by iancarroll on 8/29/24, 3:53 PM with 440 comments
by woodruffw on 8/29/24, 5:00 PM
by dylan604 on 8/29/24, 5:03 PM
by jerf on 8/29/24, 5:16 PM
But that isn't even relevant when you can go traipsing through the SQL query itself just by asking; wouldn't matter how well the passwords were stored.
by urbandw311er on 8/29/24, 9:55 PM
I’m not buying this. Feels more like they knew the site developer would just fix it immediately and they wanted to make a bigger splash with their findings.
by voiceblue on 8/29/24, 4:43 PM
by justmarc on 8/29/24, 4:53 PM
by mikeocool on 8/29/24, 6:51 PM
It seems pretty remarkable that airlines are buying such a security sensitive piece of software from a one person shop. If you make it very far into selling any piece of SaaS software to most companies in corporate America, at the absolute minimum they're going to ask you for your SOC2 audit report.
SOC2 is pretty damn easy to get through with minimal findings as far as audits go, but there are definitely several criteria that would should generate some red flags in your report if the company is operated by a single person. And I would have assumed that if your writing software that integrates with TSA access systems, the requirements would be a whole lot more rigorous than SOC2.
by preciousoo on 8/29/24, 4:43 PM
by magic_man on 8/29/24, 6:14 PM
by mariodiana on 8/29/24, 6:40 PM
by 4gotunameagain on 8/29/24, 5:21 PM
What is it, the year 2000 ?
It should be a criminal offence for whoever developed that system.
by yard2010 on 8/30/24, 10:25 AM
by 0xbadcafebee on 8/30/24, 2:03 AM
by robswc on 8/29/24, 9:55 PM
Everyone dropped the ball... and kept dropping it. The part where its handed to them on a silver platter and its essentially smacked away. Maddening.
by dtx1 on 8/29/24, 6:24 PM
> 06/04/2024: Follow-up to DHS CISO about TSA statements (no reply)
There should be a public Shitlist of Organisations that don't get the Benefit of Responsible Disclosure anymore, just a Pastebin drop linked to 4chan.
by qwertox on 8/29/24, 7:07 PM
The TSA would have been the one suing you and would easily win.
by dhx on 8/30/24, 12:42 AM
Pilot: "Years ago we’d get a random enhanced check (which just means go to TSA precheck) now and then. These days it’s 60% of the time, so it’s not possible to get a whole crew through KCM anymore, and we wait on each other because the jet can’t be boarded until the flight attendants are ALL through security, and with the 2022/2023 KCM random checks being so high, that just doesn’t happen. Honestly, I rarely use KCM anymore. I just walk through TSA precheck. The odds are we’re going there anyway so just cut to the chase and hit precheck."[1]
VIP treatments (including the likes of KCM) should be removed no matter if someone is a prime minister[2], media personality[3] or airline CEO. In this way, VIPs can experience the inadequate security processes and staffing levels that everyone else has to deal with, and hopefully with their louder voices will be able to force airports and government agencies to improve the situation for all.
[1] https://www.quora.com/As-a-pilot-how-does-it-feel-like-to-ha...
[2] https://www.theage.com.au/national/red-faces-as-nz-leader-ge...
[3] https://www.smh.com.au/traveller/travel-news/louise-milligan...
by lubujackson on 8/30/24, 4:18 PM
It is sadly an all-too-common occurence when you give uneducated dimwits police-level power with no oversight and no recourse for anyone affected. I assume flexing government power is the real objective here since everybody knows that security is not.
by wkirby on 8/29/24, 5:19 PM
> We did not want to contact FlyCASS first as it appeared to be operated only by one person and we did not want to alarm them
It’s incredible (and entirely too credible) that this kind of “high security” integration could be built in such an amateur way: and a good reminder why government projects often seem to be run with more complexity than your startup devs might think is necessary.
by jrochkind1 on 8/29/24, 5:41 PM
Wait, what? Is this a euphemism for they didn't believe they would take it seriously? Reporting it over their heads to DHS was probably not less "alarming" to anyone...
by lysace on 8/29/24, 6:57 PM
This program seems like the root cause of the security issue.
(Outside of the US) I've often gone through security screenings just before or after crew groups in fast track, but otherwise normal security screening lanes.
by qazxcvbnmlp on 8/29/24, 6:43 PM
Also… you can fix all the SQL issues, but you’re still not going to be able to fix the “men in hoodies with a big wrench talk to an authorized administrator (while their kids are kidnapped in Mexico)”
by system2 on 8/29/24, 7:20 PM
by SG- on 8/29/24, 6:16 PM
by eduction on 8/29/24, 9:34 PM
To be clear, I really hope they don’t, but they are also clearly trying to spin this in a way at odds with the researchers, and I’d hate to be in a position where they want to have leverage over me if I’d done this.
