OPINION SECURITY File Systems NETWORKING Columns Book
Total Page:16
File Type:pdf, Size:1020Kb
August 2010 VOLUME 35 NUMBER 4 OPINION Musings 2 RikR FaR ow SECURITY Making Sense of Logs 8 R oN DiLLEY THE USENIX MAGAZINE Don’t Take LaTeX Files from Strangers 17 STEPHEN CHECKOWAY, HoVaV SHaCHaM, aND ERiC RESCoRLa SymbianS O Platform Security Model 23 B o Li, ELENa RESHEToVa, aND TUoMaS aURa F ILE SYSTEMS Cephs a a Scalable Alternative to the Hadoop Distributed File System 38 CL aR oS M aLTZaHN, ESTEBaN MoLiNa-ESToLaNo, aMaNDEEP kHURaNa, aLEX J. NELS oN, SCoTT a. BRaNDT, aND SaGE wEiL NETWORKING Improving the Performance and Robustness of P2P Live Streaming with Contracts 50 M iCHaEL PiaTEk aND aRViND kRiSHNaMURTHY C OLUMNS Practical Perl Tools: Random Acts of Kindness 56 Da ViD N. BLaNk-EDELMaN Pete’s All Things Sun: The Status of Sun Products 61 P ETER BaER GaLViN iVoyeur: Pockets-o-Packets, Part 2 67 Da VE JoSEPHSEN /dev/random: A Debatably Helpful Guide to IT Disaster Planning 72 Ro BERT G. FERRELL B OOK reVIEWS Book Reviews 74 ELiZabeth ZwiCkY ET aL. useni X NOTES USENIX Lifetime Achievement Award 77 STUG Award 77 USENIX Association Financial Statements for 2009 78 EL L iE YoUNG C ONFERENCES Reportsn o NSDI ’10: 7th USENIX Symposium on Networked Systems Design and Implementation 80 Report on the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10) 94 2010 Internet Network Management Workshop/Workshop on Research on Enterprise Networking (INM/WREN ’10) 101 9th International Workshop on Peer-to-Peer Systems (IPTPS ’10) 105 BSDCan 2010: The Technical BSD Conference 108 The Advanced Computing Systems Association aug10covers.indd 1 7.14.10 1:46 PM Upcoming Events 9th USENIX symposium on operatIng systems 24th Large InstallatIon system adInIstratIon desIgn and ImpLementatIon (OSDI ’10) ConferenCe (LISA ’10) Sponsored by USENIX in cooperation with ACM SIGOPS Sponsored by USENIX in cooperation with LOPSA and SNIA o Ctober 4–6, 2010, vanCoUver, bC, Canada november 7–12, 2010, San joSe, Ca, USa http://www.usenix.org/osdi10 http://www.usenix.org/lisa10 workshops Co-LoCated wIth OSDI ’10: 9th USENIX ConferenCe on file and storage workshop on sUpportIng dIversIty In systems teChnoLogIes (FAST ’11) researCh (dIversIty ’10) Sponsored by USENIX in cooperation with ACM SIGOPS o Ctober 2–3, 2010 Febr Uary 15–18, 2011, San joSe, Ca, USa http://www.usenix.org/diversity10 http://www.usenix.org/fast11 Submissions due: September 2, 2010 workshop on managIng systems vIa Log anaLysIs and maChIne LearnIng teChnIqUes 8th USENIX symposium on networked systems (m sLa L ’10) desIgn and ImpLementatIon (NSDI ’11) o Ctober 2–3, 2010 Sponsored by USENIX in cooperation with ACM SIGCOMM and http://www.usenix.org/slaml10 ACM SIGOPS mr a Ch 30–april 1, 2011, boSton, MA , USa sixth workshop on hot topics In system http://www.usenix.org/nsdi11 dependability (hotdep ’10) Submissions due: September 16, 2010 o Ctober 3, 2010 http://www.usenix.org/hotdep10 13th workshop on hot topics In operatIng systems (hotOS XIII) orkshop on ower ware ompUtIng 2010 w p a C Sponsored by USENIX in cooperation with the IEEE Technical and systems (hotpower ’10) Committee on Operating Systems (TCOS) o Ctober 3, 2010 m ay 8–10, 2011, napa, Ca, USa http://www.usenix.org/hotpower10 http://www.usenix.org/hotos11 Submissions due: January 15, 2011 2010 workshop on the eConomics of networks, systems, and CompUtatIon (neteCon ’10) Sponsored by USENIX in cooperation with ACM SIGecom o Ctober 3, 2010 http://www.usenix.org/netecon10 5th InternatIonaL workshop on systems software verIficatIon (SSV ’10) o Ctober 6–7, 2010 http://www.usenix.org/ssv10 For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events. aug10covers.indd 2 7.14.10 1:46 PM OPINION Musings 2 R Ik FARROw SECURITY Making Sense of Logs 8 RON DILLEY Don’t Take LaTeX Files from Strangers 17 ST EPHEN CHECkOwAY, HOVAV sHACHAM, AND ERIC RE sCORLA Symbian OS Platform Security Model 23 BO LI, ELENA RE sHEtOVA, AND contents tuOMAs AuRA F ILE SYSTEMS Ceph as a Scalable Alternative to the Hadoop Distributed File System 38 CARLO s MALtZAHN, EstEBAN MOLINA-EstOLANO, AMANDEEP kHuRANA, ALEX J. NEL sON, sCOtt A. BRAND t, AND sAGE wEIL NETWORKING Improving the Performance and Robustness of P2P Live Streaming with Contracts 50 MICHAEL PIAtEk AND ARVIND kRIsHNAMuRtHY C OLUMNS Practical Perl Tools: Random Acts of VOL. 35, #4, August 2010 Kindness 56 Editor ;login: is the official D AVID N. Blank-EDELMAN Rik Farrow magazine of the Pete’s All Things Sun: [email protected] USENIX Association. The Status of Sun Products 61 Managing Editor ;login: (ISSN 1044-6397) is PBEREtER A Galvin Jane-Ellen Long published bi-monthly by the [email protected] USENIX Association, 2560 iVoyeur: Pockets-o-Packets, Part 2 67 Ninth Street, Suite 215, DVEJ A OsEPHsEN