1568 lines
69 KiB
Plaintext
1568 lines
69 KiB
Plaintext
Volume 5, Number 26 27 June 1988
|
||
+---------------------------------------------------------------+
|
||
| _ |
|
||
| / \ |
|
||
| /|oo \ |
|
||
| - FidoNews - (_| /_) |
|
||
| _`@/_ \ _ |
|
||
| International | | \ \\ |
|
||
| FidoNet Association | (*) | \ )) |
|
||
| Newsletter ______ |__U__| / \// |
|
||
| / FIDO \ _//|| _\ / |
|
||
| (________) (_/(_|(____/ |
|
||
| (jm) |
|
||
+---------------------------------------------------------------+
|
||
Editor in Chief Dale Lovell
|
||
Editor Emeritus: Thom Henderson
|
||
Chief Procrastinator Emeritus: Tom Jennings
|
||
Contributing Editors: Al Arango
|
||
|
||
FidoNews is published weekly by the International FidoNet
|
||
Association as its official newsletter. You are encouraged to
|
||
submit articles for publication in FidoNews. Article submission
|
||
standards are contained in the file ARTSPEC.DOC, available from
|
||
node 1:1/1.
|
||
|
||
Copyright 1988 by the International FidoNet Association. All
|
||
rights reserved. Duplication and/or distribution permitted for
|
||
noncommercial purposes only. For use in other circumstances,
|
||
please contact IFNA at (314) 576-4067. IFNA may also be contacted
|
||
at PO Box 41143, St. Louis, MO 63141.
|
||
|
||
Fido and FidoNet are registered trademarks of Tom Jennings of
|
||
Fido Software, 164 Shipley Avenue, San Francisco, CA 94107 and
|
||
are used with permission.
|
||
|
||
The contents of the articles contained here are not our
|
||
responsibility, nor do we necessarily agree with them.
|
||
Everything here is subject to debate. We publish EVERYTHING
|
||
received.
|
||
|
||
|
||
|
||
Table of Contents
|
||
|
||
1. ARTICLES ................................................. 1
|
||
A By Law proposal ........................................ 1
|
||
EchoMail, Blessing or Bane? .............................. 7
|
||
Killing Viruses .......................................... 9
|
||
2. NOTICES .................................................. 23
|
||
The Interrupt Stack ...................................... 23
|
||
Latest Software Versions ................................. 23
|
||
FidoCon '88 Registration Form ............................ 25
|
||
FidoNews 5-26 Page 1 27 Jun 1988
|
||
|
||
|
||
=================================================================
|
||
ARTICLES
|
||
=================================================================
|
||
|
||
Neal Curtin
|
||
1:343/1
|
||
|
||
Change to the By Laws
|
||
|
||
|
||
The following is submitted as a set of proposed amendments to
|
||
the BY-LAWS of the International FidoNet Association. They are
|
||
proposed to the Chairman of the Bylaws Committee, and to the
|
||
Board of Directors of the said International FidoNet Association.
|
||
|
||
|
||
Proposal 1.
|
||
|
||
|
||
Current Wording.
|
||
|
||
Preamble:
|
||
|
||
IFNA NODELIST: The list, prepared by the IFNA Vice President
|
||
- Technical Coordinator, of active nodes in the IFNA NETWORK.
|
||
|
||
IFNA NETWORK: The current set of systems which have been
|
||
certified as FidoNet compatible and conform to policies
|
||
established by the Board of Directors.
|
||
|
||
PUBLIC ACCESS: A system that has a telephone number published
|
||
in the IFNA Nodelist, and in addition provides services to
|
||
the public.
|
||
|
||
|
||
|
||
Suggested Wording:
|
||
|
||
Nodelist: The list, prepared by the various Zone
|
||
Coordinators, of active nodes within their zone, and on file
|
||
with the International Coordinator.
|
||
|
||
Network: The current set of systems which have been certified
|
||
as Fidonet compatible, and conform to the policies
|
||
established by their respective net, region, and zone.
|
||
|
||
PUBLIC ACCESS: A system that has a telephone number published
|
||
in the Nodelist, and in addition provides services to the
|
||
public.
|
||
|
||
Added wording:
|
||
|
||
International Coordinator: The individual elected by the
|
||
various zones and regional coordinators to arbitrate and rule
|
||
on inter-zonal disputes. In addition, the International
|
||
Coordinator is the person responsible for coordination
|
||
FidoNews 5-26 Page 2 27 Jun 1988
|
||
|
||
|
||
between the zones and is responsible for establishing new
|
||
zones as the case may arise.
|
||
|
||
|
||
Rationale:
|
||
|
||
These changes are proposed to eliminate the implication, real
|
||
or perceived, that the association owns, controls, or
|
||
manipulates the FidoNet network.
|
||
|
||
|
||
|
||
Proposal #2
|
||
Proposed changes to section 1
|
||
Current wording:
|
||
|
||
1(a) Regular Member. To be eligible, an applicant: must be
|
||
the system operator in good standing of a PUBLIC ACCESS node;
|
||
must have paid any dues required; is entitled to one vote.
|
||
|
||
1(b) Associate Member. Any person who is not eligible to be a
|
||
Regular Member, but who is interested in electronic
|
||
communications, is eligible to be an Associate Member by
|
||
paying required dues. Associate Members have all of the
|
||
rights of a Regular Member except the right to vote.
|
||
|
||
1(c) Commercial Member. Any entity using the IFNA NETWORK for
|
||
the conduct of any business is eligible to be a Commercial
|
||
Member by paying required dues. Any Commercial Member also
|
||
satisfying the requirements to be a Regular Member shall be
|
||
entitled to vote.
|
||
|
||
Proposed wording:
|
||
|
||
1(a) Regular Member. To be eligible, an applicant: must be
|
||
the system operator in good standing of a PUBLIC ACCESS
|
||
node; must be listed in a nodelist; must have paid any dues
|
||
required; is entitled to one vote.
|
||
|
||
1(b) Associate Member. Any person who is listed in a
|
||
nodelist. or who is interested in electronic communications,
|
||
is eligible to be an Associate Member by making application
|
||
for membership. Associate Members have all of the rights of a
|
||
Regular Member except the right to vote.
|
||
|
||
1(c) Commercial Member. Any entity using the IFNA NETWORK for
|
||
the conduct of any business is eligible to be a Commercial
|
||
Member by paying required dues. Any Commercial Member also
|
||
satisfying the requirements to be a Regular Member shall be
|
||
entitled to vote.
|
||
|
||
Rational:
|
||
These changes are designed to broaden the scope of eligibility,
|
||
and include all sysops who are listed in a FidoNet Compatible
|
||
nodelist.
|
||
|
||
FidoNews 5-26 Page 3 27 Jun 1988
|
||
|
||
|
||
Proposal 3.
|
||
Proposed changes to Section 2 and 3.
|
||
|
||
Current wording
|
||
|
||
2. Applications for membership shall be submitted to the
|
||
Secretary. In the case of any applicant whose character,
|
||
reputation or conduct might make him an undesirable member,
|
||
the Secretary shall refer the application to the Executive
|
||
Committee for review; in all other cases, the Secretary shall
|
||
have the authority to grant membership.
|
||
|
||
3. The Secretary shall notify members of the expiration of
|
||
their membership not less than thirty days prior to
|
||
expiration. In determining membership status, memberships
|
||
renewed within thirty days of expiration shall be regarded as
|
||
continuous.
|
||
|
||
Proposed changes
|
||
|
||
2. Applications for membership shall be submitted to the
|
||
Membership Committee. In the case of any applicant whose
|
||
character, reputation or conduct might make him an
|
||
undesirable member, the membership Committee shall refer the
|
||
application to the Executive Committee for review; in all
|
||
other cases, the Membership Committee shall have the
|
||
authority to grant membership.
|
||
|
||
3. The Membership Committee shall notify members of the
|
||
expiration of their membership not less than thirty days
|
||
prior to expiration. In determining membership status,
|
||
memberships renewed within thirty days of expiration shall be
|
||
regarded as continuous.
