textfiles/hacking/issm201.hac

841 lines
32 KiB
Plaintext

The Information Systems Security Monitor
_______ /--------\ /--------\ \ /|
| | | | \ / |
| | | | \ / |
| \_______ \_______ | \ |
| \ \ | |
| | | | |
| | | | |
| \________/ \________/ | |
-------
Dedicated to the pursuit of security awareness............
=================================================================
Volume 2 Number 1 January 1992
=================================================================
////////////////////// In this Issue \\\\\\\\\\\\\\\\\\\\\\\\\\\
One Nerd's Approach to Computer Security
What did Clyde say?
Digital Signatures Still A Mystery to Many in Government
Cyberspace
Dear Clyde
Computer Speak
Virus Fighters
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\//////////////////////////////////
ONE NERD'S APPROACH TO COMPUTER SECURITY
Hi, my name is Bill Strouse and I'm a NERD (Network Emergency
Repair Dude). I've been a Sysop or systems operator now for better
than a decade and I've learned a great deal about human nature and
security in general.
Back in 1980 it dawned on me that if I connected a modem to my
computer I could access it from anywhere I happened to be. But I
would have to have some sort of security or others would be
accessing it, possibly in a destructive way. The solution I decided
on was to setup a bulletin board system that used a combination of
a unique name and password for each caller to control what that
caller had access to. Once I got the system working I found it was
a great way to keep in touch with friends that also had modems and
an even better way to get answers on technical problems. Plus the
latest PD (public domain) software regularly showed up on my hard
disk. I publicized the number in electronic lists that were
distributed worldwide and was soon getting calls from all over the
continent and foreign countries like Sweden, England and Australia.
I soon had one of the best collections of PD software in the
country and the phone line was in constant use day and night.
Along with all the great people I met there were always those few
who had nothing better to do than try to destroy or disrupt what
others had built. One of the first things I learned was not to
allow just anyone the ability to leave public electronic mail.
Kids would call and leave grossly obnoxious public messages with
all sorts of foul language. We devised a system whereby a caller
could only leave a message to the Sysop on the first call then we
would call them back voice and verify who they were. Most
importantly we had verified they were connected to a legitimate
phone number which could be traced to a physical location and
person. After verification their security level was raised so they
had full access and an hour of system time a day. One of the next
lessons I learned was not to allow anyone to upload a program they
could then execute on the system. A friend, who continually worked
at busting the security to see if he could find holes uploaded a
game with a hidden copy of BASIC embedded in the program. When he
ran the program online he could issue a control code and jump to
the interpreter which allowed him to walk all over the security
like it didn't exist! After that all files were uploaded to a
private area no one but the Sysop had access to till they were
thoroughly inspected.
By 1985 I had so many people asking for help with computer related
problems I went into business for myself as a VAR, or Value Added
Reseller. Someone who not only sells you the goods but sticks
around and makes them work for you. Not long after that networking
looked like it might be the wave of the future. Since a network was
a shared resource, similar in nature to a bulletin board system and
even used a name and password for security I was right at home. And
I learned even more about security.
Number one. The weakest link in security is the employee using the
computer! They put their password on a sticky note and paste it on
their monitor so they don't forget; loan their account to fellow
employees; use passwords such as "secret", "love", or their social
security account number (every 14 year old wanna-be hacker has the
list of most commonly used passwords). They go to lunch and leave
their workstation logged into accounting records, bring in new
(virus infected) programs they want to use at work and just
generally gum up the (security) works. A good employee security
education program is worth its weight in gold.
And, security must be physical as well as electronic. I read a book
about a group of young hackers (Inner Circle) that could not
gain access to a mainframe because the security was well designed
so they posted a kid in the lobby of the company with a
questionnaire. He passed himself off as a high school student who
had been given an information gathering assignment as a school
project. Some of the questions asked were "What is your first and
last name", "Do you use a computer at work", "Are you married",
"What's your wife's name". Needless to say they were into the
system within days.
Mainframe managers are somewhat aware of this and protect their
iron (computers) from anyone without proper authority but most of
the LANs (Local Area Networks) I've worked with are in an area
that's easily accessible by anyone. Remember, something as simple
as a cup of coffee, or a boot disk with the proper utilities in
the hands of a disgruntled stockboy can turn your data into random
1s & 0s and truly ruin your day, if not your career.
The system I run is called The Ring of Fire after the tectonic
plate we live on the edge of here in California. Over time it has
grown to four (4) phone lines and over 350 megabytes of
downloadable software packages and graphics images. There are
well over 1,000 regular callers and the system averages about 3,000
calls a month but the electronic mail is where the real action is.
