726 lines
30 KiB
Plaintext
726 lines
30 KiB
Plaintext
|
|
Computer underground Digest Thu July 30, 1998 Volume 10 : Issue 43
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #10.43 (Thu, July 30, 1998)
|
|
|
|
File 1--One Planet, One Net: CPSR, October '98
|
|
File 2--Proposed Rules Issued for National Identity Card (Epic 510)
|
|
File 3--Are We All Petty Bureaucrats?
|
|
File 4--Senate Makes Stealth Assault on Internet Free Speech
|
|
File 5--REVIEW: "Virtual Private Networks", C. Scott/P. Wolfe/Mik
|
|
File 6--Cu Digest Header Info (unchanged since 25 Apr, 1998)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 21 Jul 1998 17:48:08 -0000
|
|
From: sevoy@quark.cpsr.org
|
|
Subject: File 1--One Planet, One Net: CPSR, October '98
|
|
|
|
Please feel free to forward where appropriate, and excuse any
|
|
mulitple postings.
|
|
|
|
Please note the complimentary conference registration for
|
|
representatives of the Press, and the opportunity to attend the
|
|
Wiener Award Banquet at the Computer Museum without registering
|
|
for the conference.
|
|
|
|
COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY
|
|
ONE PLANET, ONE NET:
|
|
THE PUBLIC INTEREST IN INTERNET GOVERNANCE
|
|
AN INTERNATIONAL SYMPOSIUM
|
|
|
|
OCTOBER 10-11, 1998
|
|
MASSACHUSETTS INSTITUTE OF TECHNOLOGY
|
|
MIT Building 6, Room 120
|
|
CAMBRIDGE, MA, USA
|
|
|
|
Keynote:
|
|
LAWRENCE LESSIG
|
|
Professor, Harvard Law School Law of Cyberspace, Constitutional Law
|
|
Saturday, October 10, 9:00am
|
|
|
|
***
|
|
Norbert Wiener Award Banquet and Ceremony
|
|
Saturday, October 10, 7:30-11:30pm
|
|
The Computer Museum
|
|
Boston, MA, USA
|
|
|
|
Norbert Wiener Award:
|
|
Presented to the INTERNET ENGINEERING TASK FORCE (IETF)
|
|
for the exceptionally open and democratic process with
|
|
which it has effected the evolution of the Internet.
|
|
|
|
Norbert Wiener Award Keynote:
|
|
EINAR STEFFERUD
|
|
Internet pioneer;
|
|
Founder, Network Management Associates & First Virtual
|
|
"Internet Paradigms & Their Consequences for Society"
|
|
***
|
|
|
|
|
|
The explosive growth of the Internet, combined with rapid
|
|
globalization and the convergence of major telecommunications
|
|
services, has strained current methods for administering the Net.
|
|
New organizations are coalescing to take on the tasks
|
|
of Internet governance, while traditional organizations try to
|
|
redefine their relationship to emerging electronic networks.
|
|
|
|
As this new system is shaped, the public risks losing to corporate
|
|
and government dominance of the discussions. The debate concerning
|
|
who administers the Internet and how that administration is achieved
|
|
will have enormous social implications, affecting access to information,
|
|
privacy rights, and freedom of speech for the population at large.
|
|
|
|
CPSR's international symposium, "One Planet, One Net," will bring
|
|
together concerned computer professionals, Internet experts, and
|
|
corporate, nonprofit, academic and governmental leaders to define the
|
|
public interest and set the stage for an advocacy coalition, to make sure
|
|
the public voice is heard.
|
|
|
|
|
|
|
|
Panels and Interactions
|
|
Saturday, October 10, 9:00am-6:00pm
|
|
|
|
Public Interest in the Age of the Behemoth
|
|
|
|
The increasing dominance of large corporations over the
|
|
infrastructure of the Internet raises serious questions about
|
|
whether the broader public's interests will be met in this era of
|
|
deregulation and globalism. While the Internet is praised as the
|
|
place where the little voice can get a hearing, the Internet may
|
|
well change under corporate pressure coming from many directions.