|
||
|
||
|
||
Rational:
|
||
The secretary does not now, nor has he ever been, involved in
|
||
membership. The application goes to the Treasurer, who notifies
|
||
the Membership Services Committee, who sends out the membership
|
||
card.
|
||
|
||
|
||
Proposal #4
|
||
Proposed changes to section 25
|
||
|
||
Current wording:
|
||
|
||
25. The following voting divisions are established:
|
||
Division 2 Europe, Africa
|
||
Division 10 CA NV
|
||
Division 11 IL IN KY MI OH WI - USA and ON PQ PEI NS NB NF
|
||
-Canada
|
||
Division 12 HI Asia, Australia, Antarctica
|
||
Division 13 DE DC MD NJ NY PA VA
|
||
Division 14 IA KS MN MO NB ND SD
|
||
Division 15 AZ CO NM UT WY
|
||
FidoNews 5-26 Page 4 27 Jun 1988
|
||
|
||
|
||
Division 16 CT ME MA NH RI VT
|
||
Division 17 AK ID MT OR WA - USA and BC ALB SSK -Canada
|
||
Division 18 AL FL GA MS NC SC TN
|
||
Division 19 AR LA OK TX, South America,
|
||
Mexico, Central America
|
||
|
||
Proposed change:
|
||
25. The following voting divisions are established:
|
||
Division 2 Europe, Africa
|
||
Division 3 Australia, Southern Pacific
|
||
Division 4 AlterNet
|
||
Division 5 GoodEggNet
|
||
Division 6 Canada
|
||
Division 7 Central and South America
|
||
Division 8 IL IN KY MI OH WI
|
||
Division 9 DE DC MD NJ NY PA VA
|
||
Division 10 IA KS MN MO NB ND SD
|
||
Division 11 AZ CO NM UT WY
|
||
Division 12 CT ME MA NH RI VT
|
||
Division 13 AK HI ID MT OR WA
|
||
Division 14 AL FL GA MS NC SC TN
|
||
Division 15 AR LA OK TX
|
||
|
||
These divisions may be changed by a two thirds vote of the
|
||
Board of Directors, and should include new zones and new
|
||
Nodelists of over 100 systems.
|
||
|
||
Rational:
|
||
|
||
The current system does not give enough representation on the
|
||
board to overseas areas and tends to be inflexible.
|
||
|
||
|
||
Proposal #5
|
||
Proposed changes to section 28
|
||
|
||
Current Wording:
|
||
|
||
28. The Secretary shall: record the proceedings of all
|
||
meetings of the Board and of the Executive Committee;
|
||
promptly furnish copies of the minutes of these meetings to
|
||
all officers and members of the Board;publish such minutes in
|
||
FidoNews; be responsible for the maintenance of the corporate
|
||
status of IFNA and the filing of all reports and certificates
|
||
which may be required of IFNA under the corporation laws of
|
||
the State of Missouri; be the archivist of IFNA; maintain the
|
||
corporate membership and voting records of IFNA; performs
|
||
other duties as described in applicable Bylaws. To the extent
|
||
that may from time to time be required by law, he shall act
|
||
as agent for the service of process but only while present in
|
||
the State of Missouri and he is not authorized to accept
|
||
service of process elsewhere.
|
||
|
||
Proposed Change:
|
||
|
||
28. The Secretary shall: record the proceedings of all
|
||
FidoNews 5-26 Page 5 27 Jun 1988
|
||
|
||
|
||
meetings of the Board and of the Executive Committee;
|
||
promptly furnish copies of the minutes of these meetings to
|
||
all officers and members of the Board; publish such minutes
|
||
in FidoNews; be responsible for the maintenance of the
|
||
corporate status of IFNA and the filing of all reports and
|
||
certificates which may be required of IFNA under the
|
||
corporation laws of the State of Missouri; be the archivist
|
||
of IFNA; maintain voting records of IFNA; performs other
|
||
duties as described in applicable Bylaws. To the extent that
|
||
may from time to time be required by law, he shall act as
|
||
agent for the service of process but only while present in
|
||
the State of Missouri and he is not authorized to accept
|
||
service of process elsewhere.
|
||
|
||
Rational:
|
||
Eliminates the requirement that the secretary maintain the
|
||
membership roster.
|
||
|
||
Proposal #6
|
||
Proposed changes to section 30
|
||
|
||
Current wording:
|
||
|
||
30. The Vice President - Technical Coordinator shall: be
|
||
responsible for maintenance and distribution of the master
|
||
NODELIST; creation and distribution of the weekly update file
|
||
for the master NODELIST; ensuring the smooth operation of
|
||
the IFNA NETWORK as prescribed by the Board of Directors;
|
||
serve as a member of the Technical Standards Committee.
|
||
|
||
Proposed change:
|
||
|
||
30. The Vice President - Technical Coordinator shall: serve
|
||
as a member of the Technical Standards Committee, and be
|
||
responsible for the development and publication of standards
|
||
for system software so as to ensure compatibility between the
|
||
various nodes. The VP-TC will assist the various Coordinators
|
||
in technical matters.
|
||
|
||
Rational:
|
||
This change to eliminate the implied or perceived implication
|
||
of that IFNA desires or wants to control the nodelist. The
|
||
reference to the IC is dropped and would no longer be a IFNA
|
||
position.
|
||
|
||
|
||
Proposal #7
|
||
Proposed changes to section 40
|
||
Current wording:
|
||
|
||
40. There shall be an official publication maintained by
|
||
IFNA, in the form of a weekly journal, the name of which
|
||
shall be FidoNews. A copy of this journal shall be available
|
||
each week to every member of IFNA in good standing. The
|
||
General management of this journal shall be in the hands
|
||
of the President. The policy of the journal shall be
|
||
FidoNews 5-26 Page 6 27 Jun 1988
|
||
|
||
|
||
determined by the Board of Directors.
|
||
|
||
Proposed change:
|
||
|
||
40. There shall be an official publication maintained by
|
||
IFNA, in the form of a weekly journal, the name of which
|
||
shall be FidoNews. A copy of this journal shall be available
|
||
each week to all listed nodes. The general management of this
|
||
journal shall be in the hands of the President. The policy of
|
||
the journal shall be to publish all submitted articles of
|
||
interest to the FidoNet community, within the bounds of
|
||
legality and good taste.
|
||
|
||
Rational:
|
||
This change is to eliminate the reference that the journal is
|
||
only for IFNA members, and to give some firm direction to the
|
||
editorial staff.
|
||
|
||
|
||
Respectively submitted by Neal Curtin, Network Coordinator, Net
|
||
1:343.
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FidoNews 5-26 Page 7 27 Jun 1988
|
||
|
||
|
||
Bob Morris
|
||
FN 1:141/333, 1:141/386
|
||
AN 7/1, 7/13, 7:46/1, 7:46/2 and 7:46/3
|
||
|
||
Echomail, the thing which allows our users (you remember them)
|
||
to communicate with the rest of the world on things that are
|
||
bothering them, technical issues, as well as speciality areas.
|
||
|
||
EchoMail has become something of a monster, what we all
|
||
use to help support and have become "HOOKED" on is now being
|
||
used as the carrot which the EchoMail Backbone, REC's, NEC's
|
||
and what ever use to limit our links to other systems across
|
||
the world.
|
||
|
||
EchoMail was designed by Jeff Rush and it was a GREAT idea of
|
||
getting the same message out to a lot of people at the same
|
||
time. But in today's environment, EchoMail has established
|
||
a new power point to control what we all do for our users,
|
||
including what type modems are utilized, the hours that
|
||
echomail can be picked up, the systems which can called to
|
||
pick up these areas and last, but not least, who we
|
||
can align ourselves with when it comes time to use software
|
||
to process this whole mess.
|
||
|
||
In this Sysop's mind, it has become a monster which in the last
|
||
20 months has accomplished the following items without the
|
||
least amount of trouble.
