1568 lines
69 KiB
Plaintext
1568 lines
69 KiB
Plaintext
![]() |
Volume 5, Number 26 27 June 1988
|
|||
|
+---------------------------------------------------------------+
|
|||
|
| _ |
|
|||
|
| / \ |
|
|||
|
| /|oo \ |
|
|||
|
| - FidoNews - (_| /_) |
|
|||
|
| _`@/_ \ _ |
|
|||
|
| International | | \ \\ |
|
|||
|
| FidoNet Association | (*) | \ )) |
|
|||
|
| Newsletter ______ |__U__| / \// |
|
|||
|
| / FIDO \ _//|| _\ / |
|
|||
|
| (________) (_/(_|(____/ |
|
|||
|
| (jm) |
|
|||
|
+---------------------------------------------------------------+
|
|||
|
Editor in Chief Dale Lovell
|
|||
|
Editor Emeritus: Thom Henderson
|
|||
|
Chief Procrastinator Emeritus: Tom Jennings
|
|||
|
Contributing Editors: Al Arango
|
|||
|
|
|||
|
FidoNews is published weekly by the International FidoNet
|
|||
|
Association as its official newsletter. You are encouraged to
|
|||
|
submit articles for publication in FidoNews. Article submission
|
|||
|
standards are contained in the file ARTSPEC.DOC, available from
|
|||
|
node 1:1/1.
|
|||
|
|
|||
|
Copyright 1988 by the International FidoNet Association. All
|
|||
|
rights reserved. Duplication and/or distribution permitted for
|
|||
|
noncommercial purposes only. For use in other circumstances,
|
|||
|
please contact IFNA at (314) 576-4067. IFNA may also be contacted
|
|||
|
at PO Box 41143, St. Louis, MO 63141.
|
|||
|
|
|||
|
Fido and FidoNet are registered trademarks of Tom Jennings of
|
|||
|
Fido Software, 164 Shipley Avenue, San Francisco, CA 94107 and
|
|||
|
are used with permission.
|
|||
|
|
|||
|
The contents of the articles contained here are not our
|
|||
|
responsibility, nor do we necessarily agree with them.
|
|||
|
Everything here is subject to debate. We publish EVERYTHING
|
|||
|
received.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
|
|||
|
1. ARTICLES ................................................. 1
|
|||
|
A By Law proposal ........................................ 1
|
|||
|
EchoMail, Blessing or Bane? .............................. 7
|
|||
|
Killing Viruses .......................................... 9
|
|||
|
2. NOTICES .................................................. 23
|
|||
|
The Interrupt Stack ...................................... 23
|
|||
|
Latest Software Versions ................................. 23
|
|||
|
FidoCon '88 Registration Form ............................ 25
|
|||
|
FidoNews 5-26 Page 1 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
ARTICLES
|
|||
|
=================================================================
|
|||
|
|
|||
|
Neal Curtin
|
|||
|
1:343/1
|
|||
|
|
|||
|
Change to the By Laws
|
|||
|
|
|||
|
|
|||
|
The following is submitted as a set of proposed amendments to
|
|||
|
the BY-LAWS of the International FidoNet Association. They are
|
|||
|
proposed to the Chairman of the Bylaws Committee, and to the
|
|||
|
Board of Directors of the said International FidoNet Association.
|
|||
|
|
|||
|
|
|||
|
Proposal 1.
|
|||
|
|
|||
|
|
|||
|
Current Wording.
|
|||
|
|
|||
|
Preamble:
|
|||
|
|
|||
|
IFNA NODELIST: The list, prepared by the IFNA Vice President
|
|||
|
- Technical Coordinator, of active nodes in the IFNA NETWORK.
|
|||
|
|
|||
|
IFNA NETWORK: The current set of systems which have been
|
|||
|
certified as FidoNet compatible and conform to policies
|
|||
|
established by the Board of Directors.
|
|||
|
|
|||
|
PUBLIC ACCESS: A system that has a telephone number published
|
|||
|
in the IFNA Nodelist, and in addition provides services to
|
|||
|
the public.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Suggested Wording:
|
|||
|
|
|||
|
Nodelist: The list, prepared by the various Zone
|
|||
|
Coordinators, of active nodes within their zone, and on file
|
|||
|
with the International Coordinator.
|
|||
|
|
|||
|
Network: The current set of systems which have been certified
|
|||
|
as Fidonet compatible, and conform to the policies
|
|||
|
established by their respective net, region, and zone.
|
|||
|
|
|||
|
PUBLIC ACCESS: A system that has a telephone number published
|
|||
|
in the Nodelist, and in addition provides services to the
|
|||
|
public.
|
|||
|
|
|||
|
Added wording:
|
|||
|
|
|||
|
International Coordinator: The individual elected by the
|
|||
|
various zones and regional coordinators to arbitrate and rule
|
|||
|
on inter-zonal disputes. In addition, the International
|
|||
|
Coordinator is the person responsible for coordination
|
|||
|
FidoNews 5-26 Page 2 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
between the zones and is responsible for establishing new
|
|||
|
zones as the case may arise.
|
|||
|
|
|||
|
|
|||
|
Rationale:
|
|||
|
|
|||
|
These changes are proposed to eliminate the implication, real
|
|||
|
or perceived, that the association owns, controls, or
|
|||
|
manipulates the FidoNet network.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Proposal #2
|
|||
|
Proposed changes to section 1
|
|||
|
Current wording:
|
|||
|
|
|||
|
1(a) Regular Member. To be eligible, an applicant: must be
|
|||
|
the system operator in good standing of a PUBLIC ACCESS node;
|
|||
|
must have paid any dues required; is entitled to one vote.
|
|||
|
|
|||
|
1(b) Associate Member. Any person who is not eligible to be a
|
|||
|
Regular Member, but who is interested in electronic
|
|||
|
communications, is eligible to be an Associate Member by
|
|||
|
paying required dues. Associate Members have all of the
|
|||
|
rights of a Regular Member except the right to vote.
|
|||
|
|
|||
|
1(c) Commercial Member. Any entity using the IFNA NETWORK for
|
|||
|
the conduct of any business is eligible to be a Commercial
|
|||
|
Member by paying required dues. Any Commercial Member also
|
|||
|
satisfying the requirements to be a Regular Member shall be
|
|||
|
entitled to vote.
|
|||
|
|
|||
|
Proposed wording:
|
|||
|
|
|||
|
1(a) Regular Member. To be eligible, an applicant: must be
|
|||
|
the system operator in good standing of a PUBLIC ACCESS
|
|||
|
node; must be listed in a nodelist; must have paid any dues
|
|||
|
required; is entitled to one vote.
|
|||
|
|
|||
|
1(b) Associate Member. Any person who is listed in a
|
|||
|
nodelist. or who is interested in electronic communications,
|
|||
|
is eligible to be an Associate Member by making application
|
|||
|
for membership. Associate Members have all of the rights of a
|
|||
|
Regular Member except the right to vote.
|
|||
|
|
|||
|
1(c) Commercial Member. Any entity using the IFNA NETWORK for
|
|||
|
the conduct of any business is eligible to be a Commercial
|
|||
|
Member by paying required dues. Any Commercial Member also
|
|||
|
satisfying the requirements to be a Regular Member shall be
|
|||
|
entitled to vote.
|
|||
|
|
|||
|
Rational:
|
|||
|
These changes are designed to broaden the scope of eligibility,
|
|||
|
and include all sysops who are listed in a FidoNet Compatible
|
|||
|
nodelist.
|
|||
|
|
|||
|
FidoNews 5-26 Page 3 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
Proposal 3.
|
|||
|
Proposed changes to Section 2 and 3.
|
|||
|
|
|||
|
Current wording
|
|||
|
|
|||
|
2. Applications for membership shall be submitted to the
|
|||
|
Secretary. In the case of any applicant whose character,
|
|||
|
reputation or conduct might make him an undesirable member,
|
|||
|
the Secretary shall refer the application to the Executive
|
|||
|
Committee for review; in all other cases, the Secretary shall
|
|||
|
have the authority to grant membership.
|
|||
|
|
|||
|
3. The Secretary shall notify members of the expiration of
|
|||
|
their membership not less than thirty days prior to
|
|||
|
expiration. In determining membership status, memberships
|
|||
|
renewed within thirty days of expiration shall be regarded as
|
|||
|
continuous.
|
|||
|
|
|||
|
Proposed changes
|
|||
|
|
|||
|
2. Applications for membership shall be submitted to the
|
|||
|
Membership Committee. In the case of any applicant whose
|
|||
|
character, reputation or conduct might make him an
|
|||
|
undesirable member, the membership Committee shall refer the
|
|||
|
application to the Executive Committee for review; in all
|
|||
|
other cases, the Membership Committee shall have the
|
|||
|
authority to grant membership.
|
|||
|
|
|||
|
3. The Membership Committee shall notify members of the
|
|||
|
expiration of their membership not less than thirty days
|
|||
|
prior to expiration. In determining membership status,
|
|||
|
memberships renewed within thirty days of expiration shall be
|
|||
|
regarded as continuous.