The E-mail is shared with other similar computer systems all over
the US and some foreign countries. Callers can leave a message in
a conference and it will show up on other systems all over the
country. Replies are automatically routed back to the originator
and show up as return mail addressed to that person. Thus, callers
can converse with a large number of diversely scattered individuals
at minimal cost (usually a free local phone call). To further
reduce online time we support SLMR off-line mail reader. With it
you can download a compressed mail packet of pre-specified
conferences then read and reply off-line with a full screen
editor and upload a compressed set of replies.
All of this runs on a Novell network that spans several computers
and large hard disks, a read/write CD, Fax server AND all of our
inhouse workstations. Hopefully, I'll see you online and we can
continue this as an interactive discussion ;-).
Author bio:
Bill Strouse has been a systems analyst for more
than twenty years now and has worked as a con-
sultant for IBM, Amdahl, Ford Aerospace and
Stanford University's SLAC (Stanford Linear
Accelerator).
Bill Strouse has been telecommuting since 1980
when he started his first electronic bulletin
board service, back in the CP/M days. He has
been the system operator ever since and current
ly has one of Silicon Valley's most popular
boards, the Ring-of-Fire, at 408-453-3326 and
408-453-2460. He was President of PRACSA (Public
Remote Access Computer Standards Association) for
many years before leaving three years ago to
found and become President of United Sysop's
Association, an organization of bulletin board
system operators and users.
Mr. Strouse is a president of Stoney River Net-
works, an authorized Novell Reseller. His com-
pany has installed many remote communication sys-
tems for various clients. He is also President
and Co-founder of the Silicon Valley Novell User
Group and serves on the Board of the Northern
California Netware User's Association. Bill is
also the editor of NetWare News, the newsletter
of the California Netware Users Association.
-------------------------End of Article---------------------
WHAT DID CLYDE SAY?
It's been brought to our attention that everyone that reads the
ISSM isn't always well versed in computer terminology. Well, in
an effort to remedy that situation we will be providing an article
called "Computer Speak", starting in this issue, that will be
devoted to getting every reader to understand computer jargon.
We appreciate hearing from our readers about any items or topics
that they would like to see appear in the ISSM. So let's keep
hearing from you. Just drop a note to Clyde or call.
-------------------------End of Article---------------------
DIGITAL SIGNATURES STILL ARE MYSTERY TO MANY IN GOVERNMENT
By Darryl K. Taft
A fight has erupted over the government proposal of a new
standard for digital signatures, and questions remain as to just
what a digital signature and public-key encryption actually are.
The National Institute of Standards and Technology has
proposed a standard for digital signatures that would securely
verify a message sender's identity.
Miles Smid, manager of the security technology group in NIST's
Computer Systems Laboratory, defined a "key" as a binary number
used with an algorithm to encipher or decipher data.
Public-key encryption requires the use of a matched pair of
such keys for each user, one that is publicly known and one that
is private and known only to the user. More traditional data
encryption methods, like the government's Data Encryption Standard
(DES), require only one key to encipher and decipher data.
Under the old method, "if I were to scramble a message with
my secret key, the only way you could descramble it would be to use
my key," Smid said. DES requires exchanging secret encryption keys
with each party, thus requiring prior relationships.
However, rather than using the same key to both encrypt and
decrypt the data, public-key encryption uses a matched pair of
encryption and decryption keys. Each key performs the inverse
function of the other.
Thus, a user makes his public-key publicly available, perhaps
via a directory or certifying authority, and keeps his private key
secret. To send a private message, an originator scrambles his
entire message using his intended recipient's public key. Once this
is done, the message can only be decoded with the recipient's
private key.
Inversely, a sender also can work over a file using his
private key, and it can only be decoded using that sender's public
key.
This provides the basis for the digital signature, because if
you can unscramble a signature in a message with someone's public
key, they had to use their private key to scramble it in the first
place.
The proposed standard, known as the Digital Signature Standard
(DSS) is based on a digital signature algorithm (DSA) derived from
a concept known as ElGamal encryption. It is intended for use in
electronic mail, electronic funds transfer, electronic data
interchange, software distribution, data storage and other
applications that require data integrity assurance and data origin
authentication.
NIST, on Aug.30, proposed to adopt the DSS as a Federal
Information Processing Standard (FIPS). The proposed standard
specifies a digital signature algorithm based on a public key.
The government's DSS is not intended to encrypt the data in
a message, but primarily to authenticate. The DSS is intended to
verify the author and verify the integrity of the data in the
message.
Public-key encryption algorithms are based upon what are known
as "hard problems," Smid said. These hard problems are mathematical
operations involving very large numbers. The government's proposed
DSS uses one of a variety of public-key encryption algorithms, Smid
said.