|
||
|
||
1. The splitting of the Network (FidoNet as we knew it in
|
||
January of 1987) into different Networks.
|
||
|
||
2. The demise of good working relationships.
|
||
|
||
3. The phrase "FLAME ON".
|
||
|
||
4. The inability of people to "read" humor or anything else
|
||
within the written word. This has lead to many people not
|
||
being able to understand the context of many of the
|
||
messages that we all read on a daily basis.
|
||
|
||
5. The demise of IFNA as well as causing it to become
|
||
unable to accomplish anything based upon the problems
|
||
associated with Electronic Mail especially that of Echo-
|
||
Mail.
|
||
|
||
6. The establishment of the *EC positions, which when they
|
||
started, were needed, but now they duplicate the *C
|
||
positions and are now wielding more power and control
|
||
than their contemporaries within the FidoNet Administrator
|
||
Positions.
|
||
|
||
7. The disenchantment of Sysops as a whole about the world
|
||
of BBSing, causing them to DROP OUT entirely, or at the
|
||
least the seeking of Alternatives to the HATEMail which
|
||
now proliferates the AREAS.BBS today.
|
||
|
||
FidoNews 5-26 Page 8 27 Jun 1988
|
||
|
||
|
||
8. The establishment of EchoMail areas which do nothing but
|
||
allow people who moderate EchoMail areas a place to
|
||
discuss what is happening within the world of echomail
|
||
and to discuss how to furthur control who can get
|
||
direct access to an EchoMail area.
|
||
If you read this article as "Sour Grapes" (one less than a
|
||
FLAME) then that is what I intended it to do. If you read it
|
||
as an indictment of the EchoMail process as it exists today,
|
||
then, again, it is something that I intended to do. If you
|
||
read this article and feel as though I am saying that the need
|
||
for an enforcement procedure is bad, then I have again
|
||
accomplished what I set out to do. If you read this and find
|
||
that someone is imposing a set of rules upon the manner in
|
||
which you and your USER must share ideas, thoughts and
|
||
other information which is posted in the EchoMail Areas, then
|
||
again, I have accomplished what I set out to do.
|
||
|
||
I am NOT saying that EchoMail Coordination is bad, I am saying
|
||
that the people who Coordinate the running of the EchoMail
|
||
distribution are imposing a set of rules and regulations which
|
||
have not been accepted by the Sysop Community as a whole. I am
|
||
also stating that pickups outside of a region, as long as they
|
||
are closed loops, stand little if any chance of generating
|
||
duplicates within any given region. Links outside of a given
|
||
Region provide for a backup link in case of disaster or full
|
||
disk drives.
|
||
|
||
Within AlterNet, there is a stated Policy concerning EchoMail,
|
||
that Policy is to "Be Polite, and if you cannot add anything to
|
||
a conference which is Positive, then do not use the conference"
|
||
this Policy is followed by the vast majority of the AlterNet
|
||
Community, unfortunately, it does not have to apply to the
|
||
FidoNet Community.
|
||
|
||
EchoMail, from my view point, has broadened my scope as far as
|
||
what is happening within the Networks, but it has soured me as
|
||
far as my view point of other Sysops and also the way that they
|
||
look at me. It is a two way street, no one wins, and only AT&T,
|
||
SPRINT, MCI, GTE and PCP have won as they get all the neat
|
||
profits from our expenses.
|
||
|
||
A few last points, do we really need all 225 conferences? Do
|
||
we really need all of this to make sure that our users get a
|
||
couple of EchoMail areas? Or are we doing this just so that
|
||
our Blood Pressure gets up at least once a day?
|
||
|
||
|
||
Bob Morris
|
||
FN 141/333, 141/386
|
||
AN 7/1, 7/13, 46/1, 46/2, 46/3
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FidoNews 5-26 Page 9 27 Jun 1988
|
||
|
||
|
||
Lee Kemp, Communet 1:221/162.14
|
||
|
||
7 June 1988
|
||
|
||
K I L L I N G V I R U S E S
|
||
|
||
1. INTRODUCTION
|
||
|
||
Numerous utilities have been released for detecting "virus"
|
||
programs before they damage hard disks or get passed on.
|
||
|
||
Unfortunately this won't work. Existing viruses will continue to
|
||
spread from diskettes already infected, and will re-infect
|
||
computers that have been through it before. New more virulent
|
||
strains will be developed to overcome each new detection utility
|
||
released (perhaps by infecting the utilities themselves!)
|
||
|
||
I believe I've figured out a method that WILL work. The World
|
||
Health Organization managed to stamp out smallpox through a
|
||
coordinated international campaign and I believe we can do the
|
||
same for ALL computer viruses - but it will require a coordinated
|
||
campaign.
|
||
|
||
This article lays out the basic idea and asks for help. Help
|
||
through any constructive criticisms or alternative proposals,
|
||
help through negative, destructive "flames" if the idea is all
|
||
wrong, so I'll stop wasting time on it, and help from any
|
||
software developers willing to "send code".
|
||
|
||
However I am not interested in corresponding about whether
|
||
destructive Trojan viruses actually exist and whether they will
|
||
become a serious problem. Its far too late to be discussing THAT.
|
||
|
||
First, some reasons why its worth working on the solution I
|
||
propose.
|
||
|
||
1.1 There is NO way to detect viruses
|
||
|
||
None of the methods currently used have the SLIGHTEST chance of
|
||
detecting a reasonably well designed Trojan, let alone a genuine
|
||
virus. Tests that are just done when software is first received,
|
||
and just consist of running a utility over it once, or installing
|
||
a TSR monitor, are ALREADY completely useless.
|
||
|
||
Any jerk can write a Trojan that won't do anything suspicious
|
||
while it's being tested, and the test utilities themselves are
|
||
likely to be a target for more sophisticated viruses.
|
||
|
||
Ideas like continually monitoring disk writes are ok for the
|
||
first generation of Trojans but simply won't work with the next
|
||
generation. Actually they will become positively dangerous. A
|
||
virus could simply recognize the particular TSR that's monitoring
|
||
it, grab the interrupts back, and send reassuring messages to the
|
||
SysOp, while it doesn't even bother to WAIT before starting to
|
||
infect other software! A false sense of security is MUCH worse
|
||
than the knowledge that anything you make available for download
|
||
FidoNews 5-26 Page 10 27 Jun 1988
|
||
|
||
|
||
COULD be a virus.
|
||
|
||
Source code for IBM ROM BIOS is available in the Technical
|
||
Reference manuals for anyone who wants to write Trojans that
|
||
access disk controllers directly. Also there are ways to do
|
||
apparently "legitimate" disk writes that do no immediate damage
|
||
but can trigger an infection later.
|
||
|
||
Much more sophisticated approaches to delayed action are
|
||
available than using the DOS date function.
|
||
|
||
Checksums of operating system files and their dates and times are
|
||
easily bypassed.
|
||
|
||
Proper testing requires at least the sort of insulation from the
|
||
hardware and operating system that is provided by a 386 running
|
||
in virtual 8086 mode. Worse, there are even ways around THAT,
|
||
which I won't go into here.
|
||
|
||
Anyone familiar with the secure design of operating systems
|
||
understands that there is NO way an application program can be
|
||
prevented from doing whatever it damn well pleases when the
|
||
underlying CPU hardware doesn't run in a protected mode. OS/2 and
|
||
Unix run in a protected mode but MSDOS normally doesn't, and
|
||
CAN'T on XTs and ATs.
|
||
|
||
Even protected mode isn't enough, given the practical realities
|
||
of normal security precautions. Controlled experiments with Unix
|
||
viruses have achieved root privileges in less than an hour, with
|
||
an average of 30 minutes. (F. Cohen, "Computer Viruses: Theory
|
||
and Experiments", University of Southern California, August 1984,
|
||
cited in Wood and Kochan, "Unix System Security", Hayden Book
|
||
Company, 1985)
|
||
|
||
The SERIOUS work in computer security is being done on how to
|
||
protect a system when you have complete source code for
|
||
everything run on it - and THAT is damn difficult. ADA and Pascal
|
||
are languages intended to allow you to figure out what the source
|
||
code actually does, but C is the language of micro applications
|
||
and its designed for efficiency, not correctness proofs. Take a
|
||
look at the fast table driven CRC routines used in most FidoNet
|
||
mailers these days. How many C programmers have the faintest idea
|
||
what they ACTUALLY do?
