Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Comodo OCR fail: researchers hack TLS certificate

alanw writes: The original e-mail should have been archived on Google Groups, but
all that is there is this reply:


There's a news report in German here:

Two researchers: Florian Heinz and Martin Kluge discovered that the
WHOIS server for some top level domains will only provide the contact
e-mail address as an image.

Comodo was using OCR to extract the e-mail address so it could send a
verification e-mail to the domain. Their OCR was faulty, and the
researchers tricked it into sending the e-mail to a different domain.

Comodo has made very negative comments about these domain registrars.

Comment Might be related to the British Gas leak (Score 2) 9


About the same number of accounts, a couple of thousand against the millions that Vodafone and British Gas must have. BG say it wasn't their systems that were breached. Sounds as if there's another database that's leaked, and some people who have re-used passwords across multiple accounts are having their credentials tried out across multiple sites.

Comment Over-hyped. (Score 4, Informative) 118

From the oss-sec mailing list:

This is not a vulnerability, this is expected behaviour.


This paragraph suggests so many things which are simply wrong, confused,
or irrelevant that i don't know what to make of the rest of the article.

  * modern debian GNU/Linux systems do not have a wheel group at all. No
particular versions or flavors of "Linux system"

  * on systems where members of group wheel really do have unrestricted
access to the su command, having wheel in the first place *is* the
vulnerability -- it is a misconfiguration to expect an account to be
non-privileged if it is a member of wheel.

  * the last sentence appears to be about setuid/setgid binaries, but
makes no mention that the overwhelming majority of binaries are not

Later on, the post suggests that wheel group membership is related to
sudo privileges.

It also seems to assume that polkit always permits access for members of
group wheel. I can find no such configuration on a modern debian system.

I don't think there's anything significant in this ambiguous,
underspecified, and confused report.


Yeah I looked into this (the article/etc was completely confusing and
took some time to parse):

1) the article states they contacted red hat, we were unable to find
any inbound email or bugzilla entry pertaining to this issue, as always
if you have an issue you wish to report please contact secalert@...hat.com

2) this is expected behaviour, admin users can install software (do I
have to say this? really? yes. I was told I should say this).

3) don't run web apps as admin users (do I have to say this? really?
yes. I was told I should say this).

4) if you feel the need to run a web app as an admin user restrict what
they can do via SELinux, and don't let them install software (do I have
to say this? really? yes. I was told I should say this).

So TL;DR: it's not a security vulnerability, and it will NOT be getting
a CVE.

I can only assume this article/vuln is perhaps referring to something
like Cpanel and other control panels that people sometimes install
insecurely/improperly and then never update. Or something. Who knows.

Comment Re:Mod parent up. (Score 1) 191

Yeah! Who the fuck thought that was a good idea?

The same clueless marketroid that thought that inserting adverts into http traffic was a good idea?

> The marketing geniuses at Belkin, the consumer networking vendor, have dreamed up a new form of spam - ads served to your desktop, by way of its wireless router
> The router would grab a random HTTP connection every eight hours and redirect it to Belkin’s (push) advertised web page.

Comment When I was a lad (Score 1) 230

School, circa 1974. Sending off your sheets and hoping that the keypunch operators didn't get 0's and O's confused. O's were slashed, or perhaps it was the other way round. Getting your job back on music ruled paper the next week

University. There were teletypes that you could use to get access to the ICL mainframe, but for exams you had to use punched cards, and only got 3 goes to compile and run your program. There were always queues for the big punch machines, so if you just needed one card doing, you could use a hand punch.

There's a good page with a photo of one here: http://www.staff.ncl.ac.uk/rog...

By my first job in 1979, we had VT52's and then VT100's, as well as a LA120 for the console.

Comment Brief Encounter (Score 2) 57

I once spent an interesting weekend in his company. He'd been born in Beijing, a walled city, and we took him via Chester on our way to North Wales. It was the first time he'd been in a walled city since his childhood. Walking near Llanberis, he found a Yew tree and enjoyed eating the berries. Still my photo of him on the Wikipedia page. Amazing guy, I hope his enthusiasm and inspiration lives on as his legacy.

Comment Install what? (Score 1) 90

To watch the live feed I'm being asked to install CNTVLive2 plugi

http:/// player . cntv . cn /flashplayer/config/plugins/npCNTVLive2_Linux_64.xpi

I think not.

There seems to be a custom compression algorithm used for

mplayer/xine/vlc don't like it.

In Firefox and Chromium it shows a loading page but stops at 80-something percent.

Comment EFF's Switzerland Network Testing Tool (Score 3, Informative) 251

The OP mentions Sandvine: the EFF has a tool called Switzerland.

Is your ISP interfering with your BitTorrent connections? Cutting off your VOIP calls? Undermining the principles of network neutrality? In order to answer those questions, concerned Internet users need tools to test their Internet connections and gather evidence about ISP interference practices. After all, if it weren't for the testing efforts of Rob Topolski, the Associated Press, and EFF, Comcast would still be stone-walling about their now-infamous BitTorrent blocking efforts.

Developed by the Electronic Frontier Foundation, Switzerland is an open source software tool for testing the integrity of data communications over networks, ISPs and firewalls. It will spot IP packets which are forged or modified between clients, inform you, and give you copies of the modified packets.

Switzerland is designed to detect the modification or injection of packets of data traveling over IP networks, including those introduced by anti-P2P tools from Sandvine (widely believed to be used by Comcast to interfere with BitTorrent uploads) and AudibleMagic, advertising injection systems like FairEagle, censorship systems like the Great Firewall of China, and other systems that we don't know about yet.

Slashdot Top Deals

What ever you want is going to cost a little more than it is worth. -- The Second Law Of Thermodynamics