Communications

The Telecommunications Ball Is Now In Cuba's Court 59

lpress writes: The FCC has dropped Cuba from its exclusion list (PDF), so there are now no restrictions on U.S. telecom company dealings with ETECSA, the Cuban government telecommunication monopoly, or any other Cuban organization. Last week the U.S. sent its second high-level telecommunication delegation to Cuba. The delegates were FCC Chairman Tom Wheeler and other government officials plus representatives of Cisco, Comcast, and Ericsson. Some of the news: there are at least 6 proposals for an undersea cable between Havana and Florida; Cisco has proposed a Network Academy at Cuba's leading computer science university (Chinese infrastructure dominates today); 4G mobile connectivity was discussed and Google was conspicuously absent. The time for Cuba to act is now — while President Obama is still in office.
HP

Exposed HP LaserJet Printers Offer Anonymous FTP To the Public (csoonline.com) 74

itwbennett writes: In a blog post on Monday, security researcher Chris Vickery outlined the risks associated with networked HP LaserJet printers, which have been made available to the public by the organizations hosting them. 'There are a few free, open source pieces of software that can be used to upload and interact with HP printer hard drives over port 9100. After uploading to a printer, the file can be accessed by ... any web browser... It doesn't take much creativity to realize that even highly illegal materials could be stored this way,' Vickery wrote. CSO's Steve Ragan picked up the thread: A quick search on Shodan to confirm Vickery's findings returned thousands of results.
Hardware Hacking

OpenWrt Turns a $14 Card Reader Into the Smallest Wireless AP (livejournal.com) 43

An anonymous reader writes: The Zsun Wifi card reader is a tiny micro SD card reader with WiFi connectivity. While people managed to access the device's serial console a few months ago, the plan was to eventually run OpenWrt since it's based on the popular Atheros AR9331 WiSoC combined with 64MB RAM and 16MB SPI Flash. A team of Polish hackers have managed this feat, and have now posted instructions to install OpenWrt, as well as other documentation: for example, a description of the board's GPIOs.
Security

FortiGuard SSH Backdoor Found In More Fortinet Security Appliances (fortinet.com) 41

itwbennett writes: Earlier this month, an SSH backdoor was identified in Fortinet firewall appliances. Last week, the company said that the problem was not an intentional backdoor, but the result of a management feature which relied on an undocumented account with a hard-coded password. Now, it has found that the same issue also exists in some versions of FortiSwitch, FortiAnalyzer and FortiCache. They said, "In accordance with responsible disclosure, today we have issued a security advisory that provides a software update that eliminates this vulnerability in these products. This update also covers the legacy and end-of-life products listed above. We are actively working with customers and strongly recommend that all customers using [those] products update their systems with the highest priority."
Networking

Ask Slashdot: Affordable Hardware For Remote-Booting USB Devices? 81

phlawed writes: USB ports are everywhere. It is very convenient for powering low-power devices, and by using a run-of-the-mill phone charger you can easily get 10+ watts or so. In other words: everyone already has the generic power supply and power cable. No issue with voltage or polarity. Perfect for the hobbyist market.

Another ubiquitous power source (in the enterprise environment) is Power over Ethernet. Active PoE splitters for 12V output are available for ~6-7 USD and up on eBay. With PoE you get networking and power over the same wires, and booting your (possibly borked) PoE device is a matter of instructing the PoE source to cycle the power on that port. (Also, USB chargers with 12V input are available for less than 1 USD on eBay. They are likely all crap, though.)

I am looking for the combination of these two concepts in a compact, affordable, quality product. I found one product offering USB power from PoE. That product appears to have left out Ethernet and has a MSRP of 30 USD. Otherwise, I find PoE wall sockets for a MSRP of USD 100 or more. It appears excessive, given the cost figures of the pieces listed above.

So, if it does not already exist... anyone feel like running with this on your favorite crowdsourcing platform? Any experienced electronics people who can do a back-of-the-envelope calculation for cost of parts and assembly?
Hardware Hacking

Sys-Admin Dispenses Passwords With a Banana (thenewstack.io) 89

An anonymous reader writes: A network administrator in Denmark is requiring users to perform a finger press on a banana to receive their Wi-Fi passwords. "The banana is mounted and in production," he posted Thursday, sharing two pictures. The banana uses a special new circuit board from Makey Makey to form a connection between the banana and a cheap Raspberry Pi computer with a screen attached, according to one technology site. They note that it could also detect finger presses on a doughnut, an apple, or even Jell-o, and offer this quote from the sys-admin about his motivations. "It's fun... It'll make people smile. It beats a static WPA password in funnyness." And most importantly, "When people leave our office, they can't access our WI-Fi because there's no banana to touch." This guy deserves some kind of award, come July 29th.
Google