|
||
|
||
Serious computer security work also deals with problems like
|
||
"compiler viruses", that install themselves in any software
|
||
compiled, including new versions of the compiler. Who REALLY
|
||
knows what's in most microcomputer object code - not even the
|
||
authors!
|
||
|
||
There is NO serious work being done on protection from real mode
|
||
applications running on 80x86 machines. Because it SIMPLY CAN'T
|
||
BE DONE.
|
||
|
||
Now sit back and think about the implications of that for 3000
|
||
FidoNet nodes around the world continually exchanging software
|
||
FidoNews 5-26 Page 11 27 Jun 1988
|
||
|
||
|
||
with each other and their users! This network can spread a deadly
|
||
virus around the world within DAYS (if not hours).
|
||
|
||
|
||
1.2 We don't have time for testing
|
||
|
||
ANY partially useful testing system for the next generation of
|
||
viruses would require tests EVERY time a copy of ANY software is
|
||
made available for distribution, and fairly elaborate procedures
|
||
to ensure the testing is done on an uninfected machine with
|
||
uninfected test utilities.
|
||
|
||
Even factory fresh diskettes from major software houses have
|
||
ALREADY been infected, so what's to stop the latest upgrade of
|
||
some commercial package infecting a machine that's been carefully
|
||
kept "clean"? Even Harvard couldn't persuade Lotus to let them
|
||
retain their policy of ONLY running software for which they had
|
||
compiled the source code themselves.
|
||
|
||
BBS SysOps just don't have the time to properly test files they
|
||
make available for download, even to detect fairly crude Trojans.
|
||
Neither do end users. Even PARTIALLY useful serious tests simply
|
||
won't be widely used until AFTER there has been some MAJOR damage
|
||
done. The time wasted on serious testing will then be almost as
|
||
damaging as actual loss of data.
|
||
|
||
|
||
1.3 We can't afford to just keep quiet and hope
|
||
|
||
The first generation of diskette based viruses has now become of
|
||
sufficient public interest for full page articles in daily
|
||
newspapers as well as computer magazines. It is therefore CERTAIN
|
||
that some warped people will take up the challenge to design the
|
||
next generation. It is also very likely to happen SOON.
|
||
|
||
In case anybody thinks that mentioning all this could give people
|
||
ideas, I should point out that the technical points made above
|
||
will be obvious to anybody TRYING to figure out how to get past
|
||
present detection utilities. People who have ALREADY shown much
|
||
more sophistication with Unix viruses will now be focussing their
|
||
attention on personal computer diskette based viruses as a result
|
||
of the newspaper publicity if nothing else.
|
||
|
||
I am deliberately refraining from mentioning some approaches that
|
||
are obvious to me, but that may not be thought of immediately by
|
||
just ANYBODY contemplating a virus program, in case that can give
|
||
an extra breathing space. But I KNOW that there ARE ways to
|
||
unleash delayed action virus programs that CANNOT be detected by
|
||
ANY feasible method. I don't think it will be long before these
|
||
more sophisticated approaches become general public knowledge
|
||
too.
|
||
|
||
A basic issue is that viruses involve quite different problems
|
||
from simple Trojans. They can spread WITHOUT doing overt damage.
|
||
|
||
I am writing a separate technical paper on all this, which shows
|
||
FidoNews 5-26 Page 12 27 Jun 1988
|
||
|
||
|
||
that FidoNet itself is in special "clear and present danger" with
|
||
more than the usual problems faced by all BBSes. Anyone wanting a
|
||
copy should NetMail me direct, explaining why they have a
|
||
legitimate "need to know" and with an undertaking not to pass on
|
||
the information. This paper is not available for file request but
|
||
will be crashed direct to responsible software developers
|
||
interested in working on solutions.
|
||
|
||
I sent a message about these problems to the International
|
||
Coordinator of FidoNet nearly three months ago. He replied to
|
||
other matters in the same message in a manner indicating that he
|
||
had not understand anything I said to him, and he did not reply
|
||
at all on this issue. Judging from that and other indications, I
|
||
do not believe that the authorities within FidoNet who ought to
|
||
take the initiative to do something about this situation are
|
||
likely to do so. (For that matter my experience with the IC is
|
||
that he also thinks he can avoid other serious problems by
|
||
sticking his head in the sand). I see no choice but to now pass
|
||
on the information direct to interested and responsible software
|
||
developers.
|
||
|
||
There's no point refraining from public discussion, when full
|
||
page articles about computer viruses are appearing in daily
|
||
newspapers, and when people responsible for administration of
|
||
FidoNet won't listen AT ALL.
|
||
|
||
Ok, now as well as being necessary to look at new solutions, it's
|
||
also URGENT to do so.
|
||
|
||
|
||
2. WHY ITS URGENT
|
||
|
||
"Computer AIDS" is likely to have as devastating an effect on
|
||
BBSes and FidoNet as the original AIDS has already had on gays,
|
||
and is now having on the wider community. Unless something is
|
||
done NOW, we are CERTAIN to eventually be hit by some really
|
||
deadly virus that has been spread to literally thousands of
|
||
public access BBS systems through FidoNet and will then, months
|
||
later, cause literally millions of dollars worth of damage to
|
||
data on literally tens of thousands of users hard disks. The
|
||
problem is THAT serious.
|
||
|
||
Apart from jerks, there are economic interests that actually
|
||
stand to GAIN from destructive viruses, because public domain
|
||
software, and the "sharing" of other software that often occurs
|
||
among people who use public domain software, directly competes
|
||
with their own commercial interests.
|
||
|
||
As Nicholas Rothwell points out in his article on "Computer
|
||
AIDS":
|
||
|
||
But what if one does not want to create trouble, but
|
||
rather to destroy trust? For that is what is at stake.
|
||
Without open communication, without "public domain"
|
||
software, without free exchange of academic and
|
||
technical software, the personal computer revolution is
|
||
FidoNews 5-26 Page 13 27 Jun 1988
|
||
|
||
|
||
hamstrung.
|
||
|
||
There are plenty of technically competent people in FidoNet who
|
||
are out to destroy trust and are opposed to open communication.
|
||
I'll be going into that in a later article.
|
||
|
||
Last month a report for the European Commission issued a formal
|
||
blunt warning that computer networks across the member nations of
|
||
the European Community were not safe:
|
||
|
||
Unless action is taken to improve levels of computer
|
||
and network security, the consequences for individual
|
||
enterprises could be severe, even catastrophic.
|
||
|
||
For FidoNet the consequences would be catastrophic, not just
|
||
"severe". It is one of the world's largest computer networks, but
|
||
with virtually NO security and LOTS of jerks.
|
||
|
||
We are supposed to be a network dedicated to the free exchange of
|
||
information. If instead we become known as a network that has
|
||
done millions of dollars worth of PREDICTABLE damage that COULD
|
||
have been avoided by SIMPLE countermeasures, then both individual
|
||
SysOps and IFNA could be held legally responsible for the damage
|
||
resulting from negligently failing to take those countermeasures.
|
||
|
||
Quite apart from the legal consequences, a really devastating
|
||
virus attack would give the words "BBS" and "FidoNet" a brand
|
||
recognition somewhere between Tylenol and anal sex.
|
||
|
||
If the countermeasures aren't in place BEFORE major damage is
|
||
done, there will be an atmosphere of incredible paranoia about
|
||
using ANY software from BBSes and user groups. It could even be
|
||
quite difficult working on solutions in that atmosphere. Also
|
||
interests opposed to public domain software and the free exchange
|
||
of information could take the opportunity to impose regulation
|
||
and controls on a VERY unpopular minority.