|
|
|
|
Telephone companies and cable TV companies are starting to offer
|
|
Internet service that small providers cannot match. Major
|
|
content-providers are changing copyright law in ways that affect
|
|
the Internet. Many new technologies are shaped by the advertising
|
|
and commerce-oriented interests of corporate sites. Finally,
|
|
commercial "portals" pose as value-free conveniences while
|
|
actually selecting content. How do such trends affect the
|
|
experience of the average Internet user?.
|
|
|
|
|
|
Panic over Privacy: A Case Study in Regulation
|
|
|
|
Everyone agrees that something has to be done to ensure the
|
|
privacy of Internet users' personal data. What roles do market
|
|
forces, laws and regulation, and advances in technology play in
|
|
securing our privacy rights?
|
|
|
|
Governments world-wide are struggling to find solutions that fit
|
|
their needs. Privacy discussions in the United States range from
|
|
free-market self-governance to the privacy advocates' demands for
|
|
strong privacy legislation. Two weeks after this symposium, the
|
|
European Union nations are required to have laws in place that
|
|
prevent the transfer of data to countries without "adequate
|
|
privacy protections." What progress is being made in resolving
|
|
different views of privacy solutions?
|
|
|
|
|
|
Universal Access: A Global Perspective
|
|
|
|
The importance of the Internet for personal communication,
|
|
information access, and commercial competitiveness means that
|
|
those who are connected to the Net will encounter greater
|
|
opportunity than the "have-nots." But different communities, some
|
|
unable to provide even basic food, water, and health care, must be
|
|
viewed differently when we try to meet their information needs.
|
|
|
|
What services should be universal, and how might tools,
|
|
technologies, and processes benefit nations in varying degrees of
|
|
development?
|
|
|
|
|
|
Convergence and the Internet's Future: Avoiding the Tragedy of the
|
|
Commons
|
|
|
|
What are the goals of a global information infrastructure? We
|
|
will discuss some of the ways in which the Internet, telephony,
|
|
television, and other media are converging, with a view toward
|
|
understanding the impact of convergence on regulation,
|
|
technological innovations, and user activity.
|
|
|
|
Panelists will look at implications for grass-roots participation
|
|
and democratic influences. How do we create channels for popular
|
|
commercial fare and yet leave space for divergent voices? What
|
|
scalability issues will arise as the Internet grows several orders
|
|
of magnitude?
|
|
|
|
|
|
Action and Coalition
|
|
Sunday, October 11, 9:00am-12noon
|
|
|
|
Our goal is to create a coalition of activists, community members,
|
|
political leaders, educators, and socially responsible business
|
|
leaders who will work together to draft an action plan
|
|
representing the public interest in the development of a new order
|
|
of Internet governance. Join us at MIT and help shape the future
|
|
of the Internet.
|
|
|
|
|
|
Banquet and Award Ceremony at the Computer Museum
|
|
Saturday, October 10, 7:30-11:30pm
|
|
|
|
CPSR's prestigious Norbert Wiener Award for Social Responsibility
|
|
in Computing Technology will be presented to the Internet
|
|
Engineering Task Force (IETF). CPSR recognizes the IETF for the
|
|
exceptionally open and democratic process with which it has
|
|
effected the evolution of the Internet. Join with members of the
|
|
Internet Society (ISOC), the IETF, and CPSR. The festivities
|
|
include a keynote talk by the Internet pioneer Einar Stefferud.
|
|
|
|
Boston's incredible Computer Museum is the venue for this
|
|
magnificent evening. We will have exclusive use of the museum.
|
|
Admission will include dinner, a private party at the Computer
|
|
Museum, and an evening with many of the brightest stars in the
|
|
world of technology. Tickets may be purchased without registering
|
|
for the conference.
|
|
|
|
|
|
CPSR joins with the Free Software Foundation as they present FSF's
|
|
first annual Awards for the Advancement of Free Software Friday,
|
|
October 9, 7:00 pm
|
|
|
|
|
|
CPSR ANNUAL MEETING
|
|
Sunday, October 11, 3-6:00 pm
|
|
|
|
Free and open to everyone
|
|
|
|
|
|
Travel and Hotels
|
|
United Airlines is the official airline of the conference. For a
|
|
discount rate, call 800-521-4041 and refer to meeting ID code
|
|
542ZC. (If you purchase your tickets at least 60 days in advance,
|
|
there is an additional 5 percent discount.)
