Tag Archives: Internet

The rise and fall of the Gopher protocol

When I first encountered what we now call the Internet, it was called NSFnet and was run by the National Science Foundation (although references to the ARPAnet still abounded). Finding information or any kind of file was difficult at best unless you already knew where it was stored. My grad school was connected, as were most universities, but we didn’t have DNS set up so you actually had to use IP numbers to specify hosts to connect to. It was the opposite of user-friendly.

By 1992 the governing committee of the Internet realized it needed a better way to connect this growing network to its users. Among the contenders was the Gopher protocol that was created by programmers at the University of Minnesota.

Gopher did very, very well for a while, greatly exceeding Tim Berners-Lee’s World Wide Web, one of the others proposed. Then the University decided to charge users to use Gopher. The rest is, as they say, history.

The real story of how the Internet became so vulnerable

You can read The real story of how the Internet became so vulnerable but the real story is simple: It wasn’t designed with security in mind. Every bit of security has been bolted on after the fact, and it shows.

Fixing it would require literally replacing everything right down to the physical layer. That kind of upheaval simply isn’t going to happen. An alternative network is an option, but whether or not people could or would even want to switch to it is an open question.

Today’s Shocking Report: US Internet speed, prices lag behind other nations’

I mean, seriously, broadband, mobile and fixed, is slower and more expensive in the US than places like Seoul, Hong Kong and Tokyo. The big reason: lack of competition, as shown in places where Google fiber gets introduced. When that happens, prices go down and speeds go up. Too bad Google fiber isn’t more widely available.

POODLE? What the heck is POODLE?

Thought I’d take a few moments and talk about the latest Internet-wide vulnerability called, of all things, POODLE.

But first a little background. Back when the Internet was first created, there was no security. None. Everyone trusted everyone else and the idea that they’d need to keep things secure wasn’t an issue. That worked fine when it was just a couple of universities and a few defense contractors. But the Internet grew and the users connected to it became diverse. And my “diverse” I mean filled with both good and bad guys.

Perhaps you’d expect the folks who created the Internet would go back to the drawing board and redesign things with security built in, but that’s not how those guys think. The Internet was designed to be as simple as possible. If you needed something more than just the ability to move bits from one place to another, you had to create a layer on top of the existing network that did what you needed. That’s why there are things like HTTP (the basis of the World Wide Web), it handles all the special things you need to display web pages that aren’t already there.

The software that the Internet runs on is called TCP/IP. It stands for Transmission Control Protocol/Internet Protocol. TCP handles things like making sure the bits you send somewhere actually get there and in the right order while IP helps tie together different smaller networks so they all seem like one big network. TCP/IP doesn’t care if your bits are from a web page or an email or an MP3 file, it just makes sure it gets to where it’s supposed to go.

That’s why if you want to do cool things like the WWW or email, you have to add software to do it that works with TCP/IP. That’s why if you want to send those bits in a way that no one but your intended recipient can read, you need to add a security layer to TCP/IP. The first attempt to do that is called Secure Sockets Layer or SSL.

SSL uses encryption to achieve that security. And that’s what’s wrong with it and why POODLE is in the news. SSL has gone through three revisions. Version 1 was never really used, version 2 was for a while but it was quickly replaced by version 3. Version 3 hung in there for years but you have to understand that it was designed in the 1990s. The encryption it uses is easily broken. That makes it unsafe to use and it was replaced by Transport Layer Security, or TLS.

TLS has much better encryption, although it’s had to go through multiple versions as well to keep up. Pretty much every computer and operating system supports TLS so you’d think the problem would be gone. Well, you’d think that but unfortunately, many systems still support SSL version 3 as a backup in case something happens with TLS. So instead of getting an error about not being able to securely connect, your computer quietly drops into what is an effectively insecure connection without telling you. So you think you’re secure, but you’re not.

What’s worse, a bad guy can listen in to connections being made and interfere in such a way to force this drop into SSLv3 and read your communications (sometimes called a Man-in-the-Middle attack). All of this is possible because most computers and servers still support SSLv3 “just in case”. Sure it’s broken and not secure but hey, you never know.

POODLE, which stands for Padding Oracle On Downgraded Legacy Encryption, is the official name for that attack. It’s been around for a very long time and really knowing if anyone’s used it or not is difficult. Security folks take the easy route and assume it has. Still, it’s possible to defend against it for the most part.

The majority of network traffic is probably the result of your web browser. Luckily, browsers like Firefox and Internet Explorer can have SSLv3 shut off entirely right now. Both browsers will have new versions with SSLv3 removed eventually so you should look for those updates. Chrome does not allow you to turn SSLv3 off from its settings menu so it will require a new version.

Since so many servers still support SSLv3, they will have to be updated as well. Google is proposing a change for servers to implement but it remains to be seen if everyone is going to use that or adopt something else. The good news is you don’t have to wait as long as you can turn SSLv3 off in your computer/smartphone/tablet etc.

Here are some info links on turning off SSLv3 in various web browsers:

Firefox
Internet Explorer – Note: Only for version 7 and higher. Version 6 does not support TLS and you shouldn’t be using it.
Chrome – Note: More complicated than the other two.

I should note there’s small probability that if you turn off SSLv3 you might see some connection issues with certain web sites. It won’t be the Googles or Facebooks but more likely smaller sites that haven’t kept up with the times. It’s up to you to decide if viewing them is important enough to turn SSLv3 back on. If you do that, don’t do it while connected to public WiFi. The likelihood of a bad guy who’s looking to take advantage of POODLE also being connected to that access point is quite high.

If you want a nice “ones and zeroes” description of the vulnerability How POODLE Happened is pretty good.

The 2008 security hole in BGP that no one fixed is being exploited

BGP, the Border Gateway Protocol, has a flaw that was discovered in 2008 that allows attackers to reroute your data without you knowing about it. In fact, someone’s been using it to send traffic to Belarus and Iceland before sending it on to its original destination. It has to be assumed that it’s being copied and then used for has to be assumed as less than innocent purposes.

Why you can’t get gigabit Internet

When Google first announced the contest for communities to get their Google Fiber service it caused quite a stir in areas with poor or slow Internet service. But the 1 Gbps service isn’t as ahead of the pack as you’d think. Companies like Comcast and Time Warner could provide such speeds today. So why don’t they? No competition. It’s just that simple.

Our Government Has Weaponized the Internet

As part of my Information Security training, the architecture of TCP/IP and the OSI model were covered. They introduced TCP/IP (the basis of the Internet) as optimized for access, not security. Never has that been more apparent than now, with what the NSA has done with the Internet backbone via their QUANTUM program.