|
||
|
||
|
||
3. WHAT IS TO BE DONE?
|
||
|
||
Fortunately there IS an approach that CAN stop viruses, and COULD
|
||
be widely used as soon as its available. I hope I've given enough
|
||
reasons for people to take a serious interest in my proposals
|
||
despite their unfamiliarity. Here goes.
|
||
|
||
The way biological immune systems develop antibodies to attack
|
||
foreign bodies is to first identify what SHOULD be present and
|
||
then deduce what should not. We can do that using "digital
|
||
signatures" just as the immune system recognizes molecular
|
||
signatures.
|
||
|
||
Since there is NO practical way to determine whether unknown
|
||
software is a virus or not, the ONLY feasible approach to "safe
|
||
software" is to identify KNOWN software and use nothing else.
|
||
|
||
The logic of that is both compelling and frightening. It has
|
||
FidoNews 5-26 Page 14 27 Jun 1988
|
||
|
||
|
||
already led to quite serious restrictions on the "promiscuous"
|
||
way that people exchange software. If the current trend
|
||
continues, open BBSes will become less and less viable and the
|
||
"free exchange of information" will be replaced by tightly
|
||
controlled distribution channels.
|
||
|
||
AT PRESENT the only way to identify "known" software, is through
|
||
writing and compiling it yourself, or buying it from a commercial
|
||
distributor in a shrink wrapped package. Even these precautions
|
||
aren't worth much against compiler viruses and given the level of
|
||
security at most software publishers.
|
||
|
||
Turned around, the same logic suggests we need to find another
|
||
way to identify "known" software. Fortunately there IS another
|
||
way, suitable for BBS public domain and shareware software.
|
||
|
||
|
||
3.1 Authentication by digital signature
|
||
|
||
Software authors and publishers can use public key encryption or
|
||
other digital signature techniques to authenticate their software
|
||
releases with their personal "signature". This merely requires
|
||
that they run a standard encryption utility on each package
|
||
before distribution. An explanation of how public key encryption
|
||
works is in FidoNews 428.
|
||
|
||
Authentication is the key to killing viruses while preserving the
|
||
free exchange of information. It doesn't actually kill them, but
|
||
it provides a way we can only use "known" software WITHOUT
|
||
tightly controlled distribution channels.
|
||
|
||
Essentially the use of public key digital signatures just
|
||
establishes that any two items that can be decrypted with the
|
||
same "public key" signature MUST have both come from the same
|
||
person. It's that person's personal signature and there is no way
|
||
that anybody else could "forge" it.
|
||
|
||
Because an item can be decrypted with a particular public key, it
|
||
must have been encrypted using the corresponding "secret key"
|
||
that was generated simultaneously with the public key by the
|
||
person who published that public key. Since this "secret key"
|
||
cannot be deduced from knowledge of the public key, the person
|
||
who encrypted using it must therefore be the person who published
|
||
the original public key (unless they let somebody else get hold
|
||
of a copy!)
|
||
|
||
A digital signature doesn't prove who the person that uses it
|
||
really is, or how trustworthy they are, or whether they
|
||
originally wrote the document they are signing.
|
||
|
||
But it DOES allow each software author (or other distributor) to
|
||
establish their own "reputation".
|
||
|
||
In practice most users won't want to keep the public keys of
|
||
large numbers of software authors and publishers, and new authors
|
||
and publishers need a way to get their software accepted.
|
||
FidoNews 5-26 Page 15 27 Jun 1988
|
||
|
||
|
||
This requires intermediary "recommenders" and "software
|
||
certifiers" who publish "signed" lists of signatures which they
|
||
recommend as trustworthy, or reissue software they trust under
|
||
their own "signatures". They may also issue signed "warnings"
|
||
about infected software they have come across, and who signed it.
|
||
|
||
Some SysOps and user groups may want to advise their users which
|
||
signatures they personally recommend as trustworthy. That's up to
|
||
them and it's up to their users what notice to take of their
|
||
advice.
|
||
|
||
Some software collectors may want to keep close tabs on who
|
||
releases what, and reissue copies under their own signature as
|
||
evidence that they consider an item to be uninfected. That's
|
||
equivalent to the responsibility that anyone takes now, when they
|
||
pass on a copy of ANYTHING to anybody else. A valuable service
|
||
can be performed by such "software certifiers". When things
|
||
settle down, end users should be able to rely on relatively few
|
||
signatures, and with the side benefit of automatically produced
|
||
catalogs of software available.
|
||
|
||
It's very important that there be convenient ways for
|
||
recommendations and warnings to be passed on and accepted or
|
||
rejected automatically according to users preferences as to which
|
||
advice they consider trustworthy. It's equally important that
|
||
there be no central authority who is the sole source of such
|
||
advice.
|
||
|
||
It IS possible for such "advice" to be processed automatically,
|
||
by users, with no hassles, despite coming from a multitude of
|
||
sources. I'll explain that later.
|
||
|
||
The essential point is that we ALL rely on such advice and
|
||
recommendations now, including published lists of Trojans. The
|
||
difference with my proposal is that we can automate it and know
|
||
where it's really coming from. More important, we can know which
|
||
software EXACTLY is being recommended or warned against.
|
||
|
||
Instead of lists warning about certain utility names and version
|
||
numbers, we will see (automatically processed) lists warning
|
||
about signatures. Although anybody can just adopt another
|
||
signature, getting other people to accept it will be a lot harder
|
||
than just using the RENAME command on a Trojan!
|
||
|
||
Life will actually be EASIER for SysOps as a result.
|
||
|
||
|
||
3.2 Establishing Reputations
|
||
|
||
For their recommendations and warnings to be accepted, a SysOp or
|
||
other software certifier needs a reputation for giving good
|
||
advice.
|
||
|
||
For their signatures to be recommended, or for their software to
|
||
be reissued under other people's signatures, a software author or
|
||
distributor needs a reputation for taking adequate precautions to
|
||
FidoNews 5-26 Page 16 27 Jun 1988
|
||
|
||
|
||
not release infected software. (For reissue most people would
|
||
want to read and recompile the source code themselves before
|
||
staking their own reputations on it.)
|
||
|
||
In both cases anybody can start again under another signature,
|
||
but the signatures that users will accept will be the ones that
|
||
have established a reputation over a period.
|
||
|
||
|
||
3.2.1 "I've never released infected software"
|
||
|
||
If an infected program is released under a particular signature,
|
||
anybody can PROVE that signature should not be trusted again.
|
||
(Although nobody can prove whether a virus was released
|
||
deliberately, accidentally, or as a result of allowing a secret
|
||
key to become known to somebody else, the effects are the same
|
||
and the consequences should be the same - don't trust the
|
||
signature of anybody who signed that software. They should never
|
||
have signed it. Whether it was deliberate or not is a matter for
|
||
law courts, not protection schemes.)
|
||
|
||
Proof consists of a copy of the infected software, as originally
|
||
signed by the person releasing it, together with details of the
|
||
infection, that can be tested by anyone reading about it.
|
||
|
||
|
||
3.2.2 "I've never signed bad advice"
|
||
|
||
If anybody gives signed bad advice that would be adopted
|
||
automatically by users who have decided to trust their advice,
|
||
anybody damaged can PROVE the advice was bad. Proof consists of a
|
||
copy of the signed advice, together with the proof that the
|
||
advisor got it wrong.
|
||
|
||
This can result in other software certifiers issuing signed
|
||
warnings to disregard advice from the signature that has been
|
||
proved to them to be unreliable.
|
||
|
||
Issuing a signed warning, without being able to provide the proof
|
||
when requested, can also be dealt with. Having asked for proof,
|
||
other software certifiers will be willing to stake their
|
||
reputations by issuing signed warnings that warnings from a
|
||
particular signature should be disregarded.
|
||
|
||
Signed warnings from software certifiers they trust can
|
||
automatically prompt users to revise their lists of who to trust,
|
||
and to review what software on their systems may be dangerous as
|
||
a result of having accepted bad advice.
