OPINION Security Columns Standards Book Reviews
Total Page:16
File Type:pdf, Size:1020Kb
DECEMBER 2008 VOLUME 33 NUMBER 6 OPINION Musings 2 Rik Farrow SECURITY Masquerade: Simulating a Thousand Victims 6 Sam Small, JoShua maSon, Ryan macaRthuR, and Fabian monRoSe THE USENIX MAGAZINE SCADA: Issues, Vulnerabilities, and Future Directions 14 tim yaRdley Highly Predictive Blacklisting 21 Jian Zhang, PhilliP Porr aS, and JohanneS ullRich Investigating Argos 29 Jeffrey beRg, evan teRan, and Sam StoveR Architecture and Threat Analysis of a Campus Wireless Network 36 calvin Ardi and daniel chen CoLUMns Practical Perl Tools: This Column Is Password-Protected. 46 david n. blank-edelman Pete’s All Things Sun: The Death of Solaris 51 PeteR baeR galvin iVoyeur: You Should Write an NEB Module, Revisited 57 david JoSePhSen /dev/random 61 RobeRt g. Ferrell STANDARDs Update on Standards: Diary of a Standards Geek, Part 2 63 nick Stoughton BooK REVIEWS Book Reviews 68 eliZabeth Zwicky et al. USEniX NOTES Thanks to Our Volunteers 72 ellie young ConFERENCES Security ’08 Reports 75 WOOT ’08 Reports 99 EVT ’08 Reports 102 HotSec ’08 Reports 109 Metricon 3.0 114 The Advanced Computing Systems Association DecCovers.indd 1 11/13/08 10:36:40 AM Upcoming Events 1s t Wo r k s h o p o n t h e th e o r y a n d pr a c t i c e o f 6t h USENIX sy M p o s i um o n ne t W o r k e d sy s t e M s pr o v e n a n c e (taPP ’09) de s i g n a n d iM p l e M e n t a t i o n (NSDI ’09) Co-located with FAST ’09 Sponsored by USENIX in cooperation with ACM SIGCOMM February 23, 2009, San FranciSco, CA, uSa and ACM SIGOPS http://www.usenix.org/tapp09 april 22–24, 2009, boSton, Ma, uSa http://www.usenix.org/nsdi09 7t h USENIX co n f e r e n c e o n fi l e a n d st o r a g e technologies (FAST ’09) 12t h Wo r k s h o p o n ho t to p i c s in op e r a t i n g Sponsored by USENIX in cooperation with ACM SIGOPS, sy s t e M s (ho t OS XII) IEEE Mass Storage Systems Technical Committee (MSSTC), Sponsored by USENIX in cooperation with the IEEE Technical and IEEE TCOS Committee on Operating Systems (TCOS) February 24–27, 2009, San FranciSco, CA, uSa May 18–20, 2009, Monte Verità, SWitzerlanD http://www.usenix.org/fast09 http://www.usenix.org/hotos09 Paper submissions due: January 13, 2009 2009 ACM SIGPLAN/SIGOPS international co n f e r e n c e o n vi r t U a l eX e c U t i o n en v i r o n M e n t s 2009 USENIX an n U a l te c h n i c a l co n f e r e n c e (VEE ’09) June 14–19, 2009, San Diego, CA, uSa Sponsored by ACM SIGPLAN and SIGOPS in cooperation with http://www.usenix.org/usenix09 USENIX Paper submissions due: January 9, 2009 March 11–13, 2009, WaShington, D.c., uSa http://www.cs.purdue.edu/VEE09/ 18t h USENIX se c U r i t y sy M p o s i um auguSt 12–14, 2009, Montreal, canaDa fi r s t USENIX Wo r k s h o p o n ho t to p i c s in http://www.usenix.org/sec09 Paper submissions due: February 4, 2009 pa r a l l e l i s M (ho t pa r ’09) March 30–31, 2009, berkeley, CA http://www.usenix.org/hotpar09 23r d la r g e installation sy s t e M ad M inistration co n f e r e n c e (LISA ’09) Sponsored by USENIX and SAGE 8t h international Wo r k s h o p o n pe e r -t o -pe e r noVeMber 1–6, 2009, BALTIMORE, MD, uSa sy s t e M s (IPTPS ’09) http://www.usenix.org/lisa09 Co-located with NSDI ’09 april 21, 2009, boSton, Ma, uSa http://www.usenix.org/iptps09 Submissions due: January 9, 2009 2n d USENIX Wo r k s h o p o n la r g e -sc a l e eX p l o i t s a n d eM e r g e n t th r e a t s (LEET ’09) Co-located with NSDI ’09 april 21, 2009, boSton, Ma, uSa http://www.usenix.org/leet09 Submissions due: January 16, 2009 For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events. DecCovers.indd 2 11/17/08 11:56:12 AM OPINION Musings 2 Rik FArrOw SECURITY Masquerade: Simulating a Thousand Victims 6 SAm Small, JoshuA Mason, ryan MacArThur, and FAbian Monrose SCADA: Issues, Vulnerabilities, and Future Directions 14 TIm yArdley Highly Predictive Blacklisting 21 contents JIan Zhang, Phillip POrr as, and JOhanneS UllrIch Investigating Argos 29 Jeffrey berG, evan Teran, and SAm Stover Architecture and Threat Analysis of a Campus Wireless Network 36 Calvin Ardi and DanieL cheN CoLUMns Practical Perl Tools: This Column Is Password-Protected. 