Cyber Cold War

I try to write on cyber conflict without getting into the politics of why someone is hacking someone else. I always get beaten by someone in the comments thread when I write on politics.

But recent events have forced me to update my usual “how-to” cyber conflict to “why” cyber conflict. This is because of a terrorist attack in my hometown Delhi.

(updated-

http://www.nytimes.com/2012/02/14/world/middleeast/israeli-embassy-officials-attacked-in-india-and-georgia.html?_r=1&hp

Iran allegedly tried  (as per Israel) to assassinate the wife of Israeli Defence Attache in Delhi using a magnetic bomb, India as she went to school to pick up her kids, somebody else put a grenade in Israeli embassy car in Georgia which was found in time. 

Based on reports , initial work suggests the bomb was much more sophisticated than local terrorists, but the terrorists seemed to have some local recce work done.

India has 0 history of antisemitism but this is the second time Israelis have been targeted since 26/11 Mumbai attacks. India buys 12 % of oil annually from Iran (and refuses to join the oil embargo called by US and Europe)

Cyber Conflict is less painful than conflict, which is inevitable as long as mankind exists. Also the Western hemisphere needs a moon shot (cyber conflict could be the Sputnik like moment) and with declining and aging populations but better technology, Western Hemisphere govts need cyber conflict as they are running out of humans to fight their wars. Eastern govt. are even more obnoxious in using children for conflict propaganda, and corruption.

Last week CIA.gov website went down

This week Iranian govt is allegedly blocking https traffic on eve of Annual Revolution Day (what a coincidence!)

 

Some resources to help Internet users in Iran (or maybe this could be a dummy test for the big one – hacking the great firewall of China)

News from Hacker News-

http://news.ycombinator.com/item?id=3575029

 

I’m writing this to report the serious troubles we have regarding accessing Internet in Iran at the moment. Since Thursday Iranian government has shutted down the https protocol which has caused almost all google services (gmail, and google.com itself) to become inaccessible. Almost all websites that reply on Google APIs (like wolfram alpha) won’t work. Accessing to any website that replies on https (just imaging how many websites use this protocol, from Arch Wiki to bank websites). Also accessing many proxies is also impossible. There are almost no official reports on this and with many websites and my email accounts restricted I can just confirm this based on my own and friends experience. I have just found one report here:

Iran Shut Down Gmail , Google , Yahoo and sites using “Https” Protocol

The reason for this horrible shutdown is that the Iranian regime celebrates 1979 Islamic revolution tomorrow.

I just wanted to let you guys know about this. If you have any solution regarding bypassing this restriction please help!

 

The boys at Tor think they can help-

but its not so elegant, as I prefer creating a  batch file rather than explain coding to newbies. 

this is still getting to better and easier interfaces

https://www.torproject.org/projects/obfsproxy-instructions.html.en

Obfsproxy Instructions

client torrc

Step 1: Install dependencies, obfsproxy, and Tor

 

You will need a C compiler (gcc), the autoconf and autotools build system, the git revision control system, pkg-config andlibtoollibevent-2 and its headers, and the development headers of OpenSSL.

On Debian testing or Ubuntu oneiric, you could do:
# apt-get install autoconf autotools-dev gcc git pkg-config libtool libevent-2.0-5 libevent-dev libevent-openssl-2.0-5 libssl-dev

If you’re on a more stable Linux, you can either try our experimental backport libevent2 debs or build libevent2 from source.

Clone obfsproxy from its git repository:
$ git clone https://git.torproject.org/obfsproxy.git
The above command should create and populate a directory named ‘obfsproxy’ in your current directory.

Compile obfsproxy:
$ cd obfsproxy
$ ./autogen.sh && ./configure && make

Optionally, as root install obfsproxy in your system:
# make install

If you prefer not to install obfsproxy as root, you can instead just modify the Transport lines in your torrc file (explained below) to point to your obfsproxy binary.

You will need Tor 0.2.3.11-alpha or later.


Step 2a: If you’re the client…

 

First, you need to learn the address of a bridge that supports obfsproxy. If you don’t know any, try asking a friend to set one up for you. Then the appropriate lines to your tor configuration file:

UseBridges 1
Bridge obfs2 128.31.0.34:1051
ClientTransportPlugin obfs2 exec /usr/local/bin/obfsproxy --managed

Don’t forget to replace 128.31.0.34:1051 with the IP address and port that the bridge’s obfsproxy is listening on.
 Congratulations! Your traffic should now be obfuscated by obfsproxy. You are done! You can now start using Tor.

For old fashioned tunnel creation under Seas of English Channel-

http://dag.wieers.com/howto/ssh-http-tunneling/

Tunneling SSH over HTTP(S)
This document explains how to set up an Apache server and SSH client to allow tunneling SSH over HTTP(S). This can be useful on restricted networks that either firewall everything except HTTP traffic (tcp/80,tcp/443) or require users to use a local (HTTP) proxy.
A lot of people asked why doing it like this if you can just make sshd listen on port 443. Well, that might work if your environment is not hardened like I have seen at several companies, but this setup has a few advantages.

