Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Comment Re:The eventual redefinition of "privacy" and the (Score 1) 89

All of this is boiling over to what exactly is considered "YOUR" information in the digital age? Nobody seems to be asking this question.

As a minimum if you don't encrypt it before tossing it out onto unknown public and private networks you don't control, you've already said you don't care who sees / reads / hears / metabolizes your data.

Submission + - CIA rendition jet was waiting in Europe to kidnap Snowden 5

Frosty Piss writes: As Edward Snowden made his dramatic escape to Russia a year ago, a secret US government jet previously employed in CIA 'rendition' flights on which terror suspects disappeared into 'black' imprisonment flew into Europe in a bid to spirit him back to the United States. On the evening of 24 June 2013, an unmarked Gulfstream V business jet took off from a quiet commercial airport 30 miles from a Washington DC. regional airport discreetly offers its clients 'the personal accommodations and amenities you can't find at commercial airports'. On its best-known mission, the jet flew a U.S. marshals into the UK on to collect radical cleric Abu Hamza after the United States won an extradition order against him. Only Vladimir Putin's intransigence saved Snowden from a similar travel package. The jet's activities can be followed on many flight tracking websites such as FlightAware

Comment Re:Sigh - what the heck ... (Score 1) 264

They're wrong.

Misfeatures of UPnP: A) only for IPv4/NAT gateways; B) proprietary specification; C) defined as profile of SOAP over UDP (so very wide attack surface); D) allows every client to make 3rd-party port maps by default (so very insecure by design).

Corrections in PCP A) works for IPv4/NAT and IPv6 gateways (NAT and w/o NAT); B) open IETF specification; C) defined as simple binary protocol (so very narrow attack surface); D) disallows 3rd-party port maps unless optional extension implemented (so less insecure by design).

You need something that does this if you have a firewall (whether there is NAT or not). If you have an IPv6 gateway, then see RFC 6092 section 3.4 Passive Listeners for an explanation. That RFC is referenced by CableLabs and BBF specs, so it is what you should expect to see in most provider-provisioned home gateways in the near future.

Seriously, PCP is what you need to use for this. Does this suck? Maybe. Depends on whether you think having firewalls everywhere denying all inbound traffic to passive listeners by default is a good idea. If you think that's a good idea, then PCP doesn't suck. Deal with it.

Comment Re:Sigh - what the heck ... (Score 1) 264

> So how do you propose that my game on a machine on NAT arranges to receive UDP through the firewall? I'm supposed to manually configure firewall rules for each game? And then change them all if my IP changes?

Ladies and gentlemen, I give you Port Control Protocol [RFC 6887].

Comment Re:Why I buy apple airports (Score 1) 264

Another feature of the AirPort home gateway product line is that it doesn't have any UPnP support, which is the attack surface that has been proven to be so difficult to secure. It also doesn't have an embedded web server for administration and configuration, using instead a proprietary Apple protocol between the firmware and the AirPort Utility rich client program that runs on OS X, iOS and Windows. The attack surface on the AirPort home gateway is really small compared to other products.

Too bad Apple will probably never make another one.

Comment Concurrent Multi-path and Multi-streaming (Score 1) 109

TCP port 443 is the new waist of the Internet, and it doesn't look like that's going to change with the transition to IPv6 either. Should we just forget about concurrent multi-path and multi-streaming at the transport layer and do it all at the application layer? Or do you think there might still be room for fixing these problems at the transport layer?

Comment Re:Yes, it's coming (Score 1) 167

We're talking about an attack that only currently originates from a user population representing less than 0.3% of the Internet user population. If you're under attack over IPv6, then just pull the plug. Seriously, I get that you need to keep your family jewels in a bank vault. You can probably keep the rhinestones under the bed and save on the safe deposit fees.

Comment Re:Yes, it's coming (Score 1) 167

Turns out for external facing web services, you don't need any of that. You just rack up an IPv6 load-balanced proxy and point it at your existing IPv4 servers. The trick is making sure you don't shoot yourself by implementing a stupid per-source address limit and kill your site over IPv6 because all the IPv4 source addresses are the for the proxy array.

"Is it really you, Fuzz, or is it Memorex, or is it radiation sickness?" -- Sonic Disruptors comics