From Possible to Practical:
The Path for Defense
Dan Kaminsky
Chief Scientist
White Ops
Or:
MOVE FAST AND FIX THINGS
We can fix this Internet.
You can help.
Yes, you.
https://autoclave.run
“Look! Linux and Windows, launched
instantly from the cloud! And…”
“No wait go back”
“Huh? But hypervisor…root…safe…”
WHEEEEEEEEEEEEEEEEEE
They just wanted a safe Internet experience.
For once.
We could lose this Internet.
Or we could save it.
Some think security is impossible.
Apparently anything is possible.
When it comes to security,
though…
Possible isn’t enough.
“It’s possible to survive this
infection…”
#MakeSecurityEasy
It doesn’t matter why it’s hard.
Just matters that it is.
Human factors matter.
“Doctors are gentlemen, and
gentlemen’s hands are clean”
From the great debates regarding the Germ Theory of Medicine
You really don’t want to know about the history of Anesthesia.
Germ Theory: How does it spread,
what keeps it sterile?
==
Well Defined Interfaces
Known Good State
PRACTICAL
PRACTICAL
PRACTICAL
They measured. They monitored.
They learned. They rebooted.
Those white coats? Symbolic.
Infosec did not invent “Snake Oil”
We used to take actual snakes, and
press them into actual oil.
ACTUAL CHINESE SNAKE OIL WORKS
Snakes are expensive…
Nobody could tell the difference…
Didn’t yet have the analytical chem…
AWKWARD HYPERMETAPHORICAL HISTORY IS AWKWARD
“Modeling How Students Learn to
Program”
If you don’t learn it in week 2, you’re
going to fail in week 7.
{piech, sahami, koller, coopers}@cs.stanford.edu, paulob@stanford.edu
BUGS AREN’T RANDOM
(Well, of course, but really.)
Humans have intentions.
Machines have instructions.
Humans are right.
Bugs are in the comm layer.
Programming languages.
Not programming equations.
It’s not math. It’s cognitive science.
JavaScript and Assembly are both
Turing Complete.
In that sense, they’re isomorphic.
Go ahead. Call them equal.
I see bad APIs.
They’re everywhere.
They don’t know they’re bad.
Application Programming Interfaces
that spend their budget on barely
working, leave nothing left for
working securely.
Security is not separate from IT.
IT looks to Security.
They need our help!
We cross layers.
We see victims.
We witness systems failing.
It’s always systems.
“Whatever, most hacking is really
just phishing anyway”
Phishing is a technology failure.
Microsoft Windows Technical
Support isn’t walking into the office.
Phishing happens because victims
can’t authenticate the caller but need
to trust them anyway.
Phones don’t just ring once, and
INBOX is not ZERO.
Bad APIs are bad.
Bad APIs are bad not just if they
break machines, but when they
break people.
I mean, the machine’s next.
Human factors aren’t an extra point.
They are the point.
Nobody intended that buffer to
overflow.
We aren’t measuring enough.
Barely see crashes, rarely seeing
frustration.
It’s not just security.
Other fields are easier to measure.
We have to fight harder.
Hacker Latency is a problem.
We can’t keep taking years to find
things.
“NIH for Cyber” ==
Volunteer Firefighting is cool, but we
don’t have the guy who fights cancer
Nerds, stable funding, a mandate to measure and repair this Internet
Find What’s Hard.
Don’t Judge.
Fix.
Developer Ergonomics: Full Chrome dev
environment, boots in seconds. (dochro)
Easier to inspect and fix Chrome?
More inspection and fixing of
Chrome.
Human factors.
(I mean, I needed it)
Lots of insecure TCP listeners.
Far fewer secure TLS listeners.
Why? Crypto? SSH replaced Telnet…
No permission required for TCP.
No permission required for SSH.
Had to get a certificate from a
bizdude. Couldn’t automate.
Can now.
So let’s.
JFE: Jump to Full Encrytion
# ./jfe -D
There, all services, all ports, valid cert, if a client wants working encryption it’s
there, system-wide
I mean, you could do all this configuration…
People normally just deploy this.
•
Be shameless. Anything can block
you, you might need to fix anything.
Be rigorous. You have to be right.
LISTEN.
It’s hard to trace DDoS.
Takes time, takes manhours.
How do you deal with spoofs?
Who do you even call?
Nothing in our architecture is set
in stone. (This is equal parts
reassuring and terrifying.)
OverflowD: Stochastic Traffic
Factoring Utility
Sends small bits of Netflow, to nodes
suffering Network Flows.
Alice attacks Bob.
Alice is not directly connected to
Bob.
There are many intervening routers
and networks.
They’re all monitored for load.
Status Quo: Netflow goes to the
same network, or maybe to Feds.
Never to attackers or victims.
But they’re the interested parties!
Idea: ~1/1M packets causes a tracer
to attacker and victim net.
“Heh, I saw this, here’s an abuse
contact.”
See what happens.
What if every DDoS came with
the keys to stop the DDoS?
You have to think of the time these
floods take people to resolve, and the
scalability of that resolution.
Find the hard problems.
Recognize the real world.
“Why did everyone punt their
DNS to DYN instead of running
their own infrastructure?”
Did you miss the last ten years of
software development moving
everything to the cloud?
Don’t answer that
You just did
We’re not securing 2005 anymore.
Clouds are not JBOS (Just A Bunch Of
Servers), where you hack one, you
hack them all.
For almost all values you
All or Nothing is not how risk
management works
It is how a lot of systems are
modeled, and thus designed
“After your password database is
compromised, make sure the
attacker has to do as much work as
possible…”
AFTER???????
If we can’t trust the cloud, we should
dramatically improve isolation.
If we can trust the cloud, we should
dramatically adopt its isolation. It’s
way better than ours.
Cloud’s are not JBOS. They’re
services with authenticated
semantics.
Isolation becomes someone else’s problem
Amazon is better at running servers than you are, for all values you in this room
Ratelocking: Rate Limiting w/
Serverless Cloud Assets.
$20 in the cash register, not all
corporate earnings.
3 logins every 10 seconds. Not 500M
Let the cloud make your server
getting compromised, a
survivable event.
The APIs make it hard, so it hasn’t
been getting done.
Let’s make it easy.
Not rhetorical!
I can’t write it all. I dare you to write
it better.
You actually can help.
Yes, you!
Write code! Test code! Document
code (PLEASE)! Break code!
Managers – jailbreak code!
The value prop of Open Source:
It is easier to find a solution on
GitHub, than from the team down
the hall. Or your own team last year.
None of us have unique problems.
We have to fix this.
We can fix this.
Whatever you can do, you can make
a difference here.
Let’s #MakeSecurityEasy.
dan@doxpara.com or @dakami
I’m running hackathons, and gauging interest.

