UK diy (uk.d-i-y) For the discussion of all topics related to diy (do-it-yourself) in the UK. All levels of experience and proficency are welcome to join in to ask questions or offer solutions.

Reply
 
LinkBack Thread Tools Search this Thread Display Modes
  #41   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 4,069
Default BBC Stuxnet programme (OT), and why you can't blow up nuclear power stations

En el artículo ,
newshound escribió:

. As they explained, an "air-gap"
is a good line of defence provided you have very tight control of
anything which might go across it.


You'll like this.

"Audio-based networking may seem an unusual choice for the Internet of
Things, especially when used for machines to bellow information at each
other inside a nuclear power station"

https://www.theregister.co.uk/2017/0...wer_station_io
t_audio_sensors/

--
(\_/)
(='.'=) systemd: the Linux version of Windows 10
(")_(")
  #42   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 8,019
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

On 1/24/2017 4:58 AM, Mike Tomlinson wrote:
En el artículo ,
newshound escribió:

And this is why we don't have PLCs in the final parts of the protection
circuits for nuclear power plants


Yet?

, and also things like steam turbines
and generators which can't tolerate significant overspeed


Interestingly, one of EDF's UK nukes has just had repairs to the turbine
overspeed protection. it's back in service now, so I'm not sure which
one. May have been Hunterston B.


Overspeed trips are quite complicated mechanical systems, they are
regularly tested and occasionally found to be out of spec or to need
adjusting.

Also found this while searching:

"Events reported to ONR by EDF Energy (01 Apr 2012 to 19 Jan 2016)"

https://www.edfenergy.com/file/1914279/download

All unrated, or level 0/1 (not significant). Good to know.


Interesting list, one of the merits of a very open, "no blame" reporting
system. The same list can be found on the ONR site, together with lists
of incidents at other UK nuclear sites.

You'll see that one of the EDF INES 1 events was a double reactor trip
when an offsite fault took down the 400 KV lines. This is the correct
response from the control system, it has that rating because an event
which in itself has no great significance (like loss of a single engine
in a commercial airliner) may be more serious if they occur in
combination with other events.
  #43   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 8,019
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

On 1/24/2017 10:30 AM, Mike Tomlinson wrote:
En el artículo ,
newshound escribió:

. As they explained, an "air-gap"
is a good line of defence provided you have very tight control of
anything which might go across it.


You'll like this.

"Audio-based networking may seem an unusual choice for the Internet of
Things, especially when used for machines to bellow information at each
other inside a nuclear power station"

https://www.theregister.co.uk/2017/0...wer_station_io
t_audio_sensors/

Yes, I did! They explain one of the reasons:

"As for the nuclear power stations, Chirp's tech has found a useful
niche in IoT sensor applications where traditional RF networking cannot
be used. Nuclear power stations have an absolute ban on RF over fears of
interference – thereby ruling out Wi-Fi, Bluetooth and all the usual
go-to wireless networking technologies"
  #44   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 4,069
Default BBC Stuxnet programme (OT), and why you can't blow up nuclear power stations

En el artÃ*culo ,
newshound escribió:

Yes, I did! They explain one of the reasons:

"As for the nuclear power stations, Chirp's tech has found a useful
niche in IoT sensor applications where traditional RF networking cannot
be used. Nuclear power stations have an absolute ban on RF over fears of
interference €“ thereby ruling out Wi-Fi, Bluetooth and all the usual
go-to wireless networking technologies"


It also ties in with the air-gap approach to security we were discussing
earlier in the thread. If equipment is networked using Chirp, that's
another vector for attack/infection, showing that air-gapping per se is
meaningless in the context of security.

I worked for some years at an astronomical observatory. RF equipment,
such as wi-fi was banned inside the observing dome while the telescope
was operating to prevent the possibility of it interfering with the very
sensitive CCD detectors used in the instruments.

--
(\_/)
(='.'=) systemd: the Linux version of Windows 10
(")_(")
  #45   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 39,563
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

On 25/01/17 08:25, Mike Tomlinson wrote:
If equipment is networked using Chirp, that's
another vector for attack/infection, showing that air-gapping per se is
meaningless in the context of security.


The staggering non sequitur from the brainless monkey, is noted.

Meanwhile elsewhere, the NHS is dispensing with alcohol hand wipe
dispensers as seniors consultant Mike ****edBrainson has shown that they
are 'just another vector for infection'


--
"When a true genius appears in the world, you may know him by this sign,
that the dunces are all in confederacy against him."

Jonathan Swift.


