Category Archives: Security

50km wireless link for Farallon Islands

I thought I wrote about this before but it doesn’t seem to show up anywhere. Tim Pozar gave an excellent presentation on how he and Matt Peterson built a wireless link from San Francisco to the Farallon Islands.

WMV and PDF available from NANOG49

The presentation will cover the requirements for a very limited budget and power consumption, issues of remote deployments, long distance microwave links over the ocean, sensitivity to the largest breeding colony the contiguous United States.

Additional network topics will be the requirement to support various services on the island via VLANs, fiber deployment to overcome distance and lightning, RF path calculations, “tuning” of the radio modulations schemes to provide the best up-time and remote support of a location that may only be accessible once a month.


Sailing around the Farallon Islands: Photo by me

PuTTY fixes password leak

An update just has been released: version 0.62

PuTTY 0.59 to 0.61 inclusive had a bug in which they failed to wipe from memory the replies typed by the user during keyboard-interactive authentication. Since most modern SSH-2 servers use the keyboard-interactive method for password logins (rather than SSH-2’s dedicated password method), this meant that those versions of PuTTY would store your login password in memory for as long as they were running.

PuTTY 0.62 fixes this bug. Keyboard-interactive responses, including passwords, are now correctly wiped from PuTTY’s memory again.

Exploitability of MS11-083

I noted the anonymous bug revealed by Microsoft called a Vulnerability in TCP/IP that could Allow Remote Code Execution has been given a couple caveats of perimeter controls and performance.

This month we released MS11-083 to address an externally found reference counter issue in TCP/IP stack.

[…]

…we believe it is difficult to achieve RCE using this vulnerability considering that the type of network packets required are normally filtered at the perimeter and the small timing window between the release and next access of the structure, and a large number of packets are required to pull off the attack. As a result, we assign an Exploitability Index of “2” for this vulnerability.

A claim of inconsistent results, which justifies a 2 rating, also begs questions of who found it and how.

Funnel Triples Wind Turbine Output

Wind LensIt has a fancy name and design but as you can tell from the photo it is a simple innovation based on a reverse funnel effect. Cleantechnica reports:

The Wind Lens works by creating an area of low pressure behind the turbine that essentially sucks the wind through the turbine, increasing effective wind speed. As wind power is proportional to the wind speed cubed, the wind lens changes the fluid dynamics around the turbine to increase its power.

Can we expect to see datacenters designed around tubines in the near future? Both new power and cooling solutions may be found by engineers trying to harness the wind. I envision a tunnel that flows through a datacenter to power turbines yet also pull heat out and away.

I’ve already written about the overproduction of power from wind turbines in Germany that has forced them to export energy to their neighbors.

Now the Japanese appear ready to take the issue even further by dropping the cost of wind energy below nuclear energy and forcing a giant shift in risk calculations.

Imagine: no more dirty coal power, no more mining deaths, no more nuclear disasters, no more polluted aquifers as a result of fracking.

Fair enough but don’t forget to imagine instead some new risks such as climbing up giant turbines to service them, the impact to weather and wildlife