{"id":3483,"date":"2021-06-12T12:12:06","date_gmt":"2021-06-12T17:12:06","guid":{"rendered":"https:\/\/control-h.org\/?p=3483"},"modified":"2021-06-12T12:12:06","modified_gmt":"2021-06-12T17:12:06","slug":"make-the-magic-smoke-come-out","status":"publish","type":"post","link":"https:\/\/control-h.org\/index.php\/2021\/06\/12\/make-the-magic-smoke-come-out\/","title":{"rendered":"Make The Magic Smoke Come Out"},"content":{"rendered":"\n<p>As a fledgling programmer, there was a bit of sick satisfaction when some of my shitty code would actually destroy a piece of hardware by something it did.<\/p>\n\n\n\n<p>Obviously, I was not <em>trying <\/em>to destroy that video controller worth a few hundred bucks, but what I was trying to do shouldn&#8217;t have caused it to almost catch fire.  Or not.  It&#8217;s all DC, so the caps did exactly what they&#8217;re there to do when fed too much juice.  (I looked to see if I could find this now-obsolete item, but couldn&#8217;t.  I can&#8217;t even remember the name of the vendor.  I bet if I dug back through my archives, I could find it, but&#8230;..I shouldn&#8217;t have been doing RS-232 programming.  Yes, I have a science degree, but it&#8217;s in a non-technical science.  The same thing would have probably wouldn&#8217;t have happened had I sort of gotten commands to come out of the port using the hot-language-du-jour, and not the correct language for the job, <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/The_C_Programming_Language\" target=\"_blank\">C<\/a><\/strong>.)<\/p>\n\n\n\n<p>Seriously, I just sent too many commands to this thing too quickly, and it started <em><strong>smoking<\/strong><\/em>.  If I&#8217;d been connected with a RS-232 cable, and could type about fifteen times faster than I do, the same thing would have happened.<\/p>\n\n\n\n<p>Writing about this was inspired by some of the topics I&#8217;ve been tracking.  Probably there was some discussion of things that happened with cyber attacks against the Colonial Pipeline, and Iran in <a rel=\"noreferrer noopener\" href=\"https:\/\/podcasts.apple.com\/us\/podcast\/310-two-live-shows-and-a-key-west-hangover\/id356090797?i=1000524883776\" target=\"_blank\">this episode<\/a> of <em>The Fifth Column<\/em>.  There was also something that <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/webjedi\" target=\"_blank\">Am\u00e9lie<\/a> linked on Twitter, and led me down a rabbit hole.<\/p>\n\n\n\n<p>I was in the midst of the <a rel=\"noreferrer noopener\" href=\"https:\/\/control-h.org\/\" target=\"_blank\">^H<\/a> VM migration (a bit of recursion, likely, if you click that link), and playing with the various mess that is the <a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Iptables\" target=\"_blank\">IPTables <\/a>replacement on Linux.<\/p>\n\n\n\n<p>As I&#8217;ve gotten constant probes from certain bad areas, I&#8217;ve sort of taken the approach of temporary DROP operations with <a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Fail2ban\" target=\"_blank\">Fail2Ban<\/a>.  Repeated abuses come, and I start restricting entire countries.  <\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">rule family=\"ipv4\" source address=\"222.160.0.0\/11\" drop<br>rule family=\"ipv4\" source address=\"180.96.0.0\/19\" drop<\/pre>\n\n\n\n<p>I can remember when you&#8217;d use things like reject &#8211;reject-with-tcp-reset to try to really overload attackers&#8217; network gear.  I don&#8217;t do it anymore, because it&#8217;s just easier to let attackers&#8217; attempts fall into the ether.  <\/p>\n\n\n\n<p>You&#8217;d be justified, even, in affirmative responses.  No <a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Non-aggression_principle\" target=\"_blank\">NAP<\/a> violation, because you&#8217;d first been attached.  <\/p>\n\n\n\n<p>Probably.<\/p>\n\n\n\n<p>And that I can&#8217;t be sure is part of why I&#8217;m just dropping shit.<\/p>\n\n\n\n<p>But if I did know, for sure, that the attacks were actually originating from where it appears they are, immediate defensive response is justified.<\/p>\n\n\n\n<p>There&#8217;s a reason nobody dares attack the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.urbandictionary.com\/define.php?term=Norks\" target=\"_blank\">Norks<\/a> (see #4 there).  They&#8217;ve got <a rel=\"noreferrer noopener\" href=\"https:\/\/nationalinterest.org\/blog\/buzz\/north-koreas-big-guns-kims-artillery-pieces-could-start-war-186962\" target=\"_blank\">lots<\/a> of big fucking guns.  Even if half of them cook off on the first fire, they&#8217;ve killed millions of people in South Korea before those guns could all be taken out.  <em>No nukes needed<\/em>.<\/p>\n\n\n\n<p>Would covert action to eliminate some of those assets early be immoral?<\/p>\n\n\n\n<p>The <a rel=\"noreferrer noopener\" href=\"https:\/\/www.msn.com\/en-us\/news\/us\/colonial-pipeline-hack-isnt-the-end-for-bitcoin-say-crypto-experts\/ar-AAKWW1l\" target=\"_blank\">Colonial Pipeline<\/a> and <a rel=\"noreferrer noopener\" href=\"https:\/\/www.msn.com\/en-us\/news\/technology\/ransomware-meat-firm-jbs-says-it-paid-out-2411m-after-attack\/ar-AAKTN8g\" target=\"_blank\">JBS<\/a> attacks happened.  Would retaliation for those attacks be justifiable?  I think so.  What about retaliatory attacks against other things in the area from whence the attacks came?  I don&#8217;t know.<\/p>\n\n\n\n<p>I can&#8217;t remember where I saw a discussion of <a rel=\"noreferrer noopener\" href=\"https:\/\/faculty.nps.edu\/dedennin\/publications\/Moral%20Cyber%20Weapons%20-%20Part-II-CH-6%20-%2024Oct2013%20(3).pdf\" target=\"_blank\">this<\/a>, and the question of transition from cyberwar to kinetic war.  <\/p>\n\n\n\n<p>The sorts of things that float around my scarred brain.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a fledgling programmer, there was a bit of sick satisfaction when some of my shitty code would actually destroy a piece of hardware by something it did. Obviously, I was not trying to destroy that video controller worth a few hundred bucks, but what I was trying to do shouldn&#8217;t have caused it to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-3483","post","type-post","status-publish","format-standard","hentry","category-scarred-brain-murmurings"],"_links":{"self":[{"href":"https:\/\/control-h.org\/index.php\/wp-json\/wp\/v2\/posts\/3483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/control-h.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/control-h.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/control-h.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/control-h.org\/index.php\/wp-json\/wp\/v2\/comments?post=3483"}],"version-history":[{"count":0,"href":"https:\/\/control-h.org\/index.php\/wp-json\/wp\/v2\/posts\/3483\/revisions"}],"wp:attachment":[{"href":"https:\/\/control-h.org\/index.php\/wp-json\/wp\/v2\/media?parent=3483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/control-h.org\/index.php\/wp-json\/wp\/v2\/categories?post=3483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/control-h.org\/index.php\/wp-json\/wp\/v2\/tags?post=3483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}