  #46   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 8,019
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

On 1/25/2017 8:25 AM, Mike Tomlinson wrote:
En el artÃ*culo ,
newshound escribió:

Yes, I did! They explain one of the reasons:

"As for the nuclear power stations, Chirp's tech has found a useful
niche in IoT sensor applications where traditional RF networking cannot
be used. Nuclear power stations have an absolute ban on RF over fears of
interference €“ thereby ruling out Wi-Fi, Bluetooth and all the usual
go-to wireless networking technologies"


It also ties in with the air-gap approach to security we were discussing
earlier in the thread. If equipment is networked using Chirp, that's
another vector for attack/infection, showing that air-gapping per se is
meaningless in the context of security.


If you have got into the turbine hall, you have already breached the
site security. If you can damage an oil, feedwater, or steam pipe this
can cause a big incident. In any case, this is technology transmitting
instrumentation data out to a logger or display, it won't be part of a
control loop. At most, it might provide a trip signal.


  #47   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 4,069
Default BBC Stuxnet programme (OT), and why you can't blow up nuclear power stations

En el artículo ,
newshound escribió:

In any case, this is technology transmitting
instrumentation data out to a logger or display, it won't be part of a
control loop. At most, it might provide a trip signal.


In that particular usage scenario, yes. But the point of the Register
article is that Chirp is a layer 1/2 protocol.

You could lay TCP/IP on top of it if you wanted, with all the advantages
and drawbacks that entailed. Some bright spark might decide that it's a
grand idea to install PLC firmware over Chirp - after all, to the
software, it looks just like another TCP/IP node.

--
(\_/)
(='.'=) systemd: the Linux version of Windows 10
(")_(")
  #48   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 5,168
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

On 25/01/2017 08:36, The Natural Philosopher wrote:
On 25/01/17 08:25, Mike Tomlinson wrote:
If equipment is networked using Chirp, that's
another vector for attack/infection, showing that air-gapping per se is
meaningless in the context of security.


The staggering non sequitur from the brainless monkey, is noted.

Meanwhile elsewhere, the NHS is dispensing with alcohol hand wipe
dispensers as seniors consultant Mike ****edBrainson has shown that they
are 'just another vector for infection'



They are if they are used rather than soap and water as everyone with
sense already knows.

They do FA with viruses while soap and water removes them.

  #49   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 7,829
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

dennis@home wrote:

The Natural Philosopher wrote:

the NHS is dispensing with alcohol hand wipe dispensers as seniors
consultant Mike ****edBrainson has shown that they are 'just
another vector for infection'


They are if they are used rather than soap and water as everyone with
sense already knows. They do FA with viruses while soap and water
removes them.


Many local authority non-NHS buildings where alcohol dispensers were
fitted at every door during past swine/bird flu scares, have realised
nobody cleans their hands with them and the cartridges have passed their
use by date, so are now removing them.

  #50   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 3,789
Default BBC Stuxnet programme (OT), and why you can't blow up nuclear power stations



"Mike Tomlinson" wrote in message
...
En el artículo , Huge
escribió:

his worked fine for several years, until some plonker
installed some network discovery software at the other end, which dialled
the *outbound* ISDN, connected to my router, said hello (or whatever
it did) and then disconnected. Every few minutes. No-one noticed this
until the bill arrived - for several thousand pounds.


The joys of the call set-up charge. Which ****ing BT has just increased
to 21p per call. #


Bleeding 'ell is it really that much

I'll be using my mobile even more in future

tim









  #51   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 39,563
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

On 26/01/17 14:38, Andy Burns wrote:
dennis@home wrote:

The Natural Philosopher wrote:

the NHS is dispensing with alcohol hand wipe dispensers as seniors
consultant Mike ****edBrainson has shown that they are 'just
another vector for infection'


They are if they are used rather than soap and water as everyone with
sense already knows. They do FA with viruses while soap and water
removes them.


Many local authority non-NHS buildings where alcohol dispensers were
fitted at every door during past swine/bird flu scares, have realised
nobody cleans their hands with them and the cartridges have passed their
use by date, so are now removing them.

Whoosh to both of you...

--
Microsoft : the best reason to go to Linux that ever existed.
  #52   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 2,853
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

On 23/01/2017 13:40, tim... wrote:


"Vir Campestris" wrote in message
o.uk...
On 21/01/2017 18:37, tim... wrote:
"Huge" wrote in message
...

snip
All software has bugs.

but back in the day you used to try and make sure that you found them
all before releasing the product

I've been writing software so long it's getting embarrassing (some of
my colleagues weren't even born) and this has always been true: You
try to find the bugs before you ship the product.

Equally true: You never find them all.

Firmware may need to be updated to maintain manufacturer support, even
without explicit bugs.

not on any firmware I ever worked on (in 35 years)

It went out the door embedded inside the product and was never touched
again

Which merely means that the only chance for it to get infected with
malware was before you shipped it.


