Transcripts

Know How... 107 (Transcript)

Net Casts you love, from people you trust. This is Twit! Bandwidth for Know How is brought to you by cachefly.com

This episode of Know How is brought to you by iFixit. You can fix it and iFixit makes it easy. With free step-by-step repair guides, high quality replacement parts, and all the tools you will ever need. For $10 off your purchase of $50 or more go to ifixit.com/twit and enter the code know how at check out.

And by Nature Box. What a great tasting healthy snacks delivered right to your door. Forget the vending machine and get in shape with healthy delicious treats like honey Dijon pretzels. To get 50% off your first box go to naturebox.com/twit.

On this episode of Know How we are going deeper into bad USB. We are going to show you how to keep downloading your videos from YouTube even though Google doesn’t want you to do that anymore. And project lunchbox gets on its wheels and we bring you some enterprise plus security for your home.

Father Robert Ballecer: Welcome to Know How. It’s that twit show where we built, bend, break and upgrade. I’m Father Robert Ballecer.

Bryan Burnett: And I'm Bryan Burnett.

Fr. Robert: For the next 30 minutes we are going to be bringing you some of the projects that we've been working on, and actually we’ve got a really cool product that we want to bring into the show just so that you can geek out in your own geek time.

Bryan: Definitely. But before we do that we should probably talk about something that we did last week.

Fr. Robert: Yeah, so people were asking us about that bad USB exploit. It is super scary because it is talking about the ability to reprogram any USB device. To act like any other USB device.

Bryan: And there is no way to know.

Fr. Robert: Right there is no way to know. There is no transparency whatsoever. If you have a USB device that gets compromised the only way to find out what it is doing is to ask the controller. And if the controller is the thing that is compromised it is not going to tell you the truth. That in a nutshell is bad USB.

Bryan: So the question was, can this happen to SD cards too?

Fr. Robert: So in the interview that I had with the researchers who found this, Karsten Knoll and Jacob, they said that if you want to do data transfer safely why not use an SD card instead? And some of the know what all’s picked up on. And they said wait a minute. We heard about a half of SD cards not too long ago. Shouldn't that mean you can do the same thing with SD cards that you do with the USB drive?

Bryan: What is the conclusion?

Fr. Robert: The conclusion is not so much.

Bryan: It is flash memory. There is not a USB controller inside of it.

Fr. Robert: There is not a USB controller that there is a programmable controller. And so there were a few researchers who showed a hack of using the controller inside of an SD card. Remember this is any SD card. Micro SD, Nano SD, etc. They are all Electronically the same. Which is why you can take a microSD card and put it into a converter and plug that into an SD slot. They are all the same.

Bryan: That is what makes them so easy to use.

Fr. Robert: That is what makes them so easy to use. But the controller inside these things is incredibly lightweight.

Bryan: Well, I kind of expect that because how long have SD cards been around. And they are supposed to be universal to be able to plug-and-play. What do you do?

Fr. Robert: It is also because they are single purpose devices. When we release the SD card no one ever said we should probably make the controller robust enough so that we can do a bunch of different things. A controller in an SD card is supposed to do one thing and that is to allow you access to the memory on the card.

Bryan: As quickly as possible.

Fr. Robert: As quickly as possible. As quickly as the memory will allow. Which means that even if you do have the controller on an SD card, which is non-trivial by the way, it wasn’t designed to be updated for anything. You need some specialized equipment, you need to know what you were doing. You can do a whole lot. You could do some re-directions for example you could have all the information on the SD card pumped to a nether spot. Where you can retrieve it later on. But you can’t make it mimic something else. For example there is no way of you plugging an SD card into the card reader of your laptop and your laptop thinking, oh that looks like a printer. Which is what happens with bad USB.

Bryan: With the other one it could be a keyboard. It could be a mouse.

Fr. Robert: It could be another storage device. Or it could be a network adapter that will push things off into a tunnel VPN off-site. That is the nightmare. Let me show you really quickly what we are talking about here. This is an SD card right here. This is a standard 32 GB SD card. Look at this. These are all USB flash drives. But, here on each one of these have all the same controller. These are all vulnerable to the bad USB device. Remember what we said, which is on this side you’ve got the controller and on this side you’ve got the actual flash memory chip. This is where all the storage takes place.

