Files
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

232 lines
20 KiB
Plaintext

Episode: 1581
Title: HPR1581: Sensible Security: The Schneier Model
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1581/hpr1581.mp3
Transcribed: 2025-10-18 05:16:38
---
This episode of HBR is brought to you by AnanasThost.com.
Get 15% discount on all shared hosting with the offer code HBR15.
That's HBR15.
Better web hosting that's honest and fair at AnanasThost.com.
Hello, this is Ahuka, welcoming you to Hacker Public Radio and
another exciting episode in our security and privacy series and in this one what I want
to do is I want to give you a way of thinking sensibly about security and to do this I'm
going to be pulling on some stuff done by real smart security people in particular for
this one Bruce Schneier.
If you cast your mind back to 2001 there was a certain incident on September 11th that led
many people to go oh my god we are doomed we must increase security do whatever it takes
and the NSA was happy to oblige and on 7705 July 7th of 2005
an attack in London added to the frenzy.
I think it is fair to say that the security agencies felt they were given a mandate to
do anything as long as it stops the attacks and thus was the overwhelming attack on privacy
moved to a whole level higher. Now to be clear security agencies are always pushing the limits
it is in their DNA and politicians have learned that you never lose votes by insisting
on stronger security and appearing tough but the reality is that security is never 100%
and the higher the level of security the greater the costs in terms of our privacy and liberty
and it is also the case that total insistence on liberty and privacy would cause your security
to go down as well so you should not adopt any simple-minded approach to this problem
in general as you add layers of security each added layer gives you less benefit some simple
security steps can give you a lot but as you add more and more the added benefit drops and this
is an example of what we call the law of diminishing returns by the same token each added measure
extracts an ever-increasing cost in terms of the loss of liberty and privacy
and conceptually you could draw a couple of curves one rising for the costs the other falling
for the benefits look for where the curves cross to determine the optimum level of security that
balances the costs and benefits in practice it's not that simple measuring these costs and benefits
tricky and there is no simple equation for either curve nonetheless a balance of some kind does need
to be struck and I want to be clear that my position is I don't think we should get rid of all
government security services I don't think that spying is one of those things that no one should
ever do for any reason and I think they very often do valuable things in some cases I'd like
to see them do more you know when we take a look at cyber security and how do we secure computer
systems I think it's a very valuable role for government experts in helping to make this happen
so I'm not I'm not an anarchist about all of this but my my position is you have to strike a
balance and as a member of the public I think I need to have my voice heard about this so
in the wake of the 9-11 attacks Bruce Schneier published a book called Beyond Fear
Thinking sensibly about security in an uncertain world came out in 2003
in this book he shows that hysteria is not a good approach to security and that you need to ask
yourself some questions to see what the cost versus benefit calculation looks like for you
I'm going to draw on his model to talk about security as we are discussing it in this series
now you've probably all heard the old joke about what constitutes a secure computer and the answer
is is that it has to be locked in a vault with no network connection and no power connection
and even then you need to worry about who can access the vault now it's a joke in the sense that
no one would ever do this we use computers in the internet because of the benefits they give us
and having a computer in a vault with no network connection and no power connection is just
a waste of money we accept a certain degree of risk because that's the only way to get the
benefits we want so how does Schneier approach this he suggests a five step process for any security
measure you are contemplating you need to have a clear eyed rational look at the costs and benefits
and Bruce's five step process looks to accomplish this this is a series of questions you need to
ask in order to figure out if this particular measure makes any sense it's a question number one
what assets are you trying to protect this is what defines the initial problem any proposed
counter measure needs to specifically protect these assets need to understand why these assets are
valuable how they work and what are attackers going after and why so if your problem is that
someone has been stealing the email out of your mailbox and your security measures to lock the
back door hmm kind of a mismatch there locking the bad back door may or may not be a good thing to do
in many cases it's probably a good thing to do but it's not going to stop anyone from stealing your
mail all right so what are the risks against these assets to do this you need to analyze who threatens
the assets what are their goals how might they try to attack your assets to achieve these goals
you need to be on the lookout for how changes in technology might affect this analysis
right the risks are going to be a changing thing as the technology changes for instance we've
talked a lot about encryption in this series that's what we started off with
and we talked about creating keys and one of the things we said was the expectation by NIST
was that 2048 bit PGP would stand up to attack until the year 2030 now they come up with that by
making estimates of how quickly computing power is increasing you know looking at Moore's law
and things like that if there's a breakthrough in quantum computing that's going to change everything
now if there's a breakthrough in quantum computing our standard ways of encryption almost
immediately become like tissue on the other hand what I haven't heard too many people say yet
is if we have a breakthrough in quantum computing maybe there is a new way of doing encryption
you know it is kind of an arms race here but you need to keep up with what's going on in technology
question three how well does the security solution mitigate the risk now mitigate is a useful term
here as opposed to totally eliminate because very rarely do you totally eliminate a risk
very often is just a matter of making it not worth anyone's while you know I remember a joke
about two campers who are out in the woods and all of a sudden they realized that there's a bear
who is prowling around their campsite and one of the guys says all right I've got to get my track