I'm not sure what you mean by "merely" .

Surely the point of this infection (under discussion) is that it can
work without you having to break through the physical security systems
of the victim.

It's quite difficult to infect a PROM with malware. The device can't
write to it.

And there were a few viruses around back then - spread on floppies mostly.

Andy
  #53   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 10,204
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

On Thursday, 26 January 2017 14:37:12 UTC, Andy Burns wrote:
dennis@home wrote:

The Natural Philosopher wrote:

the NHS is dispensing with alcohol hand wipe dispensers as seniors
consultant Mike ****edBrainson has shown that they are 'just
another vector for infection'


They are if they are used rather than soap and water as everyone with
sense already knows. They do FA with viruses while soap and water
removes them.


Many local authority non-NHS buildings where alcohol dispensers were
fitted at every door during past swine/bird flu scares, have realised
nobody cleans their hands with them and the cartridges have passed their
use by date, so are now removing them.


I'd heard at my local hospital that they were being stolen by some eastern euopeans and drank as an alchol substitute.
  #54   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 1,491
Default BBC Stuxnet programme (OT)

On Thu, 19 Jan 2017 03:09:02 -0800, whisky-dave wrote:

On Thursday, 19 January 2017 11:04:10 UTC, Mike Tomlinson wrote:
En el artÃ*culo , tim...
escribió:

In what way are the BBC passing if off as their own?


It's "BBC branded" on the relevant iPlayer webpage, and touted as part
of the BBC's own Storyville series. Not one mention that it's not a
BBC production, much less that it was first produced a year ago.

They're even offering to sell it on the BBC Store for a fiver!

It clearly says in the credits who produced it


who reads the credits?


Those that want to know who made it or contributed to the making of it.


Or those who simply want an answer to the question,

"Just how old *is this* programme, anyway?"

Knowing the answer to *that* question is particularly useful when
hoovering up, for example, "Horizon" and "Natural World" BBC4 repeats
from the Beeb's Iplayer servers using get_iplayer so as to 'refresh' the
existing archive of the original 720 by 576 SD broadcasts with 1280 by
720 'nearly HD' iplayer versions.

Unfortunately, the 1280 by 720 standard isn't universally applied to
iplayer content, sometimes being spoilt by the use of the oddball 960 by
540 resolution option ("Dad's Army" and "Reel History" being just two of
the many programmes to suffer this indignity).

--
Johnny B Good
  #55   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 10,204
Default BBC Stuxnet programme (OT)

On Tuesday, 31 January 2017 00:31:15 UTC, Johnny B Good wrote:
On Thu, 19 Jan 2017 03:09:02 -0800, whisky-dave wrote:

On Thursday, 19 January 2017 11:04:10 UTC, Mike Tomlinson wrote:
En el artÃ*culo , tim...
escribió:

In what way are the BBC passing if off as their own?

It's "BBC branded" on the relevant iPlayer webpage, and touted as part
of the BBC's own Storyville series. Not one mention that it's not a
BBC production, much less that it was first produced a year ago.

They're even offering to sell it on the BBC Store for a fiver!

It clearly says in the credits who produced it

who reads the credits?


Those that want to know who made it or contributed to the making of it.


Or those who simply want an answer to the question,

"Just how old *is this* programme, anyway?"


Usually in roman numeralstoo.


Knowing the answer to *that* question is particularly useful when
hoovering up, for example, "Horizon" and "Natural World" BBC4 repeats
from the Beeb's Iplayer servers using get_iplayer so as to 'refresh' the
existing archive of the original 720 by 576 SD broadcasts with 1280 by
720 'nearly HD' iplayer versions.

Unfortunately, the 1280 by 720 standard isn't universally applied to
iplayer content, sometimes being spoilt by the use of the oddball 960 by
540 resolution option ("Dad's Army" and "Reel History" being just two of
the many programmes to suffer this indignity).


Isn;t that because they are the old aspect ration of 3:2 .
I've seen such program streach to widescreen and they lok crap and it's easy to see the distortion when they try to streach it to 16:9 or 16:10





  #56   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 1,491
Default BBC Stuxnet programme (OT)

On Tue, 31 Jan 2017 03:18:24 -0800, whisky-dave wrote:

On Tuesday, 31 January 2017 00:31:15 UTC, Johnny B Good wrote:
On Thu, 19 Jan 2017 03:09:02 -0800, whisky-dave wrote:

On Thursday, 19 January 2017 11:04:10 UTC, Mike Tomlinson wrote:
En el artÃ*culo , tim...
escribió:

In what way are the BBC passing if off as their own?

