Resident of the world, traveling the road of life
63801 stories
·
21 followers

Merchants Are Getting People Killed

jwz
1 Share
Streetsblog:

No American city has the guts to commit to what Paris did and I'm going to be frank as to why.

The number one obstacle to any safety improvements is local merchants. Business owners and the merchant class believe that any customers they get are drivers. They are unswayed by research consistently showing that increased foot traffic and alternative travel to commercial areas increase their profit. Part of this is because merchants are just as car-brained as the general population. But the other half is that merchants disproportionately listen to their patrons who drive and complain about parking. Transit riders, cyclists and pedestrians don't advertise to merchants that they didn't arrive by car.

Though small in number, the elected interests of most local cities give disproportionate attention to business interests and their pro-driving beliefs. Even in progressive Berkeley, home of many climate scientists from the university, transportation decisions are dictated by science illiterates and business interests, not the city's intellectuals. When Berkeley proposed building a bike lane in my neighborhood, which has no protected bike lanes near a prominent middle school, many locals went uncharacteristically nuts. Plastered on neighborhood businesses were conspiracy theories about a United Nations agenda to force people into plastic cities where they won't be allowed to own cars. Every other lawn has signs proclaiming economic ruin if drivers are forced to park a whopping 30 seconds away on side streets rather than directly in front of businesses. [...]

Sadly, history is repeating itself in San Francisco. Business interests in the West Portal neighborhood where the family was wiped out by a car are already organizing to stop any improvements to the street. This is a major transit hub in S.F., developed before cars were even in mass use, yet the jurisdiction of drivers knows no bounds. If there can't be a car-free commercial strip in West Portal, there can't be one anywhere in America. Some business groups see the death of that family as merely an unavoidable consequence, a price paid to ensure drivers don't have to walk an additional 30 seconds from parking on a side street to reach their shops.

Previously, previously, previously, previously, previously, previously.

Read the whole story
mkalus
6 hours ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

Mariott so: Sagten wir AES-verschlüsselt? Wir meinten ...

1 Share
Mariott so: Sagten wir AES-verschlüsselt? Wir meinten SHA-1-"verschlüsselt"!

Während Heise da den gerechten Zorn auspackt, dass die verschlüsselt sagen aber gehasht meinen, was in der Tat nicht eine Kategorienfehler ist, möchte ich noch ein paar zusätzliche Dinge anmerken.

Wenn jemand behauptet, die Datenbank sei verschlüsselt, oder der Speicher der VM sei verschlüsselt, ist das immer eine riesige rote Warnlampe. Mit an Sicherheit grenzender Wahrscheinlichkeit ist das eine Lüge.

Denn wenn die Daten in der Datenbank sind, dann damit man sie da wieder rausholen kann. Wenn die also tatsächlich verschlüsseln, dann muss der Schlüssel daneben liegen. Wer die Datenbank raustragen kann, kann wahrscheinlich auch den Schlüssel raustragen.

Ich finde daher die viel wichtigere Frage, wieso die Datensätze überhaupt in der Datenbank lagen. Konkret geht es um "Bezahlkartendaten und Reisepassnummern". Ich bin mir fast sicher, dass Mariott an den Passnummern überhaupt kein Interesse hat, und die bloß gespeichert hat, weil irgendwelche ekelhaft datenhungrigen Landesregierungen darauf bestehen, diese Daten zu sammeln. Wir sollten alle mal ein ernstes Wort mit unseren gewählten Repräsentanten reden, um das schnellstmöglich abzustellen.

Das ist ein Hotel. Die müssen nicht wissen, wer ich bin. Die müssen auch meine Kartennummer nicht wissen. Die Zahlung erledigt ein Dienstleister. Es reicht, wenn der die Kartennummer kurzzeitig erfährt (UND NICHT SPEICHERT).

Ich finde es geradezu beruhigend, wenn Mariott überhaupt auf die Idee kam, die Daten gehasht abzulegen. Nun liegt der Vorfall schon über 10 Jahre zurück, und SHA-1 gilt inzwischen als kompromittiert. Aber immerhin.

Besser als Hashen ist Hashen mit Salt. Wenn ihr überlegt, wie ihr Daten hashen sollt, um sie irgendwo abzulegen, nehmt heutzutage lieber argon2. Oder besser: GAR NICHT ERST ABLEGEN. Daten, die da nicht rumliegen, kann niemand klauen.