  • You can proxy to anywhere (see the Proxy directive in Apache) based on names
  • You can proxy to any port you like (see the AllowCONNECT directive in Apache)
  • It works even when there is a layer-7 protocol firewall
  • If you enable proxytunnel ssl support, it is indistinguishable from real SSL traffic
  • You can come up with nice hostnames like ‘downloads.yourdomain.com’ and ‘pictures.yourdomain.com’ and for normal users these will look like normal websites when visited.
  • There are many possibilities for doing authentication further along the path
  • You can do proxy-bouncing to the n-th degree to mask where you’re coming from or going to (however this requires more changes to proxytunnel, currently I only added support for one remote proxy)
  • You do not have to dedicate an IP-address for sshd, you can still run an HTTPS site

Related-

http://opensourceandhackystuff.blogspot.in/2012/02/captive-portal-security-part-1.html

and some crypto for young people

http://users.telenet.be/d.rijmenants/en/onetimepad.htm

 

Me- What am I doing about it? I am just writing poems on hacking at http://poemsforkush.com

The Monk who Danced

P dance
Image via Wikipedia

Some monks pray

Some monks dance

Some monks drink

All monks hope for a second chance

 

I have played all

kinds of funny games

Been to all kinds of places

Called all unkind names

 

The thrill of the chase

The prospect of romance

is rarely expressed in thudding crashes

More often expressed in dance

 

Here comes tango

There goes hip hop

Ballroom dancing for the propah

Disco dancing for the lower crop

 

This monk got grace

It helps he has style

For very soon he will start sweating

Because he has not practiced in a while

 

While the forbidden and elusive

Pleasures of the flesh are often the downfall

Of talented men who began to crawl

Dancing never killed anyone

and no one got killed dancing.

 

The wars the fights and the peacock struts

Have continued since mankind begun

Choose your arena, choose your weapon

Dancing shoes or the barrel of a gun.

 

Music heals what people hurt

Poetry steals what movies covet

Paintings end up hugging stony walls

But dancing above all is in the moment

 

Transitory like a flutter of a piano sheet

Dance now or forever hold your feet.

 

Related-

http://www.themonkwholovestodance.com/

http://www.gakkaionline.net/Myths/Dancing.html

 

 

 

 

 

Happy Thanksgiving Id

http://en.wikipedia.org/wiki/Eid_al-Adha

Eid al-Adha (Arabic: عيد الأضحى‎ ‘Īdu l-’Aḍḥā) or “Festival of Sacrifice” or

“Greater Eid” is an important religious holiday celebrated by Muslims

worldwide to commemorate the willingness of Abraham (Ibrahim) to

sacrifice his son Ishmael (Isma’il) as an act of obedience to God, before

God intervened to provide him with a ram (uncastrated male sheep) to

sacrifice instead.[1]

The meat is divided into three parts to be distributed to others. The family retains one third of the share, another third is given to relatives, friends and neighbors, and the other third is given to the poor & needy.

Eid al-Adha is the latter of two Eid festivals celebrated by Muslims, whose basis comes from Sura 2 (Al-Baqara) Ayah 196 in the Qur’an.

 

The incident with Abraham and God is also mentioned in Old Testament

1431 (Islamic Calendar): November 16, 2010.

http://en.wikipedia.org/wiki/Binding_of_Isaac

The Binding of Isaac, in Genesis 22:1-24 is a story from the Hebrew Bible in which God asks Abraham to sacrifice his son, Isaac, on Mount Moriah.

The narration is referred to as the Akedah (עקדה) or Akedat Yitzchak (עקידת יצחק) in Hebrew and as the Dhabih (ذبيح) in Arabic. The sacrifice itself is called an Olah in Hebrew — for the significance of sacrifices, especially in Biblical times, see korban.

Thanksgiving

http://en.wikipedia.org/wiki/Thanksgiving#cite_note-Encyclop.C3.A6dia_Britannica-0

Thanksgiving Day is a harvest festival celebrated primarily in the United States and Canada.

Thanksgiving was a holiday to express thankfulness, gratitude, and appreciation to God, family and friends for which all have been blessed of material possessions and relationships.

Traditionally, it has been a time to give thanks for a bountiful harvest. This holiday has since moved away from its religious roots.

Note from Ajay-

Goats are slaughtered on Id and Turkeys on Thanksgiving

Happy Holidays to you.

Related Articles-

https://decisionstats.com/2010/09/18/happy-yom-kippur/

http://www.oyate.org/resources/shortthanks.html

(Id is  a holiday in secular India as we celebrate Minority Festivals-by constitutional law )

%d bloggers like this: