankful for Open Source

without comments

post thumbnail

The Linux Action Show! s19e07: We stand on the shoulders of giants of open source every single day. One episode out of the year we give thanks to those certain project and developers who’ve made a big impact on us!

Plus: Linux Mint 12 is released tune in to find out what’s new, open source gaming got a massive shot in the arm this week, we’ll give you the details, and biggest little Linux distribution in the world!

And so much more!

All this week on, The Linux Action Show!


Thanks to:

GoDaddy.com Use our codes LINUX to save 10% at checkout, or LINUX20 to save 20% on hosting!

Special GoDaddy Offer: LINUX11

$1.99 per month Economy Hosting for 3 months!


Direct Episode Download Links:

HD Video | Large Video | Mobile Video | MP3 | OGG Audio | OGG Video | YouTube

   

-SHOW NOTES-

Runs Linux:

Android Pick:

Universal Pick:

Picks so far. Thanks to Madjo!

Linux Action Show Subreddit

Jupiter Broadcasting Swag!

NEWS:

Open Source Projects, We’re Thankful For:

Chris:

Allan:

Randall:

  • Wine – allows UNIX/Linux to run Microsoft Windows API calls to rum most windows applications as close to native as you can get for running windows applications on other OSs.
  • OpenSSH Just pure awesome no words can explain how awesome this is.
  • GNOME – A opensource Window Manager/Desktop for UNIX/Linux OS’s
  • SDL – Simple DirectMedia Layer is a cross-platform multimedia library designed to provide low level access to audio, keyboard, mouse, joystick, 3D hardware via OpenGL
  • VirtualBox – VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product
  • Samba Samba is CIFS/SMB File/Print server that can be used cross platform.

Support Jupiter Broadcasting!

Find us on Google+

Find us on Twitter:

Follow the network on Facebook:

Jupiter Broadcasting Forum:

Jupiter Colony

Catch the show LIVE Sunday 10am PDT:

Simple File Sharing | LAS | s18e09

without comments

post thumbnail

HTC is exposing private information about Android users, and we bust out our ACTION RAGE! Plus Gnome 3.2 is out, find out whats new, and Microsoft kicks things up to a full assault against Android, we share the details!

Then – Find out how easy it can be share files under Linux, even if you want to do it like a pro! Plus our picks for quick and simple file sharing, and a whole lot more!

All this week on, The Linux Action Show!


Thanks to:

GoDaddy.com Use our codes LINUX to save 10% at checkout, or LINUX20 to save 20% on hosting!

Direct Episode Download Links:

HD Video | Large Video | Mobile Video | MP3 | OGG Audio | OGG Video | WebM Video | YouTube


Episode Show Notes:

Runs Linux:

Autonomous Flying Robots Flock Like Birds, Runs Linux

Android Pick:

Universal Pick:

Poll:


News:

Debian is winning the Upstream War

  • Debian has ~108 (~42 of Ubuntu) to Redhat’s ~46 forks
  • Redhat’s RPM package system, while a popular standard, suffers from a number of issues
  • Redhat uses the YellowDog update manager, which solves some of the
  • Debian’s APT handles dependencies much better
  • Both suffer from a plethora of different ‘repositories’ as compared to FreeBSD’s single repository for all versions and architectures.
Linux File Sharing

Find us on Google+

Find us on Twitter:

Follow the network on Facebook:

Catch the show LIVE at 2:30pm PDT / 5:30 EDT / 9:30pm UTC Thursday Oct 6th:

Ultimate File Server | TechSNAP 25

without comments

post thumbnail

Coming up on this week’s on TechSNAP…

Have you ever been curious how hackers pull off massive security breaches? This week we’ve got the details on a breach that exposed private data of 35 millions customers.

Plus MySQL.com spreads custom malware tailored just for your system, and the details are amazing!

On top of all that, we’ll share our insights are setting up the ultimate network file server!


Direct Download Links:

HD Video | Large Video | Mobile Video | WebM | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

Show Notes:

South Korea’s SK Telecom hacked, detailed forensics released

  • Between July 18th and 25th, SK Telecom’s systems were compromised, and all of their customer records (35 million customers) were compromised. The records included a wealth of information, including username, password, national ID number, name, address, mobile phone number and email address.
  • The attack was classified as an Advanced Persistent Threat, the attackers compromised 60 computers at SK Telecom in total, biding their time until they could compromise the database. Data was exchanged between the compromised computers at SK Telecom, and a server at a Taiwanese publishing company that had been compromised by the attackers at an earlier date.
  • The attack was very sophisticated, specifically targeted, and also seems to indicate a degree of knowledge about the the target. The well organized attackers managed to compromise the software updates server of another company (ESTsoft) who’s software (ALTools) was used by SK Telecom, then piggyback a trojan in to the secure systems that way. Only computers from SK Telecom received the malicious update.
  • The attackers send the compromised data through a number of way points before receiving it, masking the trail and the identities of the attackers. A similar pattern was seen with the RSA APT attack, the attackers uploaded the stolen data to a compromised web server, and once they had removed the data from there, destroyed the server and broke the trail back to them selves.
  • Proper code signing, or GPG signing could have prevented this
  • Original BBC Article about the attack

