💾 Archived View for spam.works › mirrors › textfiles › hacking › issm201.hac captured on 2023-11-14 at 09:54:40.
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
The Information Systems Security Monitor _______ /--------\ /--------\ \ /| | | | | \ / | | | | | \ / | | \_______ \_______ | \ | | \ \ | | | | | | | | | | | | | \________/ \________/ | | ------- Dedicated to the pursuit of security awareness............ ================================================================= Volume 2 Number 1 January 1992 ================================================================= ////////////////////// In this Issue \\\\\\\\\\\\\\\\\\\\\\\\\\\ One Nerd's Approach to Computer Security What did Clyde say? Digital Signatures Still A Mystery to Many in Government Cyberspace Dear Clyde Computer Speak Virus Fighters \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\////////////////////////////////// ONE NERD'S APPROACH TO COMPUTER SECURITY Hi, my name is Bill Strouse and I'm a NERD (Network Emergency Repair Dude). I've been a Sysop or systems operator now for better than a decade and I've learned a great deal about human nature and security in general. Back in 1980 it dawned on me that if I connected a modem to my computer I could access it from anywhere I happened to be. But I would have to have some sort of security or others would be accessing it, possibly in a destructive way. The solution I decided on was to setup a bulletin board system that used a combination of a unique name and password for each caller to control what that caller had access to. Once I got the system working I found it was a great way to keep in touch with friends that also had modems and an even better way to get answers on technical problems. Plus the latest PD (public domain) software regularly showed up on my hard disk. I publicized the number in electronic lists that were distributed worldwide and was soon getting calls from all over the continent and foreign countries like Sweden, England and Australia. I soon had one of the best collections of PD software in the country and the phone line was in constant use day and night. Along with all the great people I met there were always those few who had nothing better to do than try to destroy or disrupt what others had built. One of the first things I learned was not to allow just anyone the ability to leave public electronic mail. Kids would call and leave grossly obnoxious public messages with all sorts of foul language. We devised a system whereby a caller could only leave a message to the Sysop on the first call then we would call them back voice and verify who they were. Most importantly we had verified they were connected to a legitimate phone number which could be traced to a physical location and person. After verification their security level was raised so they had full access and an hour of system time a day. One of the next lessons I learned was not to allow anyone to upload a program they could then execute on the system. A friend, who continually worked at busting the security to see if he could find holes uploaded a game with a hidden copy of BASIC embedded in the program. When he ran the program online he could issue a control code and jump to the interpreter which allowed him to walk all over the security like it didn't exist! After that all files were uploaded to a private area no one but the Sysop had access to till they were thoroughly inspected. By 1985 I had so many people asking for help with computer related problems I went into business for myself as a VAR, or Value Added Reseller. Someone who not only sells you the goods but sticks around and makes them work for you. Not long after that networking looked like it might be the wave of the future. Since a network was a shared resource, similar in nature to a bulletin board system and even used a name and password for security I was right at home. And I learned even more about security. Number one. The weakest link in security is the employee using the computer! They put their password on a sticky note and paste it on their monitor so they don't forget; loan their account to fellow employees; use passwords such as "secret", "love", or their social security account number (every 14 year old wanna-be hacker has the list of most commonly used passwords). They go to lunch and leave their workstation logged into accounting records, bring in new (virus infected) programs they want to use at work and just generally gum up the (security) works. A good employee security education program is worth its weight in gold. And, security must be physical as well as electronic. I read a book about a group of young hackers (Inner Circle) that could not gain access to a mainframe because the security was well designed so they posted a kid in the lobby of the company with a questionnaire. He passed himself off as a high school student who had been given an information gathering assignment as a school project. Some of the questions asked were "What is your first and last name", "Do you use a computer at work", "Are you married", "What's your wife's name". Needless to say they were into the system within days. Mainframe managers are somewhat aware of this and protect their iron (computers) from anyone without proper authority but most of the LANs (Local Area Networks) I've worked with are in an area that's easily accessible by anyone. Remember, something as simple as a cup of coffee, or a boot disk with the proper utilities in the hands of a disgruntled stockboy can turn your data into random 1s & 0s and truly ruin your day, if not your career. The system I run is called The Ring of Fire after the tectonic plate we live on the edge of here in California. Over time it has grown to four (4) phone lines and over 350 megabytes of downloadable software packages and graphics images. There are well over 1,000 regular callers and the system averages about 3,000 calls a month but the electronic mail is where the real