Why is wireless security so difficult?

Dwight Silverman just set up a new PC for his parents. It’s the thankless job that all geeks do; in fact, I think Dwight was really smart to get this over with now, so he can enjoy the holidays more.

One aspect of the setup struck me in its absence, and I asked about it in the comments section of Dwight’s original post. Did he enable the security settings on the folks’ new wireless router? Yes, but only the old and very weak WEP instead of the newer and more secure WPA and WPA2 standards.

I don’t knock Dwight for making this choice. Setting up WPA is still too hard, and it can take a long time to get all the hardware talking properly.

Two years ago, around the time that Windows XP SP2 came out, Microsoft announced a standard called Windows Connect Now, which was supposed to make it ridiculously easy to set up WPA security with a USB flash key. So far, though, only one router supports the standard, D-Link’s DI-624S. And it doesn’t work as advertised.

There is a workaround that allows you to use the wizard and a flash key to set up WPA on a network even when the router doesn’t support the standard. I’ll try to post those instructions later this week.

Meanwhile, shame on the router community for not making it easier to turn on effective security.

One patch next Tuesday

The Microsoft Security Response Center Blog highlights the advance notification for security bulletins due next week (Patch Tuesday).

Good news: There’s one and only one patch.

Bad news: It’s a Critical Update for Windows.

Good news: “We don’t expect this update to cause a reboot and it can be deployed and detected with MBSA, Microsoft Update, and WSUS.”

Update: Microsoft’s Mike Reavey says there will be no patches next week:

This afternoon we revised the information in the Advance Notification to reflect a change for next week’s release. Microsoft will not be issuing any new security updates on September 13th as part of the September monthly bulletin release cycle. You can check out the revised information here.

So, why did we do this? Let me explain. Late in the testing process, we encountered a quality issue that we decided was significant enough that it required some more testing and development before releasing it. We have made a commitment to only release high quality updates that fix the issues at hand, and therefore we felt it was in the best interest of our customers to not release this update until it undergoes further testing.

I have a great deal of respect for the people who do this thankless job. If they put out a patch that causes problems on a significant number of machines – hell, on any machines – they take heat. If they delay a patch for quality reasons, they take heat. Ultimately, someone had to make a pretty tough decision here.

Employees unleashing viruses on purpose?

I’m always suspicious when someone selling security services tries to tell me how serious a particular security problem is. For the latest case in point, see this week’s Computerworld:

A recent study sponsored by Risk Control Strategies, a threat management and risk assessment firm, found that an overwhelming majority of 223 security and human resources executives who manage between 500 and 900 employees said workplace violence is a bigger problem now than it was two years ago. As a result, 23% said employees have intentionally and maliciously downloaded viruses over the past 12 months.

That seems really, really high to me, and it makes me doubt the rest of the study as well. If this sort of deliberate virus attack were really happening all that often, wouldn’t you think we would hear more specific examples? Wouldn’t some people have been arrested? I have no data to back this up, but it sure seems more logical that viruses attack organizations because the underlying security systems are faulty and users haven’t been trained in how to avoid risky behavior.

I found the original report (undated but apparently published earlier this year). It claims that in the same sample of businesses, approximately 65% had one or more employees who made verbal threats against senior management in the last 12 months and 36% had experienced “electronic assault/death threats to senior management.” I know the world has gone mad and all that, but I have a hard time believing there are that many psychos in the world.

I definitely don’t want to minimize the problem, but it is noteworthy that this company has a very full menu of (presumably very expensive) services designed to reduce workplace violence.

(via Techdirt)

Worm attacks ABC, CNN, New York Times

Last week, Microsoft issued a critical update for a serious vulnerability in Windows 2000 and versions of Windows XP before Service Pack 1. Today, a worm that exploited that vulnerability hit some of the United States’ media giants:

A computer worm shut down computer systems running the Windows 2000 operating system across the United States on Tuesday, hitting computers at CNN, ABC and The New York Times.

