- Deployment of cameras began approximately twelve years ago
- Currently 170 cameras installed
- Located in smart classrooms, computer labs, parking lots, building entrances, ball fields, …
- Cameras record on motion, no sound is recorded
- Recordings are stored 7 – 10 days
- The newer cameras are HD 5 megapixel cameras
- Review of camera footage is most often done after a theft or damage to property, but includes inclement weather, construction progress, classroom support, …
- Three UCS employees and Public Safety can directly access video recordings
and other network stuff
Rogues and Interferers
- Rogues are access points that don’t belong to the WOU network and may be masquerading as a WOU access point
- Interferers are devices that are transmitting on the same frequency as the WOU wireless access points. Most interference occurs in the 2.4Ghz frequency spectrum. This could include cordless phones, microwave ovens, Bluetooth, rogue access points and xBoxes.
- Users, rogues and interferers
- Interferer overview
- Bluetooth link risk in a wireless environment — 2.4Ghz frequency hopping
- Bluetooth discovery risk in a wireless environment — 2.4Ghz
- WiMax risk — 5.0Ghz, frequency hopping
- xBox risk — 2.4Ghz frequency hopping
- Microwave oven risk in a wireless environment — 2.4Ghz
- Microwave location
- Example wireless statistics for MacBook Air
- 802.11 a/b/g/n are available in all WOU wireless locations
- 802.11 ac deployment was begun in new locations in December 2014.
- To take advantage of the higher speeds available with 802.11 n/ac, multiple antennas are required. This is referred to as MIMO (multiple input, multiple output)
- 802.11 b/g/n — 2.4Ghz
- 802.11 a/n/ac — 5.0Ghz
- 802.11 b/g/n
- Available channels include 1 – 11
- The effective channels include — 1, 6, 11. Utilizing other channels in the 2.4Ghz range will cause interference to the channels on either side.
- 802.11 a/n/ac — The effective channels include — 36, 40, 44, 48, 52, 56, 60, 64,100, 104, 108, 112, 116, 132, 136, 140, 149, 153, 157, 161, 165
- 802.11 b/g/n
- Speed — theoretical
- Wireless is a shared resource. Each user shares the bandwidth with every other user using an access point. If there is a slow user connected to an access point, that slows down access for every other user.
- 802.11 n — 300Mb/s — 100Mb/s per antenna (MIMO)
- 802.11 ac — 1.3Gb/s — 400Mb/s per antenna (MIMO) on 5Ghz
- 802.11 ac — 450Mb/s — on 2.4Ghz
- 802.11 a — 54Mb/s
- 802.11 b — 11Mb/s
- 802.11 g — 54Mb/s
- Year developed
- 802.11 b — 1999
- 802.11 a — 1999
- 802.11 g — 2002
- 802.11 n — 2009
- 802.11 ac — approved January 2014
- Install physical and virtual firewall infrastructure
- Redundant Firewall Design — physical layer
- Create / Update firewall rules
- Install physical and virtual intrusion prevention system
- Create VRFs (virtual routing and forwarding) on core routers
- Create / Update intrusion prevention rules
The core WOU network router pair failed to pass traffic beginning at 9:30am on January 14, 2015. Partial network throughput was restored at 12:40pm and a full recovery occured at 9:00pm January 14, 2015.
- Campus network outage began at approximately 9:30am on January 14, 2015
- UCS responded immediately and went into diagnostic mode
- Cisco TAC support was engaged at 10:30am
- High CPU utilization was identified as an issue on the core campus router pair at 11:00am
- Call placed to local Cisco representative for additional support at 11:30
- Call placed to NERO (the WOU ISP) engineer at 12:30
- NERO diagnostics led to finding a server that was identified as pushing an excessive amount of ARP request to the router. The server was removed from the network at 12:40pm
- Several networks were pulled out from behind the firewall, allowing network traffic to flow again
- CPU utilization went from 99% to 86% after server was removed from the network
- About 12:50 the CPU utilization had climbed back to 99% even though the server had not been reconnected to the network
- Additional Cisco support provided about 1:00pm — at this point we had three Cisco engineers on the phone and connected to our router pair via a Webex call.
- By late afternoon, I requested additional on-site support from Mt. States Networking.
- A Mt. States engineer was on site by 6:00pm
- At ~8:15pm, the router netflow process was identified as a culprit in the high CPU utilization. After the netflows were removed, the CPU utilization fell from 99% to 23%
- All networks were moved behind the firewall and traffic continued to flow properly.
- The suspect host that was removed in the morning was returned to service and the CPU utilization on the router immediately climbed to 99%
- The suspect host was removed
- February 15, 2015
- Our unix systems administrator has been reviewing the suspect servers logs and discovered the server had been compromised. This server is running openstack OS.
- We know that whoever compromised the server did not gain direct access to it via ssh or telnet
- Forensics work continues…
This rambling includes e-mail security/insecurity, archiving and content filtering.