|
|
|
|
CPSR has reserved a block of rooms at The Buckminster Hotel, 645 Beacon
|
|
Street in downtown Boston,across the river, but about a 20-minute ride from
|
|
the campus. It is near the Kenmore Square subway station. Rates are $109
|
|
queen. $119 king, and $129 for a suite, plus 12.5% tax.
|
|
To reserve, call by September 8. Call 800-727-2825 or 617-236-7050,
|
|
ask for Group Sales, and refer to the CPSR reservation number 17370.
|
|
|
|
MIT visitor information http://web.mit.edu/visitor-info.html
|
|
|
|
|
|
Conference committee
|
|
Aki Namioka, Andy Oram, Coralee Whitcomb, Craig Johnson,
|
|
Duff Axsom, Harry Hochheiser, Karen Coyle, Nathaniel Borenstein,
|
|
Susan Evoy, Tom Thornton, Willie Schatz
|
|
|
|
|
|
Sponsor
|
|
MIT Communications Forum/Media in Transition Project
|
|
|
|
|
|
Foundation Support
|
|
This Symposium is sponsored in part by a grant from the Open Society Institute.
|
|
|
|
|
|
Corporate Sponsors
|
|
Internet Travel Network
|
|
Interval Research Corporation
|
|
Pacific Bell
|
|
|
|
|
|
Cosponsors (list in progress)
|
|
Adult Literacy Resource Institute
|
|
American Computer Foundation
|
|
Answer Channel
|
|
Boston Neighborhood Networks
|
|
Center for Civic Networking
|
|
CIO Magazine
|
|
CTCNet
|
|
Corporation for Public Broadcasting/WGBH/
|
|
National Center for Accessible Media
|
|
Data Security Systems
|
|
Electronic Frontier Foundation--EFF
|
|
Electronic Privacy Information Center--EPIC
|
|
Free Software Foundation
|
|
Innovation Network
|
|
Internet Society--ISOC
|
|
Mandela Learning Center
|
|
Massachusetts Commission for the Blind
|
|
MASSPIRG
|
|
My Bookworm
|
|
National Writers Union--UAW Local 1981
|
|
ReTech America
|
|
|
|
|
|
Check in at http://www.cpsr.org/ for updates.
|
|
|
|
*****************************************************************
|
|
|
|
Registration (Space is limited, so register early.)
|
|
|
|
Name ____________________________________________________
|
|
|
|
Address __________________________________________________
|
|
|
|
City______________________ State ____Country ______ Zip _______
|
|
|
|
Telephone ( )______________ Email _________________________
|
|
|
|
Company/School Name ______________________________________
|
|
|
|
Payment method: Check__ Visa __ MasterCard __
|
|
|
|
Card# ___________________________ Exp Date ______
|
|
|
|
|
|
Early (received by 9/26) Later or On-Site
|
|
Member of CPSR or
|
|
cosponsoring organization______________ $ 75 $ 90
|
|
|
|
Non-member $100 $115
|
|
|
|
New or Reactivating CPSR member and registration $110 ($10 more) $125
|
|
|
|
Low income participant or Student with ID $ 30 $ 35
|
|
|
|
Low income participant or Student member and reg $ 40 ($10 more) $ 45
|
|
|
|
Media Representative
|
|
from _______________________ - -
|
|
|
|
|
|
Wiener Award Gala with conference registration $ 40 $ 50
|
|
without conference registration $ 60 $ 80
|
|
|
|
Donation to further CPSR's work $____
|
|
|
|
TOTAL ENCLOSED $ ____
|
|
|
|
A limited number of scholarships are available.
|
|
Contact CPSR for information.
|
|
|
|
Send completed registration form with payment to:
|
|
CPSR, PO Box 717, Palo Alto, CA 94302.
|
|
|
|
Or register on the World-Wide Web at http://www.cpsr.org/
|
|
|
|
CHECK IN AT HTTP://WWW.CPSR.ORG/ FOR DETAILS AND UPDATES.
