920 lines
43 KiB
Plaintext
920 lines
43 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Oct 4, 1992 Volume 4 : Issue 48
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivist: Dan Carosone
|
||
Copy Editor: Etaion Shrdleax, Esq.
|
||
|
||
CONTENTS, #4.48 (Oct 4, 1992)
|
||
File 1--Wes Morgan's on J Davis & Piracy (Re: CuD 4.46)
|
||
File 2--"Whose Internet Is It Anyway?" (Online! Reprint)
|
||
File 3--Implementing System Security
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
||
libraries; from America Online in the PC Telecom forum under
|
||
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
||
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
||
Back issues also may be obtained from the mail server at
|
||
mailserv@batpad.lgb.ca.us
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Mon, 28 Sep 92 10:10:41 EDT
|
||
From: morgan@ENGR.UKY.EDU(Wes Morgan)
|
||
Subject: File 1--Wes Morgan's on J Davis & Piracy (Re: CuD 4.46)
|
||
|
||
In CuD #4.46, Jim Davis writes:
|
||
|
||
>First, the reality of software production in the late 20th century is
|
||
>much different than this image. Most software production is NOT a
|
||
>cottage industry.
|
||
|
||
Agreed, but that doesn't really change my arguments very much.
|
||
|
||
>The industry has quickly matured in the past few
|
||
>years into a typical monopolized industry. Most patent filings are by
|
||
>corporations. Most software is not purchased from the individuals who
|
||
>create the software, it is purchased from companies who have required
|
||
>their engineers to sign away any rights to whatever they come up with,
|
||
>AS A CONDITION OF EMPLOYMENT. So IN MOST CASES, the creator has been
|
||
>separated from the results of his or her creativity.
|
||
|
||
Isn't this true of almost any commercial concern? Toyota engineers
|
||
sign away their rights to the design of the 1993 Camry, and contribu-
|
||
ting editors sign away their rights to their editorials in the Lexington
|
||
Herald-Leader (if printed, unsigned, as the opinion of the paper). Yet,
|
||
these individuals still profit from their work; the engineers will receive
|
||
raises/bonuses if their designs are commercially successful, and the editors
|
||
of the Herald-Leader receive greater compensation if the paper's subscrip-
|
||
tions increase. What's the difference?
|
||
|
||
>But the image of
|
||
>the sole-proprietor hacker is raised up as a shield by the software
|
||
>industry -- the public can take pity on the "defenseless" hacker;
|
||
>people don't take pity on a Microsoft or an IBM.
|
||
|
||
It isn't a question of "pity", nor have I advanced it as such.
|
||
|
||
My argument is very simple. You do not have the moral, ethical, or legal
|
||
right to take someone else's explicit design (be it computer software, a
|
||
piece of sculpture, or a 1993 Camry), duplicate it, and give the copies away.
|
||
|
||
>Here we get
|
||
>to the heart of the matter -- we're really talking about the "rights"
|
||
>of software corporations here; not the hacker, not the consumer, and
|
||
>not society.
|
||
|
||
So, the people who constitute a corporation are now in a separate class?
|
||
|
||
>Nowhere do I argue that the people who write software should not be
|
||
>compensated for their effort. Of course people should be compensated!
|
||
|
||
You say that people should be compensated, yet you wish to remove their
|
||
largest/best-protected source of compensation -- contract royalties from
|
||
legitimate purchases.
|
||
|
||
>The question is how, and how much.
|
||
|
||
"how much"? This almost sounds like a thinly disguised slam on software
|
||
prices........
|
||
|
||
>Paycheck dollars from a
|
||
>corporation, a university, a cooperative or the government all spend
|
||
>equally as well.
|
||
|
||
Of course, one's paycheck is usually proportional to the success of
|
||
one's efforts. I can't imagine anyone increasing an employee's pay
|
||
for "good societal benefits" of their work (with the exception of
|
||
the fine people in the social work careers, of course....).
|
||
|
||
>But the social benefits from the programmer's efforts
|
||
>are constrained by forcing them through the legal contortions of
|
||
>intellectual property rights and private ownership.
|
||
|
||
If the programmer (or corporation) wants to reap social benefits, they'll
|
||
place the program in the public domain (or provide 'student editions', or
|
||
educational pricing, etc.). It's *their* choice, not yours.
|
||
|
||
>The model that we
|
||
>have been using is private speculation for private gain, made possible
|
||
>via exclusive monopolies granted by the government, enforced by law. I
|
||
>am saying that other successful models exist and have generated useful
|
||
>products.
|
||
|
||
Many such models exist; however, you would force everyone into the same
|
||
model. Neither of us can dictate models to the developer.
|
||
|
||
>The subtext in the "I deserve a reward" argument is that
|
||
>someone who comes up with a really useful idea should get a special
|
||
>reward. Fine. I have no problem with public recognition of significant
|
||
>contribution, even including a cash award. Again, this doesn't
|
||
>_require_ intellectual property rights.
|
||
|
||
I can see it now -- "You've written a wonderful program! Here's a one-
|
||
time cash award of $XXXX, and we're going to spread your program around
|
||
the world, let other people use it to make more money, and you won't reap
|
||
any further benefit from it."
