Category Archives: Security

Another U.S. Spy Plane Crash

The news today of another unmanned aerial vehicle (UAV) crash makes me think I should have been more explicit in my last blog post about the risk from UAVs. The latest crash was a Predator stationed in the Seychelles to monitor the Indian Ocean and nearby countries for al Qaeda/al Shabaab activity. Clearly the UAV are very likely to crash, as hinted by a quote in my earlier post:

…a 2008 report by the Congressional Research Service, the nonpartisan analytical arm of Congress, found UAVs have an accident rate 100 percent higher than manned aircraft.

Why do they crash so often? Some like to speculate about the risk of malware. Oh, malware. If only you were not just a symptom. Let’s review some of the many possible factors contributing to a high risk of crashes.

1) Perhaps it is because no human is on board — asset value of risk calculations makes safety procedures less thorough. It is costly to lose a UAV but not costly enough to force better risk management.

2) Perhaps it is caused by emerging/unfamiliar technology. Although planes have been around for a while, remote control seems to have a few quirks especially when communication is interrupted — planes crash instead of entering a fail-safe return-to-base mode (something smarter than a “predetermined autonomous flightpath”).

As an aside, we can’t call these aircraft “drones” because they crash when they lose human guidance. Yet that’s the popular term for them. I try hard not to use it but I still catch myself calling them drones all the time. Given the high rate and sources of error the military probably wishes they were dealing with drones by now. But I digress…

The real story here is a combination of human risk management errors that has made the crashes more likely, as explained last year in the LA Times.

Pentagon accident reports reveal that the pilotless aircraft suffer from frequent system failures, computer glitches and human error.

Design and system problems were never fully addressed in the haste to push the fragile plane into combat over Afghanistan shortly after the Sept. 11 attacks more than eight years ago. Air Force investigators continue to cite pilot mistakes, coordination snafus, software failures, outdated technology and inadequate flight manuals.

Flight manuals. That says “checklist” to me. Note the details of a federal investigation labeled NTSB Identification: CHI06MA121 for a 2008 Predator B plane crash in Arizona.

The investigation revealed a series of computer lockups had occurred since the [U.S. border on a Customs and Border Protection (CBP) Unmanned Aircraft (UA)] began operating. Nine lockups occurred in a 3-month period before the accident, including 2 on the day of the accident before takeoff and another on April 19, 2006, 6 days before the accident. Troubleshooting before and after the accident did not determine the cause of the lockups. Neither the CBP nor its contractors had a documented maintenance program that ensured that maintenance tasks were performed correctly and that comprehensive root-cause analyses and corrective action procedures were required when failures, such as console lockups, occurred repeatedly.

[…]

The pilot’s failure to use checklist procedures when switching operational control from PPO-1 to PPO-2, which resulted in the fuel valve inadvertently being shut off and the subsequent total loss of engine power, and lack of a flight instructor in the [ground control station], as required by the CBP’s approval to allow the pilot to fly the Predator B. Factors associated with the accident were repeated and unresolved console lockups, inadequate maintenance procedures performed by the manufacturer, and the operator’s inadequate surveillance of the UAS program.

I am reminded of a quote in another recent post about aviation risks but from the 1940s.

Life Begins With a Checklist…and it May End if You Don’t Use It

50km wireless link for Farallon Islands

I thought I wrote about this before but it doesn’t seem to show up anywhere. Tim Pozar gave an excellent presentation on how he and Matt Peterson built a wireless link from San Francisco to the Farallon Islands.

WMV and PDF available from NANOG49

The presentation will cover the requirements for a very limited budget and power consumption, issues of remote deployments, long distance microwave links over the ocean, sensitivity to the largest breeding colony the contiguous United States.

Additional network topics will be the requirement to support various services on the island via VLANs, fiber deployment to overcome distance and lightning, RF path calculations, “tuning” of the radio modulations schemes to provide the best up-time and remote support of a location that may only be accessible once a month.


Sailing around the Farallon Islands: Photo by me

PuTTY fixes password leak

An update just has been released: version 0.62

PuTTY 0.59 to 0.61 inclusive had a bug in which they failed to wipe from memory the replies typed by the user during keyboard-interactive authentication. Since most modern SSH-2 servers use the keyboard-interactive method for password logins (rather than SSH-2’s dedicated password method), this meant that those versions of PuTTY would store your login password in memory for as long as they were running.

PuTTY 0.62 fixes this bug. Keyboard-interactive responses, including passwords, are now correctly wiped from PuTTY’s memory again.

Exploitability of MS11-083

I noted the anonymous bug revealed by Microsoft called a Vulnerability in TCP/IP that could Allow Remote Code Execution has been given a couple caveats of perimeter controls and performance.

This month we released MS11-083 to address an externally found reference counter issue in TCP/IP stack.

[…]

…we believe it is difficult to achieve RCE using this vulnerability considering that the type of network packets required are normally filtered at the perimeter and the small timing window between the release and next access of the structure, and a large number of packets are required to pull off the attack. As a result, we assign an Exploitability Index of “2” for this vulnerability.

A claim of inconsistent results, which justifies a 2 rating, also begs questions of who found it and how.