action is. The E-mail is shared with other similar computer systems all over the US and some foreign countries. Callers can leave a message in a conference and it will show up on other systems all over the country. Replies are automatically routed back to the originator and show up as return mail addressed to that person. Thus, callers can converse with a large number of diversely scattered individuals at minimal cost (usually a free local phone call). To further reduce online time we support SLMR off-line mail reader. With it you can download a compressed mail packet of pre-specified conferences then read and reply off-line with a full screen editor and upload a compressed set of replies. All of this runs on a Novell network that spans several computers and large hard disks, a read/write CD, Fax server AND all of our inhouse workstations. Hopefully, I'll see you online and we can continue this as an interactive discussion ;-). Author bio: Bill Strouse has been a systems analyst for more than twenty years now and has worked as a con- sultant for IBM, Amdahl, Ford Aerospace and Stanford University's SLAC (Stanford Linear Accelerator). Bill Strouse has been telecommuting since 1980 when he started his first electronic bulletin board service, back in the CP/M days. He has been the system operator ever since and current ly has one of Silicon Valley's most popular boards, the Ring-of-Fire, at 408-453-3326 and 408-453-2460. He was President of PRACSA (Public Remote Access Computer Standards Association) for many years before leaving three years ago to found and become President of United Sysop's Association, an organization of bulletin board system operators and users. Mr. Strouse is a president of Stoney River Net- works, an authorized Novell Reseller. His com- pany has installed many remote communication sys- tems for various clients. He is also President and Co-founder of the Silicon Valley Novell User Group and serves on the Board of the Northern California Netware User's Association. Bill is also the editor of NetWare News, the newsletter of the California Netware Users Association. -------------------------End of Article--------------------- WHAT DID CLYDE SAY? It's been brought to our attention that everyone that reads the ISSM isn't always well versed in computer terminology. Well, in an effort to remedy that situation we will be providing an article called "Computer Speak", starting in this issue, that will be devoted to getting every reader to understand computer jargon. We appreciate hearing from our readers about any items or topics that they would like to see appear in the ISSM. So let's keep hearing from you. Just drop a note to Clyde or call. -------------------------End of Article--------------------- DIGITAL SIGNATURES STILL ARE MYSTERY TO MANY IN GOVERNMENT By Darryl K. Taft A fight has erupted over the government proposal of a new standard for digital signatures, and questions remain as to just what a digital signature and public-key encryption actually are. The National Institute of Standards and Technology has proposed a standard for digital signatures that would securely verify a message sender's identity. Miles Smid, manager of the security technology group in NIST's Computer Systems Laboratory, defined a "key" as a binary number used with an algorithm to encipher or decipher data. Public-key encryption requires the use of a matched pair of such keys for each user, one that is publicly known and one that is private and known only to the user. More traditional data encryption methods, like the government's Data Encryption Standard (DES), require only one key to encipher and decipher data. Under the old method, "if I were to scramble a message with my secret key, the only way you could descramble it would be to use my key," Smid said. DES requires exchanging secret encryption keys with each party, thus requiring prior relationships. However, rather than using the same key to both encrypt and decrypt the data, public-key encryption uses a matched pair of encryption and decryption keys. Each key performs the inverse function of the other. Thus, a user makes his public-key publicly available, perhaps via a directory or certifying authority, and keeps his private key secret. To send a private message, an originator scrambles his entire message using his intended recipient's public key. Once this is done, the message can only be decoded with the recipient's private key. Inversely, a sender also can work over a file using his private key, and it can only be decoded using that sender's public key. This provides the basis for the digital signature, because if you can unscramble a signature in a message with someone's public key, they had to use their private key to scramble it in the first place. The proposed standard, known as the Digital Signature Standard (DSS) is based on a digital signature algorithm (DSA) derived from a concept known as ElGamal encryption. It is intended for use in electronic mail, electronic funds transfer, electronic data interchange, software distribution, data storage and other applications that require data integrity assurance and data origin authentication. NIST, on Aug.30, proposed to adopt the DSS as a Federal Information Processing Standard (FIPS). The proposed standard specifies a digital signature algorithm based on a public key. The government's DSS is not intended to encrypt the data in a message, but primarily to authenticate. The DSS is intended to verify the author and verify the integrity of the data in the message. Public-key encryption algorithms are based upon what are known as "hard problems," Smid said. These hard problems are mathematical operations involving very large numbers. The government's proposed DSS uses one of a variety of public-key encryption algorithms, Smid said. The NIST proposal's scheme differs markedly from that of a popular encryption system from RSA Data Security Inc. of Redwood City, Calif. The difference