Practical Technology

for practical people.

July 14, 2008
by sjvn01
0 comments

How CAPTCHA got trashed

CAPTCHA used to be an easy and useful way for Web administrators to authenticate users. Now it’s an easy and useful way for malware authors and spammers to do their dirty work.

CAPTCHA — Completely Automated Public Turing Test to Tell Computers and Humans Apart — was a good idea in its day. You presented users with an obfuscated string of characters and then had them decode and type the string in to get an e-mail account, a social networking account or comment access on an online forum. Not much fuss — though users justifiably complained that the difference between ‘1’ (one) and l (the lower-case letter l) can be hard to see in many fonts — and certainly no muss from a Web administrator’s point of view.

So it was that CAPTCHA went from relatively obscure security measure perfected in 2000 by researchers at Carnegie Mellon University to deployment by most of the major Web e-mail sites and many other Web sites by 2007. Sites such as Yahoo Mail, Google‘s Gmail and Microsoft’s Hotmail all used — and, for that matter, continue to use — CAPTCHA to make sure that only human beings, not bots, could get accounts or make postings.

Those days are long gone.

By January 2008, Yahoo Mail’s CAPTCHA had been cracked. Gmail was ripped open in April. Hotmail’s top got popped during the same month.

And then things got bad.

There are now programs available online — no, we will not tell you where — that automate CAPTCHA attacks. You don’t need to have any cracking skills. All you need is a desire to spread spam, make anonymous online attacks against your enemies, propagate malware or, in general, be an online jerk.

It’s not just free e-mail sites that can be made to suffer, though.

John Nagle, founder of SiteTruth, a site that tries to identify bogus businesses and their Web sites, wrote in late May on Techdirt that while spam on the popular online classified ad service Craigslist “has been a minor nuisance for years … this year, the spammers started winning and are taking over.”

Craigslist tried “to stop spamming by checking for duplicate submissions,” Nagle explained. “They check for excessive posts from a single IP address. They require users to register with a valid e-mail address. They added a CAPTCHA to stop automated posting tools. And users can flag postings they recognize as spam.”

According to Nagle, waxing sarcastic, “Several commercial products are now available to overcome those little obstacles to bulk posting. A tool called CL Auto Posting Tool is one such product. It not only posts to Craigslist automatically, it has built-in strategies to overcome each Craigslist anti-spam mechanism.” It’s not the only one. There are, he added, “other desktop software products [such as] AdBomber and Ad Master. For spammers preferring a service-oriented approach, there’s ItsYourPost.” The result? “The defenses of Craigslist have been overrun. Some categories on Craigslist have become over 90% spam. The personals sections were the first to go, then the services categories, and more recently, the job postings.”

f course, you don’t have to pay anything. There are now free CAPTCHA crackers available online.

Craigslist is fighting back. The organization is now using phone verification for some ads. Crackers, in return, are working on a way to break Craigslist’s phone defenses. With combat costs mounting, it’s hard to see how Craigslist, which has always been a free service, can continue to survive with its no-visible-means-of-revenue model.

It’s not, as the Craigslist situation shows, that malicious e-mail is the only problem coming from broken CAPTCHA security. Paul Wood, senior analyst at MessageLabs, a U.K.-based e-mail security company, says, “MessageLabs have already begun to see examples of spammers exploiting other techniques once they have bypassed the CAPTCHA of Google and Hotmail — for example, using Google Docs to create spam content and including the link in the spam e-mail messages, evading traditional antispam techniques that rely on identifying known spam domains in URLs.”

Social network users are also vulnerable to attack from CAPTCHA-compromised sites, says Stephan Chenette, manager of security research at Websense Security Labs.

“The newer generation doesn’t use e-mail to communicate,” Chenette explains. “Instead, they use social networks, and they’re not too concerned about revealing their personal information on social networks or blogs where they post instead of sending e-mail. What happens is that an attacker creates a public blog of his own or sets up an account; he can then use these to publish malicious links. By exploiting the trust of the people on that community, he uses them to spread botnets and the like.”

Because social networks offer such an “enormous attack surface” and “their users don’t think of themselves as being vulnerable in the same way experienced e-mail or IM users are,” they’re especially easy to exploit, says Chenette.

Another new attack vector is coming from CAPTCHA’s collapse: the quick creation of fake Web sites. According to Chenette, these sites get their content from legitimate Web sites by copying and pasting to maximize their search engine optimization and reputation to quickly gain an audience.

“Reputation is all the rage for malicious attackers. From a search engine perspective, the content is what matters. Malicious attackers will pull sites’ contents and embed it in their site, and that gives them a high search-engine ranking, which gives them a higher reputation,” says Chenette. “We’ve been seeing that quite a lot recently. Of course, search engine poisoning is quite old, but now reputation sites [such as Digg] that use CAPTCHA are being targeted.”