|
|||
|
|
|||
|
|
|||
|
Rational:
|
|||
|
The secretary does not now, nor has he ever been, involved in
|
|||
|
membership. The application goes to the Treasurer, who notifies
|
|||
|
the Membership Services Committee, who sends out the membership
|
|||
|
card.
|
|||
|
|
|||
|
|
|||
|
Proposal #4
|
|||
|
Proposed changes to section 25
|
|||
|
|
|||
|
Current wording:
|
|||
|
|
|||
|
25. The following voting divisions are established:
|
|||
|
Division 2 Europe, Africa
|
|||
|
Division 10 CA NV
|
|||
|
Division 11 IL IN KY MI OH WI - USA and ON PQ PEI NS NB NF
|
|||
|
-Canada
|
|||
|
Division 12 HI Asia, Australia, Antarctica
|
|||
|
Division 13 DE DC MD NJ NY PA VA
|
|||
|
Division 14 IA KS MN MO NB ND SD
|
|||
|
Division 15 AZ CO NM UT WY
|
|||
|
FidoNews 5-26 Page 4 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
Division 16 CT ME MA NH RI VT
|
|||
|
Division 17 AK ID MT OR WA - USA and BC ALB SSK -Canada
|
|||
|
Division 18 AL FL GA MS NC SC TN
|
|||
|
Division 19 AR LA OK TX, South America,
|
|||
|
Mexico, Central America
|
|||
|
|
|||
|
Proposed change:
|
|||
|
25. The following voting divisions are established:
|
|||
|
Division 2 Europe, Africa
|
|||
|
Division 3 Australia, Southern Pacific
|
|||
|
Division 4 AlterNet
|
|||
|
Division 5 GoodEggNet
|
|||
|
Division 6 Canada
|
|||
|
Division 7 Central and South America
|
|||
|
Division 8 IL IN KY MI OH WI
|
|||
|
Division 9 DE DC MD NJ NY PA VA
|
|||
|
Division 10 IA KS MN MO NB ND SD
|
|||
|
Division 11 AZ CO NM UT WY
|
|||
|
Division 12 CT ME MA NH RI VT
|
|||
|
Division 13 AK HI ID MT OR WA
|
|||
|
Division 14 AL FL GA MS NC SC TN
|
|||
|
Division 15 AR LA OK TX
|
|||
|
|
|||
|
These divisions may be changed by a two thirds vote of the
|
|||
|
Board of Directors, and should include new zones and new
|
|||
|
Nodelists of over 100 systems.
|
|||
|
|
|||
|
Rational:
|
|||
|
|
|||
|
The current system does not give enough representation on the
|
|||
|
board to overseas areas and tends to be inflexible.
|
|||
|
|
|||
|
|
|||
|
Proposal #5
|
|||
|
Proposed changes to section 28
|
|||
|
|
|||
|
Current Wording:
|
|||
|
|
|||
|
28. The Secretary shall: record the proceedings of all
|
|||
|
meetings of the Board and of the Executive Committee;
|
|||
|
promptly furnish copies of the minutes of these meetings to
|
|||
|
all officers and members of the Board;publish such minutes in
|
|||
|
FidoNews; be responsible for the maintenance of the corporate
|
|||
|
status of IFNA and the filing of all reports and certificates
|
|||
|
which may be required of IFNA under the corporation laws of
|
|||
|
the State of Missouri; be the archivist of IFNA; maintain the
|
|||
|
corporate membership and voting records of IFNA; performs
|
|||
|
other duties as described in applicable Bylaws. To the extent
|
|||
|
that may from time to time be required by law, he shall act
|
|||
|
as agent for the service of process but only while present in
|
|||
|
the State of Missouri and he is not authorized to accept
|
|||
|
service of process elsewhere.
|
|||
|
|
|||
|
Proposed Change:
|
|||
|
|
|||
|
28. The Secretary shall: record the proceedings of all
|
|||
|
FidoNews 5-26 Page 5 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
meetings of the Board and of the Executive Committee;
|
|||
|
promptly furnish copies of the minutes of these meetings to
|
|||
|
all officers and members of the Board; publish such minutes
|
|||
|
in FidoNews; be responsible for the maintenance of the
|
|||
|
corporate status of IFNA and the filing of all reports and
|
|||
|
certificates which may be required of IFNA under the
|
|||
|
corporation laws of the State of Missouri; be the archivist
|
|||
|
of IFNA; maintain voting records of IFNA; performs other
|
|||
|
duties as described in applicable Bylaws. To the extent that
|
|||
|
may from time to time be required by law, he shall act as
|
|||
|
agent for the service of process but only while present in
|
|||
|
the State of Missouri and he is not authorized to accept
|
|||
|
service of process elsewhere.
|
|||
|
|
|||
|
Rational:
|
|||
|
Eliminates the requirement that the secretary maintain the
|
|||
|
membership roster.
|
|||
|
|
|||
|
Proposal #6
|
|||
|
Proposed changes to section 30
|
|||
|
|
|||
|
Current wording:
|
|||
|
|
|||
|
30. The Vice President - Technical Coordinator shall: be
|
|||
|
responsible for maintenance and distribution of the master
|
|||
|
NODELIST; creation and distribution of the weekly update file
|
|||
|
for the master NODELIST; ensuring the smooth operation of
|
|||
|
the IFNA NETWORK as prescribed by the Board of Directors;
|
|||
|
serve as a member of the Technical Standards Committee.
|
|||
|
|
|||
|
Proposed change:
|
|||
|
|
|||
|
30. The Vice President - Technical Coordinator shall: serve
|
|||
|
as a member of the Technical Standards Committee, and be
|
|||
|
responsible for the development and publication of standards
|
|||
|
for system software so as to ensure compatibility between the
|
|||
|
various nodes. The VP-TC will assist the various Coordinators
|
|||
|
in technical matters.
|
|||
|
|
|||
|
Rational:
|
|||
|
This change to eliminate the implied or perceived implication
|
|||
|
of that IFNA desires or wants to control the nodelist. The
|
|||
|
reference to the IC is dropped and would no longer be a IFNA
|
|||
|
position.
|
|||
|
|
|||
|
|
|||
|
Proposal #7
|
|||
|
Proposed changes to section 40
|
|||
|
Current wording:
|
|||
|
|
|||
|
40. There shall be an official publication maintained by
|
|||
|
IFNA, in the form of a weekly journal, the name of which
|
|||
|
shall be FidoNews. A copy of this journal shall be available
|
|||
|
each week to every member of IFNA in good standing. The
|
|||
|
General management of this journal shall be in the hands
|
|||
|
of the President. The policy of the journal shall be
|
|||
|
FidoNews 5-26 Page 6 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
determined by the Board of Directors.
|
|||
|
|
|||
|
Proposed change:
|
|||
|
|
|||
|
40. There shall be an official publication maintained by
|
|||
|
IFNA, in the form of a weekly journal, the name of which
|
|||
|
shall be FidoNews. A copy of this journal shall be available
|
|||
|
each week to all listed nodes. The general management of this
|
|||
|
journal shall be in the hands of the President. The policy of
|
|||
|
the journal shall be to publish all submitted articles of
|
|||
|
interest to the FidoNet community, within the bounds of
|
|||
|
legality and good taste.
|
|||
|
|
|||
|
Rational:
|
|||
|
This change is to eliminate the reference that the journal is
|
|||
|
only for IFNA members, and to give some firm direction to the
|
|||
|
editorial staff.
|
|||
|
|
|||
|
|
|||
|
Respectively submitted by Neal Curtin, Network Coordinator, Net
|
|||
|
1:343.
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-26 Page 7 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
Bob Morris
|
|||
|
FN 1:141/333, 1:141/386
|
|||
|
AN 7/1, 7/13, 7:46/1, 7:46/2 and 7:46/3
|
|||
|
|
|||
|
Echomail, the thing which allows our users (you remember them)
|
|||
|
to communicate with the rest of the world on things that are
|
|||
|
bothering them, technical issues, as well as speciality areas.
|
|||
|
|
|||
|
EchoMail has become something of a monster, what we all
|
|||
|
use to help support and have become "HOOKED" on is now being
|
|||
|
used as the carrot which the EchoMail Backbone, REC's, NEC's
|
|||
|
and what ever use to limit our links to other systems across
|
|||
|
the world.
|
|||
|
|
|||
|
EchoMail was designed by Jeff Rush and it was a GREAT idea of
|
|||
|
getting the same message out to a lot of people at the same
|
|||
|
time. But in today's environment, EchoMail has established
|
|||
|
a new power point to control what we all do for our users,
|
|||
|
including what type modems are utilized, the hours that
|
|||
|
echomail can be picked up, the systems which can called to
|
|||
|
pick up these areas and last, but not least, who we
|
|||
|
can align ourselves with when it comes time to use software
|
|||
|
to process this whole mess.
|
|||
|
|
|||
|
In this Sysop's mind, it has become a monster which in the last
|
|||
|
20 months has accomplished the following items without the
|
|||
|
least amount of trouble.