|
||
|
||
Being able to PROVE these things, makes it possible to establish
|
||
a completely informal decentralized and automatic system for
|
||
distributing recommendations along with software. Such a system
|
||
can be fully automated so that it is almost completely
|
||
transparent to users, who only have to decide on accepting the
|
||
signatures of a few people whose recommendations and warnings
|
||
they will trust.
|
||
FidoNews 5-26 Page 17 27 Jun 1988
|
||
|
||
|
||
3.3 Implementation
|
||
|
||
All encrypted files would have a standard header including the
|
||
public key to be used (about 150 bytes). Decryption software can
|
||
look up the key (or a shorter hash of it) automatically in a
|
||
user's database of acceptable keys. Thus to decrypt a file, users
|
||
wouldn't even have to specify keys along with filenames. To
|
||
decide whether to trust some software, users wouldn't have to
|
||
look up their database manually. The key is either there or it
|
||
isn't, when the decryption software tries to process an encrypted
|
||
file.
|
||
|
||
Initially trusted signatures could be in standard format files
|
||
called PUBLIC.KEY, similar to individual nodelist lines. These
|
||
would normally be obtained direct by downloading or file request
|
||
from the trusted phone number contained within them.
|
||
|
||
Acceptance of those initial signatures as trustworthy would
|
||
result in automatic acceptance of subsequent files containing
|
||
recommendations or warnings signed with those signatures - until
|
||
the end user decides otherwise. After decrypting the
|
||
recommendation or warning the software would automatically apply
|
||
to the user's keys database.
|
||
|
||
Standard formats similar to the St Louis nodelist can be used to
|
||
distribute (signed) lists of recommendations and warnings about
|
||
particular public key signatures. Utilities similar to MAKENL and
|
||
XLATLIST (but with a "user friendly" interface) can be used
|
||
automatically together with the encryption software, to produce
|
||
customized end user databases of what signatures they will
|
||
automatically accept or reject.
|
||
|
||
End users just decide on a few signatures they INITIALLY consider
|
||
trustworthy, and then simply pass any encrypted files they
|
||
receive, whether software, recommendations or warnings, through
|
||
their encryption utility to automatically update their keys
|
||
database as well as to decrypt the software recommended by people
|
||
they trust and not warned against by people they trust.
|
||
|
||
The main complication for a full protection system is to avoid
|
||
the encryption utilities and key databases themselves becoming
|
||
infected, despite end users not fully understanding what it's all
|
||
about.
|
||
|
||
This can be achieved by writing the software so it HAS to be used
|
||
in a secure way, eg coldbooting from a "safe" floppy, encouraging
|
||
floppy backups of the encrypted versions of all software that is
|
||
accepted, and keyboard entry of checksums of PUBLIC.KEY files.
|
||
|
||
I'm drafting some proposed standards, specifications and end user
|
||
instructions for immediate and future software development.
|
||
Anyone interested in details of these proposals please file
|
||
request CRYPLIST from 1:221/162 for a list of what's available so
|
||
far. If anyone can suggest a simpler approach that is foolproof,
|
||
or can see loopholes in this one, please send NetMail to me at
|
||
1:221/162.14. Likewise for anyone interested in working on
|
||
FidoNews 5-26 Page 18 27 Jun 1988
|
||
|
||
|
||
software and standards. I'd like to start an echo, AREA:PUBKEY,
|
||
for serious discussions among interested software developers. It
|
||
really has to happen NOW.
|
||
|
||
|
||
3.4 Free Exchange of Information
|
||
|
||
Using this approach, software distributors, BBS SysOps and user
|
||
groups etc can freely distribute the encrypted versions of
|
||
software, recommendations and warnings from anybody, without
|
||
worrying about whether the software is infected or whether the
|
||
recommendations and warnings are reliable.
|
||
|
||
They simply notify end users not to accept anything that has not
|
||
been encrypted with a digital signature that the USER trusts
|
||
(whether directly or as a result of trusting recommendations and
|
||
ignoring warnings). The recommendations and warnings just get
|
||
distributed along with encrypted software.
|
||
|
||
This is an unfamiliar concept, but it can be implemented with
|
||
simple, "user friendly" utilities. It requires NO work "testing"
|
||
software and will ultimately be much easier to get across to end
|
||
users than the idea of software celibacy.
|
||
|
||
It also requires NO centralized authorities to put their stamp of
|
||
approval on things. Apart from the unlikelihood of such
|
||
authorities being established or accepted, there would be real
|
||
dangers of abuse judging from the way I've seen FidoNet
|
||
coordinators treat the nodelist. I'll be going into that in later
|
||
articles.
|
||
|
||
|
||
3.5 Isn't it too complicated?
|
||
|
||
Yes, for now. I'm hoping there will be SOME people who understand
|
||
AND agree with the point I'm making and will work on designing a
|
||
system as easy to use as possible for when its needed. Once its
|
||
needed, it will be needed BADLY, and the alternatives will be FAR
|
||
more complicated and basically won't work.
|
||
|
||
In that situation, which could come SOON, some SysOps and user
|
||
groups may go on distributing unencrypted software. But they will
|
||
lose popularity either gradually or very suddenly.
|
||
|
||
At least this proposal provides an alternative to pretending that
|
||
viruses can't get past detection utilities, and then wondering
|
||
why use of BBSes has suddenly become unpopular.
|
||
|
||
HOW safe to play it is up to each user. Some will be silly enough
|
||
to trust any PUBLIC.KEY they are offered. Each time their hard
|
||
disk gets trashed they will at least learn not to trust THAT
|
||
signature again, and eventually they may learn more. Once enough
|
||
users have been educated through experience, it will become
|
||
pointless attempting to release viruses - they aren't going to
|
||
travel far unencrypted and each signature used successfully is
|
||
going to reduce the number of gullible fools willing to accept
|
||
FidoNews 5-26 Page 19 27 Jun 1988
|
||
|
||
|
||
unknown signatures.
|
||
|
||
Of course some "software certifiers" may irresponsibly issue
|
||
software or recommendations under their signatures without
|
||
sufficient care. But they will quickly AND AUTOMATICALLY be
|
||
discredited and others more reliable will take their place.
|
||
|
||
Major software publishers will probably prefer to encourage users
|
||
to rely only on shrink wrapped factory fresh disks. They may even
|
||
welcome the additional incentive to do so. But they could end up
|
||
in the same position as religious moralists claiming that
|
||
monogamy is the only answer to AIDS. If a really devastating
|
||
virus gets out on a factory fresh diskette, that publisher will
|
||
probably go out of business and others may start publishing their
|
||
public keys in magazine ads and printed manuals (or shorter
|
||
hashes of the full keys).
|
||
|
||
|
||
3.6 How could this proposal get widely adopted?
|
||
|
||
End users that receive encrypted software and recommendations
|
||
distributed by BBSes, user groups or other end users are FORCED
|
||
to apply the encryption utility before they can use the software.
|
||
|
||
There are VERY good reasons why developers of FidoNet mailers and
|
||
related utilities should be using this system NOW, as I'm
|
||
explaining in a separate technical paper. If they do so,
|
||
responsible FidoNet SysOps will start accepting only the
|
||
encrypted versions (although initially decrypted versions would
|
||
continue circulating).
|
||
|
||
Once encrypted software starts being released, using it just
|
||
involves running the encryption utility on the files received,
|
||
with minimal inconvenience. Once FidoNet SysOps are doing that
|
||
for essential network software updates, it will be easy for other
|
||
software authors and publishers to adopt the same system and for
|
||
SysOps to make it available directly to their users. Thus the
|
||
system could take off rapidly, once it gains a foothold.
|
||
|
||
The "inconvenience" of running an encryption utility, can be
|
||
hidden by the "convenience" of having a system that automatically
|
||
keeps track of ALL the user's software installation and backups,
|
||
superior to the cataloging utilities available now and with the
|
||
advantage of automatic enforcement of use. It can also be
|
||
integrated with concepts like Megalist, for automatic tracking of
|
||
what's available and where to get it.