Brave that they did so though and I do think the severity of the vuln warrants this.
by stuff4ben on 8/29/24, 7:01 PM
by fennecbutt on 9/2/24, 9:50 AM
How do they protect against corrupt staff. It's like they're not even thinking. Why don't they just fast track staff checks.
by adamsb6 on 8/29/24, 8:04 PM
Are they cryptographically signed by a system that was inaccessible?
Or is it just a matter of figuring out the bar code format and writing out some KCM id?
by Dove on 8/30/24, 11:43 AM
He convinced me at the time, but I wasn't expecting such an on-the-nose demonstration.
by tbarbugli on 8/30/24, 1:32 PM
by radium3d on 9/2/24, 5:35 PM
by lapphi on 8/30/24, 12:12 AM
by mdorazio on 8/29/24, 5:31 PM
by mvkel on 8/30/24, 2:43 AM
What I mean: security through obscurity is imo the best situation to be in. You can't attack something if you don't know it exists in the first place. That alone gives this system a leg up over more exposed (but hardened) platforms.
Second, convenience always beats secure. Requiring password rotations is worse than requiring none at all, because people tend to find the path of least resistance (writing a password on a notepad instead of memorizing).
If it was faster/easier to ship a useful (but vulnerable) app, that's net better than the app not shipping at all because of security hurdles. I have to imagine sanitizing inputs doesn't take much more time to include, but I don't know the systems involved.
Ultimately, what damage was experienced here? We can throw out hypotheticals about what -could- have happened, but you can't sue every driver on the road because they -could- have hit you.
An insecure system served a useful purpose for years, got more secure, and continues ticking.
by h_tbob on 8/29/24, 9:39 PM
by 77pt77 on 8/29/24, 9:09 PM
These guy are going to end up with some serious federal charges.
by bahmboo on 8/29/24, 7:09 PM
by chihwei on 8/30/24, 5:41 PM
by cratermoon on 8/29/24, 9:42 PM
by tonymet on 8/29/24, 10:09 PM
by gsanderson on 8/30/24, 1:14 PM
by killjoywashere on 8/29/24, 8:34 PM
by OneLeggedCat on 8/29/24, 6:25 PM
by ppeetteerr on 8/29/24, 10:40 PM
by bigmattystyles on 8/29/24, 11:30 PM
(edit) the charging guidelines are somewhat re-assuring but still https://www.justice.gov/opa/pr/department-justice-announces-...
by systemvoltage on 8/29/24, 9:37 PM
by mhh__ on 8/30/24, 1:28 AM
by thomasfl on 8/30/24, 10:35 AM
by harha_ on 8/29/24, 7:56 PM
by invalidlogin on 8/30/24, 1:21 AM
by sergiotapia on 8/29/24, 6:40 PM
by rekoros on 8/30/24, 3:54 AM
by d4mi3n on 8/29/24, 9:45 PM
I’m continually amused, amazed, and exasperated at how classes of software defects older than I am continue to be a problem.
by UniverseHacker on 8/29/24, 5:19 PM
It is really telling that they try to cover up and deny instead of fix it, but not surprising. That is a natural consequence of authoritarian thinking, which is the entire premise and culture of the TSA. Any institution that covers up and ignores existential risks instead of confronting them head on will eventually implode by consequences of its own negligence- which hopefully will happen to the TSA.
by samch on 8/29/24, 8:26 PM
by radium3d on 8/30/24, 12:46 AM
by bambax on 8/29/24, 6:25 PM
The reason there aren't more terrorist attacks isn't because various security agencies around the world protect us from them. It's because there are extremely few terrorists.
by hypeatei on 8/29/24, 5:09 PM
by xyst on 8/30/24, 12:46 AM
Out of that multibillion dollar budget, TSA allocates $10.4M for “cybersecurity staffing, as well as the development and implementation of enhanced cybersecurity-related measures to improve cyber resiliency across the U.S. Transportation Systems Sector.”
Glad to see our tax dollars working so effectively! \s
What a joke of a country this is
[1] https://www.tsa.gov/news/press/testimony/2023/03/29/fiscal-y...
by rez0__ on 8/29/24, 4:38 PM
LOL
> Unfortunately, our test user was now approved to use both KCM and CASS
smh...
by hbrmjen on 9/2/24, 2:58 PM