|
|||
|
|
|||
|
1. The splitting of the Network (FidoNet as we knew it in
|
|||
|
January of 1987) into different Networks.
|
|||
|
|
|||
|
2. The demise of good working relationships.
|
|||
|
|
|||
|
3. The phrase "FLAME ON".
|
|||
|
|
|||
|
4. The inability of people to "read" humor or anything else
|
|||
|
within the written word. This has lead to many people not
|
|||
|
being able to understand the context of many of the
|
|||
|
messages that we all read on a daily basis.
|
|||
|
|
|||
|
5. The demise of IFNA as well as causing it to become
|
|||
|
unable to accomplish anything based upon the problems
|
|||
|
associated with Electronic Mail especially that of Echo-
|
|||
|
Mail.
|
|||
|
|
|||
|
6. The establishment of the *EC positions, which when they
|
|||
|
started, were needed, but now they duplicate the *C
|
|||
|
positions and are now wielding more power and control
|
|||
|
than their contemporaries within the FidoNet Administrator
|
|||
|
Positions.
|
|||
|
|
|||
|
7. The disenchantment of Sysops as a whole about the world
|
|||
|
of BBSing, causing them to DROP OUT entirely, or at the
|
|||
|
least the seeking of Alternatives to the HATEMail which
|
|||
|
now proliferates the AREAS.BBS today.
|
|||
|
|
|||
|
FidoNews 5-26 Page 8 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
8. The establishment of EchoMail areas which do nothing but
|
|||
|
allow people who moderate EchoMail areas a place to
|
|||
|
discuss what is happening within the world of echomail
|
|||
|
and to discuss how to furthur control who can get
|
|||
|
direct access to an EchoMail area.
|
|||
|
If you read this article as "Sour Grapes" (one less than a
|
|||
|
FLAME) then that is what I intended it to do. If you read it
|
|||
|
as an indictment of the EchoMail process as it exists today,
|
|||
|
then, again, it is something that I intended to do. If you
|
|||
|
read this article and feel as though I am saying that the need
|
|||
|
for an enforcement procedure is bad, then I have again
|
|||
|
accomplished what I set out to do. If you read this and find
|
|||
|
that someone is imposing a set of rules upon the manner in
|
|||
|
which you and your USER must share ideas, thoughts and
|
|||
|
other information which is posted in the EchoMail Areas, then
|
|||
|
again, I have accomplished what I set out to do.
|
|||
|
|
|||
|
I am NOT saying that EchoMail Coordination is bad, I am saying
|
|||
|
that the people who Coordinate the running of the EchoMail
|
|||
|
distribution are imposing a set of rules and regulations which
|
|||
|
have not been accepted by the Sysop Community as a whole. I am
|
|||
|
also stating that pickups outside of a region, as long as they
|
|||
|
are closed loops, stand little if any chance of generating
|
|||
|
duplicates within any given region. Links outside of a given
|
|||
|
Region provide for a backup link in case of disaster or full
|
|||
|
disk drives.
|
|||
|
|
|||
|
Within AlterNet, there is a stated Policy concerning EchoMail,
|
|||
|
that Policy is to "Be Polite, and if you cannot add anything to
|
|||
|
a conference which is Positive, then do not use the conference"
|
|||
|
this Policy is followed by the vast majority of the AlterNet
|
|||
|
Community, unfortunately, it does not have to apply to the
|
|||
|
FidoNet Community.
|
|||
|
|
|||
|
EchoMail, from my view point, has broadened my scope as far as
|
|||
|
what is happening within the Networks, but it has soured me as
|
|||
|
far as my view point of other Sysops and also the way that they
|
|||
|
look at me. It is a two way street, no one wins, and only AT&T,
|
|||
|
SPRINT, MCI, GTE and PCP have won as they get all the neat
|
|||
|
profits from our expenses.
|
|||
|
|
|||
|
A few last points, do we really need all 225 conferences? Do
|
|||
|
we really need all of this to make sure that our users get a
|
|||
|
couple of EchoMail areas? Or are we doing this just so that
|
|||
|
our Blood Pressure gets up at least once a day?
|
|||
|
|
|||
|
|
|||
|
Bob Morris
|
|||
|
FN 141/333, 141/386
|
|||
|
AN 7/1, 7/13, 46/1, 46/2, 46/3
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-26 Page 9 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
Lee Kemp, Communet 1:221/162.14
|
|||
|
|
|||
|
7 June 1988
|
|||
|
|
|||
|
K I L L I N G V I R U S E S
|
|||
|
|
|||
|
1. INTRODUCTION
|
|||
|
|
|||
|
Numerous utilities have been released for detecting "virus"
|
|||
|
programs before they damage hard disks or get passed on.
|
|||
|
|
|||
|
Unfortunately this won't work. Existing viruses will continue to
|
|||
|
spread from diskettes already infected, and will re-infect
|
|||
|
computers that have been through it before. New more virulent
|
|||
|
strains will be developed to overcome each new detection utility
|
|||
|
released (perhaps by infecting the utilities themselves!)
|
|||
|
|
|||
|
I believe I've figured out a method that WILL work. The World
|
|||
|
Health Organization managed to stamp out smallpox through a
|
|||
|
coordinated international campaign and I believe we can do the
|
|||
|
same for ALL computer viruses - but it will require a coordinated
|
|||
|
campaign.
|
|||
|
|
|||
|
This article lays out the basic idea and asks for help. Help
|
|||
|
through any constructive criticisms or alternative proposals,
|
|||
|
help through negative, destructive "flames" if the idea is all
|
|||
|
wrong, so I'll stop wasting time on it, and help from any
|
|||
|
software developers willing to "send code".
|
|||
|
|
|||
|
However I am not interested in corresponding about whether
|
|||
|
destructive Trojan viruses actually exist and whether they will
|
|||
|
become a serious problem. Its far too late to be discussing THAT.
|
|||
|
|
|||
|
First, some reasons why its worth working on the solution I
|
|||
|
propose.
|
|||
|
|
|||
|
1.1 There is NO way to detect viruses
|
|||
|
|
|||
|
None of the methods currently used have the SLIGHTEST chance of
|
|||
|
detecting a reasonably well designed Trojan, let alone a genuine
|
|||
|
virus. Tests that are just done when software is first received,
|
|||
|
and just consist of running a utility over it once, or installing
|
|||
|
a TSR monitor, are ALREADY completely useless.
|
|||
|
|
|||
|
Any jerk can write a Trojan that won't do anything suspicious
|
|||
|
while it's being tested, and the test utilities themselves are
|
|||
|
likely to be a target for more sophisticated viruses.
|
|||
|
|
|||
|
Ideas like continually monitoring disk writes are ok for the
|
|||
|
first generation of Trojans but simply won't work with the next
|
|||
|
generation. Actually they will become positively dangerous. A
|
|||
|
virus could simply recognize the particular TSR that's monitoring
|
|||
|
it, grab the interrupts back, and send reassuring messages to the
|
|||
|
SysOp, while it doesn't even bother to WAIT before starting to
|
|||
|
infect other software! A false sense of security is MUCH worse
|
|||
|
than the knowledge that anything you make available for download
|
|||
|
FidoNews 5-26 Page 10 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
COULD be a virus.
|
|||
|
|
|||
|
Source code for IBM ROM BIOS is available in the Technical
|
|||
|
Reference manuals for anyone who wants to write Trojans that
|
|||
|
access disk controllers directly. Also there are ways to do
|
|||
|
apparently "legitimate" disk writes that do no immediate damage
|
|||
|
but can trigger an infection later.
|
|||
|
|
|||
|
Much more sophisticated approaches to delayed action are
|
|||
|
available than using the DOS date function.
|
|||
|
|
|||
|
Checksums of operating system files and their dates and times are
|
|||
|
easily bypassed.
|
|||
|
|
|||
|
Proper testing requires at least the sort of insulation from the
|
|||
|
hardware and operating system that is provided by a 386 running
|
|||
|
in virtual 8086 mode. Worse, there are even ways around THAT,
|
|||
|
which I won't go into here.
|
|||
|
|
|||
|
Anyone familiar with the secure design of operating systems
|
|||
|
understands that there is NO way an application program can be
|
|||
|
prevented from doing whatever it damn well pleases when the
|
|||
|
underlying CPU hardware doesn't run in a protected mode. OS/2 and
|
|||
|
Unix run in a protected mode but MSDOS normally doesn't, and
|
|||
|
CAN'T on XTs and ATs.
|
|||
|
|
|||
|
Even protected mode isn't enough, given the practical realities
|
|||
|
of normal security precautions. Controlled experiments with Unix
|
|||
|
viruses have achieved root privileges in less than an hour, with
|
|||
|
an average of 30 minutes. (F. Cohen, "Computer Viruses: Theory
|
|||
|
and Experiments", University of Southern California, August 1984,
|
|||
|
cited in Wood and Kochan, "Unix System Security", Hayden Book
|
|||
|
Company, 1985)
|
|||
|
|
|||
|
The SERIOUS work in computer security is being done on how to
|
|||
|
protect a system when you have complete source code for
|
|||
|
everything run on it - and THAT is damn difficult. ADA and Pascal
|
|||
|
are languages intended to allow you to figure out what the source
|
|||
|
code actually does, but C is the language of micro applications
|
|||
|
and its designed for efficiency, not correctness proofs. Take a
|
|||
|
look at the fast table driven CRC routines used in most FidoNet
|
|||
|
mailers these days. How many C programmers have the faintest idea
|
|||
|
what they ACTUALLY do?