For Data Centers, Google Likes the Southeast (datacenterfrontier.com) 63

1sockchuck writes: With new construction projects underway in Alabama and Tennessee, Google will soon have 5 of its 8 company-built U.S. data center campuses located in the Southeast. The strategy is unique among major cloud players, who typically have server farms on each coast, plus one in the heartland. Is Google's focus on the Southeast a leading indicator of future data center development in the region? Or is it simply a case of a savvy player unearthing unique retrofit opportunities that may not work for other cloud builders?
The Internet

Civil Construction Wipes Out Internet Connectivity Across Africa (thestack.com) 61

An anonymous reader writes: Submarine cable operator Seacom has announced that civil construction activity was the cause of widespread outages which left large parts of Africa without internet connectivity yesterday. According to the firm, its Northern Trans-Egypt cable was damaged between Cairo and Alexandria, and the Southern Trans-Egypt route was also disrupted outside of Cairo. Adding to the interruption, Seacom's backup route, the West Africa Cable System (WACS), was also down at the same time, leaving most African countries without connectivity.
Bitcoin

Bank Consortium Successfully Tests Bitcoin Tech (thestack.com) 47

An anonymous reader writes: R3CEV, a startup dedicated to bringing blockchain technology to traditional finance, yesterday ran a successful test of transactions between 11 of the world's largest financial institutions. This represents a big step forward in bringing blockchain, the foundation for Bitcoin, to traditional banking. The test, which connected the banks on a private 'distributed ledger' using Microsoft's cloud-based Azure service, allowed participants to execute sample financial transactions instantly, globally, and without a centralized third-party clearing house. Participants included Barclays, BMO Financial, Credit Suisse, HSBC, Royal Bank of Scotland, TD Bank, UBS, and UniCredit among other leading financial groups.
Networking

Benefits of a Homebrew Router (arstechnica.com) 247

An anonymous reader writes: Jim Salter has posted an article explaining why it can be a good idea to build your own router, and how he put his together. Quoting: "In the consumer world, routers mostly have itty-bitty little MIPS CPUs under the hood without a whole lot of RAM (to put it mildly). These routers largely differentiate themselves from one another based on the interface: How shiny is it? ... I wanted to go a different route. A lot of interesting and reasonably inexpensive little x86-64 fanless machines have started showing up on the market lately. The trick for building a router is finding one with multiple NICs." Once assembled, the homebrew router blows away even high-end SOHO routers for throughput and performance. "Given that nobody's offering any Internet connections over 200mbps in my area yet, that makes my inner crypto nerd dance with glee. I could literally encrypt every single byte of my Internet traffic, in either direction, without a performance penalty." Of course, it won't do wireless, but you can get separate wireless access points to handle that.
Networking

Advantech Industrial Serial-To-Internet Gateways Left Wide Open (rapid7.com) 35

itwbennett writes: Researchers from Rapid7 have discovered a vulnerability in serial-to-IP gateway devices from Advantech that would allow the Internet-connected industrial devices to be accessible to anyone, with no password. In October, the Taiwanese firm patched the firmware in some of these devices to remove a hard-coded SSH (Secure Shell) key that would have allowed unauthorized access by remote attackers. But it overlooked an even bigger problem: Any password will unlock the gateways, which are used to connect legacy serial devices to TCP/IP and cellular networks in industrial environments around the world.
Networking

Tracking Protection In Wi-Fi Networks Coming Soon To Linux 112

prisoninmate writes: Fedora contributor and NetworkManager developer Lubomir Rintel explains how your devices are being identified on a network by a unique number that most of us know by the name of MAC address. Same goes for mobile networking, as your laptop's or mobile phone's MAC address is, in most cases, broadcasted everywhere you go before you even attempt a connection to a wireless network. And that's a problem for your privacy. The solution? Randomization of the MAC address while scanning for Wi-Fi networks. Apple is already using this method on iOS 8 and later mobile operating systems, and so is Microsoft in Windows 10, so Linux users will ["likely"] get it in the upcoming NetworkManager 1.2 release.
AMD

AMD Unveils 64-Bit ARM-Based Opteron A1100 System On Chip With Integrated 10GbE (hothardware.com) 98

MojoKid writes: AMD is adding a new family of Opterons to its enterprise processor line-up today called the Opteron A1100 series. Unlike AMD's previous enterprise offerings, however, these new additions are packing ARM-based processor cores, not the X86 cores AMD has been producing for years. The Opteron A1100 series is designed for a variety of use cases and applications, including networking, storage, dense and power-efficient web serving, and 64-bit ARM software development. The new family was formerly codenamed "Seattle" and it represents the first 64-bit ARM Cortex-A57-based platform from AMD. AMD Opteron A1100 Series chips will pack up to eight 64-bit ARM Cortex-A57 cores with up to 4MB of shared Level 2 and 8MB of shared Level 3 cache. They offer two 64-bit DDR3/DDR4 memory channels supporting speeds up to 1866 MHz with ECC and capacities up to 128GB, dual integrated 10Gb Ethernet network connections, 8-lanes of PCI-Express Gen 3 connectivity, and 14 SATA III ports. AMD is shipping to a number of software and hardware partners now with development systems already available.
Verizon