|
|
|
|
> --
|
|
> Susan Evoy * Deputy Director
|
|
> http://www.cpsr.org/home.html
|
|
> Computer Professionals for Social Responsibility
|
|
> P.O. Box 717 * Palo Alto * CA * 94302
|
|
> Phone: (650) 322-3778 * Fax: (650) 322-4748 *
|
|
> Email: evoy@cpsr.org
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 20 Jul 1998 18:18:18 -0400
|
|
From: EPIC-News List <epic-news@epic.org>
|
|
Subject: File 2--Proposed Rules Issued for National Identity Card (Epic 510)
|
|
|
|
Published by the
|
|
Electronic Privacy Information Center (EPIC)
|
|
Washington, D.C.
|
|
|
|
http://www.epic.org
|
|
|
|
|
|
The U.S. Department of Transportation (DOT) issued a notice on
|
|
June 17 that would effectively turn state drivers' licenses into
|
|
national identity cards. The proposed rule would require that all
|
|
states modify their drivers' licenses to create a uniform national
|
|
drivers' license. It would prohibit government agencies from
|
|
accepting any identification besides the authorized identity card.
|
|
|
|
The proposed rule would also encourage states to include the
|
|
persons' Social Security Number either in written form on the face
|
|
of the license or in electronic form of all drivers' licenses. If
|
|
a state does not wish to include the SSN on the license, it must
|
|
minimally require every license applicant to provide the number.
|
|
State agencies would be required to send every such SSN to the
|
|
Social Security Administration for review.
|
|
|
|
The DOT is basing its rule on provisions in the Illegal
|
|
Immigration Reform and Immigrant Responsibility Act of 1996.
|
|
Reps. Ron Paul (R-TX) and Bob Barr (R-GA) have introduced H. R.
|
|
4217, the Freedom and Privacy Restoration Act of 1998, which would
|
|
repeal the immigration act's provisions on identification. It
|
|
would also prohibit federal agencies from "accept[ing] for any
|
|
identification-related purpose an identification document, if any
|
|
other Federal agency accepts such document for any such purpose."
|
|
|
|
More information on the proposed rule is available at:
|
|
|
|
http://www.epic.org/privacy/id-cards/
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 9 Jul 1998 13:51:17 -0400
|
|
From: Stephen Talbott <stevet@MERLIN.ALBANY.NET>
|
|
Subject: File 3--Are We All Petty Bureaucrats?
|
|
|
|
NETFUTURE
|
|
Technology and Human Responsibility
|
|
|
|
Issue #74 Copyright 1998 Bridge Communications July 9, 1998
|
|
Editor: Stephen L. Talbott (stevet@oreilly.com)
|
|
|
|
On the Web: http://www.oreilly.com/~stevet/netfuture/
|
|
You may redistribute this newsletter for noncommercial purposes.
|
|
|
|
|
|
Are We All Petty Bureaucrats? -----------------------------
|
|
|
|
I've been devoting much of my "spare time" during these past
|
|
several weeks to bringing up Linux side by side with Windows 95 on
|
|
my new PC. It's a struggle. Between the Linux installation
|
|
itself (my first time), hardware incompatibilities, network
|
|
configuration (TCP/IP, PPP, UUCP, dial-in, dial-out, kermit, and
|
|
so on), X Window configuration (with an unfamiliar window
|
|
manager), disk re-partitioning, and a seemingly endless queue of
|
|
inter-linked challenges -- well, for someone who's managed cleanly
|
|
to avoid PCs and Microsoft until now, and whose UNIX system
|
|
administration skills are more rusty than they ought to be, it's
|
|
been an unsettling time. My sleep has often been disturbed --
|
|
especially when I make the mistake of wrestling with a computer
|
|
problem late into the evening.
|
|
|
|
Of course, there are also great satisfactions when some of the
|
|
pieces finally come together. It was at just such a moment that I
|
|
got to thinking about what I was doing and how I was feeling. I
|
|
realized that my struggles and victories are those of the
|
|
stereotypical petty bureaucrat: I spend my days getting long rows
|
|
of in-boxes properly hooked up to the corresponding out-boxes;
|
|
making sure every action is part of a correct, overall procedure;
|
|
defining, codifying, logging, and verifying; reducing everything
|
|
to precise predictability; and then taking great pleasure when all
|
|
the parts move, lockstep, exactly according to plan.