|
|||
|
|
|||
|
Serious computer security work also deals with problems like
|
|||
|
"compiler viruses", that install themselves in any software
|
|||
|
compiled, including new versions of the compiler. Who REALLY
|
|||
|
knows what's in most microcomputer object code - not even the
|
|||
|
authors!
|
|||
|
|
|||
|
There is NO serious work being done on protection from real mode
|
|||
|
applications running on 80x86 machines. Because it SIMPLY CAN'T
|
|||
|
BE DONE.
|
|||
|
|
|||
|
Now sit back and think about the implications of that for 3000
|
|||
|
FidoNet nodes around the world continually exchanging software
|
|||
|
FidoNews 5-26 Page 11 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
with each other and their users! This network can spread a deadly
|
|||
|
virus around the world within DAYS (if not hours).
|
|||
|
|
|||
|
|
|||
|
1.2 We don't have time for testing
|
|||
|
|
|||
|
ANY partially useful testing system for the next generation of
|
|||
|
viruses would require tests EVERY time a copy of ANY software is
|
|||
|
made available for distribution, and fairly elaborate procedures
|
|||
|
to ensure the testing is done on an uninfected machine with
|
|||
|
uninfected test utilities.
|
|||
|
|
|||
|
Even factory fresh diskettes from major software houses have
|
|||
|
ALREADY been infected, so what's to stop the latest upgrade of
|
|||
|
some commercial package infecting a machine that's been carefully
|
|||
|
kept "clean"? Even Harvard couldn't persuade Lotus to let them
|
|||
|
retain their policy of ONLY running software for which they had
|
|||
|
compiled the source code themselves.
|
|||
|
|
|||
|
BBS SysOps just don't have the time to properly test files they
|
|||
|
make available for download, even to detect fairly crude Trojans.
|
|||
|
Neither do end users. Even PARTIALLY useful serious tests simply
|
|||
|
won't be widely used until AFTER there has been some MAJOR damage
|
|||
|
done. The time wasted on serious testing will then be almost as
|
|||
|
damaging as actual loss of data.
|
|||
|
|
|||
|
|
|||
|
1.3 We can't afford to just keep quiet and hope
|
|||
|
|
|||
|
The first generation of diskette based viruses has now become of
|
|||
|
sufficient public interest for full page articles in daily
|
|||
|
newspapers as well as computer magazines. It is therefore CERTAIN
|
|||
|
that some warped people will take up the challenge to design the
|
|||
|
next generation. It is also very likely to happen SOON.
|
|||
|
|
|||
|
In case anybody thinks that mentioning all this could give people
|
|||
|
ideas, I should point out that the technical points made above
|
|||
|
will be obvious to anybody TRYING to figure out how to get past
|
|||
|
present detection utilities. People who have ALREADY shown much
|
|||
|
more sophistication with Unix viruses will now be focussing their
|
|||
|
attention on personal computer diskette based viruses as a result
|
|||
|
of the newspaper publicity if nothing else.
|
|||
|
|
|||
|
I am deliberately refraining from mentioning some approaches that
|
|||
|
are obvious to me, but that may not be thought of immediately by
|
|||
|
just ANYBODY contemplating a virus program, in case that can give
|
|||
|
an extra breathing space. But I KNOW that there ARE ways to
|
|||
|
unleash delayed action virus programs that CANNOT be detected by
|
|||
|
ANY feasible method. I don't think it will be long before these
|
|||
|
more sophisticated approaches become general public knowledge
|
|||
|
too.
|
|||
|
|
|||
|
A basic issue is that viruses involve quite different problems
|
|||
|
from simple Trojans. They can spread WITHOUT doing overt damage.
|
|||
|
|
|||
|
I am writing a separate technical paper on all this, which shows
|
|||
|
FidoNews 5-26 Page 12 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
that FidoNet itself is in special "clear and present danger" with
|
|||
|
more than the usual problems faced by all BBSes. Anyone wanting a
|
|||
|
copy should NetMail me direct, explaining why they have a
|
|||
|
legitimate "need to know" and with an undertaking not to pass on
|
|||
|
the information. This paper is not available for file request but
|
|||
|
will be crashed direct to responsible software developers
|
|||
|
interested in working on solutions.
|
|||
|
|
|||
|
I sent a message about these problems to the International
|
|||
|
Coordinator of FidoNet nearly three months ago. He replied to
|
|||
|
other matters in the same message in a manner indicating that he
|
|||
|
had not understand anything I said to him, and he did not reply
|
|||
|
at all on this issue. Judging from that and other indications, I
|
|||
|
do not believe that the authorities within FidoNet who ought to
|
|||
|
take the initiative to do something about this situation are
|
|||
|
likely to do so. (For that matter my experience with the IC is
|
|||
|
that he also thinks he can avoid other serious problems by
|
|||
|
sticking his head in the sand). I see no choice but to now pass
|
|||
|
on the information direct to interested and responsible software
|
|||
|
developers.
|
|||
|
|
|||
|
There's no point refraining from public discussion, when full
|
|||
|
page articles about computer viruses are appearing in daily
|
|||
|
newspapers, and when people responsible for administration of
|
|||
|
FidoNet won't listen AT ALL.
|
|||
|
|
|||
|
Ok, now as well as being necessary to look at new solutions, it's
|
|||
|
also URGENT to do so.
|
|||
|
|
|||
|
|
|||
|
2. WHY ITS URGENT
|
|||
|
|
|||
|
"Computer AIDS" is likely to have as devastating an effect on
|
|||
|
BBSes and FidoNet as the original AIDS has already had on gays,
|
|||
|
and is now having on the wider community. Unless something is
|
|||
|
done NOW, we are CERTAIN to eventually be hit by some really
|
|||
|
deadly virus that has been spread to literally thousands of
|
|||
|
public access BBS systems through FidoNet and will then, months
|
|||
|
later, cause literally millions of dollars worth of damage to
|
|||
|
data on literally tens of thousands of users hard disks. The
|
|||
|
problem is THAT serious.
|
|||
|
|
|||
|
Apart from jerks, there are economic interests that actually
|
|||
|
stand to GAIN from destructive viruses, because public domain
|
|||
|
software, and the "sharing" of other software that often occurs
|
|||
|
among people who use public domain software, directly competes
|
|||
|
with their own commercial interests.
|
|||
|
|
|||
|
As Nicholas Rothwell points out in his article on "Computer
|
|||
|
AIDS":
|
|||
|
|
|||
|
But what if one does not want to create trouble, but
|
|||
|
rather to destroy trust? For that is what is at stake.
|
|||
|
Without open communication, without "public domain"
|
|||
|
software, without free exchange of academic and
|
|||
|
technical software, the personal computer revolution is
|
|||
|
FidoNews 5-26 Page 13 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
hamstrung.
|
|||
|
|
|||
|
There are plenty of technically competent people in FidoNet who
|
|||
|
are out to destroy trust and are opposed to open communication.
|
|||
|
I'll be going into that in a later article.
|
|||
|
|
|||
|
Last month a report for the European Commission issued a formal
|
|||
|
blunt warning that computer networks across the member nations of
|
|||
|
the European Community were not safe:
|
|||
|
|
|||
|
Unless action is taken to improve levels of computer
|
|||
|
and network security, the consequences for individual
|
|||
|
enterprises could be severe, even catastrophic.
|
|||
|
|
|||
|
For FidoNet the consequences would be catastrophic, not just
|
|||
|
"severe". It is one of the world's largest computer networks, but
|
|||
|
with virtually NO security and LOTS of jerks.
|
|||
|
|
|||
|
We are supposed to be a network dedicated to the free exchange of
|
|||
|
information. If instead we become known as a network that has
|
|||
|
done millions of dollars worth of PREDICTABLE damage that COULD
|
|||
|
have been avoided by SIMPLE countermeasures, then both individual
|
|||
|
SysOps and IFNA could be held legally responsible for the damage
|
|||
|
resulting from negligently failing to take those countermeasures.
|
|||
|
|
|||
|
Quite apart from the legal consequences, a really devastating
|
|||
|
virus attack would give the words "BBS" and "FidoNet" a brand
|
|||
|
recognition somewhere between Tylenol and anal sex.
|
|||
|
|
|||
|
If the countermeasures aren't in place BEFORE major damage is
|
|||
|
done, there will be an atmosphere of incredible paranoia about
|
|||
|
using ANY software from BBSes and user groups. It could even be
|
|||
|
quite difficult working on solutions in that atmosphere. Also
|
|||
|
interests opposed to public domain software and the free exchange
|
|||
|
of information could take the opportunity to impose regulation
|
|||
|
and controls on a VERY unpopular minority.
