Subject: Storage | April 19, 2016 - 05:00 PM | Allyn Malventano
Tagged: SSL, remote access, NAS, DroboAccess, drobo, B810n, 5N
We are currently testing a round of Drobos here at PC Perspective, and Drobo recently rolled out a new feature that I thought would be better written up as a quick news post. This is a remote access feature that applies to the NAS-style models, specifically the 5N and B810n, and leverages the Drobo Apps capabilities of these devices. If you are a current 5N or B810n owner, you can update your Dashboard application and firmware to unlock this newly announced ‘DroboAccess’ feature.
DroboAccess falls under the ‘myDrobo’ category of Drobo Apps. These are apps developed and supported by Drobo (as opposed to coming from a third party). With Drobo more involved in the end-to-end aspect of this process, they were able to work some additional magic into their implementation:
After a Drobo owner registers their device, they can install any/all of the supported apps (DroboAccess, Koken, and Wordpress). Upon registering, each app prompts for a public URL (a subdomain of .mydrobo.com). Drobo handles the behind-the-scenes registration of a 2k SSL certificate which is installed in the chain, which means that any browser access to the new subdomain is over an SSL (HTTPS) end-to-end encrypted connection. Drobo has set up a relay server that manages incoming internet connections to the 5N or B810n. Home NAT routers are not an issue as the device running the app maintains an outbound link to the same relay server. This eliminates any custom router configurations / port forwarding necessary on the user-side of things, and that free SSL cert keeps prying eyes out of the data coming across the wire. I stepped through this process myself and it was about as simple and seamless as it could possibly be. Once set up, I could browse to (chosen subdomain).mydrobo.com from any internet-connected browser and see the files on the B810n:
The interface is similar to what you’d see from other remote access apps (Dropbox, etc). There is also an iPhone and Android app available, but Drobo has chosen to charge $0.99 for this app - an odd choice given the vast majority of remote file access companion apps are free downloads. I spent some time with the iOS app and while functional, I found it a bit clunky in its current form. As an example, sending a photo to DroboAccess from the iOS Share Menu gave an ‘Upload to’ prompt with no ability to choose a destination folder (images were simply dumped in the root, which is *not* mountable on the local network - only subdirectories of root are mountable on the LAN). This means that you would have to log into the Drobo via web browser to access those uploads and move them to shares so they would be visible to local SMB-connected machines.
In testing browser access, I discovered a few more issues:
- The data throughput rate appears to be capped at 8 Mbps by the myDrobo relay server.
- Downloading files >2GB failed silently, resulting in a 0-byte file placed on the host.
…so while things are a bit rough around the edges right now, the setup was quick and painless, which was Drobos initial goal for this feature roll out. We’ve fed back our findings thus far, and I suspect the other parts should receive more polish and tweaking over the coming weeks. I’ve include Drobo’s press blast for DroboAccess after the break.
Subject: General Tech | February 25, 2015 - 12:36 PM | Jeremy Hellstrom
Tagged: SSL, security, PrivDog, idiots, fud, Comodo
This has been a bad week for the secure socket layer and the news just keeps getting worse. Comodo provides around one out of every three SSL certs currently in use as they have, until now, had a stirling reputation and were a trusted provider. It turns out that this reputation may not be deserved seeing as how their Internet Security 2014 product ships with an application called Adtrustmedia PrivDog, which is enabled by default. Not only does this app install a custom root CA certificate which intercepts connections to websites to be able to insert customized ads like SuperFish does it can also turn invalid HTTPS certificates into valid ones. That means that an attacker can use PrivDog to spoof your banks SSL cert, redirect you to a fake page and grab your credentials, while all the time your browser reports a valid and secure connection to the site.
The only good news from The Register's article is that this specific vulnerability is only present in PrivDog versions 184.108.40.206 and 220.127.116.11 and so has limited distribution. The fact that this indicates the entire SSL certificate model is broken and even those who create the certs to assure your security feel that inserting a man in the middle attack into their software does not contravene their entire reason for existing is incredibly depressing.
Update: The Register's article was originally based on research from Hanno Bock who referred to PrivDog as being distributed by Comodo. Comodo does not distribute the standalone desktop version of PrivDog only the browser extension application which was never vulnerable to the TLS interception.