|
|
|
|
I don't mean to denigrate this pleasure. It plays a legitimate
|
|
part in the human psyche. We *need* a principle of order to be at
|
|
work in all that we do. The problems arise only when that
|
|
principle becomes one-sided, no longer balanced by imaginative
|
|
freshness, inner flexibility, and a habit of revisioning our
|
|
activities. The computer, whose own functioning must always be
|
|
"strictly according to specifications", is, I would argue, a
|
|
powerful influence toward imbalance. The rigidities we encounter
|
|
globally -- for example, in the Year 2000 Problem -- are, in other
|
|
forms, a dominant feature of our daily, bureaucratic interaction
|
|
with our own computers. By now we routinely accept them. We
|
|
build our relationships to the world upon these bureaucratically
|
|
correct procedures, scarcely aware of the constraints.
|
|
|
|
But the level of functioning described above is not the only one.
|
|
Step down a level, for example, and you will find yourself
|
|
laboring in an even more obviously mechanical fashion, keystroke
|
|
by determinate keystroke, click by determinate click. It's a
|
|
world of fixed mappings from action to result. Putting it in
|
|
different words: the voice with which we speak the modern world
|
|
into being is increasingly a synthesized voice. The immediate
|
|
physical and gestural elements from which we construct our online
|
|
selves are as resistant to the ancient qualitative and expressive
|
|
power of the word as the bureaucrat's blank face.
|
|
|
|
Does it make a difference that you and I must interact with each
|
|
other by building upon a foundation of mechanical keystrokes and
|
|
bureaucratic procedures? The easiest way to answer that is to
|
|
imagine carrying on your relationship with your spouse or best
|
|
friend exclusively by choreographing a set of fixed, predefined
|
|
gestures. Yes, it can be done; in the choreographing, at least,
|
|
there is a degree of freedom. But the more rigidly the materials
|
|
with which we must work have been predefined, the more powerfully
|
|
creative we must become in imposing our own meanings upon them.
|
|
|
|
You may be thinking: "The typewriter, too, required us to
|
|
communicate with mechanical keystrokes; did that warp our
|
|
personalities?" The point is an important one, and you might have
|
|
added mention of our communication through the printing press, and
|
|
even the development of the alphabet and writing. Each of these
|
|
involved a step in the mechanization of human expression and in
|
|
the detachment of the word from the living, present speaker.
|
|
|
|
One consequence of this was that the writer (and I suspect even
|
|
more the typist) was freed to project various styles or personas
|
|
of his own invention. Of course, one could also learn to do this
|
|
in face-to-face presentation, but when we write there is less work
|
|
in "putting on the act" -- we don't need to *live* the new style
|
|
with quite the same intensity. Our entire physical organism does
|
|
not become a vibrating, resonant instrument of our expression, as
|
|
it does when we speak and gesture.
|
|
|
|
It is notorious, of course, that the computer carries the
|
|
opportunity for creation of artificial selves much further. And
|
|
my point is not to decry this freedom but rather to point out that
|
|
it must be *exercised*. The problem arises when, instead of
|
|
grasping our freedom and becoming deeply, fully, with profound
|
|
moral commitment, *who we are*, we allow the freedom to become
|
|
mere arbitrariness and artificiality. Behind the various poses,
|
|
there remains a blank. Then the machinery conducing to our
|
|
freedom substitutes for our missing selves and enslaves us.
|
|
|
|
What the bureaucrat too readily forgets -- that the regulations
|
|
were made for man and not man for the regulations -- is even
|
|
harder to keep in mind when the bureaucratic machine he oversees
|
|
is a machine pure and simple. It's no accident of terminology
|
|
that our computers execute "programs" compounded of correct
|
|
"procedures" -- or that they are uncompromising in their rejection
|
|
of syntax errors. They challenge us, in effect: either you
|
|
embrace the yet untapped power in your selves to transcend our
|
|
syntax, or else you will become a pawn of the syntax.
|
|
|
|
Unfortunately, we already have a history of passive submission to
|
|
the narcosis of television, and throughout our society we continue
|
|
to honor and employ the black arts of unconscious manipulation,
|
|
otherwise known as marketing. It is not clear where we will find
|
|
the resources to assert ourselves against the forces from beneath
|
|
that are training us to become bureaucrats and sleepwalkers.
|
|
|
|
As for me, I stayed up late last night helping my wife figure out
|
|
how to create a complex table in Microsoft Word, which I was using
|
|
for the first time. Then, sleeping only fitfully, I dreamed of
|
|
merging and splitting endless rows and columns without, however,
|
|
getting any closer to my goal, which had somehow disappeared from
|
|
sight. I hope these are not the dreams our future is made of.