|
||
|
||
>Morgan says that
|
||
>"*companies* create for financial gain" (which I certainly agree
|
||
>with), but puts this forward as if the protection of *their* financial
|
||
>gain somehow justifies the rest of us having to suffer under
|
||
>intellectual property rights.
|
||
|
||
Let's try a parallel (this usually degenerates into a flamefest, but...):
|
||
|
||
- You (Mr. Davis) write a book entitled "Intellectual Property in the
|
||
Information Age"
|
||
- Prentice-Hall, in their wisdom, deems it worthy; a First Edition is
|
||
prepared, published, and placed on sale.
|
||
- I purchase one copy, duplicate it 500 times, and distribute it to
|
||
a conference *without your permission*.
|
||
- Your book is included in the conference Proceedings, and is made
|
||
available to the public; again, neither you nor PH recognize any
|
||
compensation.
|
||
|
||
Can you honestly say that neither you nor Prentice-Hall will be concerned?
|
||
|
||
I have found that many people (NOT, necessarily, Mr. Davis) who argue against
|
||
intellectual property rights have never been in a position to earn compensation
|
||
from their personal work(s). I have been in such a position, and it definitely
|
||
changes one's opinions. (While my experience in this area does not lie within
|
||
the realm of computer software, I believe that my experience is valid.)
|
||
|
||
>Corporations are not necessary for the
|
||
>generation of the software we need.
|
||
|
||
That's well and good; you (and anyone else) is quite free to design,
|
||
implement, test, debug, document, and distribute any software you wish.
|
||
|
||
>Harlan Cleveland, .....wrote.....:
|
||
>"Is the doctrine that information is owned by its
|
||
>originator (or compiler) necessary to make sure that Americans remain
|
||
>intellectually creative?" He answers in the negative, citing the
|
||
>healthy public sector R&D efforts in space exploration, environmental
|
||
>protection, weather forecasting and the control of infectious diseases
|
||
>as counter examples.
|
||
|
||
Hmmm....."space exploration" == "NASA"
|
||
"environmental protection" == "EPA"
|
||
"weather forecasting" == "NOAA"
|
||
"infectious diseases" == "PHS/HHS/CDC"
|
||
|
||
"public sector" seems to melt into "government agencies". If you (or
|
||
Mr. Cleveland) can provide examples of such work which are outside the
|
||
governmental realm, I'd like to know about it. Of course, a great deal
|
||
of university research takes place under government grants; we might
|
||
even argue that universities are another arm of the government in this
|
||
respect.
|
||
|
||
I'm not familiar with any large-scale research which is truly in the
|
||
"public sector".
|
||
|
||
>Fourth, the notion of a solitary inventor is a popular falsehood. No
|
||
>one creates in a vacuum.
|
||
|
||
Agreed.
|
||
|
||
>The programmer's skills and creativity rest
|
||
>upon past inventions and discoveries;
|
||
|
||
This is true of almost any invention, discovery, or creation; would you
|
||
apply your arguments to cars, calculators, or novels? Heck, most musical
|
||
compositions are based on the ancient notions of scales, keys, and modes;
|
||
would you throw *all* music into the public domain, too?
|
||
|
||
>publicly supported education;
|
||
|
||
It is quite possible to complete one's education without setting foot
|
||
in a "publicly supported" school.
|
||
|
||
>the other people who produced the hardware, the manuals and textbooks
|
||
>and the development tools; as well as the artists and accompanying
|
||
>infrastructure who may have inspired or influenced the programmer.
|
||
|
||
You're absolutely correct, but it's still the programmer's invention
|
||
that made it possible.
|
||
|
||
>In
|
||
>this sense, the developer's product is a social product, and
|
||
>consequently should redound to the benefit of all of society.
|
||
|
||
Again, are you willing to apply this notion to *every* invention,
|
||
development, or creation? I still don't believe that computer
|
||
software is inherently different from any other medium.
|
||
|
||
>The
|
||
>practical problem of compensation for effort and reward for
|
||
>outstanding achievement can be addressed outside of "intellectual
|
||
>property rights."
|
||
|
||
I'd like to see some concrete ideas about the implementation of this
|
||
"compensation....and reward". You've mentioned it several times, but
|
||
you haven't presented any practical implementations.
|
||
|
||
>The public
|
||
>is already heavily involved in software production, but as is too
|
||
>often the case, the public finances something, and then turns it over
|
||
>to private corporations to reap all of the profits from it.
|
||
|
||
1) The "public" doesn't have to "turn it over" to the private sector.
|
||
|
||
2) Most programmers who develop something on their own (as opposed to
|
||
"staff programmers" at a software company) usually recognize compen-
|
||
sation in either lump-sum payment(s), increased salaries, or royalties.
|
||
|
||
3) If I decide to market my own software product, haven't I just become
|
||
one of your much-villified "private corporations"?
|
||
|
||
>Re: my point that intellectual property rights prevent intellectual
|
||
>effort, including software development, from maximizing its social
|
||
>benefit: If a copy of Lotus 1-2-3 does have use for people, and people
|
||
>are prevented from using it (e.g., because of the price barrier), then
|
||
>its potential benefit is constricted.