46 DAvid N. Blank-EdeLman Pete’s All Things Sun: The Death of Solaris 51 PeTer Baer Galvin VOL. 33, #6, December 2008 iVoyeur: You Should Write an NEB Module, Editor ;login: is the official Revisited 57 Rik Farrow magazine of the DAvid JosePhSeN USENIX Association. [email protected] /dev/random 61 Managing Editor ;login: (ISSN 1044-6397) is RoberT G. FerreLL Jane-Ellen Long published bi-monthly by the [email protected] USENIX Association, 2560 Ninth Street, Suite 215, STANDARDs Copy Editor Berkeley, CA 94710. Update on Standards: Diary of a Standards David Couzens Geek, Part 2 63 [email protected] $90 of each member’s annual NIck StouGhton dues is for an annual sub- produCtion scription to ;login:. Subscrip- Casey Henderson tions for nonmembers are Jane-Ellen Long $120 per year. BooK REVIEWS Book Reviews 68 Michele Nelson ElizabeTh ZwIcky eT al. Periodicals postage paid at typEsEttEr Berkeley, CA, and additional Star Type offices. [email protected] USEniX NOTES Thanks to Our Volunteers 72 POSTMASTER: Send address Ellie Young USEniX assoCiation changes to ;login:, 2560 Ninth Street, USENIX Association, Suite 215, Berkeley, 2560 Ninth Street, ConFERENCES Security ’08 Reports 75 California 94710 Suite 215, Berkeley, Phone: (510) 528-8649 CA 94710. WOOT ’08 Reports 99 FAX: (510) 548-5738 ©2008 USENIX Association http://www.usenix.org EVT ’08 Reports 102 http://www.sage.org USENIX is a registered trade- mark of the USENIX Associa- HotSec ’08 Reports 109 tion. Many of the designations Metricon 3.0 114 used by manufacturers and sellers to distinguish their products are claimed as trade- marks. USENIX acknowledges all trademarks herein. Where those designations appear in this publication and USENIX is aware of a trademark claim, the designations have been printed in caps or initial caps. ;LOGIN: December 2008 ArTIcLe TITLe 1 Login_DEC08_final.indd 1 11/13/08 10:35:34 AM It’s a beautIful day outsIde, but the nights are tending toward cold. And by Rik Farrow the time you read this column, fall will be changing into real winter. I love this time of year, when overheated summer days have passed and milder weather rules. The change into really cooler weather has musings always felt stimulating to me. These changes got me thinking about the changes [email protected] we’ve seen in the computer industry. Some obvious ones have to do with the price versus performance of desktop computers. Software has changed too, as desktop CPUs became fast enough to include in su- percomputers. Even graphics processors are evolv- ing into array processors useful for calculations having nothing to do with games. But even as there are changes, there are also those things that seem almost changeless. Peek from the Past I started reading an article referenced by Jason Dusek (October 2008 ;login:) by Alan Kay. Kay is one of the creators of SmallTalk, but what really struck me was how he was thinking about comput- ers in 1967 [1]. Kaye envisioned under-five-pound, wirelessly connected tablet computers used specifi- cally for helping children learn. He mused about this in the day when graphical displays were rare, and a computer that could run one was the size of a desk with a mainframe for a backend. Today, SmallTalk runs on the XO as Squeak [2], and it grew directly out of Kay’s ideas surrounding the DynaBook, that tablet computer he envisioned in the 1960s. Kay’s vision included both software and the hard- ware that would support it. And it is really great to learn that this distant vision has actually become reality in some form. But I would like to see more. If you read Kay’s article, you might be struck by how much of the computer architectures of the 1960s remains familiar. Kay worked his way through college as a programmer for the Air Force, using Burroughs mainframes. His second system, a B5000, had segmented storage, high-level language compilers, byte-code execution, automated mech- anisms for subroutine calling and multiprocess switching, pure code for sharing, and memory pro- tection mechanisms. This was in 1961 and should all sound familiar except for the name of the main- frame company. 2 ;LOGIN: vOL.