PodParley PodParley
ITed Myself

PODCAST · technology

ITed Myself

A raw and uncut IT/Cybersecurity podcast that presents sophisticated and complex technical issues in a humorous and easily understood manner.This podcast has three objectives:Improve the Cybersecurity of the world through education.Present information to be humorous and easily understood.Provide everyone with the tools to protect themselves.

  1. 135
  2. 134
  3. 133
  4. 132
  5. 131
  6. 130
  7. 129
  8. 128
  9. 127
  10. 126
  11. 125
  12. 124
  13. 123
  14. 122
  15. 121
  16. 120

    Episode 117 - What Can The Fall of the Roman Empire Teach Us About the Beginnings of Cyber Security

    28th International Conference on Knowledge-Based and Intelligent Information & EngineeringSystems (KES 2024)Use of ML and AI in Cybersecurity- A SurveySuman Karkia,∗, A B M Mehedi Hasanb, Cesar Saninc

  17. 119

    Episode 116 - What Can English Longbowman Teach Us About Security Adoption

    https://maryrose.org/https://www.historiascripta.org/the-middle-ages/english-longbowman-one-of-the-deadliest-weapons-of-the-late-middle-ages/https://en.wikipedia.org/wiki/English_longbowhttps://www.historic-uk.com/HistoryUK/HistoryofEngland/The-Longbow/

  18. 118
  19. 117
  20. 116

    Episode 113 - What Can Gift Delivery Teach Us About Novel Attack Methodology

    https://yessantaisreal.com/how-does-santa-get-in-your-house/

  21. 115
  22. 114
  23. 113
  24. 112
  25. 111
  26. 110
  27. 109

    Episode 106 - What Can Maesters Teach Us About DNSSEC

    Scott Rose, Matt Larson, Dan Massey, Rob Austein, and Roy Arends. 2005. RFC 4033: DNS Security Introduction and Requirements. RFC 4033. IETF. https://doi.org/10.17487/RFC4033Scott Rose, Matt Larson, Dan Massey, Rob Austein, and Roy Arends. 2005. RFC 4034: Resource Records for the DNS Security Extensions. RFC 4034. IETF. https://doi.org/10.17487/RFC4034Scott Rose, Matt Larson, Dan Massey, Rob Austein, and Roy Arends. 2005. RFC 4035: Protocol Modifications for the DNS Security Extensions. RFC 4035. IETF. https://doi.org/10.17487/RFC4035 There are three foundational Request For Comment (RFC) documents that create Domain Name System Security Extension (DNSSEC). They outline the concept of the problem and the proposed solution (RFC 4033), define key terms (RFC 4034), and describe how to implement the solution (RFC 4035). These three documents were published together and are to be read together to understand the foundation of DNSSEC implementation. Things have changed in the twenty years since formal start. However, these three are the foundation of DNSSEC and the natural starting point for research into the topic.  Ben Laurie, Geoff Sisson, Roy Arends, and David Blacka. 2008. RFC 5155: DNS Security (DNSSEC) Hashed Authenticated Denial of Existence. RFC 5155. IETF. https://doi.org/10.17487/RFC5155 This is not backwards compatible, but it does stop NSEC enumeration. NSEC functions by providing a response to DNS queries for names that are not secure with the “Next SECure” name. In the initial implementation this wasn’t seen as an issue. However, with usage it was determined that this enabled enumerations by chasing NSECs across the entire subdomain until being pointed back to the Apex. While not directly damaging, giving away the naming scope was determined to be a bad call. Beyond the paranoid it also had a significantly unbounded cost associated with it, thus NSEC3 (the third iteration of attempting to solve the enumeration walking) was created. NSEC3 uses a hash value which conceals names and is a smaller compute value.  Eric Osterweil, Dan Massey, and Lixia Zhang. 2009. Deploying and Monitoring DNS Security (DNSSEC). In Proceedings of the 2009 Annual Computer Security Applications Conference (ACSAC '09). IEEE Computer Society, 429-438. https://doi.org/10.1109/ACSAC.2009.47 This paper dives into the double problem set of a distributed core system plus a cryptographic system four years into DNSSEC’s existence. Either one is difficult. Combining them along with the voluntary implementation doesn’t bode well for global compliance. United States Federal Government mandated the use of DNSSEC for Federal sites within the .gov domain. And a majority of ccTLD (country code Top Level Domains) begin implementing. Article also talks at length about the difficulty that RFC 5155 and NSEC3 attempts to solve. Also discussed their belief that a DNSSEC monitoring platform should be established and showed off their version SecSpider.  Wilson Lian, Eric Rescorla, Hovav Shacham, and Stefan Savage. 2013. Measuring the Practical Impact of DNSSEC Deployment. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security '13). USENIX Association, 573-587. Eight years after DNSSEC and only 0.15% of .com TLD are using it. These authors also traced significant delays and in-effect denial of service caused by DNSSEC. Interestingly, they indicate it is statistically significant in the Asian Regional Internet Registry (RIR). The authors created a web browser based iframe extension to study these issues over 529,294 clients’ weeklong internet usage. The iframe used 27 tests per usage (1 no DNSSEC, 1 with DNSSEC, 25 improper DNSSEC), to obtain the data for their report. They also dive into the size of the DNSSEC packet, the failover to TCP or resizing via EDNS0. Comcast as an ISP completely implementing DNSSEC in 2012 which radically changed the percentage of adoption for North America. Added perk, this article talked about SecSpider which was interesting to see they were still relevant and provided more meaning to the earlier article.  Adnath Hemanthindra, Amreesh Phokeer, Visham Ramsurrun, Panagiota Katsina, Sumit Anantwar, and Amar Kumar Seeam. 2021. DNSSEC as a service - A prototype implementation. In Proceedings of the 2020 32nd International Conference on Microelectronics (ICM). IEEE 1-6. https://doi.org/10.1109/ICM50269.2020.9331810 Sixteen years after DNSSEC and even with ICANN publishing warning about DNS vector cyber attacks significant portions of the internet are still not fully implementing DNSSEC. APNIC (Asia Pacific Network Information Centre) specifically cited with less than 25% DNSSEC confirmations. One thing that is noted, is even though adoption has slowly grown, outages caused by misconfigurations have grown in step. A specific example was when the ccTLD .nl key roll over didn’t happen correctly the ~5million sub-domains were impacted. In a sample of 1,456 signed zones 194 were misconfigured in some manner (13.32%). Doing a managed DNSSEC as a service was tested and found to be viable, a quick google search shows that this is a very practical commercial service in 2025.  Marek Bator, Jakub Przystasz, and Miłosz Serafin. 2023. Security of the DNSSEC Protocol and Its Impact on Online Privacy Protection. Advances in Web Development Journal 1, 2 (2023), 43-63. https://doi.org/10.5281/zenodo.10050033 Eighteen years after publishing and adoption is 51.64%(Europe) at the high end and 36.07% at the low end (Asia). One issue that is recurring is distrust from rest of world and the United States. Of the 13 root server clusters 10 are managed by American elements. An additional part of the concern is tied into an interesting factoid brought up in this article, the Key Signing Ceremony. As defined in the initial RFCs the DNS roots have to get the initial trust out-of-band. This is accomplished four times a year in a ceremony that is designed to keep the systems protected, even from malicious actors present in the ceremony. It physically occurs at two sites within the continental United States and that also leads to concerns with some foreign nations.Music by Sam Green Media: http://samgreenmedia.com/subscribe