|
|
|
|
=========
|
|
NETFUTURE is a newsletter and forwarding service dealing with technology
|
|
and human responsibility. It is hosted by the UDT Core Programme of the
|
|
International Federation of Library Associations. Postings occur roughly
|
|
once every week or two. The editor is Steve Talbott, author of "The
|
|
Future Does Not Compute: Transcending the Machines in Our Midst".
|
|
|
|
You may redistribute this newsletter for noncommercial purposes. You may
|
|
also redistribute individual articles in their entirety, provided the
|
|
NETFUTURE url and this paragraph are attached.
|
|
|
|
Current and past issues of NETFUTURE are available on the Web:
|
|
|
|
http://www.oreilly.com/~stevet/netfuture/
|
|
http://www.ifla.org/udt/netfuture/ (mirror site)
|
|
http://ifla.inist.fr/VI/5/nf/ (mirror site)
|
|
|
|
To subscribe to NETFUTURE, send an email message like this:
|
|
To: listserv@infoserv.nlc-bnc.ca
|
|
subscribe netfuture yourfirstname yourlastname
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 29 Jul 1998 10:45:26 -0400
|
|
From: "EPIC-News List" <epic-news@epic.org>
|
|
Subject: File 4--Senate Makes Stealth Assault on Internet Free Speech
|
|
|
|
Source = EPIC - Volume 5.11 July 29, 1998
|
|
--------------------------------------------------------------
|
|
|
|
Published by the
|
|
Electronic Privacy Information Center (EPIC)
|
|
Washington, D.C.
|
|
|
|
http://www.epic.org
|
|
|
|
[1] Senate Makes Stealth Assault on Internet Free Speech
|
|
|
|
Without advance notice or public discussion, the U.S. Senate last week
|
|
approved three controversial measures that could adversely impact free
|
|
expression on the Internet. By offering the provisions on the Senate
|
|
floor as amendments to the $33 billion appropriations bill for the
|
|
Commerce, State and Justice departments (S. 2260), the sponsors avoided
|
|
debate and apparently reneged on an agreement to consider alternative
|
|
approaches to the complex issue of children's access to "inappropriate"
|
|
material.
|
|
|
|
The Senate's stealth action involved the following measures:
|
|
|
|
- The so-called "CDA 2" bill sponsored by Sen. Dan Coats (R-IN). The
|
|
bill creates criminal penalties for anyone who "through the World Wide
|
|
Web is engaged in the business of the commercial distribution of
|
|
material that is harmful to minors" and fails to "restrict access to
|
|
such material by persons under 17 years of age." Opponents of the bill
|
|
contend that it, like the unconstitutional Communications Decency Act,
|
|
would restrict the ability of adults to receive online information
|
|
because speakers on the Internet are unable to determine the age of
|
|
potential recipients.
|
|
|
|
- The "Internet School Filtering Act" sponsored by Sen. John McCain
|
|
(R-AZ). The bill requires schools and libraries receiving federal
|
|
Internet subsidies to install software "to filter or block matter
|
|
deemed to be inappropriate for minors." Senate opponents of the
|
|
filtering bill, led by Sen. Conrad Burns (R-MT) had been assured that
|
|
the Senate would consider an alternative measure requiring schools and
|
|
libraries to adopt Internet "acceptable use policies." That agreement
|
|
was not honored.
|
|
|
|
- An amendment offered by Sen. Christopher Dodd (D-CT) requiring
|
|
Internet access providers to, "at the time of entering into an
|
|
agreement with a customer for the provision of Internet access
|
|
services, offer such customer (either for a fee or at no charge)
|
|
screening software that is designed to permit the customer to limit
|
|
access to material on the Internet that is harmful to minors."
|
|
|
|
The Internet provisions of the appropriations bill must now be
|
|
considered by a House-Senate conference committee that will reconcile
|
|
discrepancies between the two chambers' versions of the spending bill.
|
|
The Coats and McCain provisions are likely to be challenged in court if
|
|
they emerge from the conference committee and are signed into law.