|
||
|
||
You didn't address my mention of "public access" computing sites, such
|
||
as those found in many schools and public libraries. It would seem that
|
||
this growing "public access" facility would render your "price barrier"
|
||
irrelevant.
|
||
|
||
>Mr. Woodhead says that no companies specialize in educational
|
||
>software. If this in fact is the case, then this only reinforces the
|
||
>argument for the necessity of some sort of social or public or
|
||
>community (or whatever you want to call it) funding of educational
|
||
>software development.
|
||
|
||
Just go ahead and say "government funding"; you've been hinting around
|
||
the phrase for several paragraphs.
|
||
|
||
>Re: Mr. Morgan's notion of more aggressively extending patents to
|
||
>software: it's already taking place.
|
||
|
||
Good; I'll look at the references you mentioned.
|
||
|
||
>17 years (typical for
|
||
>patents) is an eternity in the evolution of software (as is 10 or 20
|
||
>years, as suggested by Mr. Morgan).
|
||
|
||
OK, let's change it to 5; we're speaking rhetorically, right? 8)
|
||
|
||
>As a sidenote, even the SPA has
|
||
>opposed software patents.
|
||
|
||
Of course they oppose it! It cuts into their profits! I've never
|
||
said that current pricing is fair.......
|
||
|
||
>Re: fair use -- the point I was trying to make is that the concept of
|
||
>"fair use" has EVOLVED and EXPANDED with increasing ability to easily
|
||
>duplicate various media.
|
||
|
||
How, exactly, has it "evolved and expanded"?
|
||
|
||
>"Taping of television programs for personal
|
||
>use appears to have become accepted as fair use of copyright material.
|
||
|
||
"appears to have"? It was explicitly affirmed in several court decisions.
|
||
|
||
>The
|
||
>rationale of the court must have been the unlikely efficacy of trying
|
||
>to put Pandora back into the box and the fact that no commercial use
|
||
>of the tapes was either alleged or documented."
|
||
|
||
Bingo! The "personal use" factor was a determinant in each decision.
|
||
You'll notice that the courts did NOT affirm any redistribution rights,
|
||
either for-profit or for free.....
|
||
|
||
>The point is that legal constructs like "fair
|
||
>use" are not brought to us by Moses -- they are determined by the
|
||
>balance of social forces through legal, political, economic and other
|
||
>forms of struggle. And therefore they are something which we can
|
||
>affect.
|
||
|
||
Agreed!
|
||
|
||
I would enthusiastically support a "free for educational purposes" waiver of
|
||
licensing. I'm the Systems Administrator for the UK College of Engineering;
|
||
we spend a great deal of money on licenses, and some vendors have my undying
|
||
gratitude (Swanson Analysis, MathWorks, and CADKEY, are you listening?).
|
||
|
||
Let me ask you a simple question:
|
||
|
||
You have championed (and rightfully so) the cause of "educational computing";
|
||
you've used education as a bulwark of your arguments. However, would you
|
||
voluntarily restrict your use of "free software" to educational purposes?
|
||
If WordPerfect gave you 10 copies for your class, would you use it to write
|
||
your next book? Would you sell that book?
|
||
|
||
>From: peter@FICC.FERRANTI.COM(Peter da Silva)
|
||
>Subject--File 2--Response to Davis/Piracy (1)
|
||
>
|
||
>Re: Wes Morgan's article in CuD #4.43
|
||
>
|
||
>I largely agree with most of his arguments, but I would like to point
|
||
>out one mistake... he says:
|
||
>
|
||
> "The whole concept of copyrights ... is based on the notion
|
||
> that the creator ... is entitled to some compensation for his
|
||
> effort"
|
||
>
|
||
>This is just not true. The whole concept of copyrights and patents in
|
||
>the United States is based on the notion that by making intellectual
|
||
>property a salable commodity subject to market forces, more and better
|
||
>intellectual property will be created and it will be distributed more
|
||
>freely.
|
||
|
||
Absolutely! I think we said the same thing; I just didn't extend my
|
||
statement far enough. (My statement was based on my experience in
|
||
more "artistic" fields, namely music; the market forces Peter mentions
|
||
are less dominant in that field.)
|
||
|
||
Thanks for clarifying, Peter.
|
||
|
||
>And, you know what, it works. There's no better refutation, nor need
|
||
>there be a better refutation, of the argument that piracy promotes
|
||
>openness. It doesn't. It promotes encrypted software, dongles, and
|
||
>trade secrets. It discourages publication. It reduces the incentive to
|
||
>create viable products of commercial quality. These are not the result
|
||
>of intellectual property laws, they're the result of the failure to
|
||
>enforce intellectual property laws.
|
||
|
||
Breakaway! Shot! Goal!
|
||
|
||
Well said.
|
||
|
||
>From: "Michael Stack" <stack@STARNINE.COM>
|
||
>Subject--File 3--Response to Davis/Piracy (2)
|
||
>
|
||
>They both seem to view copyright and
|
||
>patents as a system guaranteeing a right to profit overlooking the
|
||
>original constitutional intent to "promote the progress of Science and
|
||
>the useful Arts."