Mac OS X Lion may expose your hashed password

  • The Directory Services command allows users to search for data about other users on the machine. This is the intended function.
  • The problem is that the search results for the current user also include sensitive information, such as the users’ password hash. You are authorized to view this information, because you are the current user.
  • However, any application running as that user, could also gain that information, and send it back to an attacker.
  • Using the hash, an attacker could perform an offline brute force attack against the password. These attacks have gotten more common and less time consuming with the advent of better parallel computing, cloud computing and high performance GPGPUs.
  • My bitcoin mining rig could easily be converting to a password hash cracking rig, especially now that the current value of bitcoin is sagging. If there were a big enough market for cracking hashed passwords, there are now a huge number of highly specialized machines devoted to bitcoin that could be easily switched over.
  • The tool can also allow the current user to overwrite their own password hash with a new one, without the need to provide the current plain text password. This means that rather than spend time cracking the password, the attacker could just change the current users password, and then take over the account that way.
  • These attacks would require some kind of exploit that allowed the attack to perform the required actions, however we have seen a number of flash, java and general browsers exploits that could allow this.
  • The current recommended work around is to chmod the dscl command such that it can only be used by root
  • Additional Article

MySQL.com compromised, visitors subject to drive by infection

  • The MySQL.com front page was compromised and had malicious code injected in to it.
  • The code (usually an iframe) caused a java exploit to be executed against the visitor. The exploit required no interaction or confirmation from the user. This type of attack is know as a ‘drive by infection’, because the user does not have to take any action to become infected.
  • Two different trojans were detected being sent to users, Troj/WndRed-C and Troj/Agent-TNV
  • Because of the nature of the iframe attack, and the redirect chain the attackers could have easily varied the payload, or selected different payloads based on the platform the user was visiting the site on.
  • There are reports of Russian hackers offering to sell admin access to mysql.com for $3000
  • Detailed Analysis with malicious source code, video of the infection process
  • Article about previous compromise
  • When the previous compromise was reported, it was also reported that MySQL.com was subject to a XSS (Cross Site Scripting) attack, where content from another site could be injected in to the MySQL site, subverting the browsers usual ‘Same Origin’ policy. This vulnerability, if not repaired, could have been the source of this latest attack.

Feedback:

Continuing our Home Server Segment – This week we are covering file servers.
Some possible solutions:

  • Roll Your Own (UNIX)
  • Linux or FreeBSD Based
  • Install Samba for SMB Server (allow windows and other OS machines to see your shared files)
  • Setup FTP (unencrypted unless you do FTPS (ftp over ssl), high speed, doesn’t play well with NAT, not recommended)
  • Configure SSH (provides SCP and SFTP) (encrypted, slightly higher cpu usage, recommended for Internet access)
  • Install rsync (originally designed to keep mirrors of source code and websites up to date, allows you to transfer only the differences between files, rather than the entire file) (although it is recommended you do rsync over SSH not via the native protocol)
  • Configure NFS (default UNIX file sharing system)
  • Build your own iSCSI targets (allows you to mount a remote disk as if it were local, popular in virtualization as it removes a layer of abstraction. required for virtual machines that can be transferred from one host to another.
  • Roll Your Own (Windows)
  • Windows provides built in support for SMB
  • Install Filezilla Server for FTP/FTPs (Alternative: CyberDuck)
  • There are some NFS alternatives for windows, but not are not free
  • There is an rsync client for windows, or you could use cygwin, same goes for SSH. Similar tools like robocopy and synctoy
  • FreeNAS
  • FreeBSD Based. Provides: SMB, NFS, FTP, SFTP/SCP, iSCSI (and more)
  • Supports ZFS
  • Chris’ Previous Coverage of FreeNAS:
  • FreeNAS, IN DEPTH
  • FreeNAS Vs. HP MediaSmart WHS
  • FreeNAS vs Drobo

Round Up:

Bitcoin Blaster:

Best Firewall Ever | LAS | s18e07

without comments

post thumbnail

The best firewall in the universe is powered by open source, and we’ll show you how to set it up like a boss!

Plus – Why 2012 might be the year of Android on the desktop, and openSUSE 12.1’s top features!