"The US Department of Homeland Security's cyber-cops have slapped down PrivDog, an SSL tampering tool backed by, er, SSL certificate flogger Comodo.
Comodo, a global SSL authority, boasts a third of the HTTPS cert market, and is already in hot water for shipping PrivDog."
Here is some more Tech News from around the web:
- AMD previews Carrizo APU, offers insights into power savings @ The Tech Report
- Amazon tries to patent 3D printers on trucks @ The Register
- Mozilla Firefox 36 is second major browser to bring HTTP/2 @ The Inquirer
- Samb-AAAHH! Scary remote execution vuln spotted in Windows-Linux interop code @ The Register
- JEDEC publishes eMMC 5.1 standard @ DigiTimes
- Red Hat: Traditional virtualisation isn't going anywhere @ The Inquirer
Subject: General Tech | March 12, 2012 - 10:01 PM | Tim Verry
Tagged: SSL, search, international, google, encryption
Google recently announced on their Inside Search blog that the company would be rolling out the default SSL encrypted search option for users signed in with a Google account internationally. Previously, the company made SSL encryption the default setting for Gmail and provided an alternative encrypted.google.com webpage for users that wanted to opt in to encrypted search. Earlier this year, they began testing SSL encrypted search and search results pages for users signed into Google in the US, and they are now ready to expand the default setting to international users.
They announced that over the next few weeks, they will begin introducing an SSL (secure socket layer) encrypted search page for localized international google pages such as google.co.uk (United Kingdom) and google.fr (France) among others. Further, they hope that their increased SSL commitment will encourage other websites to enable SSL on their domains to protect users from MITM (man in the middle) attacks and to ensure their sessions stay private.
More encryption is a good thing, and international users will be pleased to finally get a taste of it for their google search queries, especially now that the big G has enabled personalized search results.
Subject: General Tech | September 26, 2011 - 01:20 PM | Jeremy Hellstrom
Tagged: fud, security, SSL
SSL and secure data transfer are wounded, but not dying quite yet if you use an elderly encryption protocol called RC4 or ARC4. Current AES is suggested as the preferred way of encrypting data transfers, but the BEAST (Browser Exploit Against SSL/TLS) attack is capable of defeating AES encryption. Unfortunately there are attack methods which are able to defeat RC4, specifically as it is implemented for WPA and WES in wireless networks. Google informed The Register that they have been using RC4, although clients that attempt to connect which don't support that encryption method are offered the vulnerable AES method. Google also pointed out the latest developer version of Chrome protects against the BEAST attack but don't mention when the main version of Chrome will protect users.
"The recommendations published Friday by two-factor authentication service PhoneFactor, suggest websites use the RC4 cipher to encrypt SSL traffic instead of newer, and ironically cryptographically stronger, algorithms such as AES. Google webservers are already configured to favor RC4, according to this analysis tool from security firm Qualys. A Google spokesman says the company has used those settings "for years."
Here is some more Tech News from around the web:
- Rick Bergman leaving AMD has no up side @ SemiAccurate
- MS denies secure boot will exclude Linux @ The Register
- Avast buys Android thiefbuster developer @ The Register
- Ubuntu 11.04 vs. Ubuntu 11.10 Benchmarks @ Phoronix
- A case for better keyboards @ The Tech Report
- ThinkComputers and Thermaltake YouTube Contest
- Win a Samsung Galaxy SII @ t-break
Subject: General Tech | September 20, 2011 - 12:02 PM | Jeremy Hellstrom
Tagged: fud, SSL, tls, security
The good news about the discovery that the encryption procedure behind Secure Socket Layer and Transport Layer Security has been compromised is that the newest versions of both SSL and TLS are still safe and they have been available for a while now. The bad news is that not only do only a tiny handful of websites utilize TLS 1.1/1.2 and SSL 3.0, most browsers don't even support the updated protocols. Oddly Internet Explorer and Internet Information Services both support the newer protocols, though they are not enabled by default; the only one that does have TLS 1.2 enabled by default is Opera.
"Researchers have discovered a serious weakness in virtually all websites protected by the secure sockets layer protocol that allows attackers to silently decrypt data that's passing between a webserver and an end-user browser.