|
|||
|
|
|||
|
|
|||
|
3. WHAT IS TO BE DONE?
|
|||
|
|
|||
|
Fortunately there IS an approach that CAN stop viruses, and COULD
|
|||
|
be widely used as soon as its available. I hope I've given enough
|
|||
|
reasons for people to take a serious interest in my proposals
|
|||
|
despite their unfamiliarity. Here goes.
|
|||
|
|
|||
|
The way biological immune systems develop antibodies to attack
|
|||
|
foreign bodies is to first identify what SHOULD be present and
|
|||
|
then deduce what should not. We can do that using "digital
|
|||
|
signatures" just as the immune system recognizes molecular
|
|||
|
signatures.
|
|||
|
|
|||
|
Since there is NO practical way to determine whether unknown
|
|||
|
software is a virus or not, the ONLY feasible approach to "safe
|
|||
|
software" is to identify KNOWN software and use nothing else.
|
|||
|
|
|||
|
The logic of that is both compelling and frightening. It has
|
|||
|
FidoNews 5-26 Page 14 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
already led to quite serious restrictions on the "promiscuous"
|
|||
|
way that people exchange software. If the current trend
|
|||
|
continues, open BBSes will become less and less viable and the
|
|||
|
"free exchange of information" will be replaced by tightly
|
|||
|
controlled distribution channels.
|
|||
|
|
|||
|
AT PRESENT the only way to identify "known" software, is through
|
|||
|
writing and compiling it yourself, or buying it from a commercial
|
|||
|
distributor in a shrink wrapped package. Even these precautions
|
|||
|
aren't worth much against compiler viruses and given the level of
|
|||
|
security at most software publishers.
|
|||
|
|
|||
|
Turned around, the same logic suggests we need to find another
|
|||
|
way to identify "known" software. Fortunately there IS another
|
|||
|
way, suitable for BBS public domain and shareware software.
|
|||
|
|
|||
|
|
|||
|
3.1 Authentication by digital signature
|
|||
|
|
|||
|
Software authors and publishers can use public key encryption or
|
|||
|
other digital signature techniques to authenticate their software
|
|||
|
releases with their personal "signature". This merely requires
|
|||
|
that they run a standard encryption utility on each package
|
|||
|
before distribution. An explanation of how public key encryption
|
|||
|
works is in FidoNews 428.
|
|||
|
|
|||
|
Authentication is the key to killing viruses while preserving the
|
|||
|
free exchange of information. It doesn't actually kill them, but
|
|||
|
it provides a way we can only use "known" software WITHOUT
|
|||
|
tightly controlled distribution channels.
|
|||
|
|
|||
|
Essentially the use of public key digital signatures just
|
|||
|
establishes that any two items that can be decrypted with the
|
|||
|
same "public key" signature MUST have both come from the same
|
|||
|
person. It's that person's personal signature and there is no way
|
|||
|
that anybody else could "forge" it.
|
|||
|
|
|||
|
Because an item can be decrypted with a particular public key, it
|
|||
|
must have been encrypted using the corresponding "secret key"
|
|||
|
that was generated simultaneously with the public key by the
|
|||
|
person who published that public key. Since this "secret key"
|
|||
|
cannot be deduced from knowledge of the public key, the person
|
|||
|
who encrypted using it must therefore be the person who published
|
|||
|
the original public key (unless they let somebody else get hold
|
|||
|
of a copy!)
|
|||
|
|
|||
|
A digital signature doesn't prove who the person that uses it
|
|||
|
really is, or how trustworthy they are, or whether they
|
|||
|
originally wrote the document they are signing.
|
|||
|
|
|||
|
But it DOES allow each software author (or other distributor) to
|
|||
|
establish their own "reputation".
|
|||
|
|
|||
|
In practice most users won't want to keep the public keys of
|
|||
|
large numbers of software authors and publishers, and new authors
|
|||
|
and publishers need a way to get their software accepted.
|
|||
|
FidoNews 5-26 Page 15 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
This requires intermediary "recommenders" and "software
|
|||
|
certifiers" who publish "signed" lists of signatures which they
|
|||
|
recommend as trustworthy, or reissue software they trust under
|
|||
|
their own "signatures". They may also issue signed "warnings"
|
|||
|
about infected software they have come across, and who signed it.
|
|||
|
|
|||
|
Some SysOps and user groups may want to advise their users which
|
|||
|
signatures they personally recommend as trustworthy. That's up to
|
|||
|
them and it's up to their users what notice to take of their
|
|||
|
advice.
|
|||
|
|
|||
|
Some software collectors may want to keep close tabs on who
|
|||
|
releases what, and reissue copies under their own signature as
|
|||
|
evidence that they consider an item to be uninfected. That's
|
|||
|
equivalent to the responsibility that anyone takes now, when they
|
|||
|
pass on a copy of ANYTHING to anybody else. A valuable service
|
|||
|
can be performed by such "software certifiers". When things
|
|||
|
settle down, end users should be able to rely on relatively few
|
|||
|
signatures, and with the side benefit of automatically produced
|
|||
|
catalogs of software available.
|
|||
|
|
|||
|
It's very important that there be convenient ways for
|
|||
|
recommendations and warnings to be passed on and accepted or
|
|||
|
rejected automatically according to users preferences as to which
|
|||
|
advice they consider trustworthy. It's equally important that
|
|||
|
there be no central authority who is the sole source of such
|
|||
|
advice.
|
|||
|
|
|||
|
It IS possible for such "advice" to be processed automatically,
|
|||
|
by users, with no hassles, despite coming from a multitude of
|
|||
|
sources. I'll explain that later.
|
|||
|
|
|||
|
The essential point is that we ALL rely on such advice and
|
|||
|
recommendations now, including published lists of Trojans. The
|
|||
|
difference with my proposal is that we can automate it and know
|
|||
|
where it's really coming from. More important, we can know which
|
|||
|
software EXACTLY is being recommended or warned against.
|
|||
|
|
|||
|
Instead of lists warning about certain utility names and version
|
|||
|
numbers, we will see (automatically processed) lists warning
|
|||
|
about signatures. Although anybody can just adopt another
|
|||
|
signature, getting other people to accept it will be a lot harder
|
|||
|
than just using the RENAME command on a Trojan!
|
|||
|
|
|||
|
Life will actually be EASIER for SysOps as a result.
|
|||
|
|
|||
|
|
|||
|
3.2 Establishing Reputations
|
|||
|
|
|||
|
For their recommendations and warnings to be accepted, a SysOp or
|
|||
|
other software certifier needs a reputation for giving good
|
|||
|
advice.
|
|||
|
|
|||
|
For their signatures to be recommended, or for their software to
|
|||
|
be reissued under other people's signatures, a software author or
|
|||
|
distributor needs a reputation for taking adequate precautions to
|
|||
|
FidoNews 5-26 Page 16 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
not release infected software. (For reissue most people would
|
|||
|
want to read and recompile the source code themselves before
|
|||
|
staking their own reputations on it.)
|
|||
|
|
|||
|
In both cases anybody can start again under another signature,
|
|||
|
but the signatures that users will accept will be the ones that
|
|||
|
have established a reputation over a period.
|
|||
|
|
|||
|
|
|||
|
3.2.1 "I've never released infected software"
|
|||
|
|
|||
|
If an infected program is released under a particular signature,
|
|||
|
anybody can PROVE that signature should not be trusted again.
|
|||
|
(Although nobody can prove whether a virus was released
|
|||
|
deliberately, accidentally, or as a result of allowing a secret
|
|||
|
key to become known to somebody else, the effects are the same
|
|||
|
and the consequences should be the same - don't trust the
|
|||
|
signature of anybody who signed that software. They should never
|
|||
|
have signed it. Whether it was deliberate or not is a matter for
|
|||
|
law courts, not protection schemes.)
|
|||
|
|
|||
|
Proof consists of a copy of the infected software, as originally
|
|||
|
signed by the person releasing it, together with details of the
|
|||
|
infection, that can be tested by anyone reading about it.
|
|||
|
|
|||
|
|
|||
|
3.2.2 "I've never signed bad advice"
|
|||
|
|
|||
|
If anybody gives signed bad advice that would be adopted
|
|||
|
automatically by users who have decided to trust their advice,
|
|||
|
anybody damaged can PROVE the advice was bad. Proof consists of a
|
|||
|
copy of the signed advice, together with the proof that the
|
|||
|
advisor got it wrong.
|
|||
|
|
|||
|
This can result in other software certifiers issuing signed
|
|||
|
warnings to disregard advice from the signature that has been
|
|||
|
proved to them to be unreliable.
|
|||
|
|
|||
|
Issuing a signed warning, without being able to provide the proof
|
|||
|
when requested, can also be dealt with. Having asked for proof,
|
|||
|
other software certifiers will be willing to stake their
|
|||
|
reputations by issuing signed warnings that warnings from a
|
|||
|
particular signature should be disregarded.
|
|||
|
|
|||
|
Signed warnings from software certifiers they trust can
|
|||
|
automatically prompt users to revise their lists of who to trust,
|
|||
|
and to review what software on their systems may be dangerous as
|
|||
|
a result of having accepted bad advice.