The University of Washington has posted the following information on their web site: (http://www.washington.edu/itconnect/connect/email/)
- Privacy: The UW email systems are provided to support UW activities and are subject to state laws and UW policy.
- Do not send sensitive information by email. This includes personnel data, patient records, student information, and financial information.
- Email messages can be kept and forwarded. Never assume email is private, even when using encryption technologies. The message you send to one person can easily spread to many more.
What e-mail security infrastructure is in place at WOU?
- SSL is the predecessor to TLS
- What is TLS?
- Transport layer security is an encryption protocol that is implemented by e-mail systems and other services to prevent eavesdropping and tampering.
- Always choose TLS rather than SSL, if TLS is an option
- What does Google say about TLS? Why should I use TLS?
- This encryption makes it more difficult for hackers to intercept and read messages.
- Transport Layer Security is available for incoming and outgoing WOU mail accounts.
- TLS is on by default when you use the web-based mail client.
- If you are using an external mail program such as Macmail, Outlook or a mobile device, confirm that TLS or SSL is turned on for both inbound and outbound mail.
- When mail is sent from a WOU mail account to another WOU mail account the transmission will utilize TLS/SSL, as long as sender and recipient have TLS/SSL turned on.
- When sending mail to a non-WOU account, all bets are off.
- You can ensure encryption on the mail receiver end by using active encryption
- Information regarding active encryption can be found here.
Is WOU e-mail filtered?
- Spam, anti-virus and content filtering is configured.
- Examples of content filtering include:
- Nigerian get rich schemes, etc.
- When there is content with malicious intent that gets through the content management system, we manually enter a rule into the system. This would include the “Your Mailbox Is Full” email.
- Examples of content filtering include:
Do you have trouble finding your e-mails on occasion?
- They may be in your spam folder
- All unfiltered e-mails are sent to the mail archiver.
- The archiver currently contains about three years of e-mail.
- Your mail that ended up in trash, was deleted or sent to the spam bucket, can be found on the mail archiver.
- The archiver is located at https://archive.wou.edu
- Use your Pawprint credentials to login to the archiver.
- I recommend that you click on the Advanced Search link.
Moodle development continues in an effort to provide 99.999% up-time and good page load-times. Current up-time is 99.967%. Page load times are good, except during large “Course Development” events.
- Added additional “Course Development” servers
- When a server reaches a high enough load to render the web-page unusable, a restart script will automatically be executed on the high load server
- Whether you enter Moodle through a “Course Participation” link or a “Course Development” link, you are accessing centralized data that is shared by all web servers.
- The current entry point for “Course Participation” is https://moodle.wou.edu
- One of five Moodle web-servers will respond to https://moodle.wou.edu
- The algorithm used for selecting which of the five servers will be selected for the current requester, is “least load”.
- One of five Moodle web-servers will respond to https://moodle.wou.edu
- The current entry points for “Course Development” is http://dep-web.wou.edu http://faculty-moodle.wou.edu and http://video-moodle.wou.edu
- “Course Development” is separated from “Course Participation” in order to provide a more consistent user experience for the students. “Course Development“, tends to have a high load impact on the web-server being used for development.
Moodle access will include the following changes, as represented by the graphic below.
- “Course Participation” remains unchanged
- The three access points for “Course Development“, will be consolidated into a single link, https://coursedev.wou.edu
- This change will balance the load across all three “Course Development” servers
- All three servers, dep-web.wou.edu, faculty-moodle.wou.edu and video-moodle.wou.edu will respond to the URL https://coursedev.wou.edu
- The algorithm used for selecting which of the three servers will be utilized by the current requester, is “least load”.
- The three old URLs will continue to function, but will re-direct to https://coursedev.wou.edu
CryptoWall infected a staff members computer recently. All the files on his C: and H: drive have been encrypted and he no longer has access to them. Fortunately the files on his H: drive are backed up in several locations, so those are recoverable. The files on the C: drive have been lost.
The information below the horizontal line came from the Sophos web-site, the WOU anti-virus software company.
Below the double horizontal lines, you will find recommendations from Sophos on how to prevent being infected with this type of malware.
CryptoWall and CryptoDefense
New variants of file-encrypting ransomware called CryptoWall and CryptoDefense have been popping up since at least April 2014.
SophosLabs threat researcher Anand Ajjan says CryptoWall has the same code as CryptoDefense, and only differs in the name.
If you see a message like the one below, you’re in trouble – many, if not most, of the data files on your hard drive or any connected drives will be scrambled, and it’s simply not practicable to crack the encryption used by the crooks.
(You don’t have to pay, of course. Despite losing data, police in the New Hampshire town of Durham showed a bit of public resistance to the crooks, announcing that they were “definitely not paying any ransom.”)
The message gives instructions on how to use the Tor anonymizing proxy to access a website where you can pay to unlock your files:
If you do go to the payment website, you come to a screen that shows a clock counting down the time you have left to pay the ransom.