|
||
|
||
Keeping track is ESSENTIAL for virus killing, to recover from
|
||
having trusted irresponsible recommendations by restoring
|
||
original uninfected software, and to be able to track down,
|
||
remove, and warn others about, the signatures that caused the
|
||
problem. It has to be done automatically, or it won't be done
|
||
properly.
|
||
|
||
However this can be implemented later, after basic FidoNet
|
||
software has been protected by a preliminary system. Initially
|
||
FidoNews 5-26 Page 20 27 Jun 1988
|
||
|
||
|
||
FidoNet utilities could just be protected with publication of the
|
||
PUBLIC.KEY files of their authors, (eg in FidoNews, or shorter
|
||
hashes as nodelist flags), without the full mechanism for
|
||
exchanging recommendations and warnings and keeping track etc.
|
||
|
||
|
||
4. POSSIBLE PROBLEMS
|
||
|
||
4.1 Legal Hassles
|
||
|
||
The US National Security Agency has a policy opposed to the
|
||
widespread use of secure encryption techniques and has classified
|
||
some commercial public key encryption packages such as
|
||
Cryptmaster and PKcrypt as "weapons" subject to munitions export
|
||
controls. However this does NOT apply to publicly available
|
||
information including shareware and public domain software
|
||
available for download from BBSes (although some people have been
|
||
bluffed into believing it might).
|
||
|
||
Under the US Export Administration Regulations there is a General
|
||
Licence "GTDA" (part 379.3) which covers all such publicly
|
||
available technical data and is NOT overridden by the munitions
|
||
regulations (logical when you think about it - the US Government
|
||
is not so silly as to even TRY to prohibit export of publicly
|
||
available data!). Full details for anyone interested are
|
||
contained in a USEnet discussion as file GTDA.ARC (10K) available
|
||
for file request from 1:221/162.
|
||
|
||
Books containing detailed algorithms are readily available and
|
||
public domain or shareware source code would be in the same
|
||
category. (Some has already been released through BBSes and
|
||
USEnet).
|
||
|
||
I would recommend the following books for a thorough professional
|
||
understanding of secure cryptographic techniques:
|
||
|
||
Alan G. Konheim, "Cryptography: A Primer", John Wiley & Sons, New
|
||
York, 1981.
|
||
|
||
Carl H. Meyer and Stephen M. Matyas, "Cryptography: A new
|
||
dimension in computer data security", John Wiley & Sons, New
|
||
York, 1982.
|
||
|
||
|
||
4.2 Developing Encryption Software
|
||
|
||
Development of a standard public key encryption utility that can
|
||
be used widely involves no significant technical problems at all.
|
||
|
||
Its true that software with even the best key generation
|
||
algorithms runs extremely slowly, but each software author or
|
||
publisher only needs to generate their keys once and end users
|
||
don't need to do it at all (although there are extra benefits if
|
||
they do).
|
||
|
||
Actual encryption and decryption operates at quite acceptable
|
||
FidoNews 5-26 Page 21 27 Jun 1988
|
||
|
||
|
||
speeds with existing commercial packages and can no doubt be
|
||
further improved with the superior programming resources
|
||
available within FidoNet.
|
||
|
||
For our purposes a high speed "hybrid" implementation could be
|
||
quite acceptable, at least initially. This would use relatively
|
||
slow public key encryption to authenticate only a short hash of
|
||
the attached software, using a cryptographically secure hashing
|
||
method. The actual software need not be encrypted at all, but
|
||
just hashed with a more complex algorithm than the usual CRC and
|
||
producing at least 10 bytes of output. (That could also keep NSA
|
||
happy).
|
||
|
||
A smooth transition could be achieved by using a normal ARC file,
|
||
which can just be used to unARC the software directly or ALSO
|
||
used to check a file within it that contains the "signed" hash of
|
||
the rest of the ARC file. In the long run though, once things get
|
||
really bad, it would be better to force users to actually run the
|
||
software provided for authentication, by actually encrypting
|
||
entire files. The transitional system would be useful for secure
|
||
distribution of a better system released later.
|
||
|
||
I am writing a draft proposal for the FidoNet Technical Standards
|
||
Committee suggesting standards to ensure utilities developed will
|
||
be secure, compatible, fast, widely adopted, suitable for porting
|
||
to all common computers and suitable for other FidoNet uses.
|
||
(Other uses with further software development include: private
|
||
and authenticated Email; a convenient, decentralized and secure
|
||
means for exchanging nodelist information and session passwords
|
||
between nodes; and Email voting systems.)
|
||
|
||
|
||
4.2 Is Public Key Encryption Secure?
|
||
|
||
Most digital signature techniques rely on the computational
|
||
difficulty of factorizing large composite numbers. This problem
|
||
has defied mathematicians for some 200 years but has not been
|
||
proved cryptographically secure or even "NP complete" (a measure
|
||
of computational complexity which does NOT prove cryptographic
|
||
security). There is some indication that these methods CAN
|
||
eventually be cracked or MAY have already been cracked, with the
|
||
results classified.
|
||
|
||
Fortunately this problem need not concern us unduly as it is
|
||
unlikely that a major breakthrough in higher mathematics will
|
||
first come to light as a result of its discovery by someone
|
||
warped enough to want to launch destructive viruses! (Not that
|
||
some mathematicians aren't pretty warped, but they'd probably
|
||
prefer to take the public kudos for announcing the solution!)
|
||
|
||
If new developments make any particular digital signature system
|
||
insecure, alternatives are available and can be implemented
|
||
quickly. (Unlike virus detection programs which just simply won't
|
||
work AT ALL against the next generation of viruses.) Standards
|
||
for file headers etc should provide for later upgrades.
|
||
The main thing is to have the machinery in place for when its
|
||
FidoNews 5-26 Page 22 27 Jun 1988
|
||
|
||
|
||
needed, and improve it later.
|
||
|
||
|
||
4.4 Developing End User Software
|
||
|
||
Some pretty neat software will need to be written quickly for end
|
||
users automatic key databases and tracking etc. It has to end up
|
||
being a lot more professional and "user friendly" than most
|
||
public domain and shareware software and provide lots of extra
|
||
benefits like software cataloging, to gain wide acceptance BEFORE
|
||
a disaster hits.
|
||
|
||
That's why I wrote this article. Now who's going to do the hard
|
||
stuff?
|
||
|
||
Oh well, there it is. Sorry about the length, but if nobody pays
|
||
any attention, guess who'll be saying "I told you so".
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FidoNews 5-26 Page 23 27 Jun 1988
|
||
|
||
|
||
=================================================================
|
||
NOTICES
|
||
=================================================================
|
||
|
||
The Interrupt Stack
|
||
|
||
|
||
16 Jul 1988
|
||
A new areacode, 508, will form in eastern Massachusetts and
|
||
will be effective on this date. The new area code will be
|
||
formed from the current areacode 617. Greater Boston will
|
||
remain areacode 617 while the rest of eastern Massachusetts
|
||
will form the new areacode 508.
|
||
|
||
25 Aug 1988
|
||
Start of the Fifth International FidoNet Conference, to be
|
||
held at the Drawbridge Inn in Cincinnati, OH. Contact Tim
|
||
Sullivan at 108/62 for more information. This is FidoNet's big
|
||
annual get-together, and is your chance to meet all the people
|
||
you've been talking with all this time. We're hoping to see
|
||
you there!
|
||
|
||
24 Aug 1989
|
||
Voyager 2 passes Neptune.