Bryan: I think on one of these that I gave you it is actually…

Fr. Robert: This is the one I actually want to show off. Look at this. We've got the controller on this side but on this side that is actually an SD card. That isn’t micro SD card that they’ve mounted on the back of a USB device. Which tells you, that you need that. You need the power of that controller in order to read that memory.

Bryan: These are all just USBs that I got from you and Shannon when you went to CES. they are all 2 GB and I took them apart just to see what they look like inside. It was kind of funny that it was a microSD card inside.

Fr. Robert: You can actually pull that SD card off the back of that and plug it into something and it will work just fine.

Bryan: I thought about that. It looks like it is stuck in there pretty good.

Fr. Robert: So ultimately when you think about bad USB you have to think about not just that you can own the controller. Because you can own the controller on a lot of things. You have to be able to own the controller that A) has enough power to do something else and B) was designed to fill multiple roles. And that is only with a USB. Not with the SD.

Bryan: What if these were getting owned at the manufacturers level.

Fr. Robert: I don’t want to talk about that. It is scary. Actually we talked about that on Twiet.

Bryan: You had a Kingston representative on there?

Fr. Robert: We had a Kingston representative and they were saying that one of the things that they actually do that none of the other manufacturers do is they maintain control of all the raw materials until they receive the drives. It is one of these things where they think this is enterprise grade. We can tell you with certainty we have seen all these pieces, there are no middleman in the middle attacks. Of course unless someone intercepts them in route. But most manufacturers use the same assembly line. And if there was a bad actor on that assembly line reprogramming the controllers we would never know.

Bryan: It is definitely scary. I guess it is kind of like security through obscurity. Just knowing that is possible and there is not too much you can do about it.

Fr. Robert: There is nothing you can do.

Bryan: Can you de-solder these?

Fr. Robert: The researchers who found this exploit, the way they found it was they had to de-solder the memory and then in a specialized reader to find out what was on it. Because that is where the exploit gets stored. As long is that controller is there the controller will not let you have access.

Bryan: And who is going to do that?

Fr. Robert: Nobody. Now you could on this one. This cool one with the SD card, you could pull that off. And you could read that and that would show you the code that is being used. That might be a Know How.

Bryan: Make that a project?

Fr. Robert: I think we should. So next time we are going to show you how to do with a bunch of German researchers couldn’t. No not really. Now, Brian. One of the things that we had been doing a lot is we have been disassembling things.

Bryan: I love taking things apart. Putting them back together is usually a little bit more difficult.

Fr. Robert: But it is optional. Who needs all that extra stuff? If it still works? What we have been using to do our disassembling it to find out how things work is we have been using the iFixit toolkit. In fact we got out on the desk right now. We have been using it to remove the casings from these USB drives. But that is just one way that you can use the iFixit tool kit. it really is the best friend of anyone who needs to get in and out of the year that they want access to. Now, iFixit is a company that offers you free online repair manuals for pretty much everything. They have more than 10,000 repair guides for everything from electronics on your smart phone or your tablet to your games console, to your home appliances, to your clothing, even your bike. They also have foolproof instructions to fix all your stuff. If you have ever shattered your iPhone screen or in Shannon’s case the Nexus screen you need to repair something like the red ring of death, or you need to swap the batteries on your galaxy S3. You need the right tools to do it. And iFixit has got you covered. Now this is the protect toolkit. We have shown this off on Know How a lot because this is our go to set for everything we need to do with electronics. It has 70 tools to assist you with any mod, malfunction, or misfortune that comes your way. This toolkit is the gold standard for electronics work. From garage hackers to the CIA and FBI, but more importantly they are unique tools that you just need. This kit includes a 54 bit driver kit. That is this thing right here. This is fantastic because if you ever try to take apart electronics you know the frustration of not having quite the right fit. And when you use not quite the right bit that is when you strip things, that is when you break things, that is when your project goes south. This kit has Phillips bit, cantaloupe bit, torques and torque security bits. Try wing bits, which are popular for video game caught consoles. And triangle bits which are used for McDonald’s toys. In other words anything you want to hat, you can hack it with this kit. They also include ESD safe precision tweezers that for delicate manipulation like for example whenever we are planning with these we are supposed to be using tweezers instead of our fingers. They also include things like this antistatic ESD wrist strap to make sure that you don’t nodischarge device that you are trying to fix. They've got nylon sponges, metals sponges, plastic opening tools for prying and scraping. And, it is lightweight and compact and it rolls up so that you can take it with you when you need to have it on the go. It is only $64.95 and it is backed by a lifetime warranty. Home DIYers and fixers alike use this protect tool kit for doorknobs, eyeglasses, cabinet doors, sink fixtures and more. If you are looking for an addition to your toolkit try this out. Go to ifixit.com and see if maybe this is what you need to take your DIY and make your spirit to the next level. Now here is what we want you to do. With iFixit you can fix it yourself. Visit iFixit.com/twit for more than 10,000 Free step-by-step guides. iFixit also sells every part and tool that you will need. Enter the code know-how at checkout and you will save $10 off any purchase of $50 or more. That is ifixit.com/twit. And we thank iFixit for their support of Know How.