shoes the other guy says well track shoes aren't going to help you cannot run a bear and the first guy
says don't have to I just have to outrun you you know mitigation is very often a case of
making it just you know giving yourself a little edge you know a good example of mitigation
is locking your front door most of us do that at least in the United States maybe where you are it's
different I always lock my front door when I leave in the morning could someone still break into my
house yeah they could it's a little harder if the door is locked so to me that is a reasonable
amount of safety you know if they have to break down the door that you know might get noticed by
the neighbors someone might call the police and generally the feeling is if you just make it a
process where they they move on to some other place that's easier to deal with then you've achieved
your goal so understand your counter measure all right how will it protect the asset when it works
properly but you know you also need to take an account what happens when it fails because no
security measure is a hundred percent foolproof and everyone will fail at some point in some
circumstances a fragile system fails badly a resilient system handles failure well
that think about that a fragile system fails badly a resilient system handles failure well
one of the things about nine eleven that I have not heard enough people talk about
is that the experts didn't do a damn thing that was useful it was individual people
all right individual people are resilient security systems tend to be very fragile
now a security measure could be slightly less effective under ideal conditions but handle
failure much better and that might make it the optimum choice so that's one of the things you
need to think about another one is a measure that guards against one risk may increase vulnerability
somewhere else and then you got to watch out for the whole false positive versus false negative
trade-off it is a truism that any set of measures designed to reduce the number of false negatives
will increase the number of false positives and vice versa reduce the false positives the false
negatives will go up now false positive is when you think you've discovered an attack and you
didn't really a false negative is where you think everything's fine and yet you really are under
attack you know both of those are problems question four what other risks does the security solution
cause security countermeasures always interact with each other and the rule is that all security
countermeasures cause additional security risks question five what trade-offs does the security
solution require every security countermeasure affects everything else in the system it affects
the functionality of the assets being protected it affects all related work connected systems
and they all have a cost frequently but not always financial but also in terms of usability
convenience and freedom so these are the five steps that you want to go through to evaluate
and you don't just do this once you need to re-evaluate as the systems evolve as the technology changes
there's a saying security is a process and that's really what we're talking about
now i'm going to take a look at a very common one and in fact it's going to set me up
because i want to talk about this some more going forward and that's passwords and we take a
look at that in this context so i have a cartoon on the wall of my cubicle at work that shows an alert
box says password must contain an uppercase letter a punctuation mark a three digit prime number
and a Sanskrit hieroglyph i think the only thing that left out was a squirrel noise
now we've all encountered this it does get frustrating this is a humorous take on something that
is an accepted best practice i recall the story about a fellow who worked at a company that
insisted he regularly changed his password and would also remember the eight previous passwords
and not let him use any of them again but he liked the one he had so he spent a few minutes
changing his password nine times in a row the last time being back to his favored password
now was he a threat to security or was the corporate policy misguided let's try Bruce's model and see
where we get what assets is the company trying to protect now i think this has several possible
answers the company may want to prevent unauthorized access to corporate data on its network
or the company wants to prevent unauthorized use of its resources possibly with legal implications
and the company may be concerned to prevent damage to its network all of these are good
reasons to try and control who has access to this asset and to protect it but knowing which of
these is being targeted may matter when we get to trade-offs and effectiveness of the proposed
countermeasures for now let's assume the primary interest is in preventing unauthorized access
to the data such as credit card numbers on an e-commerce site question two what are the risks
against these assets well if we're talking about credit card numbers the risk is that criminals
could get their hands on these numbers from the company standpoint though the risk is what
can happen to them if this occurs will this cause them to assume financial penalties will the CEO
be hauled in front of legislative committees will their insurance premiums rise as a result
this is the sort of thing companies really care about and when you understand this you begin to
see why companies all adopt the same policies when people talk about best practices
you should not assume that anyone has actually determined in a rational manner what the best
practices should be it only means that they are protected in some sense when things go wrong
after all they followed the industry best practices the biggest failure of security
is when companies or organizations just apply a standard instead of rules instead of creating
a process of security I see this criticized constantly in my daily newsletter from the sans
institute question three how well does the security solution mitigate the risks
this becomes a question of whether forcing people to change their passwords frequently is a
significantly effective measure in preventing unauthorized access to computer networks and here's
where things really start to break down it is very difficult to come up with many examples of
cases where a password in use for a long time leads to unauthorized access that's simply not how
these things work we know that the majority of these cases derive from one of two problems
social engineering to get people to give up their password and malware that people manage to
get on their computer one way or another now how does that work constantly let's take social
engineering for number one we're always hearing stories about how some security company and I
have a friend who does this kind of testing for his customers he's a security professional