|
||
|
||
|
||
If you have something which you would like to see on this
|
||
calendar, please send a message to FidoNet node 1:1/1.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Latest Software Versions
|
||
|
||
BBS Systems Node List Other
|
||
& Mailers Version Utilities Version Utilities Version
|
||
|
||
Dutchie 2.90* EditNL 4.00* ARC 5.21
|
||
Fido 12h MakeNL 2.12* ARCmail 1.1
|
||
Opus 1.03b Prune 1.40 ConfMail 3.31
|
||
SEAdog 4.10 XlatList 2.86 EchoMail 1.31
|
||
TBBS 2.0M XlaxNode 1.02 MGM 1.1
|
||
BinkleyTerm 1.50 XlaxDiff 1.02
|
||
QuickBBS 2.01 ParseList 1.10
|
||
|
||
* Recently changed
|
||
|
||
Utility authors: Please help keep this list up to date by
|
||
reporting new versions to 1:1/1. It is not our intent to list
|
||
all utilities here, only those which verge on necessity.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FidoNews 5-26 Page 24 27 Jun 1988
|
||
|
||
|
||
OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION
|
||
|
||
Ken Kaplan 100/22 Chairman of the Board
|
||
Don Daniels 107/210 President
|
||
Mark Grennan 147/1 Vice President
|
||
Dave Dodell 114/15 Vice President - Technical Coordinator
|
||
David Garrett 103/501 Secretary
|
||
Leonard Mednick 345/1 Treasurer
|
||
|
||
|
||
|
||
IFNA BOARD OF DIRECTORS
|
||
|
||
DIVISION AT-LARGE
|
||
|
||
10 Steve Jordan 102/2871 Don Daniels 107/210
|
||
11 Bill Allbritten 11/301 Hal DuPrie 101/106
|
||
12 Leonard Mednick 345/1 Mark Grennan 147/1
|
||
13 Rick Siegel 107/27 Brad Hicks 100/523
|
||
14 Ken Kaplan 100/22 Ted Polczyinski 154/5
|
||
15 Jim Cannell 128/13 Kurt Reisler 109/74
|
||
16 Vince Perriello 141/491 Robert Rudolph 261/628
|
||
17 Rob Barker 138/34 Greg Small 148/122
|
||
18 Christopher Baker 135/14 Bob Swift 140/24
|
||
19 Vernon Six 19/0 Larry Wall 15/18
|
||
2 Henk Wevers 2:500/1 Gee Wong 107/312
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FidoNews 5-26 Page 25 27 Jun 1988
|
||
|
||
|
||
FidoCon '88 - Cincinnati, Ohio
|
||
At The Drawbridge Inn and Convention Center
|
||
August 25-28, 1988
|
||
|
||
Attendee Registration Form
|
||
|
||
|
||
Name: ____________________________________________________
|
||
|
||
Address: ____________________________________________________
|
||
|
||
Address: ____________________________________________________
|
||
|
||
City: _______________________ State: ____ Zip: ___________
|
||
|
||
Country: ____________________________________________________
|
||
|
||
|
||
|
||
Phone Numbers:
|
||
|
||
Day: ____________________________________________________
|
||
|
||
Evening: ____________________________________________________
|
||
|
||
Data: ____________________________________________________
|
||
|
||
|
||
Zone:Net/
|
||
Node.Point: _______________________________________________
|
||
|
||
Your BBS Name: _______________________________________________
|
||
|
||
|
||
BBS Software: _____________________ Mailer: _________________
|
||
|
||
Modem Brand: _____________________ Speed: _________________
|
||
|
||
|
||
What Hotel will you be Staying at: ____________________________
|
||
|
||
Do you want to share a room? ______
|
||
|
||
Are you a non-smoker? ______
|
||
|
||
Do you want an in room point? ______
|
||
(Tower rooms at Drawbridge only)
|
||
|
||
|
||
|
||
Do you need special accommodations? ______
|
||
|
||
(If so, please explain) ____________________________
|
||
|
||
____________________________
|
||
|
||
FidoNews 5-26 Page 26 27 Jun 1988
|
||
|
||
|
||
Are you a non-Sysop? ______
|
||
|
||
Are you an IFNA Member? ______
|
||
|
||
If so, will you be attending the
|
||
Sunday IFNA brunch/BoD meeting? ______
|
||
|
||
|
||
Additional Guests: ______
|
||
(not attending conferences)
|
||
|
||
|
||
|
||
|
||
Comments: ____________________________________________________
|
||
|
||
____________________________________________________
|
||
|
||
____________________________________________________
|
||
|
||
|
||
Costs How Many? Cost
|
||
--------------------------- -------- -------
|
||
|
||
Conference fee $60..................... ________ _______
|
||
($75.00 after 7/31)
|
||
|
||
Thursday Lunch $10.95 .............. ________ _______
|
||
|
||
Thursday Dinner $18.95 .............. ________ _______
|
||
|
||
Friday Lunch $10.95 .............. ________ _______
|
||
|
||
Friday Banquet $24.95 .............. ________ _______
|
||
|
||
Saturday Lunch $10.95 .............. ________ _______
|
||
======== =======
|
||
|
||
Totals ................................ ________ _______
|
||
|
||
|
||
You may pay by Check, Money Order or Visa/MC
|
||
Please send no cash. All monies must be in U.S. Funds.
|
||
Checks should be made out to: "FidoCon '88"
|
||
|
||
This form should be completed and mailed to:
|
||
|
||
FidoCon '88 Registration
|
||
P.O. Box 9294
|
||
Cincinnati, OH 45209
|
||
|
||
|
||
If you pay by Credit Card you may also register by Netmailing
|
||
this completed form to 108/62 or 1/88 for processing. Please
|
||
complete the information below and be sure to include a voice
|
||
phone number above so that we can contact you for Credit Card
|
||
FidoNews 5-26 Page 27 27 Jun 1988
|
||
|
||
|
||
verification. Rename this file ZNNNXXXX.REG where Z is your Zone
|
||
number, N is your Net number, and X is your Node number.
|
||
|
||
|
||
[ ] Visa [ ] MasterCard
|
||
|
||
|
||
Name as it appears
|
||
on credit card: ___________________________________________
|
||
|
||
Credit Card Number: ___________________________________________
|
||
|
||
Expiration Date: ___________________________________________
|
||
|
||
Signature: ___________________________________________
|
||
(If you mail in registration)
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FidoNews 5-26 Page 28 27 Jun 1988
|
||
|
||
|
||
INTERNATIONAL FIDONET ASSOCIATION
|
||
ORDER FORM
|
||
|
||
Publications
|
||
|
||
The IFNA publications can be obtained by downloading from Fido
|
||
1:1/10 or other FidoNet compatible systems, or by purchasing
|
||
them directly from IFNA. We ask that all our IFNA Committee
|
||
Chairmen provide us with the latest versions of each
|
||
publication, but we can make no written guarantees.
|
||
|
||
Hardcopy prices as of October 1, 1986
|
||
|
||
IFNA Fido BBS listing $15.00 _____
|
||
IFNA Administrative Policy DOCs $10.00 _____
|
||
IFNA FidoNet Standards Committee DOCs $10.00 _____
|
||
|
||
SUBTOTAL _____
|
||
|
||
IFNA Member ONLY Special Offers
|
||
|
||
System Enhancement Associates SEAdog $60.00 _____
|
||
SEAdog price as of March 1, 1987
|
||
ONLY 1 copy SEAdog per IFNA Member
|
||
|
||
Fido Software's Fido/FidoNet $100.00 _____
|
||
Fido/FidoNet price as of November 1, 1987
|
||
ONLY 1 copy Fido/FidoNet per IFNA Member
|
||
|
||
International orders include $10.00 for
|
||
surface shipping or $20.00 for air shipping _____
|
||
|
||
SUBTOTAL _____
|
||
|
||
HI. Residents add 4.0 % Sales tax _____
|
||
|
||
TOTAL _____
|
||
|
||
SEND CHECK OR MONEY ORDER IN US FUNDS:
|
||
International FidoNet Association
|
||
c/o Leonard Mednick, MBA, CPA
|
||
700 Bishop Street, #1014
|
||
Honolulu, HI. 96813-4112
|
||
USA
|
||
|
||
Name________________________________
|
||
Zone:Net/Node____:____/____
|
||
Company_____________________________
|
||
Address_____________________________
|
||
City____________________ State____________ Zip_____
|
||
Voice Phone_________________________
|
||
|
||
Signature___________________________
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|