Bryan: I got this as a gift for someone and I just never gave it to them. I just kept it.

 Fr. Robert: I actually have one in my house that I got as a gift for my father. But I never gave it to him. It’s really good too. We have been playing with project lunch box for the last couple of weeks. We've been showing you how the motors work, how the circles work, how the transmitter and receiver works. On the last episode we got it to a rolling chassis. But now we need to give you the final integration. Here is step five of Project lunchbox.

Fr. Robert: The last time we saw project lunch box we had just finished assembling the rolling chassis. Complete with steering, shocks, and transmission. Now we need to complete final integration. The last step before our lunch box is drivable. Let’s start by clipping and installing the mounts for the lunchbox body. These are the posts that will allow the shell to be secure to the chassis. Clip the four mounting posts and installed them on the corners of the chassis. Now let's install the power switch for the internal electronics. There is a small slot on the left side of the chassis into which the switch can be mounted. I suggest installing the switch with the on position towards the rear of the vehicle so that ground to Paris cannot accidentally turn off your lunchbox. The TVLO2S is a dual-mode electronics speed controller that supports both brushed and brushless motors. However since it defaults to brushless local sensing and the motor in the kit is a brushed cam we can only use two of the power leads and they do not use the remote sensing cable. The first thing we need to do is switch the mode on the ESC to match our set up. Holding down the setup button turn on the power and wait until the LDT flips to read then release the setup button. The LED will flash red, then green, then read, been green again. Press the setup button when it flips to green and it should rapidly flash screen. Your ESC has now been set to brushed mode. It is time to get mounting. There is a piece of dual sided tape in the kit that you can attach to the bottom of the remote control receiver and the electronic speed controller. Mount the receiver on the pedestal just in front of the rising detail then install the ESC on the tell itself. Making sure to keep the power leads near their respective outlets. Read the blue and yellow power leads from the ESC through the tail towards the transmission assembly. Then connect the yellow and green limits from the motor to the yellow and blue leads in the ESC respectively. Now connect the steering servo to Channel one in the ESC to channel 2 on the receiver. In addition to receiving throttle commands from channel 2, the ESC will supply power to the receiver through the same cable. Negating the need for a separate battery pack. We are going to be crashing the lunchbox a lot. And we need a way to protect the vulnerable steering assembly. The kit includes a bumper that screws on the front of the vehicle to give us that protection. Now let's install the antenna whip. The whip will keep the antenna from dragging behind the lunchbox or getting tangled in the drive wheels. Read the wire down through the chassis then back up to the antenna mounting hole. You're going to need to thread the antenna wire through the antenna rod, I suggest using some of the kits lube to ease the process. Once it is through the rod, snub the rod into the antenna mounting coal and pull the remaining slack to the top of the rod. Preparing the body is a simple matter of screwing in the sunroofs, windshield, bumpers and side boards. Once the body is complete, lower it over the chassis guiding the antenna rod through the body and lineup the mounting holes over the mounting posts. Your lunchbox is now ready to run.

 Fr. Robert: I noticed it is really filthy now. Thank you for doing that to project lunchbox.

Bryan: Oh yeah, my pleasure. Sometimes you’ve really got to put in the hours.

Fr. Robert: It even got filthy on the inside. That is a special kind of…

Bryan: Is still smells a little bit too.

Fr. Robert: What were you writing the street?

Bryan: Sand, dirt, tar weed. A lot of stuff. But it did really good. It was awesome.

