WordPress — Summer Resources

Danielle Gauntz, Web Desinger, had her baby daughter on July 3, 2015.  She will be back, providing full time web support on September 8, 2015.  Her tentative plans include working 10 hours per week, starting July 20,

Shandelle Pepper is the technician providing Word Press support through December.  Don’t hesitate to give her a call.  She is glad to meet with you one-on-one or as a group. Her contact information is:

  • e-mail  peppers@wou.edu
  • phone 503-838-8493

WordPress resources can be found here.

 

 

The Demise of Windows XP

Windows XP support has ended, as of April 8, 2014.  Microsoft suggest that you are five times more vulnerable to security risks and viruses, which means you could get hacked and have your personal information stolen, if you continue to run Windows XP.

By default, Windows XP computers will be blocked from operating on the WOU network, after July 1, 2015.  If you have a critical need that requires Windows XP, please send me a note and I will design an alternative operating path for you.

If you don’t know which operating system you are using, contact the Service Request Desk at 88925 and they will help you identify the OS.

 

 

Security Cameras

  • Deployment of cameras began approximately twelve years ago
  • Currently 170 cameras installed
  • Located in smart classrooms, computer labs, parking lots, building entrances, ball fields, …
  • Cameras record on motion, no sound is recorded
  • Recordings are stored 7 – 10 days
  • The newer cameras are HD 5 megapixel cameras
  • Review of camera footage is most often done after a theft or damage to property, but includes inclement weather, construction progress, classroom support, …
  • Three UCS employees and Public Safety can directly access video recordings

Wireless Infrastructure

Utilization

Rogues and Interferers

802.11 a/b/g/n/ac

  • Example wireless statistics for MacBook Air
  • 802.11 a/b/g/n are available in all WOU wireless locations
  • 802.11 ac deployment was begun in new locations in December 2014.
  • To take advantage of the higher speeds available with 802.11 n/ac, multiple antennas are required.  This is referred to as MIMO (multiple input, multiple output)
  • Frequency
    • 802.11 b/g/n — 2.4Ghz
    • 802.11 a/n/ac — 5.0Ghz
  • Channels
    • 802.11 b/g/n
      • Available channels include 1 – 11
      • The effective channels include — 1, 6, 11.  Utilizing other channels in the 2.4Ghz range will cause interference to the channels on either side.
    • 802.11 a/n/ac — The effective channels include — 36, 40, 44, 48, 52, 56, 60, 64,100, 104, 108, 112, 116, 132, 136, 140, 149, 153, 157, 161, 165
  • Speed — theoretical
    • Wireless is a shared resource.  Each user shares the bandwidth with every other user using an access point.  If there is a slow user connected to an access point, that slows down access for every other user.
  • 802.11 n — 300Mb/s — 100Mb/s per antenna  (MIMO)
  • 802.11 ac — 1.3Gb/s — 400Mb/s per antenna (MIMO) on 5Ghz
  • 802.11 ac — 450Mb/s — on 2.4Ghz
  • 802.11 a — 54Mb/s
  • 802.11 b — 11Mb/s
  • 802.11 g — 54Mb/s
  • Year developed
    • 802.11 b — 1999
    • 802.11 a — 1999
    • 802.11 g — 2002
    • 802.11 n — 2009
    • 802.11 ac — approved January 2014

Security Infrastructure

Phase 1

Phase 2

 

Network Outage

Summary:

The core WOU network router pair failed to pass traffic beginning at 9:30am on January 14, 2015.  Partial network throughput was restored at 12:40pm and a full recovery occured at 9:00pm January 14, 2015.

Timeline:

  • Campus network outage began at approximately 9:30am on January 14, 2015
  • UCS responded immediately and went into diagnostic mode
  • Cisco TAC support was engaged at 10:30am
  • High CPU utilization was identified as an issue on the core campus router pair at 11:00am
  • Call placed to local Cisco representative for additional support at 11:30
  • Call placed to NERO (the WOU ISP) engineer at 12:30
  • NERO diagnostics led to finding a server that was identified as pushing an excessive amount of ARP request to the router.  The server was removed from the network at 12:40pm
  • Several networks were pulled out from behind the firewall, allowing network traffic to flow again
  • CPU utilization went from 99% to 86% after server was removed from the network
  • About 12:50 the CPU utilization had climbed back to 99% even though the server had not been reconnected to the network
  • Additional Cisco support provided about 1:00pm — at this point we had three Cisco engineers on the phone and connected to our router pair via a Webex call.
  • By late afternoon, I requested additional on-site support from Mt. States Networking.
  • A Mt. States engineer was on site by 6:00pm
  • At ~8:15pm, the router netflow process was identified as a culprit in the high CPU utilization.  After the netflows were removed, the CPU utilization fell from 99% to 23%
  • All networks were moved behind the firewall and traffic continued to flow properly.
  • The suspect host that was removed in the morning was returned to service and the CPU utilization on the router immediately climbed to 99%
  • The suspect host was removed