|
||
|
||
Here's the relevant citation:
|
||
|
||
[Article I, Section 8, US Constitution]
|
||
|
||
...To promote the progress of science and useful arts, by securing for
|
||
limited times to authors and inventors the exclusive right to their
|
||
respective writings and discoveries;
|
||
|
||
We may argue that the current implementation of copyrights and patents
|
||
is in need of overhaul/modification, but you cannot evade the Constitutional
|
||
"exclusive right" for inventors and authors.
|
||
|
||
I'd also argue that the very presence of hundreds of software companies
|
||
validates the "progress of science and useful arts"; I receive informa-
|
||
tion on new software releases on an almost-daily basis.
|
||
|
||
>To be able to accuse someone of stealing or to claim something
|
||
>as property (and to subsequently grant licenses on how this property
|
||
>is to be used) implies there exists rights of ownership in the first
|
||
>place. The crux of Mr. Davis's article questions this right. The
|
||
>respondents by-pass this altogether.
|
||
|
||
I didn't bypass it at all; in fact, my entire argument is based on
|
||
the premise of "I made it, and it's mine!". 8)
|
||
|
||
>Their articles are but
|
||
>explanations of the existing order in case we didn't already
|
||
>understand.
|
||
|
||
The "existing order" is entirely Constitutional. Mr. Davis' questions
|
||
bypass the Constitutional provisions of "exclusive rights" for creations
|
||
and inventions. Would you support a Constitutional amendment to revoke
|
||
those "exclusive rights"?
|
||
|
||
Keep in mind that any such action would invalidate *all* trademarks,
|
||
copyrights, and patents. None of the parties in this discussion have
|
||
provided justification for applying different standards to computer
|
||
software, so it's in the same boat as any other "writings and discoveries".
|
||
|
||
>The fact that "alls not well in the state of Denmark"
|
||
>in itself punches large holes in the system the two respondents
|
||
>defend.
|
||
|
||
>Both belittle the spectre of "police state" raised by Mr. Davis.
|
||
>Amazingly, this is done within the pages of a publication which has
|
||
>spotlighted many instances of "police-state" behavior: doors
|
||
>kicked-in in the early hours of morning, guns drawn, threats,
|
||
>equipment confiscated (permanently?), "guilty till proved innocent,"
|
||
>etc.
|
||
|
||
I didn't "belittle" the police-state notion at all!
|
||
|
||
Of course, those are matters of criminal law, not copyright infringement.
|
||
I have yet to hear mention of such a "police state" approach to copyrights.
|
||
|
||
>--On the one hand you argue "If I pour 4 years of my life into the
|
||
>development of SnarkleFlex, I DESERVE to profit from it" but then you
|
||
>append a caveat which undoes this assertion "(assuming that people
|
||
>want to purchase/use it)." Doesn't this condition make your
|
||
>capitalized assertion self-destruct?
|
||
|
||
How about "I deserve the OPPORTUNITY to profit from it"?
|
||
|
||
>Do you deserve to be rewarded
|
||
>for your work, yes or no, or is it to be let dependent on market
|
||
>caprice?
|
||
|
||
Market caprice, absolutely! That's the basis for ANYONE's living; one
|
||
must provide a service (or goods) which people need or want. If there
|
||
is no market for your skills, you get to find another job. That's self-
|
||
determination.
|
||
|
||
>--You ask "Would you make a copy of Webster's Dictionary and give it
|
||
>to a friend?" and you sport(!) "Xerox(tm)[ing] your entire printed
|
||
>library for me..." "...would be just fine, right?" Yes, it would --
|
||
>if the library and dictionary were in a readily distributable form and
|
||
>the copy cost me near nothing i.e. in digital form. I'd be happy to
|
||
>give you a copy. I could give it to anyone. As to how I'd have a
|
||
>library in the first place we can discuss (perhaps outside of this
|
||
>forum).
|
||
|
||
"how I'd have a library......we can discuss.....outside of this forum"?
|
||
|
||
Oh, my! Let's translate this a bit.....
|
||
|
||
"Sure, I'll give you a copy; just don't ask where I got it."
|
||
|
||
>Michael Goldhaber in his book Reinventing Technology states "Since new
|
||
>information technology includes easy ways of reproducing information,
|
||
>the existence of these [intellectual property] laws effectively
|
||
>curtail the widest possible spread of this new form of wealth."
|
||
|
||
Your alternative is anarchic, is it not? I'll ask you a simple question,
|
||
one for which no one has provided a suitable answer:
|
||
|
||
If I choose to make my living as a software author (either "on
|
||
my own" or as part of a company/corporation), how will your
|
||
proposed "freedom of information" help me earn a living? Will
|
||
it, in fact, hinder me in earning a living?
|
||
|
||
--Wes
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 1 Oct 92 08:58:29 EDT
|
||
From: Rich=Gautier%SETA%DRC@S1.DRC.COM
|
||
Subject: File 2--"Whose Internet Is It Anyway?" (Online! Reprint)
|
||
|
||
This entire article was re-typed by Richard A. Gautier
|
||
(RG%SETA%DRC@S1.DRC.COM). If there are any SPELLING errors, they are
|
||
probably his. If there are grammar errors, they are Dr. Grundners, or
|
||
the editors. Mr. Gautier HAS obtained permission to electronically
|
||
disseminate this article from ngarman@tso.uc.edu who represents ONLINE
|
||
magazine. Her comment was that this article really does belong in the
|
||
electronic (Internet) forum, and that it was really a shame that I had
|
||
to ask with an article like this.