Fr. Robert: That is why we got this one. It is a lot of fun to drive. It is not the easiest thing to drive, it is not the fastest thing to drive but it is robust. You can roll this thing over a couple of times, take it up and down a hill and it is kind of bouncy.

Bryan: Yeah, I went with some friends camping and the battery lasted a couple days. We played with it about 20 minutes at a time.

Fr. Robert: You didn’t take a second battery?

Bryan: No. Just the one. It is cool when you see it on the San two. It is kicking up.

Fr. Robert: It does bring out that inner six-year-old. This is what I wish I could do with my real car!

Bryan: Even watching the video we started making engine noises and things.

Fr. Robert: That is all part of the fun. Now this is not it. We are not done with Project lunchbox. We have put it into stock configuration. The only thing that we have added so far has been the ball bearings. Because those are a pain to get to after you have actually assembled it. But there is a lot of aftermarket modifications that we are going to make to this.

Bryan: Oil filled shocks?

Fr. Robert: Oil filled shocks. Because it bounces around way too much. It is really hard to control.

Bryan: That is the thing that as I was driving it through sand it was really uneven so every bomb you were trying to turn and it would kind of hit something and then divert from the line that you were trying to follow.

Fr. Robert: And the other thing is that it tends to be a bit unstable in the back. It makes it nosedive. So there are a couple of mods that we can do to the transmission and the casing itself to give it a bit more stability so that you don’t end up nosing the lunchbox into the ground again and again.

Bryan: It did do a few flips out there.

Fr. Robert: Now we are also going to hand this over to your brother and he is supposed to turn this really trashed horribly messed up shell into something nice. People in the chat room Are you saying you should put a red racing stripe on it.

Bryan: Yeah. That would give it more horsepower something right?

Fr. Robert: I also noticed that the antenna is a lot shorter than it used to be.

Bryan: Okay, so we might have to come up with some sort of modification for that because when you flip the lunchbox as much as we did, it just snapped the antenna right where it sets with the case. It is bound to happen. That is why we have two of them.

Fr. Robert: This is why we got two of them. Now this was a lot of fun and we are going to continue with Project lunchbox. We are going to show you some of the things that you can do either to your lunchbox or any RC model. Again one of the reasons why we do this is because everything that you assemble on a remote control model like this does have an analog in the real world. If you want to know how transmissions work, if you want to know how ball bearings work, if you want to know how steering linkages work, this is a really good way to get started.

Bryan: Very cool.

Fr. Robert: Speaking of getting started, you know how I start the day?

Bryan: Snacks?

Fr. Robert: Snacks. Kind of sad but it’s true.

Bryan: Me too.

Fr. Robert: I’m going to be serious about this for a while here. I obviously have some body issues. For health wise I would like to drop a couple of pounds. But one of the things that many people try to lose weight is that they make a mistake early on and say I’m just not going to eat. Which for so many different reasons doesn’t really work. It doesn’t work on a physiological level and it doesn’t work on a mental level because then you start thinking I was really good today I didn’t snack at all I am going to eat seven hamburgers. But what we found is that the people who are in the know tell us that snacking is okay. Snacking is good. You’ve just got to make sure that you snack on the right stuff.

Bryan: When I wake up in the morning all I want is a cup of coffee and maybe just a little snack. I don’t usually either big breakfast and I need to snack through the day because I am type I diabetic and my blood sugar goes down. But I don’t want something really heavy.

Fr. Robert: If you go to the back room where we have the snacks for the Twit Army. There are nerds, skittles and all the sugar bombs that will give you a quick boost of energy that they are so bad for you. We also used to have a pantry full of Nature Box. And I say used to because we ate them all. They are really, really good. That is the second sponsor of this episode of Know How. It is Nature Box. When you are looking for something good to snack on you got to stop and by the Nature Box. What is Nature Box? Nature Box is the easy way to get healthy snacks to your door it in every week. What makes it healthy? There is no high fructose corn syrup, it is zero trans-fat and there is nothing artificial. Nature Box is Great tasting snacks right to your door with free shipping anywhere in the United States. So here’s how it works. You go to their website and you click on the continue button. You choose between three subscription options. Then you place your order. Once you are a member of nature box you can select which snacks you would like in your monthly box. You can select by dietary needs like vegan, soy free, gluten intolerance, lactose free, nut free and non-GMO. That is actually really important. You need to have the non-sugary snacks. But what I like is that you get to choose between flavors. I didn’t know this.