Around 5 p.m. computers began crashing at CNN facilities in New York and Atlanta. ABC said its problems began in New York about 1:30 p.m.

There is no excuse for these companies being unprepared for this. After CodeRed and Sasser and Blaster and other similar worms, the IT departments at these companies should have been ready to deploy critical updates like this one for any operating system, not just Windows. We’ve known for years that exploits like these can be go from proof-of-concept code to a full-fledged destructive worm almost literally overnight, as this outbreak proves once again. Even if they weren’t prepared to deploy a patch immediately, basic firewall software and a network configuration that blocks ports 139 and 445 from entering the network (all documented in the Workarounds section of this security bulletin) could have prevented the spread of this worm.

If you’re running Windows 2000, better check your security settings. You’re definitely at risk.

Trash your PC because of spyware? Rubbish!

This post is from guest blogger Carl Siechert:

On Sunday, the New York Times published “Corrupted PC’s Find New Home in the Dumpster”:

“I was spending time every week trying to keep the machine free of viruses and worms,” said Mr. Tucker, [an Internet industry executive who holds a Ph.D. in computer science and] a vice president of Salesforce.com, a Web services firm based here. “I was losing the battle. It was cheaper and faster to go to the store and buy a low-end PC.”

Until Mr. Tucker secures his computer (with a firewall, automatic updates, and an antivirus program), he’s soon going to have the same problems with his new computer. In his case, since he apparently can’t say no to installation of unwanted software, he ought to add an antispyware program to the arsenal.

In the face of a constant stream of pop-up ads, malfunctioning programs and performance slowed to a crawl or a crash – the hallmarks of spyware and adware – throwing out a computer “is a rational response,” said Lee Rainie, director of the Pew Internet and American Life Project.

No, it’s not a rational response, whether you’re looking at it from an environmental perspective or merely a technical one. Clean up your mess (or hire someone who can; the article reports the cost of professional cleanup averages $129, which is still only a third the price of the cheapest replacement computer), set up a few basic protections, and learn to not click OK to every installation prompt that pops up.

More on Microsoft and Claria

This is a follow-up to my earlier post about the rumor that Microsoft is negotiating to buy Claria. Claria actually has five product lines:

  • The GAIN advertising network, which serves pop-up ads.
  • BehaviorLink, another advertising network which says it delivers ads that are “targeted based on consumer behavior.” These are not pop-ups but can include audio, animation, and Flash as well as HTML.
  • Feedback Research, a marketing research company that claims to be able to produce “in-depth analytics of anonymous consumer Web usage patterns,” based on “actual behavior of tens of millions of anonymous Internet users across more than 60 million domains.”
  • A software division that distributed a variety of utility programs, most of which are designed as vehicles to deliver GAIN Network ads to anyone who installs the free version of these programs.
  • A handful of me-too Web properties: a search engine and two comparative services intended to help consumers find schools and compare prices.

The two ad networks are obviously profitable, but they’d be a toxic acquisition for Microsoft and would undo every bit of goodwill they’ve built up over the past few years. The security and privacy communities would have plenty to scream about. Feedback Research can at least stay behind the scenes, but the source of their data is ethically questionable, making it difficult to see how Microsoft could continue to gather it and still maintain that it was not a spyware vendor. Ben Edelman agrees:

A November 2003 eWeek article reported that Claria’s then-12.1 terabyte database was already the seventh largest in the world — bigger than Federal Express, and rivaling Amazon and Kmart. Claria recently told Release 1.0 its database is now 120 terabytes, the fifth-largest commercial Oracle database in the world. All very interesting, and perhaps troubling to those who worry about illicit use of such detailed data. But why would Microsoft invite this unnecessary privacy firestorm?