|
||
|
||
"WHOSE INTERNET IS IT ANYWAY? -- A CHALLENGE"
|
||
By Dr. Tom Grunder
|
||
From--Online! Magazine, July 1992, pp. 6-7, 10.
|
||
|
||
It began innocently enough. I was rummaging around the Internet
|
||
looking for some NREN information to include in a proposal I was
|
||
writing, when I came across a rather one-sided "debate."
|
||
|
||
It was a string of messages written mostly by people from academic
|
||
computing centers bemoaning the fact that NREN _might_ be made
|
||
available to K-12 schools, businesses, libraries, and (horror of
|
||
horrors) even to the general public. They were beside themselves.
|
||
"The Internet and the NREN are supposed to be for academic and
|
||
research purposes," they said. "What's going to happen if we allow
|
||
all these other people on? There's not going to be enough bandwidth.
|
||
Transmission time will suffer. Before you know it, the NREN is going
|
||
to be just as bad as the Internet is now."
|
||
|
||
As the messages came in, their outrage seemed to build. So did
|
||
mine.
|
||
|
||
Finally I came across a message that simply read: "Why should we
|
||
let them use it at all???" and suddenly the terrible mistake we've
|
||
been making became clear. We in the non-university networking
|
||
community have been framing the wrong issue.
|
||
|
||
Until now, the issue has been whether K-12 schools and community
|
||
users are going to have access to the NREN. It should have been
|
||
whether K-12 and community users are going to
|
||
_allow_the_academic_centers_ to access the NREN. Somehow we had
|
||
gotten our priorities crossed.
|
||
|
||
Who do they think is _paying_ for all this? When the NREN comes
|
||
online, the money to build it will be coming from that apparently
|
||
forgotten group of people called "taxpayers." Who do they think is
|
||
paying for the current Internet backbone? The National Science
|
||
Foundation? Wrong! It's the taxpayers. Who do they think is paying
|
||
for those mid-level networks, and for the high-speed data lines to
|
||
connect their colleges to those networks, and for the nice
|
||
high-powered servers that makes the connection so easy? Do they think
|
||
that money is coming from good ole Siwash State U.? If so, then who,
|
||
pray tell, is funding Siwash State? Right again. Taxpayers!
|
||
|
||
So now we come along, with hat in hand, begging for permission to
|
||
have minimal access to the Internet and to be a part of NREN. Why?
|
||
So we can set-up K-12 networks that will allow the _taxpayers'_ kids
|
||
to learn the information age skills they will need to be competitive
|
||
in the 21st century. So we can provide the _taxpayers_ access to
|
||
electronic mail, government information, and other resources via
|
||
libraries and community computer systems. So we can provide some
|
||
piece of the information age to the people who paid for it in the
|
||
first place! And the academics treat us like beggars in a subway
|
||
station.
|
||
|
||
_Absurd!_ Absurd, but not surprising.
|
||
|
||
To understand this attitude, you have to keep in mind that, in
|
||
most locations, these university computing centers are designed for
|
||
the people who work there plus 35 of their buddies. No one else -
|
||
including the other students and faculty on their own campuses - need
|
||
apply. In most locations, students or faculty members seeking to use
|
||
the Internet are given a blinking cursor that dares them to come up
|
||
with some combination of nonsense syllables to make it do something.
|
||
That's it. No help. No training. No assistance. Nothing. It is
|
||
not surprising that the idea of letting the community have access to
|
||
this preciously guarded resource would send chills up their spines.
|
||
|
||
But, in many ways, we in the non-academic computing circles have
|
||
made our share of mistakes as well. Not only have we been apologetic
|
||
in our claims to this national resource, but we have engaged in what I
|
||
call the "Balkanization" of the information age - the fragmentation of
|
||
our efforts into dozens of competing networks and special interest
|
||
systems. We should be working toward a common framework with enough
|
||
"conceptual bandwidth" to include everyone.
|
||
|
||
As a function of developing my organization, the National Public
|
||
Telecomputing Network, I am asked to speak at a lot of conventions and
|
||
conferences; and what I find at those meetings has become quite
|
||
predictable. Everyone is excited about computer networking. When I
|
||
go to a K-12 convention; everyone is talking about K-12 networks.
|
||
When I go to a library conference; everyone is talking about library
|
||
networks, and so on - all in direct competition with each other.
|
||
|
||
It doesn't make sense.
|
||
|
||
Let's say you are proposing a statewide network that will link
|
||
your libraries together, complete with Internet connections - the
|
||
whole bit. And let's say you take it to your state capital and,
|
||
amazingly enough, you get it funded. Now, what happens if a month
|
||
later the K-12 people (or someone else) shows up with a proposal to
|
||
fund their network; or worse, what happens if they get there a month
|
||
_before_ you? Some one must lose; it is inherent in that kind of
|
||
competitive process.
|
||
|
||
But our mistakes do not end with the competition for monies. They
|
||
run deeper than that. We have also failed to come up with a
|
||
comprehensive plan to show how any of our ideas fit together. Let me
|
||
use the K-12 initiatives as an example.