  28. 108
  29. 107
  30. 106
  31. 105
  32. 104
  33. 103
  34. 102
  35. 101
  36. 100
  37. 99

    Episode 96 - What Can The Lagerlunda Rail Accident Teach Us About Power Users

    https://www.nei.nih.gov/learn-about-eye-health/eye-conditions-and-diseases/color-blindness/types-color-vision-deficiencyhttps://time.com/archive/6769967/national-defense-color-blind-observers/https://www.reddit.com/r/AskHistorians/comments/a32spn/colorblind_recruited_in_ww2_to_see_camouflage/https://www.bbc.co.uk/history/ww2peopleswar/stories/99/a2107199.shtmlhttps://academic.oup.com/milmed/article-abstract/175/2/84/4344546?redirectedFrom=PDFhttps://www.militarytimes.com/off-duty/military-culture/2023/06/05/do-you-need-color-vision-to-be-a-pilot-in-the-military/https://www.aao.org/eye-health/diseases/what-is-color-blindnesshttps://pubmed.ncbi.nlm.nih.gov/1104986/#:~:text=Holmgren's%20supposition%20that%20colour%20blindness,basis%20of%20the%20court%20records.https://pubmed.ncbi.nlm.nih.gov/22301271/https://en.wikipedia.org/wiki/Lagerlunda_rail_accident

  38. 98
  39. 97
  40. 96
  41. 95
  42. 94
  43. 93
  44. 92
  45. 91
  46. 90
  47. 89
  48. 88

    Episode 85 - What Can Operation Spiders Web Teach Us About Dwell Time

    https://en.wikipedia.org/wiki/Operation_Spider%27s_Web

  49. 87

    Episode 84 - What Can Tic Tacs Teach Us About Remediation and Mitigation

    https://en.wikipedia.org/wiki/Tic_Tac https://www.amazon.com/review/R2JGNJ5ZPJT4YC https://www.boredpanda.com/eating-many-tic-tacs-sudden-weight-gain/

  50. 86

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

A raw and uncut IT/Cybersecurity podcast that presents sophisticated and complex technical issues in a humorous and easily understood manner.This podcast has three objectives:Improve the Cybersecurity of the world through education.Present information to be humorous and easily understood.Provide everyone with the tools to protect themselves.

HOSTED BY

Matthew Minneman

URL copied to clipboard!