The most interesting asset, in my opinion, is the oldest one of all: the Gator eWallet program. This is actually a tremendously useful program (although I prefer RoboForm). The paid version of Gator works well and doesn’t serve any ads at all. If it were free and ad-free, it could be an excellent tool for helping Windows and Internet Explorer users navigate the maze of passwords and forms on Web sites and thereby increase the likelihood that people will choose secure passwords. But the MSN toolbar already has some form-filling capabilities, and adding Gator-like features to IE can’t be that difficult.

Ultimately, though, as Ben points out, the question comes down to the rumored $500 million price tag. What does Claria have that’s worth that much money and can’t be developed either in-house or through a less tainted source? Nothing. Which is why I seriously hope the deal will fall apart.

Why does Comcast need my Social Security number?

We’re moving in a few weeks, into a neighborhood where Comcast provides cable and Internet service. The good news is they have high-speed access and high-definition DVR service. The bad news is that Comcast insists I have to give them my Social Security number before they’ll start my service.

The sales rep says the company doesn’t run a credit check or actually do anything with the information. Instead, they use it as an identity check so that a third party can’t make changes to my service.

Are they insane? Identity theft is a real problem, and the Social Security Administration cautions, “You should be careful about sharing your number with anyone who asks for it (even when you are provided with a benefit or service).” They specifically caution against companies like Comcast doing this:

If a business or other enterprise asks you for your SSN, you can refuse to give it. However, that may mean doing without the purchase or service for which your number was requested. For example, utility companies and other services ask for a Social Security number, but do not need it; they can do a credit check or identify the person in their records by alternative means.

Giving your number is voluntary, even when you are asked for the number directly. If requested, you should ask why your number is needed, how your number will be used, what law requires you to give your number and what the consequences are if you refuse. The answers to these questions can help you decide if you want to give your Social Security number. The decision is yours.

The rep I talked to said it’s “policy.” No, I can’t talk to a supervisor, but he’ll have someone call me back. We’ll see what happens.

This is not the Windows AntiSpyware Beta you’re looking for

A new version of the Windows AntiSpyware Beta is now available for download. This isn’t the long-awaited Beta 2, but instead is a refresh of Beta 1:

In this second beta refresh (Build 1.0.613), we’ve made other enhancements to the detection and removal capabilities, including improved Winsock LSP removal capabilities and support for long descriptions of categorized software. In addition, we have also extended the Windows AntiSpyware beta expiration date to December 31, 2005. 

Mary Jo Foley at Microsoft Watch quotes a Microsoft executive as saying Beta 2 will be released “some time later this year.” If you already have Microsoft AntiSpyware installed, it should update itself. If you are thinking about trying it out, this is the one to download.

Update: More details about changes in this version are available at Steve Dodson’s Weblog.

Sometimes it’s best to just start over

Brian Krebs writes about his experience trying to clean up a PC that was infested with malware:

I just spent nearly seven hours doing emergency surgery on a Windows PC that belongs to a dear, longtime friend. The experience was so harrowing that I decided to blog it.

Been there, done that. And never again. Here’s a partial list of what Brian found:

  • The user had not installed any Windows updates since mid-2003 (so, obviously, no Service Pack 2).
  • Antivirus software was installed but hadn’t been updated for months.
  • An Ad-Aware scan found three pages of “scary-looking toolbars, start-page hijackers and pop-up generators.”
  • Spybot S&D refused to download updates.
  • The machine was infected with CoolWebSearch.
  • EZ Anti-Virus found 38 threats, “including several very serious computer worms and viruses.”
  • And so on and on and on…

Brian could have spent seven days trying to clean up this computer and not been successful. I can practically guarantee that despite his well-intentioned efforts, this computer is still compromised. If you ever encounter a PC with even a fraction of the symptoms displayed in this case, the solution is simple:

  1. Back up as much data as you can.
  2. Reformat the hard drive.
  3. Reinstall Windows with all current security patches.
  4. Reinstall all software.

It would have taken much less than seven hours, and he would have been certain that the effort was worth it. Trying to clean up a machine that is “owned” by someone else – in this case, by many others – is an exercise in futility. Don’t bother.