|
|||
|
|
|||
|
Being able to PROVE these things, makes it possible to establish
|
|||
|
a completely informal decentralized and automatic system for
|
|||
|
distributing recommendations along with software. Such a system
|
|||
|
can be fully automated so that it is almost completely
|
|||
|
transparent to users, who only have to decide on accepting the
|
|||
|
signatures of a few people whose recommendations and warnings
|
|||
|
they will trust.
|
|||
|
FidoNews 5-26 Page 17 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
3.3 Implementation
|
|||
|
|
|||
|
All encrypted files would have a standard header including the
|
|||
|
public key to be used (about 150 bytes). Decryption software can
|
|||
|
look up the key (or a shorter hash of it) automatically in a
|
|||
|
user's database of acceptable keys. Thus to decrypt a file, users
|
|||
|
wouldn't even have to specify keys along with filenames. To
|
|||
|
decide whether to trust some software, users wouldn't have to
|
|||
|
look up their database manually. The key is either there or it
|
|||
|
isn't, when the decryption software tries to process an encrypted
|
|||
|
file.
|
|||
|
|
|||
|
Initially trusted signatures could be in standard format files
|
|||
|
called PUBLIC.KEY, similar to individual nodelist lines. These
|
|||
|
would normally be obtained direct by downloading or file request
|
|||
|
from the trusted phone number contained within them.
|
|||
|
|
|||
|
Acceptance of those initial signatures as trustworthy would
|
|||
|
result in automatic acceptance of subsequent files containing
|
|||
|
recommendations or warnings signed with those signatures - until
|
|||
|
the end user decides otherwise. After decrypting the
|
|||
|
recommendation or warning the software would automatically apply
|
|||
|
to the user's keys database.
|
|||
|
|
|||
|
Standard formats similar to the St Louis nodelist can be used to
|
|||
|
distribute (signed) lists of recommendations and warnings about
|
|||
|
particular public key signatures. Utilities similar to MAKENL and
|
|||
|
XLATLIST (but with a "user friendly" interface) can be used
|
|||
|
automatically together with the encryption software, to produce
|
|||
|
customized end user databases of what signatures they will
|
|||
|
automatically accept or reject.
|
|||
|
|
|||
|
End users just decide on a few signatures they INITIALLY consider
|
|||
|
trustworthy, and then simply pass any encrypted files they
|
|||
|
receive, whether software, recommendations or warnings, through
|
|||
|
their encryption utility to automatically update their keys
|
|||
|
database as well as to decrypt the software recommended by people
|
|||
|
they trust and not warned against by people they trust.
|
|||
|
|
|||
|
The main complication for a full protection system is to avoid
|
|||
|
the encryption utilities and key databases themselves becoming
|
|||
|
infected, despite end users not fully understanding what it's all
|
|||
|
about.
|
|||
|
|
|||
|
This can be achieved by writing the software so it HAS to be used
|
|||
|
in a secure way, eg coldbooting from a "safe" floppy, encouraging
|
|||
|
floppy backups of the encrypted versions of all software that is
|
|||
|
accepted, and keyboard entry of checksums of PUBLIC.KEY files.
|
|||
|
|
|||
|
I'm drafting some proposed standards, specifications and end user
|
|||
|
instructions for immediate and future software development.
|
|||
|
Anyone interested in details of these proposals please file
|
|||
|
request CRYPLIST from 1:221/162 for a list of what's available so
|
|||
|
far. If anyone can suggest a simpler approach that is foolproof,
|
|||
|
or can see loopholes in this one, please send NetMail to me at
|
|||
|
1:221/162.14. Likewise for anyone interested in working on
|
|||
|
FidoNews 5-26 Page 18 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
software and standards. I'd like to start an echo, AREA:PUBKEY,
|
|||
|
for serious discussions among interested software developers. It
|
|||
|
really has to happen NOW.
|
|||
|
|
|||
|
|
|||
|
3.4 Free Exchange of Information
|
|||
|
|
|||
|
Using this approach, software distributors, BBS SysOps and user
|
|||
|
groups etc can freely distribute the encrypted versions of
|
|||
|
software, recommendations and warnings from anybody, without
|
|||
|
worrying about whether the software is infected or whether the
|
|||
|
recommendations and warnings are reliable.
|
|||
|
|
|||
|
They simply notify end users not to accept anything that has not
|
|||
|
been encrypted with a digital signature that the USER trusts
|
|||
|
(whether directly or as a result of trusting recommendations and
|
|||
|
ignoring warnings). The recommendations and warnings just get
|
|||
|
distributed along with encrypted software.
|
|||
|
|
|||
|
This is an unfamiliar concept, but it can be implemented with
|
|||
|
simple, "user friendly" utilities. It requires NO work "testing"
|
|||
|
software and will ultimately be much easier to get across to end
|
|||
|
users than the idea of software celibacy.
|
|||
|
|
|||
|
It also requires NO centralized authorities to put their stamp of
|
|||
|
approval on things. Apart from the unlikelihood of such
|
|||
|
authorities being established or accepted, there would be real
|
|||
|
dangers of abuse judging from the way I've seen FidoNet
|
|||
|
coordinators treat the nodelist. I'll be going into that in later
|
|||
|
articles.
|
|||
|
|
|||
|
|
|||
|
3.5 Isn't it too complicated?
|
|||
|
|
|||
|
Yes, for now. I'm hoping there will be SOME people who understand
|
|||
|
AND agree with the point I'm making and will work on designing a
|
|||
|
system as easy to use as possible for when its needed. Once its
|
|||
|
needed, it will be needed BADLY, and the alternatives will be FAR
|
|||
|
more complicated and basically won't work.
|
|||
|
|
|||
|
In that situation, which could come SOON, some SysOps and user
|
|||
|
groups may go on distributing unencrypted software. But they will
|
|||
|
lose popularity either gradually or very suddenly.
|
|||
|
|
|||
|
At least this proposal provides an alternative to pretending that
|
|||
|
viruses can't get past detection utilities, and then wondering
|
|||
|
why use of BBSes has suddenly become unpopular.
|
|||
|
|
|||
|
HOW safe to play it is up to each user. Some will be silly enough
|
|||
|
to trust any PUBLIC.KEY they are offered. Each time their hard
|
|||
|
disk gets trashed they will at least learn not to trust THAT
|
|||
|
signature again, and eventually they may learn more. Once enough
|
|||
|
users have been educated through experience, it will become
|
|||
|
pointless attempting to release viruses - they aren't going to
|
|||
|
travel far unencrypted and each signature used successfully is
|
|||
|
going to reduce the number of gullible fools willing to accept
|
|||
|
FidoNews 5-26 Page 19 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
unknown signatures.
|
|||
|
|
|||
|
Of course some "software certifiers" may irresponsibly issue
|
|||
|
software or recommendations under their signatures without
|
|||
|
sufficient care. But they will quickly AND AUTOMATICALLY be
|
|||
|
discredited and others more reliable will take their place.
|
|||
|
|
|||
|
Major software publishers will probably prefer to encourage users
|
|||
|
to rely only on shrink wrapped factory fresh disks. They may even
|
|||
|
welcome the additional incentive to do so. But they could end up
|
|||
|
in the same position as religious moralists claiming that
|
|||
|
monogamy is the only answer to AIDS. If a really devastating
|
|||
|
virus gets out on a factory fresh diskette, that publisher will
|
|||
|
probably go out of business and others may start publishing their
|
|||
|
public keys in magazine ads and printed manuals (or shorter
|
|||
|
hashes of the full keys).
|
|||
|
|
|||
|
|
|||
|
3.6 How could this proposal get widely adopted?
|
|||
|
|
|||
|
End users that receive encrypted software and recommendations
|
|||
|
distributed by BBSes, user groups or other end users are FORCED
|
|||
|
to apply the encryption utility before they can use the software.
|
|||
|
|
|||
|
There are VERY good reasons why developers of FidoNet mailers and
|
|||
|
related utilities should be using this system NOW, as I'm
|
|||
|
explaining in a separate technical paper. If they do so,
|
|||
|
responsible FidoNet SysOps will start accepting only the
|
|||
|
encrypted versions (although initially decrypted versions would
|
|||
|
continue circulating).
|
|||
|
|
|||
|
Once encrypted software starts being released, using it just
|
|||
|
involves running the encryption utility on the files received,
|
|||
|
with minimal inconvenience. Once FidoNet SysOps are doing that
|
|||
|
for essential network software updates, it will be easy for other
|
|||
|
software authors and publishers to adopt the same system and for
|
|||
|
SysOps to make it available directly to their users. Thus the
|
|||
|
system could take off rapidly, once it gains a foothold.
|
|||
|
|
|||
|
The "inconvenience" of running an encryption utility, can be
|
|||
|
hidden by the "convenience" of having a system that automatically
|
|||
|
keeps track of ALL the user's software installation and backups,
|
|||
|
superior to the cataloging utilities available now and with the
|
|||
|
advantage of automatic enforcement of use. It can also be
|
|||
|
integrated with concepts like Megalist, for automatic tracking of
|
|||
|
what's available and where to get it.