Read the whole story
mkalus
9 hours ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

Saturday Morning Breakfast Cereal - Sit Down

2 Shares


Click here to go see the bonus panel!

Hovertext:
I do check to see what became of the PLiF guys every six months or so.


Today's News:
Read the whole story
mkalus
13 hours ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

The Radiant Future! (Of 1995)

2 Shares

The AI hype in the media obscures the fact that we're clearly in another goddamn venture capital bubble right now.

As the Wall Street Journal said earlier this month (article is paywalled), "... In a presentation earlier this month, the venture-capital firm Sequoia estimated that the AI industry spent $50 billion on the Nvidia chips used to train advanced AI models last year, but brought in only $3 billion in revenue."

On top of that, the industry is running at a loss on power consumption alone, never mind labour costs (which are quite high: those generative LLMs require extensive human curation of the input data they require for training).

So, we've been here before. Most recently with cryptocurrency/blockchain (which is still going on, albeit much less prominently as governments and police go after the most obvious thieves and con men like Sam Bankman Fried).

But there've been other internet-related bubbles before.

I was in on the ground floor of the dot-com boom from 1995-2000, and the hype back then was absolutely bonkers: that may be part of why I'm so thoroughly soured on the current wave of bilge and bullshit. (That, and it's clearly being pumped up by fascist-adjacent straight white males with an unadmitted political agenda, namely to shore up the structures of privilege and entitlement that keep them wealthy.)

The common feature of these bubbles is a shitload of hype and promises from hucksters who fail to deliver a viable product but suck up as much investment capital as they can. A handful of them survive: from dot-com 1.0, the stand-outs are Amazon and Google (Facebook, Twitter, Reddit, et al came along much later—social media was a later, smaller bubble). Other survivors include Paypal, eBay, and Doubleclick (the latter being merged with Google to form a monstrous global advertising monopoly). The survivors tend to leave behind infrastructure: the failures leave behind t-shirts, second hand Aeron chairs, and motivational posters.

If I had more energy I'd be writing a snarky, satirical, 21st century Jetson's style short story right now to highlight the way this plays out. It'd be set in a future where all the dot-com 1.0 hype and promises actually delivered and laid the bedrock of our lives in 2025.

But of course, that's not the story. Instead, the story would explore the unanticipated drawbacks. Starting with "oops, the Amazon drone delivering your neighbour's new dishwasher just fell through your roof; but trades.com only shows you roofers who live in Boston, England, not Boston, MA".

In this shiny dotcom 1.0 future, shoppers always carry their laptop to the supermarket so they can use their CueCat scanner to scan product discount coupon codes off the packaging: they collect the money off vouchers using internet delivered over the supermarket wifi (which blasts them with ads they're forced to click through in return for bandwidth).

The Teledesic satellite network got funded and built out, so you now have 9600 baud global roaming data on your Microsoft Windows CE phone. Which has a fold-out QWERTY keyboard because nobody likes writing on a touch-sensitive screen with a stylus and multitouch was still-born. But your phone calls are secure, thanks to the mandatory built-in Clipper chip.

But Pets dot com just mailed you the third dead and decomposing Rottweiler of the month, instead of the cat food subscription you ordered: the SKUs for Rottie pups and Whiskas are cross-linked in their database, and freight shipping from China takes weeks.

In this gleaming, chromed, Jetsons style future, the Intel Itanium didn't fail, Macs still run on Power architecture, and Microsoft OS/2 4.0 runs everywhere on MIPS, Alpha, and SPARC workstations. Linux is nearly extinct thanks to restrictive embrace-and-extinguish commercial bootloader licensing terms ...

But don't ask about Apple. Oh dear. Oh no. You asked about Apple, didn't you? And why are all those workstations running OS/2?

Solaris never really took over the workstation market; NeXT ate Sun's lunch in the 90s. Today, UNIX research workstations are all featureless black cubes or monoliths and come bundled with Mathematica and FrameMaker. Cheaper RISC-based workstations are all the domain of Microsoft, as are PCs. Apple lives on in a strange twilight: Steve Jobs was unavailable in 1998 (he was tied up buying Oracle), and Apple was not-exactly-saved by buying Be and hiring on Jean-Louis Gassée as their CEO. He staunched the bleeding through strategic alliances, but in the end Gassée had no alternative but to sell Apple to IBM as Big Blue tried to push their Power Architecture down into the realm of business personal computing.