and you know the first thing they do when they're evaluating the security is they start calling
people up and something oh hi I'm from the IT department I just am trying to verify something
could you give me your password and about half the time people well this has been done over and
over again all you have to do is you know plausibly look like you're the sort of person they ought to
give this stuff to now does changing your passwords frequently stop that attack no
that do a damn thing now the other one is people managing to get malware okay RSA which is a security
company they lost the keys to the kingdom they lost the keys to the RSA security tokens
from malware because a secretary clicked a link in an email there there was a attack levied
against Iranian facilities and the median for that was and it's pretty clear now is some
combination of the US government and the Israeli government that worked on all of this
and the way they got it on there was by dropping usb keys on the ground in the vicinity of the
facility figuring will someone will pick it up and say oh look usb key lucky me plug it into
their computer and then the software we get in there there's lots of ways to do this okay
making people change their passwords won't guard against any of these things and and this is
really the thing you've got a policy that everyone complies with because it is a best practice
and when you look at it it does not guard against the risks that are out there
now can you make an argument that forcing people to frequently change passwords might in rare
cases actually do some good maybe but there's no way to say that this is in general an effective
countermeasure against unauthorized access it simply isn't question four what other risks
does the security solution cause there are several possible risks that come out of this
first since all security measures require a variety of resources and remember people's time and
attention is one of those resources emphasizing one security measure may take resources away from
more effective measures that don't get sufficient attention but there are also risks from how people
act in response to this policy in the ideal world of the security department each person with
access would choose a long complicated password each time chosen for a maximum entropy and then
memorized but never written down yeah that'll happen sadly for the security department they
have to deal with actual human beings who do not do any of these things most people at the very
least consider this an annoyance some may actively subvert the system like the fellow in our story
who changed his password nine times in a row to get back to the one he liked but even without
this type of subversion we know what people will do if you let them they will choose something
that is easy to remember is their first attempt and that means they will most likely choose a
password that can easily be cracked in a dictionary attack if you instead insist that each password
contain letters numbers upper and lower case a Sanskrit higher or a glyph and two squirrel noises
they will write it down probably on a yellow sticky note attached to their monitor
if the person question is a top executive of course it gets even worse because they don't put
up with the BS that the ordinary worker bees have to tolerate question five what trade-offs does
the security solution require well this policy causes a major impact on usability and convenience
and all of this for a policy that we saw above actually accomplishes very little in the majority
of organizations the IT department is viewed with a certain amount of hostility and this is part
of it in addition anyone in an IT help desk can tell you that they get a lot of calls from people
who cannot log in because they forgot their password which is a natural consequence of forcing
people to keep changing it so bottom line what does all this mean in the final analysis
I think it means you need to carefully consider which measures are actually worth taking
and this is at least impart a cost versus benefit analysis for instance as I have
initially written this the heartbleed vulnerability was in the news and I got to hear
Bruce Schneyer discuss how people should react and he did not say oh my god change all your
passwords right now he said you should assess the case if it is your password to log into your bank
probably something you want to change but if it was some social network you access once every two
weeks he said and don't bother and that seems reasonable and as another example although I have
discussed how to encrypt emails and digitally sign them that does not mean I open up GPG every
time I send an email it is something of a pain in the posterior to do and I use it judiciously
I don't see the point in digitally signing every email when a lot of it is just stupid stuff anyway
so I'm going to give three final rules from Bruce Schneyer
all of this is in his book Beyond Fear by the way and he goes into this in much more depth
rule number one risk demystification you need to take the time to understand what the actual
risk is and understand just how effective any proposed security countermeasure would be
there will always be a trade-off if the risk is low and the countermeasure is not particularly
effective why are you doing this saying we must do everything on our power to prevent
a risk that is unlikely and where the countermeasures are not likely to work is how you get to
what Snowden revealed rule number two secrecy demystification secrecy is the enemy of security
to get that secrecy is the enemy of security if you're looking for security
making things secret doesn't get you there security can only happen when problems are discussed not
when discussions are forbidden secrecy will always break down at some point see above Snowden
this is the failure mode of security by obscurity most often secrecy is used to cover up incompetence
or malfeasance rule number three agenda demystification people have agendas and
often use security as an excuse for something that is not primarily a security measure
and emotions can lead people to make irrational trade-offs
so with that this is a hookah signing off and as always reminding you to support free software bye bye
so like all our shows was contributed by an hbr listener like yourself if you ever thought of
recording a podcast and click on our contributing to find out how easy it really is
hecka public radio was founded by the digital dog pound and the infonomicon computer club
and it's part of the binary revolution at binrev.com if you have comments on today's show
please email the host directly leave a comment on the website or record a follow-up episode yourself
unless otherwise stated today's show is released on the creative comments attribution share
free www.fieldrie.org license