It's "BBC branded" on the relevant iPlayer webpage, and touted as
part of the BBC's own Storyville series. Not one mention that it's
not a BBC production, much less that it was first produced a year
ago.

They're even offering to sell it on the BBC Store for a fiver!

It clearly says in the credits who produced it

who reads the credits?

Those that want to know who made it or contributed to the making of
it.


Or those who simply want an answer to the question,

"Just how old *is this* programme, anyway?"


Usually in Roman numerals too.


I've gotten pretty adept at deciphering them, what with all the practice
I've had over the past decade or so that I've been recording Freeview
broadcasts. :-)


Knowing the answer to *that* question is particularly useful when
hoovering up, for example, "Horizon" and "Natural World" BBC4 repeats
from the Beeb's Iplayer servers using get_iplayer so as to 'refresh'
the existing archive of the original 720 by 576 SD broadcasts with 1280
by 720 'nearly HD' iplayer versions.

Unfortunately, the 1280 by 720 standard isn't universally applied to
iplayer content, sometimes being spoilt by the use of the oddball 960
by 540 resolution option ("Dad's Army" and "Reel History" being just
two of the many programmes to suffer this indignity).


Isn't that because they are the old aspect ratio of 3:2 .
I've seen such program stretch to widescreen and they look crap and it's
easy to see the distortion when they try to stretch it to 16:9 or 16:10


They use non-square pixels with the video metadata set to produce a 16:9
AR frame, even with 4:3 AR material such as "Dad's Army" when they simply
pillar box it into the required 4:3 AR window.

I'm still recording the SD Freeview broadcasts since there's no
guarantee of iPlayer availability. This provides both a reference and a
'safety recording'. This means I can compare the quality between the
Freeview 720 by 576 and the iPlayer 960 by 540 Pillar boxed versions of
such 4:3 AR material. Since there's almost no discernible difference in
video quality, I tend to use the iPlayer 960 by 540 versions since they
very rarely suffer from end credit vandalism. The only downside to this
choice is the reduction of vertical resolution from typically 572 lines
down to 540 lines which in theory would compromise the quality but in
practice doesn't appear to do so.

Since the original scan line count is a bit of an unknown, along with
the efficacy of the conversion processes used to convert to the 576 and
540 line output formats, it's quite possible that the smaller 540 line
picture is actually the better of the two options (but not by much). I've
never been able to arrive at any conclusion as to which is the better
from a video quality point of view, hence my electing to to opt for the
960 by 540 option to avoid end credit vandalism.

--
Johnny B Good
  #57   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 8,019
Default BBC Stuxnet programme (OT), and why you can't blow up nuclearpower stations

On 1/25/2017 3:26 PM, Mike Tomlinson wrote:
En el artículo ,
newshound escribió:

In any case, this is technology transmitting
instrumentation data out to a logger or display, it won't be part of a
control loop. At most, it might provide a trip signal.


In that particular usage scenario, yes. But the point of the Register
article is that Chirp is a layer 1/2 protocol.

You could lay TCP/IP on top of it if you wanted, with all the advantages
and drawbacks that entailed. Some bright spark might decide that it's a
grand idea to install PLC firmware over Chirp - after all, to the
software, it looks just like another TCP/IP node.

I agree completely. But it won't have much bandwidth so I would
generally expect it to be restricted to that sort of not particularly
"sensitive" application. It could change, of course.

I believe that at one time there wasn't much bandwidth in the secure
communications to nuclear subs, but I bet there was plenty of security
elsewhere in the chain!
  #58   Report Post  
Posted to uk.d-i-y
external usenet poster
 
Posts: 4,069
Default BBC Stuxnet programme (OT), and why you can't blow up nuclear power stations

En el artículo ,
newshound escribió:

I agree completely. But it won't have much bandwidth


Understatement of the century

--
(\_/)
(='.'=) systemd: the Linux version of Windows 10
(")_(")
Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Drunk takes a Stuxnet Leak Country Carpenter Home Repair 0 June 28th 13 02:11 PM
OT The men who made us fat (BBC programme) ARWadsworth UK diy 22 June 24th 12 03:16 PM
After stuxnet, nuclear watchdog could expand computer safety measures task sunitha frnd Electronics Repair 0 November 17th 10 05:20 AM
radio programme gentlegreen UK diy 0 May 11th 06 03:45 PM
TV programme looking for your story. [email protected] Home Repair 0 December 16th 05 12:02 PM


All times are GMT +1. The time now is 06:55 AM.

Powered by vBulletin® Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 DIYbanter.
The comments are property of their posters.
 

About Us

"It's about DIY & home improvement"