All this week on, The Linux Action Show!


Thanks to:

GoDaddy.com Use our codes LINUX to save 10% at checkout, or LINUX20 to save 20% on hosting!

Direct Episode Download Links:

HD Video | Large Video | Mobile Video| MP3 | OGG Audio | OGG Video | YouTube


Episode Show Notes:

Runs Linux:

Rugged Video Server, Runs Linux

Android Pick:

BSD Pick:

News:

Getting Started with pfSense:

Find us on Google+

Find us on Twitter:

Follow the network on Facebook:

Catch the show LIVE at 10am on Sunday:

Battery Malware | TechSNAP 16

without comments

post thumbnail

Attackers take aim at Apple with an exploit that could brick your Macbook, or perhaps worse. Plus you need to patch against a 9 year old SSL flaw.

Plus find out about a Google bug that could wipe a site from their Index, and a excellent batch of your feedback!

All that and more, on this week’s TechSNAP!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

Show Notes:

iPhones vulnerable to 9 year old SSL sniffing attack

  • A nine year old bug discovered and disclosed by Moxie Marlinspike in 2002 allows attackers to decrypt intercepted SSL sessions. Moxie Marlinspike released a newer, easier to use version of the tool on monday, to coincide with Apple finally patching the flaw on iPhone and other iOS devices.
  • Any unpatched iOS device can have all of it’s SSL traffic trivially intercepted and decrypted
  • This means anyone with this new easy to use tool sitting near a wifi hotspot, can intercept encrypted login information (gmail, facebook), banking credentials, e-commerce transactions, or anything else people do from their phone.
  • The bug was in the way iOS interpreted the certificate chain. Apple failed to respect the ‘basicConstraint’ parameter, allowing an attacker to sign a certificate for any domain with an existing valid certificate, a condition normally prevented by the constraint.
  • There are no known flaws in SSL it self, in this case, the attacker could perform a man-in-the-middle attack, by feeding the improperly signed certificate to the iPhone which would have accepted it, and used the attackers key to encrypt the data.
  • Patch is out with a support doc and direct download links

Apple Notebook batteries vulnerable to firmware hack

  • After analyzing a battery firmware update that Apple pushed in 2009, researchers found that all patched batteries, and all batteries manufactured since, use the same password
  • With this password, it is possible to control the firmware on the battery
  • This means that an attacker can remotely brick your Macbook, or cause the battery to overheat and possibly even explode
  • The attacker can also falsify the data returned to the OS from the battery, causing odd system behaviour
  • The attacker could also completely replace the Apple firmware, with one designed to silently infect the machine with malware. Even if the malware is removed, the battery would be able to reinfect the machine, even after a complete OS wipe and reinstall.
  • Further research will be presented at this years Black Hat Security Conference
  • In the meantime, researchers have notified Apple of the vulnerability, and have created a utility that generates a completely random password for your Mac’s battery.
    Additional Link

Facebook fixes glitch that let you see private video information

  • A glitch in facebook allowed you to see the thumbnail preview and description of private videos posted by other users, even when they were not shared with you.
  • It was not possible to view the actual videos

Google was quick to shutdown Webmaster Tools after vulnerability found

  • Using the google webmaster tools, users were able to remove websites that did not belong to them from the Google Index
  • By simply modifying the query string of a valid request to remove your own site from the google index, and changing one of the two references to the target url, you were able to remove an arbitrary site from the google index
  • The issue was resolved within 7 hours of being reported to Google
  • Google restored sites that were improperly removed from its index.

Researchers find vulnerablity in Skype

  • Inproper input validation and output sanitation allowed attackers to inject code into their skype profile
  • By entering html and java script in to the ‘mobile phone’ section of your profile, anyone who had you on their friends list would execute the injected code.
  • This vulnerability could have allowed attackers to high your session, steal your account, capture your payment data, and change your password

Feedback


Q: (Sargoreth) I downloaded eclipse, and I didn’t bother to verify the md5 hash they publish on the download page, how big a security risk is this?
A: Downloadable software often has an MD5 hash published along with the downloadable file, as a measure to allow you to ensure that the file you downloaded is valid. Checking the downloaded file against this hash can ensure that the file was not corrupted during transfer. However it is not a strong enough indicator that the file has not been tampered with. If the file was modified, the MD5 hash could just as easily have been updated along with it. In order to be sure that the file has not been tampered with, you need a hash that is provided out of band, from a trusted source (The FreeBSD Ports tree comes with the SHA256 hashs of all files, which are then verified once they are downloaded). SHA256 is much more secure, as MD5 has been defeated a number of times, with attackers able to craft two files with matching hashes. SHA-1 is no longer considered secure enough for cryptographic purposes. It should also be noted that SHA-512 is actually faster to calculate than SHA256 on 64bit hardware, however it is not as widely supported yet. The ultimate solution for ensuring the integrity of downloadable files is a GPG signature, verified against a trusted public key. Many package managers (such as yum) take this approach, and some websites offer a .asc file for verification. A number of projects have stopped publishing the GPG signatures because the proportion of users who checked the signature was too low to justify the additional effort. Some open source projects have had backdoors injected in to their downloadable archives on official mirrors, such as the UnrealIRCd project.