Macintosh® Powerbook™ is all that's left of the glory that was Apple: a range of black plastic PowerPC business laptops sold by Lenovo. Main value proposition: they run COBOL business applications real good. Meanwhile, the UK's Acorn Computers bought what was left of the NewtonOS intellectual property and continues to market the Newton Messagepad series as ruggedized retail and industrial data capture terminals in Europe, using the unique Graffiti text entry system from Palm Computing).

The world of MP3 music players is dominated by Archos. Video is ... well, video as such isn't allowed on the public internet because the MPAA hooked up with the cable TV corporations to force legislation mandating blockers inside all ISPs. Napster does not exist. Bittorrent does not exist. YouTube does not exist. But what passes for video on the internet today is 100% Macromedia Flash, so things could be worse.

So. What survivors from the glorious-future-that-wasn't would you like to memorialize in this shared fictional nightmare?

Read the whole story
mkalus
14 hours ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

Ach gucke mal, hier ist noch ein bedauerlicher Verrechner ...

1 Share
Ach gucke mal, hier ist noch ein bedauerlicher Verrechner bei der AWS-Trafficrechnung. Da hat jemand 3TB Daten übertragen aber Amazon hat 130TB berechnet.

Schau an. Auch dieser Softwarefehler ging zu Gunsten von Amazon, nicht der Kunden. Bemerkenswerte Zufälle gibt es manchmal!

Da willste doch Kunde werden, wa?

Read the whole story
mkalus
16 hours ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete

The AWS S3 Denial of Wallet amplification attack - Limbus News

1 Share

If you publicly host large data files on AWS S3 and pay for AWS transfer costs, you may be vulnerable to a “Denial of Wallet” amplification attack. Even if you are not hosting data publicly, you may be exposed to a malicious third-party attack or even a programming error, that can cause major costs within a short time frame.

Ben Liesfeld

Limbus News

Introduction

Cloud computing enables companies to build fast-scaling applications. This allows for new ways of analyzing data, especially in medicine or bioinformatics. But with the ease of resource scaling up and down, the way of cost control changes significantly for the cloud customers.

By design, resources are scaling in cloud environments, and this results in rising costs at the same time. Having control of the costs is a difficult job. Even though AWS offers its own pricing calculator, it is so difficult that many companies have products to assist in cost control or cost overview, see for example “AWS Costs: Surprise, Surprise? It Shouldn’t Be!

Because of the large variety of cloud services and their cost models, it is very important for customers that they can rely on certain assumptions. A simple assumption is that downloading of some S3 data (via the Internet) costs an amount of money that is proportional to the amount of data downloaded (see S3 pricing structure). With such an assumption people build software and have some rough idea about the costs a certain service may incur.

Since cloud resources scale so easily, cloud users must take certain precautions to prevent malicious attacks that may incur unintended costs. For example, if you experience a DDoS attack on your specific application, the costs may rise significantly because your cloud resources can be configured to scale according to demand. You need to implement multiple mechanisms to prevent this. Cloud providers even create tools to reduce the attack surface (see here for AWS best practices on this topic).

The Denial of Wallet amplification attack

Here, we will provide a previously unknown example of a potential attack on cloud resources where the assumed costs differ significantly from the real costs. This is about how costs for AWS S3 egress (transfer into the Internet) are calculated. With a very small number of special requests, it is possible to generate costs that differ from the actually downloaded data by a factor of 50. We coined this scenario a “’Denial of Wallet’ Amplification Attack”. It is not an attack against your service but against your wallet.

We publish this information in a blog post because we ourselves were caught unaware of this situation and we feel the need to raise awareness about this issue, as it could be exploited by malicious third parties.

Data sets in health care may be large

In the healthcare industry, many other large companies and organizations use AWS S3 and similar cloud platforms for data storage or processing. For example, there are many public bioinformatics data repositories, also from government agencies, that provide large files on S3 publicly (e. g. NCBI SRA or gnomAD). Even cloud-computing platforms of large sequencing instrument manufacturers are affected. Having cost control of data storage and data transfer is very important if your data volume is increasing that much.