The NIST proposal's scheme differs markedly from that of a
popular encryption system from RSA Data Security Inc. of Redwood
City, Calif. The difference lies in the algorithms used to encrypt
and decrypt data. Smid said the RSA algorithm is based on the
difficulty of factoring very large numbers. This involves finding
a number that is the product of two other numbers.
Breaking that system for a small number would be pretty
simple, "but if I give you a large number, like 150 digits, that
would be difficult. Factoring very large numbers is a difficult
problem," he said.
The algorithm used in the NIST proposal is based upon the
difficulty of finding discrete logarithms. Essentially, this method
involves finding the remainder left over when you divide one number
by another one. Again, when dealing with very large numbers this
becomes a very difficult problem, Smid said.
Trap Doors
RSA's president, D. James Bidzos, has attacked the NIST
proposal as one that is not secure and that encourages trap doors.
Smid said many cryptographers rate the discrete logarithm problem
as more difficult or at least as difficult as the factoring method
RSA uses.
Ironically, Tahar ElGamal, whose work is recognized in the
NIST encryption scheme, is RSA's director of engineering.
"What NIST has proposed is a modification of the idea. Their
algorithm is about half from my work and half from theirs. The key
size is limited to 512 bits, which is questionable," ElGamal said.
ElGamal added that while he believes the NIST proposal will work,
he questions its security.
To use the DSS, a user need only use the system with his
everyday mail software.
"What you'd see is the regular message under whatever mail
system you have, but somewhere there would be a place for a digital
value, from three to 500 bits of data. This would be the sender's
signature. You'd have to have some software that would be able to
pull off the signature and verify it," Smid said.
Using the DSS, messages appear "in the clear," Smid said
because the DSS does not account for privacy. The DSS does not
encrypt the entire message, it adds an encrypted "signature" onto
the message.
The RSA system does allow for privacy -- with or without
another encryption scheme. The RSA system lets the user "sign" a
message with his private key and then add privacy by encrypting the
message with the recipient's public key. In trying RSA Data
Security's Mailsafe software for MS-DOS on the GCN local area
network, we found it to work quickly and easily, whether a message
was just "signed" or signed and "sealed."
Signed and Sealed
Signing the message with the sender's private key put an
encrypted digital signature at the end of an openly readable
message. Any person receiving the message with RSA software could
verify that it had not been changed and that it came from the
sender who scrambled the signature.
Sealing it with the recipient's public key then scrambled the
entire message so only the recipient could read it with his private
key.
At the receiving end, we decrypted the message first with the
recipient's private key, then verified the signature with the
sender's public key.
Full encryption and decryption took less than five seconds
each for a 10K file on AST Research Inc. Premium 386/25 computers.
Varying hard-drive speeds had no measurable effect at this file
size.
Though all this sounds very good, it appears to be practical
only in close-knit computing communities. As yet, no third-party
certification authorities have been established. To use these
schemes, users must be able to verify that a public-key/private-
key combination fits the right person. Without a certification
authority this is difficult in a large network.
The U.S. Postal Service is vying to provide that service.
Without certification of keys, someone could establish a key in
someone else's name.
The 90-day comment period for the NIST proposal ends at the
end of November, but NIST probably will not formally adopt the
standard until February, Smid said. The DSS would be mandatory for
federal users and for private companies protecting government data,
he said.
Though questioning claims that the DSS is less secure than
RSA's method, Smid acknowledged that the DSS lacks a necessary
hashing function. A hashing function is a cryptographic algorithm
used to create a message digest that is unique to each document,
much like a fingerprint, said Bidzos. This function ensures the
message has not changed since the sender "signed" it. However, Smid
said NIST will deliver a hashing function soon.
Public-key encryption is not simply a black art that just
happens. "To use public-key encryption, you need a system that
knows how to use it," said Robert E. Frank, project leader for
electronic commerce at the Lawrence Livermore National Laboratory
in Livermore, Calif.
Frank heads a Defense Department funded project to move DOD
to electronic commerce. One area his group has focused on is
public-key encryption. The pilot system that Lawrence Livermore has
developed gives users an option to use either the NIST proposal or
the RSA method.
"Our main objective is to provide a trusted mail capability
that makes it possible for vendors and government buyers to use the
security features if they want to, and to use what they're most
comfortable with," Frank said.
Reprinted with permission by Government Computer News, October 28,
1991, page 37. Copyright 1989, Ziff-Davis Publishing Company
-------------------------End of Article---------------------
...........................................................
A journey behind (way behind) . . . .