|
||
|
||
I have seen a number of proposals going around that (depending on
|
||
the proposal) would provide every school in the city/state/country
|
||
with a connection to the Internet - so every child will have access to
|
||
the information resources to be found there. That's fine. In fact,
|
||
on the surface, it sounds wonderful.
|
||
|
||
But what happens _after_ the student graduates from high school or
|
||
college? Do we toss him or her out into a world where those resources
|
||
are utterly unavailable? If so,
|
||
_what's_the_point_of_training_them_on_the_resources_
|
||
in_the_first_place? It's like having mandatory driver education in a
|
||
world without cars!
|
||
|
||
It doesn't make sense. We create plan after plan, proposal after
|
||
proposal, with no common conceptual framework to tie them together.
|
||
|
||
I believe we must start developing our programs in the context of
|
||
community-wide information systems. The guy who runs the corner gas
|
||
station (and who was in a K-12 class only a few years ago) should have
|
||
at least as much information access as the K-12 students who are in
|
||
class right now. But we can't do that; we can't achieve it; unless we
|
||
can band together somehow to speak with one voice.
|
||
|
||
And...we need leadership.
|
||
|
||
Where is that leadership going to come from? One logical source
|
||
is the library community. But I don't see that happening. What I see
|
||
is a profession divided. Half the librarians I've talked to see this
|
||
network technology as exactly the kind of thing libraries should be
|
||
embracing; and the other half (usually higher-level officials) see it
|
||
as the work of the devil - with no detectable middle ground.
|
||
|
||
We can't continue without leadership, without a plan, and in
|
||
direct competition with each other. Perhaps what is needed is a plot
|
||
of ground that stands outside existing territory, a place where
|
||
everyone can stand, and around which we can all rally.
|
||
|
||
Let me try out an idea on you.
|
||
|
||
Suppose a super-fund was created for the development of a
|
||
nationwide network of computerized community information systems.
|
||
These systems would be free to the user in the same sense that the
|
||
public library is free to its patrons. Of equal importance, each of
|
||
these systems would have a place on them for the library community,
|
||
the K-12 community, the medical community, government officials, and
|
||
anyone else who wanted to use it. In addition, each system would be
|
||
linked by, and would provide its users with controlled access to, the
|
||
Internet/NREN. From a technological standpoint, there are no barriers
|
||
to the development of these systems. Indeed, there currently exist
|
||
several pilot systems that are already accomplishing all the above and
|
||
more.
|
||
|
||
How would we fund it? One way would be to ask every Regional Bell
|
||
Operating Company to contribute, along with every high-tech
|
||
corporation, the federal government, every state government, every
|
||
major city, and every major foundation. If necessary, we would
|
||
approach the various state Public Utility Commissions to ask that a
|
||
surtax be placed on phone company data line profits. The fund would
|
||
be charged with developing a minimum of 100 community computers
|
||
covering all 50 states by the year 2000. Initial cost would be about
|
||
$30 million dollars.
|
||
|
||
Could it be done? Without any doubt, yes. We've done it before.
|
||
Most people do not realize that 100 years ago there was no such
|
||
thing as the public library as we know it. But we reached the
|
||
point in this country where literacy levels got high enough (and
|
||
the cost of producing books cheap enough) that the public library
|
||
became feasible. People across the country began to come together
|
||
around the idea of free public access to the printed word; and the
|
||
result was a legacy from which everyone reading this article has
|
||
benefitted.
|
||
|
||
What I am saying, is that in this century _computer_ literacy
|
||
levels have gotten high enough (and the cost of computer equipment
|
||
cheap enough) that it is time from a similar movement to form around
|
||
the development of free public-access computerized community
|
||
information systems. It is time for us to stop being apologetic, and
|
||
to stop competing wih each other. In short, it is time for us to
|
||
leave a legacy of our own.
|
||
|
||
Do you see what I am saying?
|
||
Would you support such a plan? I mean, would you support it
|
||
personally?
|
||
Would you work for it?
|
||
Would your company or institution support it?
|
||
Would they contribute to it? If so, let me know.
|
||
|
||
Send me electronic mail, send me snailmail, but let me know. The
|
||
key here is not the technology, that's already in place, it is "wil."
|
||
Do we have the will to do it?
|
||
|
||
The issue is no longer _whether_ we will enter an information age.
|
||
That part has been settled. We have. What is at issue is whether the
|
||
information age is something that happens _to_ us, or something that
|
||
happens _for_ us.
|
||
|
||
Fortunately, that decision still remains in our hands.
|
||
|
||
++++++++++++++++
|
||
|
||
_TOM_GRUNDNER_ is the president of the National Public
|
||
Telecomputing Network, and the founder of the Cleveland Freenet. The
|
||
freenets are community information systems, located in several Ohio
|
||
communities and in Peoria, Illinois. A column in DATABASE (April
|
||
1988, pp. 97-99) by Steve Cisler describes the Cleveland Freenet in
|
||
its early stages.