Attack amplifying S3 egress costs

One day we experienced an anomaly of S3 egress costs. We analyzed this anomaly and found that the amount of data actually downloaded did not match the amount on our invoice. With our partners’ help, we reproduced this behavior and identified a minor bug in a bioinformatics library. It was an accident. Unfortunately, this accidental behavior could also have been ‘weaponized’ in an attack.

After contacting the AWS Support we were directed to the following details of the S3 pricing page (highlighting by us):

Data Transfer Out may be different from the data received by your application in case the connection is prematurely terminated by you, for example, if you make a request for a 10 GB object and terminate the connection after receiving the first 2 GB of data. Amazon S3 attempts to stop the streaming of data, but it does not happen instantaneously. In this example, the Data Transfer Out may be 3 GB (1 GB more than 2 GB you received). As a result, you will be billed for 3 GB of Data Transfer Out.

Okay, this is half the explanation. AWS customers are not billed for the data actually transferred to the Internet but instead for some amount of data that is cached internally.

The main problem is the potential difference between the amount of data received by an entity outside of AWS and the amount of data on your bill. In the example above from the AWS documentation, the difference is a factor of 1.5 (2GB sent, 3GB billed). In our real-world example, the difference was almost a factor of 50. This means 3TB sent and 130TB billed. That can make a difference between “we do not care” and “whaaat”?

The extent of the problem

It may be even worse: we were able to reproduce the scenario where we downloaded 300MB of data in 30sec from AWS S3 and were billed for more than 6GB by AWS. If an attacker can induce costs for 6GB in 30sec how much costs can be generated in a day, or on the weekend when running many threads in parallel? Note that AWS S3 is highly available, and you may never reach any bandwidth limits in real-world scenarios. That should scare anyone who hosts large files on a public S3 bucket, because the egress costs can skyrocket in this scenario.

The good news: we only observed this behavior for large files (>1GB), when software clients download them via HTTP(S) RANGE requests. With range requests, the client can request to retrieve a part of a file, but not the entire file. By quickly canceling such requests, a client can request parts of a file without downloading all the data. Due to the way AWS calculates egress costs the transfer of the entire file is billed. There may also be dependencies on access patterns and timing, but we were able to reproduce it across different buckets and files and over several weeks (so this is not a fluke).

This means that everybody who hosts large files on S3 is at risk, especially if these files are publicly accessible.

Potential remedies

Can I prevent this attack?

Do not host large files on S3 if they can be accessed by range requests in a way that you cannot control. If you are relying on hosting large S3 data sets publicly, then you cannot prevent this attack. AWS best practice guidelines recommend restricting data access to S3 buckets.

What does AWS recommend?

We do not exactly know what the recommendation of AWS is for companies relying on hosting data publicly, but we did not find any official documentation that has any recommendations in that regard for files in public S3 buckets.

For example, the “Security best practices for Amazon S3” state:

Unless you explicitly require anyone on the internet to be able to read or write to your S3 bucket, make sure that your S3 bucket is not public.

But AWS does not say anything about those cases where you do need public access (at least we did not find any under the AWS best practices for storage).

By the way: restricting access to your S3 buckets may not prevent you from incurring costs for unauthorized requests as @maciej.pocwierz found out: https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1.

Are there workarounds to mitigate the attack?

Yes. As the first and most important step you should create cost alerts. We suggest to activate AWS Cost Anomaly Detection. When activating this tool and configuring it correctly you will be informed about abnormal billing events. At least in our case, this helped us to identify such an adverse event after a short time frame limiting its financial impact.

Sadly, preventing such an attack is no easy task because of the design of AWS S3. The service is designed to serve large amounts of data as fast as possible. You could monitor HTTP API requests to your S3 buckets which is possible with a delay of a few hours. If you see an unusually high amount of API requests, you could prohibit access to the resource. But this solution is a brutal last resort, potentially disrupting your service entirely.

So, if I’m not hosting public S3 files I’m safe?

Unfortunately, no, as we observed a similar behavior when serving S3 files via pre-signed URLs, for example.

Acknowledgement

We thank Stephan Drukewitz from the Institute for Human Genetics, Leipzig, for his help in troubleshooting the issue. Also thanks to Martin Garbe and Roland Ewald who substantially researched and authored this article.

We thank the AWS Security team for their feedback on earlier drafts of this post.

Read the whole story
mkalus
16 hours ago
reply
iPhone: 49.287476,-123.142136
Share this story
Delete
Next Page of Stories