More Related Content

PPTX
A Technical Dive into Defensive Trickery
PPTX
Wo defensive trickery_13mar2017
PPTX
I Want These * Bugs Off My * Internet
PPTX
Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying
ODP
Bugs Aren't Random
PPTX
Some Thoughts On Bitcoin
PPT
Dmk neut toor
PPTX
Yet Another Dan Kaminsky Talk (Black Ops 2014)
A Technical Dive into Defensive Trickery
Wo defensive trickery_13mar2017
I Want These * Bugs Off My * Internet
Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying
Bugs Aren't Random
Some Thoughts On Bitcoin
Dmk neut toor
Yet Another Dan Kaminsky Talk (Black Ops 2014)

What's hot (20)

PPTX
Black Ops of TCP/IP 2011 (Black Hat USA 2011)
PPTX
Black ops 2012
PPT
Black opspki 2
PPT
Dmk shmoo2007
PPTX
Domain Key Infrastructure (From Black Hat USA)
PPTX
Confidence web
PPTX
Dmk sb2010 web_defense
PPT
Dmk bo2 k8_bh_fed
PPT
Dmk bo2 k8
PPT
Dmk blackops2006
PPT
Dmk bo2 k8_ccc
PPTX
Interpolique
PPTX
Man vs Internet - Current challenges and future tendencies of establishing tr...
PPT
Design Reviewing The Web
PDF
SSL: Past, Present and Future
PPTX
A Digital Conversation: The Next Web
PPTX
Large Components in the Rearview Mirror
PDF
The Network The Next Frontier for Devops ?
PDF
Why isn't infosec working? Did you turn it off and back on again?
PDF
A Gentle introduction to microservices
Black Ops of TCP/IP 2011 (Black Hat USA 2011)
Black ops 2012
Black opspki 2
Dmk shmoo2007
Domain Key Infrastructure (From Black Hat USA)
Confidence web
Dmk sb2010 web_defense
Dmk bo2 k8_bh_fed
Dmk bo2 k8
Dmk blackops2006
Dmk bo2 k8_ccc
Interpolique
Man vs Internet - Current challenges and future tendencies of establishing tr...
Design Reviewing The Web
SSL: Past, Present and Future
A Digital Conversation: The Next Web
Large Components in the Rearview Mirror
The Network The Next Frontier for Devops ?
Why isn't infosec working? Did you turn it off and back on again?
A Gentle introduction to microservices
Ad