|
||
|
||
Communications to the author should be addressed to Dr. Tom
|
||
Grundner, National Public Telecomputing Network, Box 1987, Cleveland,
|
||
OH 44106; 216/368-2733; Internet-aa001@cleveland.freenet.edu;
|
||
BITNET-aa001%cleveland.freenet.edu@cunyvm. (Editor's Note: Write to
|
||
Tom Grundner, or write to ONLINE (ngarman@tso.uc.edu), to answer this
|
||
challenge and comment on this controversial issue facing the library
|
||
and online community. ONLINE will publish as many notes and letters
|
||
as we have room for in coming issues. --NG)
|
||
|
||
------------------------------
|
||
|
||
Date: 25 Sep 1992 11:07:31 -0700 (MST)
|
||
From: RayK <KAPLAN%UAMIS@ARIZVMS.BITNET>
|
||
Subject: File 3--Implementing System Security
|
||
|
||
Toward the Implementation of a System and Network Security-Related
|
||
Incident Tracking and Vulnerability Reporting Database
|
||
by Ray Kaplan
|
||
|
||
Consider the need for a system and network security-related incident
|
||
tracking and vulnerability reporting database (herein referred to as
|
||
ITVRD for convenience).
|
||
|
||
Such a database might be a relational combination of reported
|
||
vulnerabilities and incidents that could answer queries such as "show
|
||
me recorded instances of compromise for version xxx of operating
|
||
system yyy on zzz hardware" or "show me a list of known
|
||
vulnerabilities of the login sequence for version xxx of operating
|
||
system yyy on zzz hardware" or even, "show me a list of reported
|
||
compromises of version AAA of third party product BBB running under
|
||
version xxx of operating system yyy on zzz hardware". We might even
|
||
be able to ask "show me known instances of password guessing attacks
|
||
on version xxx of operating system yyy on zzz hardware at banks."
|
||
|
||
It is widely known that the flow of security-related information is
|
||
carefully controlled and that such information is not readily or
|
||
widely available to those who need it to protect their systems and
|
||
networks. There is plenty of information available - but, its
|
||
availability seems limited to the underground. While this apparently
|
||
serves those who know and control this information, but it does little
|
||
to help those who are trying to protect their systems and networks.
|
||
Security by obscurity is widely known to be a flawed concept. My
|
||
argument would be that this game of security incident/vulnerability
|
||
tracking is a lot like dealing with the AIDs crisis. If we don't
|
||
start talking openly about it, we are all in trouble(1).
|
||
|
||
While some of the various computer incident handling capabilities do
|
||
an excellent job of distributing SOME significant vulnerability and
|
||
incident information publicly(2), VERY LITTLE detailed information
|
||
gets disseminated in comparison to the number of known vulnerabilities
|
||
and known incidents. In addition, those who are not connected to the
|
||
Internet have a difficult time staying abreast of those incidents that
|
||
are reported. Worse yet, I speculate that the majority of systems and
|
||
private networks that exist in the world today are simply not even
|
||
tapped into the meager flow of security-related information that does
|
||
exist.
|
||
|
||
I believe that this sad situation is due to the politics of security
|
||
vulnerability information between vendors in the market(3), and an
|
||
inherent desire to control the distribution of this information by the
|
||
portion of the security community that has placed themselves in charge
|
||
of it. As proof of this, consider that prototypes of system and
|
||
network security-related ITVRDs are known to have been funded by the
|
||
government, but were stopped when the funding agency wanted to
|
||
classify the effort making it publicly inaccessible(4). What we - as
|
||
a community - are left with is an odd situation where the best
|
||
collections of vulnerability information are to be found only on the
|
||
clandestine sources of the world's underground computer community.
|
||
|
||
At this writing, the Defense Advanced Research Projects Agency's
|
||
(DARPA) Computer Emergency Response Team (CERT) is reporting on the
|
||
order of 3 incidents per day, but we - as a community - hear very
|
||
little about the exact nature of these problems, how they can be used
|
||
against our systems or their fixes. While the relatively new Forum of
|
||
Incident Response and Security Teams (FIRST) is working on the
|
||
problems associated with the design and implementation of a ITVRD,
|
||
their discussions are carefully restricted to their members and this
|
||
topic has been under discussion for quite a long time with no
|
||
apparent movement. In addition, most of us are not members of FIRST,
|
||
so we can't contribute to the discussions even if we wanted to do so.
|
||
|
||
Since I know that the formation of a widely available ITVRD is a very,
|
||
very emotional issue in the security community and since I am not
|
||
willing to suggest that I have the best design and implementation plan
|
||
for it in mind - I'm simply throwing the question out into the
|
||
community for an open, vigorous debate: how can a system and network
|
||
security-related ITVRD be implemented - or should it even be
|
||
implemented? Based on my recent, unsuccessful experiences in trying
|
||
to get members of the legitimate security community at large to talk
|
||
to members of the world's computer underground, I have decided that it
|
||
is not prudent for me to proceed with the design and implementation of
|
||
a ITVRD until some consensus in the community is reached about how -
|
||
or even if - such a thing should be done.
|
||
|
||
As a seed for the debate, here are some of the questions surrounding
|
||
the implementation of a ITVRD that I think need vigorous discussion by
|
||
the community. Please consider them carefully and offer us your
|
||
thoughts. Post your reply to this channel or send it to me at any of
|
||
the addresses below and I will collect it, combine it with others that
|
||
I receive and report it in some regular manner which is yet to be
|
||
determined.