Forensics:

  • February 15, 2015
    • Our unix systems administrator has been reviewing the suspect servers logs and discovered the server had been compromised.  This server is running openstack OS.
    • We know that whoever compromised the server did not gain direct access to it via ssh or telnet
    • Forensics work continues…

E-mail ramblings

This rambling includes e-mail security/insecurity, archiving and content filtering.

 

The University of Washington has posted the following information on their web site:  (http://www.washington.edu/itconnect/connect/email/)

  • Privacy:  The UW email systems are provided to support UW activities and are subject to state laws and UW policy.
  • Do not send sensitive information by email. This includes personnel data, patient records, student information, and financial information.
  • Email messages can be kept and forwarded. Never assume email is private, even when using encryption technologies. The message you send to one person can easily spread to many more.

 

What e-mail security infrastructure is in place at WOU?

  • SSL is the predecessor to TLS
  • What is TLS?
    • Transport layer security is an encryption protocol that is implemented by e-mail systems and other services to prevent eavesdropping and tampering.
  • Always choose TLS rather than SSL, if TLS is an option
  • What does Google say about TLS?  Why should I use TLS?
    • This encryption makes it more difficult for hackers to intercept and read messages.
  • Transport Layer Security is available for incoming and outgoing WOU mail accounts.
    • TLS is on by default when you use the web-based mail client.
    • If you are using an external mail program such as Macmail, Outlook or a mobile device, confirm that TLS or SSL is turned on for both inbound and outbound mail.
  • When mail is sent from a WOU mail account to another WOU mail account the transmission will utilize TLS/SSL, as long as sender and recipient have TLS/SSL turned on.
  • When sending mail to a non-WOU account, all bets are off.
  • You can ensure encryption on the mail receiver end by using active encryption
    • Information regarding active encryption can be found here.

 

Is WOU e-mail filtered?

  • Spam, anti-virus and content filtering is configured.
    • Examples of content filtering include:
      • Nigerian get rich schemes, etc.
      • When there is content with malicious intent that gets through the content management system, we manually enter a rule into the system.  This would include the “Your Mailbox Is Full” email.

 

Do you have trouble finding your e-mails on occasion?

  • They may be in your spam folder
  • All unfiltered e-mails are sent to the mail archiver.
    • The archiver currently contains about three years of e-mail.
    • Your mail that ended up in trash, was deleted or sent to the spam bucket, can be found on the mail archiver.
    • The archiver is located at https://archive.wou.edu
    • Use your Pawprint credentials to login to the archiver.
    • I recommend that you click on the Advanced Search link.

 

Moodle Updates

Moodle development continues in an effort to provide 99.999% up-time and good page load-times.  Current up-time is 99.967%.  Page load times are good, except during large “Course Development” events.

Recent changes:

  • Added additional “Course Development” servers
  • When a server reaches a high enough load to render the web-page unusable, a restart script will automatically be executed on the high load server

Current design:

  • Whether you enter Moodle through a “Course Participation” link or a “Course Development” link, you are accessing centralized data that is shared by all web servers.
  • The current entry point for “Course Participation” is https://moodle.wou.edu
    • One of five Moodle web-servers will respond to https://moodle.wou.edu
      • The algorithm used for selecting which of the five servers will be selected for the current requester, is “least load”.
  • The current entry points for “Course Development” is http://dep-web.wou.edu http://faculty-moodle.wou.edu and http://video-moodle.wou.edu
    • Course Development” is separated from “Course Participation” in order to provide a more consistent user experience for the students.  “Course Development“, tends to have a high load impact on the web-server being used for development.

MoodleCluster

Next iteration:

Moodle access will include the following changes, as represented by the graphic below.