Leave it too long and the price to decrypt your files doubles:
In broken but intelligible English, the website tells you:
We are present a special software - CryptoWall Decrypter - which is allow to decrypt and return control to all your encrypted files.
This website (blocked by Sophos) includes links to payment options, and offers you the chance to “Decrypt 1 file for FREE”:
Unlike the crooks SophosLabs found who are trying to copy CryptoLocker but without actually encrypting your files, CryptoWall’s encryption can’t be reversed without the key.
That means if your files get locked, you either have to pay up, or “do a Durham,” and kiss your files goodbye.
According to SophosLabs, a common way of spreading CryptoWall infections is through exploit kits called RIG (also known as “Goon”) and Angler.
Exploit kits are web pages containing pre-packaged exploits that can be used to deliver malware of your choice to unsuspecting victims.
Often, one group of cybercrooks will simply “rent” exploit kit services from other cybercrooks on a pay-per-install basis.
So, whereas some ransomware attacks use social engineering in spam to trick you into downloading the malware, CryptoWall can get onto your computer just by visiting a website that is rigged up with an exploit kit.
- HPmal/Ransom-I: the Cryptowall/Cryptodefense malware itself.
- Troj/ExpJS-KX: web pages containing the RIG exploit kit.
- Mal/Generic-S and Mal/ExpJava-AF: other exploit kit pages associated with this threat.
- prevent SPAM email from reaching end users.
- educate users not to open any attachments that they are not expecting.
- ensure local anti-virus is up to date on all computers and is active (ensure the user has not disabled the protection).
- ensure your central shares (that endpoints update from) are receiving updates from Sophos Update Manager – check your console.
- avoid opening any attachment emailed to you that you were not expecting.
- watch out for emails with attachments suggesting you must reply quickly or ‘act fast’ and hence feel compelled to open the attachment quickly – without considering the source.
- check your Sophos shield in the system tray and make sure it does not have a red cross or warning triangle.
Move your mouse point over the shield and ensure ‘On-access scanning: disabled’ is not shown.
Double-click the Sophos shield to open the program. On the left hand side, under the ‘Status’ panel make sure the ‘Last updated’ value is recent…
- At WOU “Web control” is Disabled. When this is turned on, it will block you from going to specific categories of web sites, some of which my be required for your research.
…the date shown when hovering the mouse point over the shield does not indicate a recent update in protection, but only that it checked with the update source and is in sync.
- contact your IT department if in any doubt.
Two methods of guest wireless access are now available on the WOU campus.
- Sponsored Guest
- A guest account can be created prior to the guest arriving on campus. Accounts can be created by the APA’s, Service Request Desk, Hamersly Library reference desk or the Werner University Center Information Desk.
- The guest will select SSID: wou-guest
- The SSID password will be provided by the sponsor.
- The guest will login using the credentials provided by the sponsor.
- Self-serve Guest
- A guest account is created by the guest when they arrive on campus.
- The guest will select SSID: wou-guest-open
- When the guest selects SSID wou-guest-open, they will be presented with the web pages seen below.
- The guest login credentials will be sent by both text message and e-mail, once they complete the form below.
- The guest will login using the credentials sent to them as a result of their form submission.
- Campus users will continue to use SSID: wou-secure.
The WOU EDW (data warehouse), VDI and Moodle have all been moved from spinning drive storage to SSD storage, utilizing the NetApp EF550. VDI is running on a RAID 0 pool, while Moodle, Oracle and Cognos are running on RAID 6.
The server side utilizes the Cisco UCS blade platform. The RedHat operating system runs on VMware. The communication between server and storage is via a HA pair of Cisco Nexus 5000’s, utilizing 8Gb fiber-channel SFP’s.
Significant data throughput improvements has been noted on the following three applications:
- Data Warehouse (utilizes both Cognos Insight and Oracle 12c database)
- Reports that previously took 25 – 30 seconds to complete now finish in 5 – 10 seconds
- The user experience, including moving through menu items, creating queries and reports within Cognos, has increased significantly
- VDI (virtual Windows 7 desktop lab environment running on VMware)
- 200 concurrent lab VMs, all running on an NetApp EF550. Previously these 200 VMs were spread accross two FAS-3250 heads, a FAS-2240-2 with flash pool and a FAS-2240-2
- Windows logins that previously took 45 – 80 seconds, now take 20 – 25 seconds
- Moodle version 2.7.1
- The user load is currently peaking at about 186 users on the current term Moodle server. See graph here
- The http response time on the current term, running on EF550 SSD drives averages 25 milli-seconds, with 60 milli-second peaks. See graph here
- The http response time on last summer term, running on spinning drives is averages 291 milli-seconds, with 1,635 milli-second peaks. See graph here
- Differences in latency between spinning drives and SSD drives were significant during several load test. See graph here The large spike on the right side of the graph was 580 users utilizing spinning drives, while the small bump further to the right of the spike was 5,125 users utilizing SSD drives.