Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:This is straight from Microsoft's playbook (Score 1) 510

More to the point, it's trivial to break a chroot on Linux if you have root access; it's not designed to be secure against someone with root permissions. (You create a second chroot inside the original chroot, and move your shell inside it but keep the working directory between the two chroots. Then you can just do cd .. until you reach the original root, and chroot again to reset the root to its original value.) I think this is intentional; there are plenty of other ways to break a chroot as root, but they tend to be more destructive, so having an easy way out is nice. (This is also the reason that chroots can only be created as root; otherwise, they'd be no security even against unprivileged users.)

Comment Re:Slip the backdoor into a precompiled GCC instea (Score 1) 576

Not at all. You only apply the "patch" when debugging symbols are off and optimisation is on, which would cover nearly any production build. Even if you left in debugging symbols, you would still have a hard time discovering it with a debugger since optimisation is supposed do change the output.

You would also make it trigger under very special circumstances and as others have pointed out, the error you introduce could be a subtle change of behaviour of the random number generator.

If you did that, the backdoor would disappear over the course of time whenever someone released a production compiler that was compiled with a debugging-symbol version of the same compiler. (This is a lot more likely than it seems; the people who actually develop compilers, and thus compile them, are likely to have debugging symbols on for their compilers as a matter of course, because they frequently make changes that break them.)

Comment Re:Got your feelings hurt? (Score 1) 566

/dev/random blocks if it feels that there wasn't enough entropy gathered from the environment to produce a truly random number. /dev/urandom will never block; rather, if there isn't enough entropy gathered from the environment, it will give you a cryptographically secure pseudorandom number instead. So the difference basically depends on what level of true randomness you need; in general, /dev/urandom is just fine for all applications except cryptography, and if you're doing cryptography, you shouldn't be using either directly but rather relying on a crypto library anyway (and the library probably uses /dev/random, possibly among other things).

Comment Re:The continuing saga. . . (Score 1) 177

I remember to set a quick LC_ALL=C when I'm doing anything that might have to parse the output of a shell command (typically just on that command, rather than exported). Including the space you need to separate it from the command, it's what, nine characters? (And as a bonus, it forces things like the decimal point convention to known values too.)

(By the way, "C" is a better setting than any specific language, including English; its entire purpose is to be as portable as possible across computers. I've actually also come across programs that give more 'friendly' output on, say, "en_US.UTF-8" than they do on "C"; it's the difference between knowing that your output will be read by a human, or by a computer.)

Comment Re:Companies shouldn't have this anyway (Score 1) 339

The private key is normally protected by a password, without which it won't/can't work. The password doesn't need to be sent anywhere in order to work correctly.

SSH keys are actually one of the easiest ways to get two-factor authentication ("something you have" = the encrypted private key, "something you know" = the password to decrypt it.

Comment Linked to Pokémon fansite hack? (Score 1) 36

A bunch of Pokémon fansites were hacked recently (here's one reasonably detailed report from one of the sites). Although as far as I know no plaintext passwords were stored on any of the servers, there were a bunch of password hash databases taken; and because Pokémon is a Nintendo property, Nintendo's website would be an obvious place to try any username/password pairs that were weak enough to be reversed from the databases (and some plaintext passwords would be available as a result of compromised login forms).

Many of the hacked sites (that I know about, at least) were reasonably small, with user counts measured in thousands; as such, 24 thousand total seems to be a reasonable estimate for the number of accounts that might have been affected.

Comment Re:No shit (Score 1) 286

I'm thinking of situations like "needing to pick someone up in an emergency (with limited time) and trying to contact them to verify where they are". If you pull over in order to make the call, then you're going to have to break the speed limit in order to get there on time, which is dangerous in a different way. If a passenger's making the call, there's no danger involved, and so things are safer all around.

Slashdot Top Deals

You know, the difference between this company and the Titanic is that the Titanic had paying customers.

Working...