|
|
|
|
The text of the Internet-related amendments to S. 2260 (including a
|
|
prohibition on Internet gambling) are available at:
|
|
|
|
http://www.epic.org/free_speech/censorship/sen_amend_7_98.html
|
|
|
|
=======================================================================
|
|
Subscription Information
|
|
====================================================
|
|
|
|
The EPIC Alert is a free biweekly publication of the Electronic
|
|
Privacy Information Center. To subscribe or unsubscribe, send email
|
|
to epic-news@epic.org with the subject: "subscribe" (no quotes) or
|
|
"unsubscribe". A Web-based form is available at:
|
|
|
|
http://www.epic.org/alert/subscribe.html
|
|
|
|
Back issues are available at:
|
|
|
|
http://www.epic.org/alert/
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 30 Jul 1998 10:41:22 -0800
|
|
From: Rob Slade <rslade@sprint.ca>
|
|
Subject: File 5--REVIEW: "Virtual Private Networks", C. Scott/P. Wolfe/Mik
|
|
|
|
BKVRPRNT.RVW 980524
|
|
|
|
"Virtual Private Networks", Charlie Scott/Paul Wolfe/Mike Erwin, 1998,
|
|
1-56592-319-7, U$29.95/C$42.95
|
|
%A Charlie Scott
|
|
%A Paul Wolfe
|
|
%A Mike Erwin
|
|
%C 103 Morris Street, Suite A, Sebastopol, CA 95472
|
|
%D 1998
|
|
%G 1-56592-319-7
|
|
%I O'Reilly & Associates, Inc.
|
|
%O U$29.95/C$42.95 800-998-9938 fax: 707-829-0104 nuts@ora.com
|
|
%P 200 p.
|
|
%T "Virtual Private Networks"
|
|
|
|
Large corporations can afford to set up high bandwidth communications
|
|
links between local, national, and even international offices, as well
|
|
as hiring the staff necessary to manage major networks. This keeps
|
|
internal information (relatively) secure. Small to mid-sized
|
|
companies can't afford this infrastructure, and so must use the links
|
|
of the public networks, such as the Internet. However, there are ways
|
|
of using public networks while still keeping communications private.
|
|
|
|
Chapter one looks at the needs (both economic and security related)
|
|
for a virtual private network (VPN), and the basic technologies used
|
|
to provide for those needs. Some of these technologies are expanded
|
|
upon in chapter two. The discussion of cryptography is fairly minimal
|
|
(not really covering, for example, key management issues) but the
|
|
descriptions of different types of firewalls is excellent. The VPN is
|
|
compared against Wide Area Network (WAN) and remote access options for
|
|
a variety of company sizes and scenarios in chapter three. Chapter
|
|
four outlines a case study for a medium sized business designing a
|
|
VPN.
|
|
|
|
The specifics of VPN technologies start in chapter five with an
|
|
examination of the Point to Point Tunneling Protocol (PPTP). Various
|
|
details of PPTP are given, but the explanation of connections over the
|
|
Internet are not well presented. Chapter six walks the reader through
|
|
PPTP configuration for a Windows NT RAS server as well as NT and
|
|
Windows 95 clients, and the Ascend MAX 4004 switch. The AltaVista
|
|
Tunnel is described, with advantages, disadvantages, and an enormous
|
|
variety of configuration options, in chapter seven. Actual
|
|
configuration is covered in chapter eight, along with troubleshooting
|
|
and management information. Conceptually the same, operation of the
|
|
Cisco PIX Firewall is different because of its hardware basis,
|
|
examined in chapter nine.
|
|
|
|
The maintenance and management of a VPN can have the complexity and
|
|
problems of remote access, a WAN, and an ISP (Internet Service
|
|
Provider). Chapter ten is brief, but does point out a number of the
|
|
more serious issues to consider. Appendix A looks at some emerging
|
|
technologies that may bear on VPNs.
|
|
|
|
While the material is not exhaustive, this book does provide a clear
|
|
overview of the issues to be dealt with in setting up a virtual
|
|
private network.
|
|
|
|
copyright Robert M. Slade, 1998 BKVRPRNT.RVW 980524
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 25 Apr 1998 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 6--Cu Digest Header Info (unchanged since 25 Apr, 1998)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
CuD is readily accessible from the Net:
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #10.43
|
|
************************************
|
|
|