Bryan: Sweet, savory, spicy.

Fr. Robert: Exactly, Sweet, savory and spicy. That makes the difference. Sometimes I am in the mood for something sweet, but more often than not I kind of like that savory. My favorite are the Santa Fe corn sticks. I can’t get enough of those.

Bryan: I know. I wish I knew what they tasted like because you keep taking them. this is my breakfast right now. A cup of coffee and the whole wheat blueberry fig bars.

Fr. Robert: No matter what you are craving you are going to find something to put in your Nature Box. That is what I like. It is that constant upgrading of their offerings. That is what makes Nature Box so nature box. so the next time you get cranky and hungry or cranky hippo and hungry don’t forget. now with these snacks you get something that is guilt free, you get something that is good for you, something like smoky pumpkin seeds or lemon pistachios, or dried Pears. And over 100 more healthy choices. So here’s what we want you to do. We want you to go to Nature Box, we want you to pry one out of Brian’s hands and get 50% off your first box. Just go to naturebox.com/twit. Stay full, stay strong and go to naturebox.com/twit and we thank Nature Box for their support of Know How.

Bryan: And the packaging is really good too.

Fr. Robert: He likes the Nature Box because he likes to…

Bryan: I look forward to it. I get to eat and I get to throw things. What do we have next?

Fr. Robert: Okay, so we wanted to do a little something something for people who want to download YouTube videos.

Bryan: Right. Because we had a way of doing it not that long ago.

Fr. Robert: Yes. It was YouTube center for chrome. It was a fantastic solution. Basically once you installed that it would give you an actual button in the YouTube window that would allow you to download the video, download the audio, to get rid of ads. It was a really cool little feature. But Google didn’t like it so the first thing they did was they made it so that every time you shut down crawl and restarted it would say there is an unauthorized extension in here. I am going to disable it for your own safety. And we got a lot of feedback about that. There was a workaround. You A copy of the extension on your desktop and so every time you started up chrome futures dropped it back in.

Bryan:. I guess that works. But it is a pain.

Fr. Robert: It was annoying. Well now it just doesn’t work at all. So they changed chrome just enough so the extension just won’t even load anymore. It doesn’t have matter how many times you try to fake it you are not going to get the download.

Bryan: But where there is a will there is a Firefox browser.

Fr. Robert: So what we are going to do is we want to show you happy you can use the exact same plug-in in Firefox instead of chrome. This is just what Firefox looks like. Again, just like we did with chrome you are going to go to a get up for the YouTube center. This is what it looks like. Notice that we had been getting this. We have been getting chrome and this isn’t really going to work anymore. In fact, if you look at this on the Chrome webstore page, they finally in order to get this, which if you lose the download option then why would be you use it? But the firefox extension is still untouched. So if you go ahead and click the firefox extension, it is going to download one. This is how you install it. it is super, super complicated. Pay close attention. This is tough. So check this out. Here is where the download went right? It is a 15 step process. And it starts with this. We have to go to here, we have to go to add-ons, we have to go to these extensions, and then we have to take this and drop it in there.

Bryan: Did you just drop it?

Fr. Robert: That is hard. It is super super hard. But it works! Now if you go to YouTube… I now have my download thing back and I can download in multiple resolutions. I can download audio only and I can also stream. We have a guest in the studio who wanted to know if this allows for streaming. And it does. Streaming is just downloading. So this will let you download to your mobile device so that you can just listen to the audio version in your car.

Bryan: That is a beautiful thing padre.

Fr. Robert: Beautiful thing. And because Firefox is not owned by Google they are not going to disable this.

Bryan: It is such a weird thing. You know the guys that Google probably feel the same way we do and the only reason I use the YouTube downloader is for our own videos when I need to edit things out or make clips out of it.

Fr. Robert: One of the things that I use it for is when I am going on a trip. And sometimes I do want stupid cat videos that I can upload.

Bryan: Or if you are going on vacation And you know there is a set of videos that you want to watch. It is nice to have the option to download it so you don’t have to use your mobile data.

Fr. Robert: Now this does require you to install Firefox on your computer. I am sorry if you really don’t want yet another browser. But, it is okay. I still prefer chrome for most things and it kind of frustrates me because hey Google you are not going to stop people from downloading YouTube videos so why are you crippling your browser.