. . . . . .. .
. CYBERSPACE . . .. . .
. . . . . . .
hackers in their illusive world . .. . .
...........................................................
by Kim Clancy
In the last issue of the ISSM, I explained that I would be
documenting my journey behind hackers in cyberspace. Let me start
by saying that cyberspace is fascinating; it is another world that
quietly but actively exists. I mean ACTIVELY. I have no idea what
the traffic is of electronic interactions but I can tell you that
within minutes I can send a message to Japan and get a response.
I can write this article in West Virginia and send it in electronic
format to San Francisco. As a matter of fact, almost every guest
article we have received has been sent to us through cyberspace.
Within minutes of receiving the article, it is imported into the
newsletter and finalized. This is a fascinating technology.
The dark side of cyberspace
Alas, while the technology offers major advantages, it also
offers some very frightening avenues as well. What is scary to me
in regard to some of the avenues is the ability for individuals
to get to so many different types of information, individuals that
may initially be too naive to know what they are stumbling into.
I am not stating that I think information should be shielded from
individuals. I am saying that turning people, children for example,
loose in cyberspace may have some unpleasant results. I once went
to a presentation about hackers. The presenter told a story about
a mother who took her child's computer modem out into the driveway
and ran over it after her son had been arrested for hacking. The
presenter said that you should never let your child use a modem
unattended. While hackers spend time developing their skills and
learning how to master cyberspace they also use cyberspace to share
information about what they have learned. Information has been
found on how to steal long distance phone calls from the phone
company, how to make a pipe bomb and how to perform satanic rituals
before sitting down to hack. I hesitate to write the above because
I don't want people to avoid the technology. Everything I have
found is in most libraries, but the accessibility of it through
computers makes it much easier to obtain. In an earlier issue of
the ISSM, we published a code of computer ethics being used by
schools throughout the nation. If you have purchased a modem for
your child for Christmas, you may wish to dig that issue out and
go over that with him or her.
On a brighter note
I thoroughly enjoy cyberspace. Cyberspace has fantastic
legitimate resources and places to visit that are good for the
entire family. For example, you can dial up CompuServe and get
access to encyclopedias. This is a great way for a child to
research a school project. The AIS Security Branch accesses
numerous electronic bulletin boards(bbs) that keep us up to date
on security issues and provides us with a network of security
professionals. As a matter of fact, we actively participate in
cyberspace by running our own bbs.
There is really no way of knowing where a person will end up once
he/she starts exploring cyberspace. The technology is addictive and
before you know it you are constantly searching for more computers
to call and more people to learn from. Cyberspace is a great world,
but if you are not careful, it can carry you away. Don't ignore the
technology, if you don't know about it, you are already behind.
Dive in, experience it, have a great time. You will be fascinated
by what you discover.
-------------------------End of Article---------------------
/^\
_ /_ \_\ /\ Clyde....dedicated to the pursuit
/ /\ \ / \ of security ...
/__/ \__\ | |
@ @ ______
__ </ __ |
\ \______/ / |
\_______/ |
DEAR CLYDE...responses to questions for those who are searching for
the truth.............................................
Dear Clyde,
How do I select a good password?
Signed, ABCDE
Dear ABCDE,
One method is to choose a 5 or 6 character word at random and then
add 2 or more random characters to it. This should give you
something relatively easy to remember with the additional
characters making it more difficult to compromise. It is not a
good practice to choose a word that can be associated with you.
Send your comments or questions to Clyde c/o the AIS Security
Branch in Parkersburg, WV, Room 1011, or leave them in Clyde's
mailbox located on the Security bulletin boards located throughout
the Parkersburg office. You may also leave Clyde an email message
on the AIS Security Branches bbs (304-420-6083)
-------------------------End of Article---------------------
//Computer Speak: Computer terms and their meanings\\
SYSOP n. The operator (and usually the owner) of a bulletin-board
system.
MODEM n. A device that connects a computer and a terminal via a
telephone line. Short for modulator/demodulator.
NETWORK n. A data communications system that allows a number of
systems that allows a number of systems and devices to communicate
with each other.
TRAP DOOR alt. trapdoor n. A breach created intentionally in an EDP
systems for the purpose of collecting, altering, or destroying
data.
HARDWARE n. Physical equipment used in data processing. Such as
PC, disk drives, mainframe, keyboard, etc.
SOFTWARE n. Computer programs, procedures, rules, and possibly
associated documentation.
-------------------------End of Article---------------------
^^^^^VIRUS FIGHTERS
What is a computer virus?
The term "computer virus" is derived from and analogous to a
biological virus. The word virus itself is Latin for poison.