|
|||
|
|
|||
|
Keeping track is ESSENTIAL for virus killing, to recover from
|
|||
|
having trusted irresponsible recommendations by restoring
|
|||
|
original uninfected software, and to be able to track down,
|
|||
|
remove, and warn others about, the signatures that caused the
|
|||
|
problem. It has to be done automatically, or it won't be done
|
|||
|
properly.
|
|||
|
|
|||
|
However this can be implemented later, after basic FidoNet
|
|||
|
software has been protected by a preliminary system. Initially
|
|||
|
FidoNews 5-26 Page 20 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
FidoNet utilities could just be protected with publication of the
|
|||
|
PUBLIC.KEY files of their authors, (eg in FidoNews, or shorter
|
|||
|
hashes as nodelist flags), without the full mechanism for
|
|||
|
exchanging recommendations and warnings and keeping track etc.
|
|||
|
|
|||
|
|
|||
|
4. POSSIBLE PROBLEMS
|
|||
|
|
|||
|
4.1 Legal Hassles
|
|||
|
|
|||
|
The US National Security Agency has a policy opposed to the
|
|||
|
widespread use of secure encryption techniques and has classified
|
|||
|
some commercial public key encryption packages such as
|
|||
|
Cryptmaster and PKcrypt as "weapons" subject to munitions export
|
|||
|
controls. However this does NOT apply to publicly available
|
|||
|
information including shareware and public domain software
|
|||
|
available for download from BBSes (although some people have been
|
|||
|
bluffed into believing it might).
|
|||
|
|
|||
|
Under the US Export Administration Regulations there is a General
|
|||
|
Licence "GTDA" (part 379.3) which covers all such publicly
|
|||
|
available technical data and is NOT overridden by the munitions
|
|||
|
regulations (logical when you think about it - the US Government
|
|||
|
is not so silly as to even TRY to prohibit export of publicly
|
|||
|
available data!). Full details for anyone interested are
|
|||
|
contained in a USEnet discussion as file GTDA.ARC (10K) available
|
|||
|
for file request from 1:221/162.
|
|||
|
|
|||
|
Books containing detailed algorithms are readily available and
|
|||
|
public domain or shareware source code would be in the same
|
|||
|
category. (Some has already been released through BBSes and
|
|||
|
USEnet).
|
|||
|
|
|||
|
I would recommend the following books for a thorough professional
|
|||
|
understanding of secure cryptographic techniques:
|
|||
|
|
|||
|
Alan G. Konheim, "Cryptography: A Primer", John Wiley & Sons, New
|
|||
|
York, 1981.
|
|||
|
|
|||
|
Carl H. Meyer and Stephen M. Matyas, "Cryptography: A new
|
|||
|
dimension in computer data security", John Wiley & Sons, New
|
|||
|
York, 1982.
|
|||
|
|
|||
|
|
|||
|
4.2 Developing Encryption Software
|
|||
|
|
|||
|
Development of a standard public key encryption utility that can
|
|||
|
be used widely involves no significant technical problems at all.
|
|||
|
|
|||
|
Its true that software with even the best key generation
|
|||
|
algorithms runs extremely slowly, but each software author or
|
|||
|
publisher only needs to generate their keys once and end users
|
|||
|
don't need to do it at all (although there are extra benefits if
|
|||
|
they do).
|
|||
|
|
|||
|
Actual encryption and decryption operates at quite acceptable
|
|||
|
FidoNews 5-26 Page 21 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
speeds with existing commercial packages and can no doubt be
|
|||
|
further improved with the superior programming resources
|
|||
|
available within FidoNet.
|
|||
|
|
|||
|
For our purposes a high speed "hybrid" implementation could be
|
|||
|
quite acceptable, at least initially. This would use relatively
|
|||
|
slow public key encryption to authenticate only a short hash of
|
|||
|
the attached software, using a cryptographically secure hashing
|
|||
|
method. The actual software need not be encrypted at all, but
|
|||
|
just hashed with a more complex algorithm than the usual CRC and
|
|||
|
producing at least 10 bytes of output. (That could also keep NSA
|
|||
|
happy).
|
|||
|
|
|||
|
A smooth transition could be achieved by using a normal ARC file,
|
|||
|
which can just be used to unARC the software directly or ALSO
|
|||
|
used to check a file within it that contains the "signed" hash of
|
|||
|
the rest of the ARC file. In the long run though, once things get
|
|||
|
really bad, it would be better to force users to actually run the
|
|||
|
software provided for authentication, by actually encrypting
|
|||
|
entire files. The transitional system would be useful for secure
|
|||
|
distribution of a better system released later.
|
|||
|
|
|||
|
I am writing a draft proposal for the FidoNet Technical Standards
|
|||
|
Committee suggesting standards to ensure utilities developed will
|
|||
|
be secure, compatible, fast, widely adopted, suitable for porting
|
|||
|
to all common computers and suitable for other FidoNet uses.
|
|||
|
(Other uses with further software development include: private
|
|||
|
and authenticated Email; a convenient, decentralized and secure
|
|||
|
means for exchanging nodelist information and session passwords
|
|||
|
between nodes; and Email voting systems.)
|
|||
|
|
|||
|
|
|||
|
4.2 Is Public Key Encryption Secure?
|
|||
|
|
|||
|
Most digital signature techniques rely on the computational
|
|||
|
difficulty of factorizing large composite numbers. This problem
|
|||
|
has defied mathematicians for some 200 years but has not been
|
|||
|
proved cryptographically secure or even "NP complete" (a measure
|
|||
|
of computational complexity which does NOT prove cryptographic
|
|||
|
security). There is some indication that these methods CAN
|
|||
|
eventually be cracked or MAY have already been cracked, with the
|
|||
|
results classified.
|
|||
|
|
|||
|
Fortunately this problem need not concern us unduly as it is
|
|||
|
unlikely that a major breakthrough in higher mathematics will
|
|||
|
first come to light as a result of its discovery by someone
|
|||
|
warped enough to want to launch destructive viruses! (Not that
|
|||
|
some mathematicians aren't pretty warped, but they'd probably
|
|||
|
prefer to take the public kudos for announcing the solution!)
|
|||
|
|
|||
|
If new developments make any particular digital signature system
|
|||
|
insecure, alternatives are available and can be implemented
|
|||
|
quickly. (Unlike virus detection programs which just simply won't
|
|||
|
work AT ALL against the next generation of viruses.) Standards
|
|||
|
for file headers etc should provide for later upgrades.
|
|||
|
The main thing is to have the machinery in place for when its
|
|||
|
FidoNews 5-26 Page 22 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
needed, and improve it later.
|
|||
|
|
|||
|
|
|||
|
4.4 Developing End User Software
|
|||
|
|
|||
|
Some pretty neat software will need to be written quickly for end
|
|||
|
users automatic key databases and tracking etc. It has to end up
|
|||
|
being a lot more professional and "user friendly" than most
|
|||
|
public domain and shareware software and provide lots of extra
|
|||
|
benefits like software cataloging, to gain wide acceptance BEFORE
|
|||
|
a disaster hits.
|
|||
|
|
|||
|
That's why I wrote this article. Now who's going to do the hard
|
|||
|
stuff?
|
|||
|
|
|||
|
Oh well, there it is. Sorry about the length, but if nobody pays
|
|||
|
any attention, guess who'll be saying "I told you so".
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-26 Page 23 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
NOTICES
|
|||
|
=================================================================
|
|||
|
|
|||
|
The Interrupt Stack
|
|||
|
|
|||
|
|
|||
|
16 Jul 1988
|
|||
|
A new areacode, 508, will form in eastern Massachusetts and
|
|||
|
will be effective on this date. The new area code will be
|
|||
|
formed from the current areacode 617. Greater Boston will
|
|||
|
remain areacode 617 while the rest of eastern Massachusetts
|
|||
|
will form the new areacode 508.
|
|||
|
|
|||
|
25 Aug 1988
|
|||
|
Start of the Fifth International FidoNet Conference, to be
|
|||
|
held at the Drawbridge Inn in Cincinnati, OH. Contact Tim
|
|||
|
Sullivan at 108/62 for more information. This is FidoNet's big
|
|||
|
annual get-together, and is your chance to meet all the people
|
|||
|
you've been talking with all this time. We're hoping to see
|
|||
|
you there!
|
|||
|
|
|||
|
24 Aug 1989
|
|||
|
Voyager 2 passes Neptune.