Bryan: Probably just trying to save face.

Fr. Robert: Okay. Let’s get away from that.

Bryan: Start your own Padre browser. Do whatever you want.

Fr. Robert: I might look disapproving at you but I’m not can stop you. Do you like the little picture?

Bryan: You shouldn't be doing that.

Fr. Robert: From Jurassic Park. All right, this next segment is a little something special. Every once in a while I find a product and this one I found at DefCon and it came from a friend of one of my other shows. This man has been a guest on this week in enterprise tech many times. They have started a new company called Itus Network. And they are creating a small box that goes between your router and your broadband provider. And it gives you enterprise class security. Another going to be a lot of people who say what does that mean? And that is why last week we had a chat with him.

Fr. Robert: Every once in a while a product will come to my attention that is that proper combination of the maker spirit and good old-fashioned corporate know-how. That is the case with the iGuardian. This little box that goes between your broadband provider and your home router to give you enterprise class security for a home router price. Now to explain what this I guardian does, I brought on Daniel Ayoub from Itus Network to talk about a brand-new product they are kickstarting. Daniel, first of all thank you for coming back. I have had you on one of my other shows, This Week In Enterprise Tech. You used to work for Sonic Wall, which is one of the vow den masters of security and now you’ve started a new company with its own kick starter. Can you tell me a little about this.

Daniel Ayoub: Sure. So we are really trying to take a lot of the business-class security that you find in the commercial firewalls that cost several hundred to thousands of dollars. And provide that in a very easy to use form factor that is affordable to be able to market it for families.

Fr. Robert: What does that mean? Because I hear that all the time. I hear inner price class security in a box and it is only this expensive. But what does that mean? What are the enterprise features that you wouldn’t normally get in a high-end router that you might buy from Fry's or Best Buy?

Daniel: Absolutely. This thing that you are going to find here is that it is and actually end line intrusion prevention system. Not only are we processing the packets and letting them in and out, we are actually looking at the data payloads and inspecting the contents of every pack coming into the system. If there is a pattern of known attacks for an exploit or vulnerability that is being exploited, we are able to identify that and block that malicious code from reaching its intended target. If we see a system on the trusted network that is infected we can identify the outgoing command and control traffic to a malware server or to a known Trojan bot net or something like that. We can actually sever and block those connections as well.

Fr. Robert: So not only are you protecting the computers from malicious attacks outside but you are keeping infected computers on the inside from hitting computers on the outside. Which would kill off a bot net.

Daniel: Absolutely. And it will also prevent your personally data from leaving your home network.

Fr. Robert: Isn’t that what my WRT54G with open source software would have done 10 years ago? What is different?

Daniel: The commercial routers that you were talking about, consumer off-the-shelf type routers that you buy from a big box store like Best Buy or Fry’s, those are basically all utilizing state full packet inspections and firewalls. That is the same type of technology that we have used for about 25 years now. It probably came onto the scene in the late 90s were the late 80s to early 90s. Something that is a pretty mature technology but again it is really just looking at, is this connection allowed to come backend? It is not actually inspecting the contents of the data coming through that connection. So if there were, for example, your Linsys router if you were to click on a malicious link - say you’ve got a phishing email where you got targeted in some way and you were to click on a link that you weren’t supposed to, your Link-sys router isn’t going to have a problem letting that malicious content into the network. It is not actually inspecting the traffic to know that this is an attack. It just knows that you requested this data, so it is going to allow it backend.

Fr. Robert: But in order to do what you’re suggesting it means that you are doing some sort of signature defense right? You are actually looking at the type of traffic and you are looking for specific patterns that would denote an attack. That means you have to update the signatures. Is there some sort of signature update program for this?

Daniel: Absolutely. So the kick starter in addition is aggregating the community in open source GPL tools, convert them to a drop, serve it up as a download so that our backers are able to pull that down on a daily or weekly basis on an automated fashion. So the box will update itself in that respect. If you are an advanced user and you want to subscribe to a third-party service such as Emerging Threats or Source Fire VRT you have the ability to also hide your own custom rules or your third-party subscription to it as well.

Fr. Robert: This is a DYI show, a Maker show so they are going to want to know what actually goes in here. what kind of hardware goes into a consumer level enterprise security products?