Copy Editor Berkeley, CA 94710. Steve Gilmartin /dev/random: A Debatably Helpful Guide [email protected] $90 of each member’s annual dues is for an annual sub- to IT Disaster Planning 72 produCtion scription to ;login:. Subscrip- R OBERt G. F ERRELL Casey Henderson tions for nonmembers are Jane-Ellen Long $125 per year. Jennifer Peterson B OOK reVIEWS Book Reviews 74 Periodicals postage paid at typEsEttEr Berkeley, CA, and additional E LIZABEtH ZwICkY Et AL. Star Type offices. [email protected] POSTMASTER: Send address useni X NOTES USENIX Lifetime Achievement Award 77 usEniX assoCiation changes to ;login:, 2560 Ninth Street, USENIX Association, STUG Award 77 Suite 215, Berkeley, 2560 Ninth Street, California 94710 Suite 215, Berkeley, USENIX Association Financial Statements Phone: (510) 528-8649 CA 94710. for 2009 78 FAX: (510) 548-5738 E YLLIE Oung ©2010 USENIX Association http://www.usenix.org http://www.sage.org USENIX is a registered trade- mark of the USENIX Associa- C ONFERENCES Reports on NSDI ’10: 7th USENIX Symposium tion. Many of the designations on Networked Systems Design and used by manufacturers and Implementation 80 sellers to distinguish their products are claimed as trade- Report on the 3rd USENIX Workshop on marks. USENIX acknowledges Large-Scale Exploits and Emergent Threats all trademarks herein. Where those designations appear in (LEET ’10) 94 this publication and USENIX 2010 Internet Network Management is aware of a trademark claim, Workshop/Workshop on Research on the designations have been printed in caps or initial caps. Enterprise Networking (INM/WREN ’10) 101 9th International Workshop on Peer-to-Peer Systems (IPTPS ’10) 105 BSDCan 2010: The Technical BSD Conference 108 ;LOGIN: AuGust 2010 ARtICLE tItLE 1 AUGUST2010_loginarticles.indd 1 7.14.10 11:19 AM Another d Ay, Another exploit. Today I read that some researchers plan on RikR Fa R ow demoing a rootkit for Android at DefCon 2010. In May, UW and UCSD researchers announced remote control of a car via the diagnostic port [1] and a wireless link. They could disable the brakes totally, apply the brakes to just one wheel (or more), stall the musings engine, and control the display panel. And Rik is the Editor of ;login:. just wait until you learn what can be done [email protected] with your new smartphone. I got interested in computer security because I found it both intriguing and challenging. Under- standing security involves knowledge of program- ming, system administration, OS design and imple- mentation, and networking. Few CS disciplines cross so many boundaries. I’ve done well in the field, but still feel like I am groping in the dark. Visualization Speaking of darkness, I decided to visualize what government-sponsored2 attackers might be using in ;LOGIN: VOL. 35, NO. 4 the near future. It would have been really nice to have a console that was not only used for attack- ing (or, more politely, penetration testing), like Metasploit, but something that displays the status of the systems and networks that may be involved in the attack. Of course, I also imagine that the operator can call up lists of potential attacks and chose to execute an attack with a few keystrokes (real hackers keep their hands on the keyboard— mouses are for sissies). On that note, here goes . Maxim glanced at his smartphone, checked the time, and stubbed out his cigarette. He really hated himself for smoking, but did it for the sharpened focus it seemed to bring. He looked around the stuffy, windowless room, with its piles of books, magazines, and stacks of paper, then turned out the dim LED lamp over his desk. Finally, he lifted the helmet from its rest and settled it into position. Maxim sighed deeply. As usual, he felt enthralled by the display. He appeared to be floating in the depths of space, but instead of stars, collections of brightly colored lights surrounded him. With a couple of keystrokes, he could zoom in on an area and view the tags that provided more detail. Or he could add in overlays that showed the amount of network traffic between any of the targets in his display. Soft pops, crackles, and chimes came from all directions. The UI people had decided that enhanc- AUGUST2010_loginarticles.indd 2 7.14.10 11:19 AM ing the display with sound was a good idea, and Maxim agreed. Humans retain ancient instincts from their hunter-gatherer days, when someone who ignored a cracking branch might miss finding dinner, or quickly become dinner. As new sources of information appeared, they chimed softly, then crackled as more information about the source was added. What Maxim really hated was the thumper. If the back-end AI decided that the attacker had been detected, it not only produced a tremendous crump sound, it also thumped the seat hard enough to jolt his whole body.