Verizon Accused of Helping Spammers By Routing Millions of Stolen IP Addresses (spamhaus.org) 120

An anonymous reader writes: Spamhaus, an international non-profit organization that hunts down spammers, is accusing Verizon of indifference and facilitation of cybercrime because it failed for the past six months to take down stolen IP routes hosted on its network from where spam emails originated. Spamhaus detected over 4 million IP addresses, mainly stolen from China and Korea, and routed on Verizon's servers with forged paperwork. Spamhaus says, "For a start, it seems very strange that a large US-based ISP can be so easily convinced by abusers to route huge IP address blocks assigned to entities in the Asian-Pacific area. Such blocks are not something that can go unnoticed in the noise of everyday activity. They are very anomalous, and should call for an immediate accurate verification of the customer. Internal vetting processes at large ISPs should easily catch situations so far from normality."
Networking

SSH Backdoor Found In Fortinet Firewalls (arstechnica.com) 71

An anonymous reader writes: The IT community was shaken a few weeks ago when Juniper Networks firewalls were found to contain "unauthorized code" that seemed to enable a backdoor. Now, Fortinet firewalls have been found to contain an apparent SSH backdoor as well. "According to the exploit code, the undisclosed authentication works on versions 4.3 up to 5.0.7. If correct, the surreptitious access method was active in FortiOS versions current in the 2013 and 2014 time frame and possibly earlier, based on this rough release history. The weakness was eventually patched, but so far, researchers have been unable to locate a security advisory that disclosed the alternative authentication method or the hard-coded password." A spokesperson for Fortinet told El Reg, "This was not a 'backdoor' vulnerability issue but rather a management authentication issue."
Bug

After Two Fixes, OAuth Standard Deemed Secure (net-security.org) 19

An anonymous reader writes: OAuth 2.0 is one of the most used single sign-on systems on the web: it is used by Facebook, Google, Microsoft, GitHub and other big Internet companies. A group of researchers from University of Trier, Germany, have performed the first formal security analysis of the OAuth 2.0 standard, and have discovered two previously unknown attacks that could be mounted to break authorization and authentication in OAuth. However, says the article, "[w]ith these problems solved, the researchers ultimately concluded that OAuth 2.0 is secure enough to provide both authorization and authentication -- if implemented correctly."
Graphics

After Years of Serving X11, X.Org Stands To Lose Its One-Letter Domain (phoronix.com) 140

An anonymous reader writes: The X.Org domain predates the X.Org Foundation. It was used in the '90s as a destination by The Open Group around the X Window System. While many are expecting Mir and Wayland to eventually succeed the X.Org Server, it seems the X.Org/X11 Server may outlive the valuable domain. Thanks to poor management by the X.Org Foundation, they risk losing access to their one-letter domain. Procrastination, paired with not transferring the domain when forming the non-profit foundation, has led to a last-minute mess. They left the domain registered for years to a person who is no longer involved with X.Org — and doesn't want to relinquish it. In the few days until the domain expires, they are hoping for a "Hail Mary." Let this be a lesson for open-source projects to better manage their assets.
The Internet

Cuba's Nationwide Sneakernet: a Model For Developing Nations? 108

lpress writes: Cuba has little Internet infrastructure, but they have a well-organized sneaker net called El Paquete Semanal (the weekly packet). El Paquete distributes a terabyte of digital entertainment nationwide every week using portable drives. The system is reliable and the organization is said to be Cuba's largest private employer, but it is technically illegal and the content is pirated. A legitimatized Paquete would save scarce Internet resources for other applications. El Paquete is also a possible model for other developing nations. Vox has a short documentary about the system.

Enterprise Datacenter Hardware Assumptions May Be In For a Shakeup (acm.org) 100

For the entire careers of most practicing computer scientists, a fundamental observation has consistently held true: CPUs are significantly more performant and more expensive than I/O devices. The fact that CPUs can process data at extremely high rates, while simultaneously servicing multiple I/O devices, has had a sweeping impact on the design of both hardware and software for systems of all sizes, for pretty much as long as we've been building them. This assumption, however, is in the process of being completely invalidated.
Networking

The Network Revolution Needed For Remote Surgery (thestack.com) 103

An anonymous reader writes: IEEE researchers are proposing new standards for haptic codecs over software-defined 5G networks in order to achieve the ambitious 1ms latency and reliability required for the 'tactile internet'. It's a trivial consideration when hugging chickens over a network, more serious for applications of telesurgery, and a proposed leap in network quality that seems likely to yield benefits for general data streams as well.

Slashdot Top Deals