Daniel: So, we are actually using the same type of security processors that you would find in a large enterprise firewall. So somebody like the Palo Alto networks or Juniper are using the same type of security processors that we are. The difference is that they are using a 24 core or 48 core and we are using a dual core version. Now that type of CPU is special for this type of application. It is a dual core mix CPU that is able to also have an integrated application acceleration processor. So it can actually do layer 7 inspection, regular matching, PCR matching, at a very very fast rate to offload the CPU so that you can do inline IPS inspection. Now in terms of what is under the hood in this. The hardware is the Cavium Octeon CPU but the software that we are utilizing is 100% open source. So we are using open WRT as the base operating system and then Snort is the in-line intrusion prevention system. The production version that we are making for the kick starter, that compute power that you find in nap platform compared to some of the commercial firewalls that are out there are providing about 2X the compute power at about 1/10 of the price. So it is a very, very powerful platform in the sense that coupled with the open source it really makes it almost endless the possibilities of what you can do.

Fr. Robert: You mentioned the price which means now I have to mention the price.

Daniel: So, the kick starter edition that we have online for $149 for the targeted price. The MSRP will be $179. The nice thing about this also is that we are providing lifetime access to the community and open source rules that are available to you online. So if somebody wanted to go and build their own box and use the open source community rules that is something they can do. You will typically spend $300, $400 or $500 just on the appropriate components to build the computer and then you are going to spend your entire weekend configuring it and hoping that it works the way that it is supposed to. We have really simplified that and try to provide a platform that is very powerful, very flexible but still affordable so that the nerd, the hackers and the tweakers that want to play with it it is open for you to be able to do that.

Fr. Robert: I don’t think we call ourselves tweakers.

Daniel: Okay, let’s say the hobbyists or the hunters that Want to be able to play with it and get at the underlying operating system, configure it as they see fit. It is completely open for them to be able to do that. But also making it easy enough that someone like my mom can literally just plug it in between her modem and her router and have an adequate baseline.

Fr. Robert: I like that. So the basic level of plug it in and get protection but also if you’ve got the steels you can have fun and kind of poke around with it. Daniel thank you so very much. Where can they find this? If they want to contribute to the kick starter and get you on your feet and get this thing built, where do they go?

Daniel: Sure. In order for us to be able to bring this to market at an affordable price we need to pre-sell at least 8000 circuit boards. That is so that we can get the price under $149 to be able to sell it at an affordable rate. So we have it on kick starter today, we are about a third of the way towards our goal. If you go to itusnetwork.com/kickstarter it will redirect you to the page. Also if you go to itusnetwork.com and click on the banner on the home page it will take you to the kick starter page.

Fr. Robert: Thank you so very much.

Daniel: Thank you for having me.

Fr. Robert: Daniel Ayoub of Itus Networks. If you want some enterprise security in your home, check out the little white box.

Fr. Robert: No Bart in the chatroom has a really good question. He wants to know what if your modem and your router are one and the same? We covered this before. I hate when they do that and it is so difficult for you to find a provider that will give you just the modem. Why?

Bryan: Because they want the control.

Fr. Robert: Now there are some providers, and actually go to our Google plus page because some of our users pointed out the different ISPs that give you the option of a bridge mode. There is a certain port that you can plug-in or a certain feature that you can access and it will kind of turn off the router. Kind of. What you don’t want to do is that you don’t really want to go from your router/modem to a nether router. You want to make sure that you can actually use this device on your network. But what I love about this is that it is open source so you know exactly what is running on it. I am a big proponent of open source. There is no security through obscurity. All the tools that run on this box, I can run on my laptop right now. It is running Linux, it is running Snort. and it is using definitions for signatures that you can readily access. The difference is I was trying to put together a machine that would do something like this because some of the know it all’s wanted a router that would do this sort of function.

Bryan: Because we have talked about the packets… and the difference between a switch and a hub and stuff like that. But I like this because it seems like a natural progression of security. Without having to upgrade your router, you can have some of the security that you wouldn’t be able to get without spending a ton of money.