The vulnerability resides in versions 1.0 and earlier of TLS, or transport layer security, the successor to the secure sockets layer technology that serves as the internet's foundation of trust. Although versions 1.1 and 1.2 of TLS aren't susceptible, they remain almost entirely unsupported in browsers and websites alike, making encrypted transactions on PayPal, GMail, and just about every other website vulnerable to eavesdropping by hackers who are able to control the connection between the end user and the website he's visiting."
Here is some more Tech News from around the web:
- Ultrabook platform may not benefit ODMs @ DigiTimes
- Intel downstream partners request CPU price drop @ DigiTimes
- Intel sets to invest NT$300 million in software designer Insyde @ DigiTimes
- Microsoft's high-risk Windows 8 .NET switch @ The Register
- A Look at the Windows 8 Developer @ SemiAccurate
- Cisco plans virtual switch for Hyper-V in Windows Server 8 @ Ars Technica
- Apple makes a hash of password security (again) @ The Register
- Intel X79 chipset and Socket 2011 are ready for the desktop @ The Register
- Asus WL-330N3G 6 in 1 Wireless-N Mobile Router Review @ eTeknix
- Olympus PEN E-PM1 Review @ TechReviewSource
- XDC2011 Chicago Recap: Open-Source Graphics, GPGPU, OpenGL 3.0 @ Phoronix
- Name the Browser Contest - 2 Days Left! @ NGOHQ
- Win a Dell XPS Laptop with Overclock3D & Dell Outlet
Subject: General Tech | August 8, 2011 - 01:48 PM | Jeremy Hellstrom
Tagged: SSL, black hat 2011, CA, Comodo
While the boys were having fun at an event in Texas, TechwareLabs were at a show of a completely different colour. Black Hat 2011, the yearly computer security convention was also taking place in Las Vegas, bringing to light the discoveries of the past year when it comes to vulnerabilities and how to protect yourself against them. One of the topics for discussion was how the Secure Socket Layer works, by assuming that a Trusted Authority is behind a security certificate which requires them to provide a secure connection between yourself and their servers. Over the past year we saw a hack at Comodo, who are a major Certificate Authority, which lead to nefarious people getting their hands on certificates assigned to Microsoft, Yahoo and Google, which allowed them to easily fool even a computer using SSL.
Taking that as an example of the failure of the idea of single, large CAs as the way to implement SSL. If you were to no longer trust Comodo and its certificates then about 1/4 of the secure sites on the net would never allow you to connect. Instead a programmer detailed a FireFox extension called Convergence as an alternative. This distributed way of dealing with Certificate authentication would allow you to switch between trusting and untrusting certain CAs without damaging your ability to connect to secure sites on the web.
"This interesting presentation concerns a security protocol that you probably use everyday. It is in your browser, on the server you connect to, and bought together by a “Certificate Authority”. The idea behind SSL is to provide a secure connection between you, the client browser, and the server providing the sensitive data to you. For instance a Bank website is designed to provide the client with convenient access to account details, transactions, etc. But there is a major issue with a pivotal player in this process. The Certificate Authority or CA is charged with certifying the organizations to which it provides certificates. The CA is supposed to be a trustworthy entity working on behalf of us, the end users, to ensure that any organization it issues a certificate to is credible and trustworthy. After all many users depend on the CA’s, SSL protocol, and issued certificates to enforce authentication and integrity in the online space. You have little choice but to trust the CAs and expect them to provide a high quality level of authentication services."
Here is some more Tech News from around the web:
- AMD releases an SDK for its Llano chips @ The Inquirer
- Some thoughts on Mac OS X Lion @ The Tech Report
- Beginners Guide to Installing Windows 7 @ MissingRemote
- Monitor makers poised to adopt IPS technology @ DigiTimes
- Trendnet TV-IP121WN @ Hardware Bistro
- One month with Google+: why this social network has legs @ Ars Technica
- Cyberlink YouCam 5 Webcam Software Review @ Hardware Canucks
- Top Ten Green Tips for Your PC @ TechwareLabs
- The TR Podcast 93: A trifecta of tablets
- Last chance - Weekly Giveaway #9: Dirt 3 @ eTeknix
- Summer Icy Dock Giveaway @Hi Tech Legion
- ThinkComputers & NZXT Back to School Giveaway!