Similar to Move Fast and Fix Things (20)

PDF
Hack the book Mini
PDF
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
PDF
Broken by design (Danny Fullerton)
PDF
Hushcon 2016 Keynote: Test for Echo
PDF
Security
PDF
From 🤦 to 🐿️
PPTX
Security testing for web developers
PPTX
Security for AWS : Journey to Least Privilege (update)
PDF
Security for AWS: Journey to Least Privilege
PDF
A Big Dashboard of Problems.pdf
PDF
Hackers secrets
PDF
The Internet is on fire – don't just stand there, grab a bucket!
PDF
From DevOps to NoOps how not to get Equifaxed Apidays
PPT
Thane Barnier MACE 2016 presentation
PDF
Mere Paas Teensy Hai (Nikhil Mittal)
PPTX
Episode 3: Andrew Hay of OpenDNS
PDF
SELJE - VFP and IT Security.pdf
PDF
Nick Drage & Fraser Scott - Epic battle devops vs security
PDF
The Good The Bad The Virtual
PDF
Opsec for security researchers
Hack the book Mini
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Broken by design (Danny Fullerton)
Hushcon 2016 Keynote: Test for Echo
Security
From 🤦 to 🐿️
Security testing for web developers
Security for AWS : Journey to Least Privilege (update)
Security for AWS: Journey to Least Privilege
A Big Dashboard of Problems.pdf
Hackers secrets
The Internet is on fire – don't just stand there, grab a bucket!
From DevOps to NoOps how not to get Equifaxed Apidays
Thane Barnier MACE 2016 presentation
Mere Paas Teensy Hai (Nikhil Mittal)
Episode 3: Andrew Hay of OpenDNS
SELJE - VFP and IT Security.pdf
Nick Drage & Fraser Scott - Epic battle devops vs security
The Good The Bad The Virtual
Opsec for security researchers
Ad

More from Dan Kaminsky (12)

PPT
Chicken
PPT
Chicken Chicken Chicken Chicken
PPTX
Interpolique
PDF
232 md5-considered-harmful-slides
PPT
Bh us-02-kaminsky-blackops
PDF
Bh eu 05-kaminsky
PDF
Bh eu 05-kaminsky
PPT
Dmk audioviz
PPT
Bo2004
PPT
PDF
Advanced open ssh
PDF
Bh fed-03-kaminsky
Chicken
Chicken Chicken Chicken Chicken
Interpolique
232 md5-considered-harmful-slides
Bh us-02-kaminsky-blackops
Bh eu 05-kaminsky
Bh eu 05-kaminsky
Dmk audioviz
Bo2004
Advanced open ssh
Bh fed-03-kaminsky

Recently uploaded (20)

PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Unlock new opportunities with location data.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Architecture types and enterprise applications.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Five Habits of High-Impact Board Members
A novel scalable deep ensemble learning framework for big data classification...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Chapter 5: Probability Theory and Statistics
Unlock new opportunities with location data.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Assigned Numbers - 2025 - Bluetooth® Document
Developing a website for English-speaking practice to English as a foreign la...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A review of recent deep learning applications in wood surface defect identifi...
CloudStack 4.21: First Look Webinar slides
Group 1 Presentation -Planning and Decision Making .pptx
Benefits of Physical activity for teenagers.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Architecture types and enterprise applications.pdf
Module 1.ppt Iot fundamentals and Architecture
Final SEM Unit 1 for mit wpu at pune .pptx
Zenith AI: Advanced Artificial Intelligence
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Five Habits of High-Impact Board Members

Move Fast and Fix Things