Fr. Robert: Exactly. And that is the thing. There are going to be people who say why not just build a PF router. That would work. But that would cost 2 to 3 times more than this. And you would have to upkeep it. This is a dumb box. This goes in line, it updates its own definitions and if you get the kick starter version it means you get a life time access to all those definitions. And if you have ever used in enterprise product that is the part that is expensive. The continual licensing. This is, by the product have access to the community and you are done. You brought up a question.

Bryan: We need to start monitoring the traffic going out of our networks a little bit more. And would this be a way of detecting the bad USB?

Fr. Robert: I thought about it and yes. Because one of the things that we talked about last week we talked about bad USB is that since you can’t see the memory, you have no visibility…

Bryan: The only way you can find out if something like this is happening is monitoring your traffic.

Fr. Robert: Exactly. Behavior. And that is what this works on. He was trying to explain this in the video, which is the router that you’ve got it does really well in state full packet inspections. Which basically means I am going to block out all the ports unless your computer requests access on that port. If your computer is owned, it is going to request access on that port and the router will just say okay sure. This doesn’t do that. This actually does de-packet inspection. It looks at layer 7 and it says what are you doing and what are you asking for? It is going to go no, no. This looks like bot traffic. Or this looks like a dump of system memory. I’m not letting this through. So, if you want to I think Itus’s slogan is, “To secure your internet of things”. If you want something to secure your Internet of things, this is a very good option.

Bryan: It’s a cool idea. Did you back it?

Fr. Robert: I did. I have one. Well, I backed it and I asked the guys that Itus, could you please help me? know, the one they brought in was a prototype. So there was a 3-D printed case on prototype board but Brian Chee who is my cohost on Twiet, he’s got a prototype as well and right now he is blasting it with all the tools he uses to test his enterprise gear.

Bryan: We should get Rafael Mudge one too.

Fr. Robert: now that was a lot of material that we had for this episode.

Bryan: But don’t worry. We have shown notes. Very detailed show notes that you can find at twit.tv/kh, that is where all our episodes live. You can subscribe, download, and like we were saying you can go through the show notes because in these episodes we cover a lot of stuff. And we don't want you to get lost so we provide links for you, whatever you need.

Fr. Robert: It is a manifest of everything. For example with the lunchbox built we are going to show you where we bought it, we are going to show you what mods we are going to make to it, we are going to show you where you can find the kick starter for Itus, we are going to show you what steps we used and what links we used to do the YouTube Center for Firefox. So if you ever wanted to do something that we have done on this show, we have probably given you step-by-step instructions to do it.

Bryan: We are just trying to help fill that knowledge hole. But if you are looking for more ways to have social interaction you can go to our Google plus page. I don’t think the link is working…

 Fr. Robert: The shorter doesn’t work so go to Google plus and just look for the knowhow group. With 7000+ members strong, the best thing about the know how Army is that even if Bryan or I aren’t answering your questions there is probably going to be someone in there who can. It is a great place if you are a DIYer or a Maker to get started. There are no stupid questions. There are only stupid graphics.

Bryan: And we have plenty of those. But you can also find projects and post your own stuff there too. And probably the best way to get a hold of us is on twitter.

Fr. Robert: Because if you send us an email we are just going to forward it to Jeffrey.

Bryan: Jeff loves email.

Fr. Robert: You can find me @PadreSJ.

Bryan: And I am @Cranky_Hippo.

Fr. Robert: Follow us, talk to us on Twitter. It is a really good way to get input into the show. If you want to see something in a future episode or if you are upset with something talk to us on twitter. We love to talk to our fans. We love to talk to our audience.

Bryan: You can see what we are up to on a day-to-day basis. Like building a know-how layer.

Fr. Robert: Right under our feet. That ceiling is what we are standing on right now. We’ve carved off an area of the basement that is going to become the Know How layer. The Know How Layer.

Bryan: And Alex is the director so he is keeping an eye on everything.

Fr. Robert: The best thing about this is that the basement is filled with boxes so we are making a wall.

Bryan: It’ll be like the bat cave. You’re giving away all the secrets thought.

Fr. Robert: The Know How Cave. Also, thanks to our TD. @anelf3. Alex Gumple who works his butt off every week. It is nice to have a real TD. You can find him at @anelf3. Make sure to follow him and tell him what you want to see us do. Until next time, I’m Father Robert Ballecer.

Bryan: And I’m Bryan Burnett.

Fr. Robert: And now that you know….

Bryan: Go do it!

All Transcripts posts