So with all these problems, all these new ways to attack users both by e-mail and on social networks and blogs, is there any hope for CAPTCHA?

No, not really.

“I think my view on this now is that time is definitely running out for current CAPTCHA systems; already they are not as effective as they once were,” says Wood. “It’s already becoming more difficult for real customers to use them successfully, and they continue to come under increasing pressure from spammers.”

Chenette goes further: “CAPTCHA has been broken for the last year and a half. The technology has really not progressed. They’ve got a little bit harder but the hackers have made programs that can easily break them. This works both with print and audio CAPTCHA. All of these have been broken in one way or the other.”

Chenette says it’s a “fundamental problem with no simple answer.” After all, “harder CAPTCHA solutions mean harder problems for people as well.” And he believes that “the idea behind CAPTCHA may need to be part of a solution.”

Chenette doesn’t expect that a one-size-fits-all solution will emerge, however. “Each site will have to choose its own answer. Financial sector sites, for example, will be more difficult than a free social-networking site,” he notes.

Wood expects to see CAPTCHA replaced soon. “I would expect to see some sites introducing new techniques to replace the existing CAPTCHA models, maybe as early as the beginning of next year, perhaps involving 3-D spatial perception, such as the one created by SpamFizzle,” he says.

And if that fails in its turn, well, there’s always CAPTCHAs like the one used by Quantum Random Bit Generator Service. You do know your math through at least calculus … right?

A version of this story was first published in ComputerWorld.

July 11, 2008
by sjvn01
1 Comment

UMPCs and Linux: made for each other, and coming soon

Who knew that the biggest desktop Linux show of 2008 would turn out to be the June Computex show in Taipei, Taiwan, where the next generation of Linux desktop hardware was put on display? In fact, Linux was at the heart of no fewer than four different ultra mobile PCs (UMPC).

At the show, Intel introduced the next two members of its Diamondville Atom processor family. The first to arrive was the N270, which is meant for what Intel calls Netbooks and the rest of the world calls UMPC. The other Diamondville processor, the N230, is meant for mobile Internet devices (MID). Both chips are meant for lightweight (under four pounds) portable computers with battery lives of three hours and up.

The N270 powers four soon-to-ship Linux-powered PCs: Asus’s two new Eee PCs, the Eee PC 901 and 1000; MSI’s entry into the field, the N270; and the Acer Aspire One.

The Eee PC 901 comes with an 8.9-inch screen, a gigabyte of RAM, a 20GB solid state disk (SSD), a built-in 1.3-megapixel webcam, built-in Bluetooth connectivity, and 802.11n Wi-Fi. The 1000H comes with a Xandros-based Linux operating system or XP Home. The 1000H offers a 10-inch screen and 2GB of RAM, but is otherwise pretty much the same system as the 901. An 80GB hard drive is also an option. The 1000H is priced at $679, while the 901 goes for about $629. Like previous Asus Linux-powered UMPCs, the new Asus systems run a variant of Xandros Linux.

Finding these systems today is a challenge — I was unable to find any US resellers who had any in stock — but most vendors are promising shipments in one to two weeks.

The MSI Wind N270, a.k.a. NB-Linux, uses the 1.6GHz Intel Atom N270 CPU and 1GB of DDR2 667MHz memory, with an upgrade to 2GB possible. Unlike Asus, MSI is continuing to use conventional hard drives instead of SSDs. The Wind N270’s default storage device is a 80GB hard drive.

For a UMPC, the Wind has a good-sized screen: 10 inches wide with 1024×600 resolution. For networking it supports 802.11b/g Wi-Fi. Like almost all UMPCs these days, the Wind also comes with a 1.3-megapixel webcam. Its operating system is Novell’s SUSE Linux Enterprise Desktop (SLED) 10 SP2.

MSI promised the Wind would go on sell in May. Now the company, citing a lack of parts, is predicting mass availability of the mini-laptops by late July. It may be later still; Amazon.com is advising would-be buyers not to expect shipments for three to five weeks. When they appear, you can expect to pay about $500 for this UMPC.

Curiously, a twin to the MSI Wind N270, the Advent 4211, is already available in the UK. The Advent 4211, however, is sold by UK retailer PC World as a Windows XP Home-only system. Presumably, the Advent would work with SLED, but UK Linux hackers are spending their time on porting Ubuntu 8.04 to the Wind and Advent UMPCs.

The Acer Aspire One runs the little-known Linpus Linux distribution. The Aspire One will come with 512MB or 1GB of RAM, 8GB of SSD, an 8.9-inch, 1024×600 display, 802.11b/g Wi-Fi, and a webcam. Buyers also have the option of an 80GB hard drive. Eventually, but not in the first release, Acer will offer 3G cellular wireless connectivity as an option, and the company is considering making 802.16e mobile WiMAX an option.

Like the other Atom-powered UMPCs, the Aspire One was supposed to have shipped by now, but it hasn’t. Acer assures would-be buyers that it will be out Real Soon Now. Come the day the Aspire One shows up, it’s pricetag will be about $500 with all the goodies.

A host of other vendors, most notably Dell, plan to release Linux-powered UMPCs this summer. Sources close to Dell confirm that its will be releasing two “Dell E” systems that will use Ubuntu 8.04. The first Atom-powered model is aimed at the growing UMPC market with a price point around $300.

The Dell E Slim, however, seems to be targeting the MacBook Air high-end laptop market. Sources say that this luxury UMPC will be just 0.8 inches thick but will include a 12.1-inch display, a choice between the 1.3 or 1.6GHz Atom processors, an 8GB SSD or a 40GB hard drive, 1GB to 2GB of RAM, 802.11g and n Wi-Fi, and mobile WiMAX support.

Officially, Dell has no word on these plans. Come August, about the same time the other Atom-powered Linux UMPCs actually arrive, you can expect to see Dell Ubuntu Linux-powered UMPCs on sale.

A version of this story first appeared in NewsForge.

July 10, 2008
by sjvn01
0 comments

Why openSUSE 11 is the Linux for me

Recently, my colleague James Turner reviewed openSUSE 11 and he liked it. It’s hard to tell from some of the notes he got back-shame on you people!–but he really did.

I, on the other hand, love openSUSE 11 and since Warren Woodford, the developer behind MEPIS, has had to put his great Debian-based Linux distribution on the back-burner for now, openSUSE 11 has become The Linux distribution as far as I’m concerned.

Why? Well, for me, openSUSE is easy to install. Yes, you need to decide if you want to use LVM (Logical Volume Manager) for storage, and that is a mysterious question for new users. But, as Turner points out, all you need do is click on the default choice instead and in a few minutes you’re in business.

More >

July 10, 2008
by sjvn01
1 Comment

Preventing DNS Poisoning in Linux

If you don’t think the recent discovery of the DNS cache-poisoning flaw is bad news and needs to be addressed as soon as possible, let me repeat what Paul Mockapetris, DNS’ (Domain Name System) inventor, had to say about this security hole: Patch your DNS servers right now.

CERT can tell you about the technical details of DNS cache-poisoning, here’s what an attack on a DNS server can mean to you according to Dan Kaminsky, a researcher at security services firm IOActive: The vulnerability could allow attackers to redirect Web traffic and e-mails to systems under their control.

In other words, you click on your bookmark for Google and you end up at a site that looks like Google but is loaded down with malware. Or, you go to what looks like your bank site, the URL is the right one for your bank, but when you enter in your account ID you’ve just given it to a rip off artist.

Continue Reading →

July 9, 2008
by sjvn01
0 comments

Developing Open-Source Business Policies That Work: Everyone Is Making It Up As They Go Along

We know your company uses open-source applications. We also know many of you already have an open-source policy. Sort of. As CIO.com discovered when researching the adoption of open-source in enterprise IT, a quarter of respondents have a formal policy in place to control how such software is chosen, supported and deployed. Another 18 percent expected to adopt such a policy in the next 12 months. But those who have some kind of policy aren’t necessarily thrilled with it; just 45 percent said their policies are very effective.

“Somewhat effective” policies are like “somewhat effective” security; clearly, there’s more to be learned. CIO.com asked CIOs and other people in the trenches about what’s working—and what’s not working—with their open-source usage policies. We found that most people don’t really have a formalized policy. What they do have, though, are common concerns. Considered carefully, these issues should help you get a handle on how to better manage open-source software in your company. Once that’s out of the way, you’re in a better position to decide what you want in a formal policy that’s right for your own company.

More >

July 9, 2008
by sjvn01
1 Comment

Building Linux Software the easy way: OpenSUSE Build Service

Let’s say you want to write an easy-to-install program for any Linux distribution. That’s a a problem. There is no single, easy way to install software for all versions of Linux OpenSUSE thinks it has an answer: the openSUSE Build Service.

The openSUSE project, the community Linux distribution supported by Novell, announced the release of its openSUSE Build Service 1.0 on July 7th. The first major release of the Build Service provides developers with direct access to the code repositories for the openSUSE Linux distribution.

Access to code is nice, but this is open source, we always have access to code. What’s more interesting is that the build service enables developers to build programs for different hardware platforms without a “compiler farm” of different hardware. It also provides automatic resolving of dependencies to other packages. If a program depends on another package, say a KDE application on a Trolltech Qt library, the KDE application will be rebuilt automatically if its Qt library is changed and rebuilt. That takes a lot of the drudgery out of building Linux applications .

Continue Reading →