|
||
|
||
A Myriad of hard questions:
|
||
|
||
What of the morals and ethics questions that surround the
|
||
establishment of a widely available ITVRD? While this is not a new
|
||
idea(5), we are talking about the morals and ethics of making an ITVRD
|
||
available to anyone who wants access to it. This necessarily includes
|
||
those that are not members of the legitimate security community. Even
|
||
though information such as that which an ITVRD would hold is readily
|
||
available now, it takes a lot of time and energy to find it. An ITVRD
|
||
would make incident and vulnerability information trivially available
|
||
|
||
to anyone who wanted it.
|
||
|
||
How should an ITVRD be accessible? Should it be a database on the
|
||
network that can be accessed by simply sending a well-formed query via
|
||
electronic mail to a database server? Should an ITVRD allow
|
||
interactive access? Should it be available via a toll-free, 1-800
|
||
number? A pay per-call, 1-900 number?
|
||
|
||
Since it has its own very well-developed channels of communication,
|
||
why would the underground even care to contribute to such an ITVRD?
|
||
Would a widely accessible ITVRD threaten or replace popular
|
||
underground publications like Hack-Tic or 2600? Would the underground
|
||
be happy with attribution for the holes that they find? Would the
|
||
contributors to an ITVRD even want to be identified?
|
||
|
||
Should a subscriber-based ITVRD pay its contributors for their
|
||
submissions? If so, on what basis and how much? Should it be
|
||
available to those that want to passively access it without
|
||
contributing to it? Should this access be on a subscription basis?
|
||
If so, does such a subscription service need some sort of
|
||
authentication to restrict access to only legitimate, paid
|
||
subscribers?
|
||
|
||
Should the contents of an ITVRD be exactly what is submitted to it, or
|
||
should submissions to it be edited and/or verified for authenticity.
|
||
If editing, verification and authentication of submissions are to take
|
||
place, who should do this and under what rules should it be done? In
|
||
recognition that many organizations do not currently report their
|
||
security problems, should anonymous submissions be allowed?
|
||
|
||
Should such an ITVRD be in the public domain or should it be private
|
||
property.
|
||
|
||
Where should an on-line ITVRD be maintained? Should it be located
|
||
outside the traditional boundaries of countries that would restrict its
|
||
availability?
|
||
|
||
I am sure that I have missed many, many important questions. Please
|
||
contribute to this discussion.
|
||
|
||
Electronic mail:Internet - kaplan@mis.arizona.edu
|
||
BITNET - KAPLAN@ARIZMIS
|
||
|
||
Snail mail:
|
||
Ray Kaplan
|
||
P.O. Box 42650
|
||
Tucson, AZ 85733-2650
|
||
FAX - (602) 791-3325
|
||
|
||
This has been posted to:
|
||
|
||
Some common Network Newsgroups, and the DECUS DECUServe bbs.Several of
|
||
the world's underground publications: 2600 and HacK-Tic.Selected
|
||
members of the security community.
|
||
|
||
Please feel free to re-post this anywhere you see fit - it is hereby
|
||
released into the public domain. If you post it somewhere - please let
|
||
me know where you put it so I can try and track the discussions - I'd
|
||
like to do a summary of it all one of these days.
|
||
|
||
In advance, thanks for your time and consideration. Since I know that
|
||
the ire of powerful forces in the security community may be stirred up
|
||
by the idea of publically discussing the design and operation of an
|
||
ITVRD, I only hope that a reasoned exchange of ideas will follow.
|
||
|
||
++++++++++
|
||
|
||
(1) I get into some interesting discussions with people who argue that
|
||
secrecy is the best course of action. For instance, while splitting
|
||
hairs on the tough subject of when you begin (of if there even should
|
||
BE) sex education, there is an argument that says educating very young
|
||
people about their sexuality will induce them to experiment where they
|
||
otherwise might not do so. In my view, this is similar to discussions
|
||
that I have with those that oppose the implementation of an ITRVD.
|
||
There are those that say the mere availability of an ITRVD will cause
|
||
more incidents. In the face of this criticism, I say that while this
|
||
may be true, at least system and network managers WILL have a
|
||
reference for this information where currently there is none. Just
|
||
think, the formation of an ITRVD may lead to vendors actually shipping
|
||
a document that describes the known vulnerabilities of their systems
|
||
to their customers. Sort of like the warning from the surgeon
|
||
General's warning on alcohol and tobacco products?
|
||
|
||
(2) Of note here is the Defense Advanced Research Projects Agency's
|
||
(DARPA) Computer Emergency Response Team (CERT). While these
|
||
consummate professionals do an excellent job of distributing incident
|
||
and vulnerability-related information to the Internet community, not
|
||
nearly enough is being done.
|
||
|
||
(3) While it is clear that there are vulnerabilities which affect many
|
||
vendors, there is evidence to suggest that some vendors in the
|
||
incident response community don't acknowledge those reports by other
|
||
vendors which clearly affect their own systems - let alone reporting
|
||
all of the vulnerabilities of their own systems.
|
||
|
||
(4) References available if you'd like them.
|
||
|
||
(5) There most certainly are ITVRDs currently being maintained in
|
||
various places.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.48
|
||
************************************
|
||
|
||
|
||
|