  • Course Participation” remains unchanged
  • The three access points for “Course Development“, will be consolidated into a single link, https://coursedev.wou.edu
    • This change will balance the load across all three “Course Development” servers
    • All three servers, dep-web.wou.edu, faculty-moodle.wou.edu and video-moodle.wou.edu will respond to the URL https://coursedev.wou.edu
      • The algorithm used for selecting which of the three servers will be utilized by the current requester, is “least load”.
    • The three old URLs will continue to function, but will re-direct to https://coursedev.wou.edu

MoodleCluster2

 

One month load average as of 11/25/2014

CryptoWall has arrived

CryptoWall infected a staff members computer recently.  All the files on his C: and H: drive have been encrypted and he no longer has access to them.  Fortunately the files on his H: drive are backed up in several locations, so those are recoverable.  The files on the C: drive have been lost.

The information below the horizontal line came from the Sophos web-site, the WOU anti-virus software company.

Below the double horizontal lines, you will find recommendations from Sophos on how to prevent being infected with this type of malware.


 

CryptoWall and CryptoDefense

New variants of file-encrypting ransomware called CryptoWall and CryptoDefense have been popping up since at least April 2014.

SophosLabs threat researcher Anand Ajjan says CryptoWall has the same code as CryptoDefense, and only differs in the name.

If you see a message like the one below, you’re in trouble – many, if not most, of the data files on your hard drive or any connected drives will be scrambled, and it’s simply not practicable to crack the encryption used by the crooks.

(You don’t have to pay, of course. Despite losing data, police in the New Hampshire town of Durham showed a bit of public resistance to the crooks, announcing that they were “definitely not paying any ransom.”)

The message gives instructions on how to use the Tor anonymizing proxy to access a website where you can pay to unlock your files:

CryptoDefense-pay-screen-500

If you do go to the payment website, you come to a screen that shows a clock counting down the time you have left to pay the ransom.

Leave it too long and the price to decrypt your files doubles:

cw-cost-500

In broken but intelligible English, the website tells you:

We are present a special software - CryptoWall Decrypter - which is allow to decrypt and return control to all your encrypted files.

This website (blocked by Sophos) includes links to payment options, and offers you the chance to “Decrypt 1 file for FREE”:

cw-ransom-500

Unlike the crooks SophosLabs found who are trying to copy CryptoLocker but without actually encrypting your files, CryptoWall’s encryption can’t be reversed without the key.

That means if your files get locked, you either have to pay up, or “do a Durham,” and kiss your files goodbye.

According to SophosLabs, a common way of spreading CryptoWall infections is through exploit kits called RIG (also known as “Goon”) and Angler.

Exploit kits are web pages containing pre-packaged exploits that can be used to deliver malware of your choice to unsuspecting victims.

Often, one group of cybercrooks will simply “rent” exploit kit services from other cybercrooks on a pay-per-install basis.

So, whereas some ransomware attacks use social engineering in spam to trick you into downloading the malware, CryptoWall can get onto your computer just by visiting a website that is rigged up with an exploit kit.

Sophos Anti-Virus (in endpoint and gateway products) detects and blocks the various components of this threat with the following names:

  • HPmal/Ransom-I: the Cryptowall/Cryptodefense malware itself.
  • Troj/ExpJS-KX: web pages containing the RIG exploit kit.
  • Mal/Generic-S and Mal/ExpJava-AF: other exploit kit pages associated with this threat.

 


 

IT admin:

  • prevent SPAM email from reaching end users.
  • educate users not to open any attachments that they are not expecting.
  • ensure local anti-virus is up to date on all computers and is active (ensure the user has not disabled the protection).
  • ensure your central shares (that endpoints update from) are receiving updates from Sophos Update Manager – check your console.

Regular user:

  • avoid opening any attachment emailed to you that you were not expecting.
  • watch out for emails with attachments suggesting you must reply quickly or ‘act fast’ and hence feel compelled to open the attachment quickly – without considering the source.
  • check your Sophos shield in the system tray and make sure it does not have a red cross or warning triangle.
    Good Bad
      

    Move your mouse point over the shield and ensure ‘On-access scanning: disabled’ is not shown.

    Good
    Bad

    Double-click the Sophos shield to open the program.  On the left hand side, under the ‘Status’ panel make sure the ‘Last updated’ value is recent…

  • At WOU “Web control” is Disabled.  When this is turned on, it will block you from going to specific categories of web sites, some of which my be required for your research.

    …the date shown when hovering the mouse point over the shield does not indicate a recent update in protection, but only that it checked with the update source and is in sync.
  • contact your IT department if in any doubt.