Q: (Christoper) I have a windows 7 laptop, and a Ubuntu desktop, what would be a cheap and easy way to share files between them?
A: The easiest and most secure way, is to enable SSH on the ubuntu machine, and then use an SFTP client like FileZilla (For Windows, Mac and Linux), and then just login to your ubuntu machine using your ubuntu username/password. Alternatively, If you have shared a folder on your windows machine, you should be be able to browse to it from the Nautilus file browser in Ubuntu. Optionally, you can also install Samba, to allow your Ubuntu machine to share files with windows, it will appear as if it were another windows machine in your windows ‘network neighbourhood’.


Q: (Chad) I have a network of CentOS servers, and a central NFS/NIS server, however we are considering adding a FreeNAS box to provide ZFS. I need to be able to provide consistent centralized permissions control on this new file system. I don’t want to have to manually recreate the users on the FreeNAS box. Should I switch to LDAP?
A: FreeNAS is based on FreeBSD, so it has a native NIS client you can use (ypbind) to connect to your existing NIS system. This would allow the same users/groups to exist across your heterogeneous network. You may need to modify the /etc/nsswitch.conf file to configure the order local files and NIS are checked in, and set your NIS domain in /etc/rc.conf. Optionally, you could use LDAP, again, adding some additional parameters to nsswitch.conf and configuring LDAP. If you decide to use LDAP, I would recommend switching your CentOS machines to using LDAP as well, allowing you to again maintain a single system for both Linux and BSD, instead of maintaining separate account databases. If you are worried about performance, you might consider setting the BSD machine up as an NIS slave, so that it maintains a local copy of the NIS database. The FreeBSD NIS server is called ypserv. You can find out more about configuring NIS on FreeBSD here


Bitcoin Blaster

Roundup

The Techie Geek – Episode 34 – Show Notes

without comments


MP3 Format
OGG Format
FOLLOW ME on Twitter
FOLLOW ME on Identica
FOLLOW ME on Facebook
Email me at russ AT thetechiegeek DOT com

Samba How-To tutorial by listener Kevin Wisher. Download it here
OpenSSH server and FileZilla using SFTP are still my favorite way to get access too ALL my stuff on my Linux box when accessing it from my Windows box
WinMerge is a free GPL program for Windows that makes comparing log files easy. It also works und CodeWeavers Crossover Office Professional. It will probably work well under WINE too but I haven’t tested it yet.
diff is a command utility in Linux that does the same thine. Do you know of a good GUI version of diff for Linux? Let me know.
Gnome Cheese web cam application now works on my Systen76 Pangolin laptop after a recent Ubuntu Intrepid 8.10 update. As far as I know everything works on my laptop. I haven’t tried the modem, HDMI, SATA, or PCMCIA port yet.
Google Hack Generator
ShmooCon speakers
The Top 50 Proprietary Programs that Drive You Crazy — and Their Open Source Alternatives
Come join the Linux Study Group at learn.linuxbasement.com. Here’s a link to the LPI study book we’re using
Here’s 2 PDFs to help you study PDF-1 and PDF-2. Also download ELPICX 2 here which is a Linux Live DVD for studying for the LPI
Checkout Twitterholic if you love Twitter
I like Indentica too
Check out some of my favorite Windows podcasts. The Mike Tech Show, Podnutz, and Tech Vets
Head over to MyHardDriveDied.com and read Steve Moulton’s awesome presentations
Email me if you are interested in helping with “The DistroWatch Weekly Podcast” The rss feeds are here MP3 and OGG
Check out these awesome Windows apps Crystal Disk Info, AusLogic Defrag, JKDefrag, and for defraging your page file PageDefrag from SysInternals
Here’s the talks from Defcon 16 Check out these very cool videos at IronGeek.com.

Regarding Public Service Announcement: If you have a working laptop computer you want to donate please send an email to “noel.saliba AT gmail.com” or drop in the IRC chat room #linuxcrazy on freenode.net and ask “weidedout” your questions. Check out these links “Hear Say Spoken English Tutor” and “Grow Church Promo PDF“. Thank you.

Check out these great podcast sites: Techpodcasts.com and BluBrry.com