About Clay

I'm a Data Center Operations Engineer in beautiful Charleston, SC. I'm happily married to my wonderful wife Nan and we have an teenage daughter Lela. I'm a total geek. I got into electronics when I was around 9 or 10 and got hooked on computers shortly thereafter. I also love Sci-Fi, (not fantasy) particularly Star Trek. My favorite outdoor activities include rollerblading, biking and hiking. I'm also a bit of a car guy and amateur racing driver.

Don’t take your health for granted

As I sit here resting my back from this week’s physical therapy routine, enjoying a cold beer and my Anjunabeats playlist, I’m keenly aware of the state I was in two weeks ago. It was a Saturday like most others. I was hooking the bike trailer to my 21-speed hybrid road bike in preparation to take my daughter on an afternoon ride through our favorite bike trail. My back had been a little sore the past few days, (probably due to overloading my messenger bag) but I hadn’t really given it a second thought. It never occurred to me that what I felt might be an early indicator of a serious injury.

As I was finishing adding air to my tires, my daughter tripped on the driveway and skinned her knee. (she’s only 4 and doesn’t always understand why we tell her not to run…) I dropped what I was doing, scooped her up and took her into the house to get fixed up. I stopped in the kitchen, I think instinctively because I felt something, but I didn’t realize it at the time. I picked her back up and as I made the first few steps up the stairs to the bathroom I felt a sudden stabbing pain in my back and was unable to carry her any further. Thankfully my wife was there to take over because I was almost completely incapacitated.

Every step, every movement of my body those first couple of days were met with intense pain. It never occurred to me that something so simple could bring someone my age, quite literally to his knees. I felt like an 80-year-old, not someone in their mid 30’s.

The fault is entirely mine. While I’ve been telling myself that my 15 minute walks to and from work are good exercise, I haven’t been making much effort to stay in shape. Sure I do the occasional bike ride or walks around the neighborhood and I play Wii Fit plus, (sometimes) but nothing regular. Once my physical therapist clears me for more strenuous activities, that is going to change. I’m not going to let this happen again.

Back in the saddle

It’s been a while since my last post, about a year in fact.  This will come as no surprise to those who’ve followed my blog before.  In my defense, it wasn’t entirely my fault.  Back when I decided to convert my static weblog over to a proper blog platform, (and being cheap) I decided to host it myself with a free dynamic domain service.  For the most part, this worked great until one day that company decided to stop providing some of the domains for free.  I didn’t want to pay $15/year for a single hostname when I could have multiple domains for the same money.  I looked at other free solutions, but I just couldn’t trust that these domains would stick around.

Fast forward to today:  My trusty Compaq Evo, while tiny and very power efficient (try 35W @ idle running a Pentium 4 CPU) just wasn’t cutting it.  I wanted a new machine with multiple cores, SATA and GigE.  I had an AMD Phenom x3 CPU collecting dust in my computer room, so I decided to order up a new motherboard, and a pair of 2TB drives.  The new machine definitely eats more power, but it’s also got to keep 4 disks spinning.  I’ve also broken with tradition and installed Linux on this server.  (my previous servers have always been at the latest version of Microsoft’s server OS to give me extra practice before implementing at work…)  Hosting this blog on a WIMP platform has been an experience in frustration at times, so switching to LAMP was already a desirable option.  The last piece of the puzzle was to find a domain I liked that was cheap and easy to remember… and that brings us full circle.  I definitely should’ve done this sooner.

Computer security and the human factor

One of the most important things to remember about security is that it is a process, not a product.  All too often, people think of security as a specific problem with a specific solution.  Unfortunately for us, security (in almost any context) is a moving target.  What was a strong password yesterday is weak today.  There are good reasons to require users to change their passwords, but it’s only part of the solution.  Forcing user’s to change their password too often invariably results in weaker passwords that are easier to remember.

To understand why this is a problem we first need to define what a strong password is and what makes one weak.  Numeric passwords are the worst as there are only 10^N possibilities where N is the number of characters.  Using letters is a little better as that’s 26^N for english.  Using both upper and lower case gives you 52^N, while a full alphanumeric set gives you 62^N.  Use of a full alphanumeric characterset on passwords 8-characters and higher was considered strong enough until recently.  After all, 218 trillion possibilities seems pretty large doesn’t it?  Considering some of today’s high-end graphics cards can perform over 2 trillion floating point operations per-second, breaking even a completely random 8-character alphanumeric password is trivial.  Adding the full set of special characters   on most english keyboards yields an additional 30 characters for 92^N or 5 quadrillion possibilities for an 8-character password.

You’re probably noticing a problem; we’re out of usable characters.  From this point on, the only way to increase password security is to make them longer and longer.  Obviously we can only keep up with this for so long before technology overtakes our ability to remember a secure password.  Clearly simple password-based security is insufficient for protecting anything of real value.  What’s needed is a multifactor system that uses 2 or more separate components to authenticate a user’s credentials.

A multifactor authentication system could be as simple as the combination of a password and a physical token such as a smartcard.  To authenticate, the user must insert the smartcard and type his or her password.  Either factor by itself will be rejected.  The beauty of this system is that any data protected in this way is inaccessible without each piece of the authentication puzzle.

A system is only as secure as its weakest link.  In many cases we humans are unfortunately that link.  We have limited memory and are vulnerable to social engineering attacks that get us to reveal sensitive information to complete strangers.  A strong password is useless if a user gives that password away or writes it down.  Adding a unique physical component to the equation raises the level of difficulty for an attacker significantly.