A computer virus is a computer program that will copy (infect) its
code into the machine codes of other programs, and when those
infected programs are run performing some apparently useful
function, such as a login, it executes its hidden code performing
an unwanted, usually malicious function.
How does a computer virus work?
A program infected with a virus and loaded and executing in the
main memory of a computer can infect another executable (object)
program in the computer's disk storage system by secretly
requesting the computer's operating system to append a copy of the
virus code to the object program, usually at the start. The
infection makes the object program slightly longer.
When the newly infected program is itself loaded into memory and
invoked, the virus in it takes control and performs hidden
functions, such as infecting yet other object programs. The virus
may also perform destructive functions before transferring control
to the original entry point. The virus code contains a marker so
that the virus won't attempt to infect a program already infected
by its own kind: multiple infections would cause an object file to
grow ever larger, leading to easy detection.
The same principle works in personal computers, where floppy disks
play the role of object programs in the description above. In this
case, the virus usually attacks the copy of the operating system
contained on the floppy disk so that the virus is automatically
invoked whenever the disk's operating system is started. Since the
operating system then resides in the PC's main memory, it can
infect any diskettes inserted into the PC.
What can be done to protect against viruses in a computer or
workstation?
An additional measure of protection can be obtained by care in the
way one uses a computer. Analogies with food and drug safety are
helpful. Just as one would not consider purchasing food or
capsules in unsealed containers or from untrusted sources, one can
refuse to use any unsealed software or software from untrusted
sources.
Can the operating procedures followed by those who use a computer
system lower the risk?
Yes! The following are some procedures that would help lower the
risk:
. Never insert a diskette that has no manufacturer's seal into your
PC.
. Never use a program borrowed from someone who does not practice
digital hygiene to your own standards.
. Beware of software obtained from public bulletin boards.
. Purchase programs that check other programs for known viruses.
. Be wary of public domain software (including virus eradicators!).
. Monitor the last-modified dates of programs and files.
. Don't execute programs sent in electronic mail--even your friends
may have inadvertently forwarded a virus.
. Don't let employees bring software from home, unless it is
approved and checked to be virus free by user management.
What are some of the computer virus symptoms?
When a strange behavior occurs, do not dismiss it as simply a bug.
Instead, suspect a virus and respond accordingly - acting quickly
may save your data. The following are possible symptoms of a viral
infection:
. Strange screen graphics or displays.
. Unexpected musical tones or sound effects.
. Alteration of text or commands.
. Unusual behavior on reboot.
. Reduction in system performance.
. Unexpected disk access patterns.
. Changes in file length or alteration times.
. Bugs in previously reliable software.
. Bad sectors on floppy disks, or unusually large numbers of bad
sectors on hard disks.
. Reduction in available memory.
. Unexplained changes in the system clock.
. Unknown, new files or directories/folders appearing on disk.
. Problems in time-dependent tasks such as communications or
printing.
. The system will not reset or reboot.
What to do if you expect a virus.
. Leave the machine on! Any evidence of intrusion or
infection may be lost if the machine is powered down. Turn off
the machine only at the instruction of your management, your
security group, or your technical support group.
. If your desk-top computer is connected to any kind of network,
break the network connection logically.
NOTE: BPD EMPLOYEES MUST CONTACT THE COMMUNICATIONS BRANCH IN THE
DIVISION OF PROGRAMS AND COMMUNICATIONS (OAIS) SO THAT THEY
MAY BREAK THE PHYSICAL CONNECTION.
. Let people know about your suspicions. Alert your own
management.
. Use your regular trouble reporting procedure to notify technical
support of your problem.
Additional information on viruses can be obtained from publications
available in the AIS Security Branch. The information above was
obtained from the publication "Computers Under Attack - Intruders,
worms, and Viruses" by Peter J. Denning.
-------------------------End of Article---------------------
DON'T FORGET, THE AIS SECURITY BRANCH RUNS ITS OWN ELECTRONIC
BULLETIN BOARD SYSTEM(BBS). GIVE US A CALL AND LET US KNOW WHAT
YOU THINK. THE NUMBER IS 304-420-6083.
The ISSM is a quarterly publication of the Department of Treasury,
Bureau of the Public Debt, AIS Security Branch, 200 3rd Street,
Parkersburg, WV 26101, (304) 420-6363. The ISSM is also available
in paper format. Let us know if you would like a copy or if you
would like to download a copy of the print file. The print file
can be copied to a HP II or III laser printer and you will receive
a copy with all graphics and formatting.
Editors: Bob Settles, Ed Alesius, Kim Clancy, Joe Kordella
Downloaded From P-80 International Information Systems 304-744-2253