|
|||
|
|
|||
|
|
|||
|
If you have something which you would like to see on this
|
|||
|
calendar, please send a message to FidoNet node 1:1/1.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
Latest Software Versions
|
|||
|
|
|||
|
BBS Systems Node List Other
|
|||
|
& Mailers Version Utilities Version Utilities Version
|
|||
|
|
|||
|
Dutchie 2.90* EditNL 4.00* ARC 5.21
|
|||
|
Fido 12h MakeNL 2.12* ARCmail 1.1
|
|||
|
Opus 1.03b Prune 1.40 ConfMail 3.31
|
|||
|
SEAdog 4.10 XlatList 2.86 EchoMail 1.31
|
|||
|
TBBS 2.0M XlaxNode 1.02 MGM 1.1
|
|||
|
BinkleyTerm 1.50 XlaxDiff 1.02
|
|||
|
QuickBBS 2.01 ParseList 1.10
|
|||
|
|
|||
|
* Recently changed
|
|||
|
|
|||
|
Utility authors: Please help keep this list up to date by
|
|||
|
reporting new versions to 1:1/1. It is not our intent to list
|
|||
|
all utilities here, only those which verge on necessity.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-26 Page 24 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION
|
|||
|
|
|||
|
Ken Kaplan 100/22 Chairman of the Board
|
|||
|
Don Daniels 107/210 President
|
|||
|
Mark Grennan 147/1 Vice President
|
|||
|
Dave Dodell 114/15 Vice President - Technical Coordinator
|
|||
|
David Garrett 103/501 Secretary
|
|||
|
Leonard Mednick 345/1 Treasurer
|
|||
|
|
|||
|
|
|||
|
|
|||
|
IFNA BOARD OF DIRECTORS
|
|||
|
|
|||
|
DIVISION AT-LARGE
|
|||
|
|
|||
|
10 Steve Jordan 102/2871 Don Daniels 107/210
|
|||
|
11 Bill Allbritten 11/301 Hal DuPrie 101/106
|
|||
|
12 Leonard Mednick 345/1 Mark Grennan 147/1
|
|||
|
13 Rick Siegel 107/27 Brad Hicks 100/523
|
|||
|
14 Ken Kaplan 100/22 Ted Polczyinski 154/5
|
|||
|
15 Jim Cannell 128/13 Kurt Reisler 109/74
|
|||
|
16 Vince Perriello 141/491 Robert Rudolph 261/628
|
|||
|
17 Rob Barker 138/34 Greg Small 148/122
|
|||
|
18 Christopher Baker 135/14 Bob Swift 140/24
|
|||
|
19 Vernon Six 19/0 Larry Wall 15/18
|
|||
|
2 Henk Wevers 2:500/1 Gee Wong 107/312
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-26 Page 25 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
FidoCon '88 - Cincinnati, Ohio
|
|||
|
At The Drawbridge Inn and Convention Center
|
|||
|
August 25-28, 1988
|
|||
|
|
|||
|
Attendee Registration Form
|
|||
|
|
|||
|
|
|||
|
Name: ____________________________________________________
|
|||
|
|
|||
|
Address: ____________________________________________________
|
|||
|
|
|||
|
Address: ____________________________________________________
|
|||
|
|
|||
|
City: _______________________ State: ____ Zip: ___________
|
|||
|
|
|||
|
Country: ____________________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Phone Numbers:
|
|||
|
|
|||
|
Day: ____________________________________________________
|
|||
|
|
|||
|
Evening: ____________________________________________________
|
|||
|
|
|||
|
Data: ____________________________________________________
|
|||
|
|
|||
|
|
|||
|
Zone:Net/
|
|||
|
Node.Point: _______________________________________________
|
|||
|
|
|||
|
Your BBS Name: _______________________________________________
|
|||
|
|
|||
|
|
|||
|
BBS Software: _____________________ Mailer: _________________
|
|||
|
|
|||
|
Modem Brand: _____________________ Speed: _________________
|
|||
|
|
|||
|
|
|||
|
What Hotel will you be Staying at: ____________________________
|
|||
|
|
|||
|
Do you want to share a room? ______
|
|||
|
|
|||
|
Are you a non-smoker? ______
|
|||
|
|
|||
|
Do you want an in room point? ______
|
|||
|
(Tower rooms at Drawbridge only)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Do you need special accommodations? ______
|
|||
|
|
|||
|
(If so, please explain) ____________________________
|
|||
|
|
|||
|
____________________________
|
|||
|
|
|||
|
FidoNews 5-26 Page 26 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
Are you a non-Sysop? ______
|
|||
|
|
|||
|
Are you an IFNA Member? ______
|
|||
|
|
|||
|
If so, will you be attending the
|
|||
|
Sunday IFNA brunch/BoD meeting? ______
|
|||
|
|
|||
|
|
|||
|
Additional Guests: ______
|
|||
|
(not attending conferences)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Comments: ____________________________________________________
|
|||
|
|
|||
|
____________________________________________________
|
|||
|
|
|||
|
____________________________________________________
|
|||
|
|
|||
|
|
|||
|
Costs How Many? Cost
|
|||
|
--------------------------- -------- -------
|
|||
|
|
|||
|
Conference fee $60..................... ________ _______
|
|||
|
($75.00 after 7/31)
|
|||
|
|
|||
|
Thursday Lunch $10.95 .............. ________ _______
|
|||
|
|
|||
|
Thursday Dinner $18.95 .............. ________ _______
|
|||
|
|
|||
|
Friday Lunch $10.95 .............. ________ _______
|
|||
|
|
|||
|
Friday Banquet $24.95 .............. ________ _______
|
|||
|
|
|||
|
Saturday Lunch $10.95 .............. ________ _______
|
|||
|
======== =======
|
|||
|
|
|||
|
Totals ................................ ________ _______
|
|||
|
|
|||
|
|
|||
|
You may pay by Check, Money Order or Visa/MC
|
|||
|
Please send no cash. All monies must be in U.S. Funds.
|
|||
|
Checks should be made out to: "FidoCon '88"
|
|||
|
|
|||
|
This form should be completed and mailed to:
|
|||
|
|
|||
|
FidoCon '88 Registration
|
|||
|
P.O. Box 9294
|
|||
|
Cincinnati, OH 45209
|
|||
|
|
|||
|
|
|||
|
If you pay by Credit Card you may also register by Netmailing
|
|||
|
this completed form to 108/62 or 1/88 for processing. Please
|
|||
|
complete the information below and be sure to include a voice
|
|||
|
phone number above so that we can contact you for Credit Card
|
|||
|
FidoNews 5-26 Page 27 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
verification. Rename this file ZNNNXXXX.REG where Z is your Zone
|
|||
|
number, N is your Net number, and X is your Node number.
|
|||
|
|
|||
|
|
|||
|
[ ] Visa [ ] MasterCard
|
|||
|
|
|||
|
|
|||
|
Name as it appears
|
|||
|
on credit card: ___________________________________________
|
|||
|
|
|||
|
Credit Card Number: ___________________________________________
|
|||
|
|
|||
|
Expiration Date: ___________________________________________
|
|||
|
|
|||
|
Signature: ___________________________________________
|
|||
|
(If you mail in registration)
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-26 Page 28 27 Jun 1988
|
|||
|
|
|||
|
|
|||
|
INTERNATIONAL FIDONET ASSOCIATION
|
|||
|
ORDER FORM
|
|||
|
|
|||
|
Publications
|
|||
|
|
|||
|
The IFNA publications can be obtained by downloading from Fido
|
|||
|
1:1/10 or other FidoNet compatible systems, or by purchasing
|
|||
|
them directly from IFNA. We ask that all our IFNA Committee
|
|||
|
Chairmen provide us with the latest versions of each
|
|||
|
publication, but we can make no written guarantees.
|
|||
|
|
|||
|
Hardcopy prices as of October 1, 1986
|
|||
|
|
|||
|
IFNA Fido BBS listing $15.00 _____
|
|||
|
IFNA Administrative Policy DOCs $10.00 _____
|
|||
|
IFNA FidoNet Standards Committee DOCs $10.00 _____
|
|||
|
|
|||
|
SUBTOTAL _____
|
|||
|
|
|||
|
IFNA Member ONLY Special Offers
|
|||
|
|
|||
|
System Enhancement Associates SEAdog $60.00 _____
|
|||
|
SEAdog price as of March 1, 1987
|
|||
|
ONLY 1 copy SEAdog per IFNA Member
|
|||
|
|
|||
|
Fido Software's Fido/FidoNet $100.00 _____
|
|||
|
Fido/FidoNet price as of November 1, 1987
|
|||
|
ONLY 1 copy Fido/FidoNet per IFNA Member
|
|||
|
|
|||
|
International orders include $10.00 for
|
|||
|
surface shipping or $20.00 for air shipping _____
|
|||
|
|
|||
|
SUBTOTAL _____
|
|||
|
|
|||
|
HI. Residents add 4.0 % Sales tax _____
|
|||
|
|
|||
|
TOTAL _____
|
|||
|
|
|||
|
SEND CHECK OR MONEY ORDER IN US FUNDS:
|
|||
|
International FidoNet Association
|
|||
|
c/o Leonard Mednick, MBA, CPA
|
|||
|
700 Bishop Street, #1014
|
|||
|
Honolulu, HI. 96813-4112
|
|||
|
USA
|
|||
|
|
|||
|
Name________________________________
|
|||
|
Zone:Net/Node____:____/____
|
|||
|
Company_____________________________
|
|||
|
Address_____________________________
|
|||
|
City____________________ State____________ Zip_____
|
|||
|
Voice Phone_________________________
|
|||
|
|
|||
|
Signature___________________________
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|