lies in the algorithms used to encrypt and decrypt data. Smid said the RSA algorithm is based on the difficulty of factoring very large numbers. This involves finding a number that is the product of two other numbers. Breaking that system for a small number would be pretty simple, "but if I give you a large number, like 150 digits, that would be difficult. Factoring very large numbers is a difficult problem," he said. The algorithm used in the NIST proposal is based upon the difficulty of finding discrete logarithms. Essentially, this method involves finding the remainder left over when you divide one number by another one. Again, when dealing with very large numbers this becomes a very difficult problem, Smid said. Trap Doors RSA's president, D. James Bidzos, has attacked the NIST proposal as one that is not secure and that encourages trap doors. Smid said many cryptographers rate the discrete logarithm problem as more difficult or at least as difficult as the factoring method RSA uses. Ironically, Tahar ElGamal, whose work is recognized in the NIST encryption scheme, is RSA's director of engineering. "What NIST has proposed is a modification of the idea. Their algorithm is about half from my work and half from theirs. The key size is limited to 512 bits, which is questionable," ElGamal said. ElGamal added that while he believes the NIST proposal will work, he questions its security. To use the DSS, a user need only use the system with his everyday mail software. "What you'd see is the regular message under whatever mail system you have, but somewhere there would be a place for a digital value, from three to 500 bits of data. This would be the sender's signature. You'd have to have some software that would be able to pull off the signature and verify it," Smid said. Using the DSS, messages appear "in the clear," Smid said because the DSS does not account for privacy. The DSS does not encrypt the entire message, it adds an encrypted "signature" onto the message. The RSA system does allow for privacy -- with or without another encryption scheme. The RSA system lets the user "sign" a message with his private key and then add privacy by encrypting the message with the recipient's public key. In trying RSA Data Security's Mailsafe software for MS-DOS on the GCN local area network, we found it to work quickly and easily, whether a message was just "signed" or signed and "sealed." Signed and Sealed Signing the message with the sender's private key put an encrypted digital signature at the end of an openly readable message. Any person receiving the message with RSA software could verify that it had not been changed and that it came from the sender who scrambled the signature. Sealing it with the recipient's public key then scrambled the entire message so only the recipient could read it with his private key. At the receiving end, we decrypted the message first with the recipient's private key, then verified the signature with the sender's public key. Full encryption and decryption took less than five seconds each for a 10K file on AST Research Inc. Premium 386/25 computers. Varying hard-drive speeds had no measurable effect at this file size. Though all this sounds very good, it appears to be practical only in close-knit computing communities. As yet, no third-party certification authorities have been established. To use these schemes, users must be able to verify that a public-key/private- key combination fits the right person. Without a certification authority this is difficult in a large network. The U.S. Postal Service is vying to provide that service. Without certification of keys, someone could establish a key in someone else's name. The 90-day comment period for the NIST proposal ends at the end of November, but NIST probably will not formally adopt the standard until February, Smid said. The DSS would be mandatory for federal users and for private companies protecting government data, he said. Though questioning claims that the DSS is less secure than RSA's method, Smid acknowledged that the DSS lacks a necessary hashing function. A hashing function is a cryptographic algorithm used to create a message digest that is unique to each document, much like a fingerprint, said Bidzos. This function ensures the message has not changed since the sender "signed" it. However, Smid said NIST will deliver a hashing function soon. Public-key encryption is not simply a black art that just happens. "To use public-key encryption, you need a system that knows how to use it," said Robert E. Frank, project leader for electronic commerce at the Lawrence Livermore National Laboratory in Livermore, Calif. Frank heads a Defense Department funded project to move DOD to electronic commerce. One area his group has focused on is public-key encryption. The pilot system that Lawrence Livermore has developed gives users an option to use either the NIST proposal or the RSA method. "Our main objective is to provide a trusted mail capability that makes it possible for vendors and government buyers to use the security features if they want to, and to use what they're most comfortable with," Frank said. Reprinted with permission by Government Computer News, October 28, 1991, page 37. Copyright 1989, Ziff-Davis Publishing Company -------------------------End of Article--------------------- ........................................................... A journey behind (way behind) . . . . . . . . . .. . . CYBERSPACE . . .. . . . . . . . . . hackers in their illusive world . .. . . ........................................................... by Kim Clancy In the last issue of the ISSM, I explained that I would be documenting my journey behind hackers in cyberspace. Let me start by saying that cyberspace is fascinating; it is another world that quietly but actively exists. I mean ACTIVELY. I have no idea what the traffic is of electronic interactions but I can tell you that within minutes I can send a message to Japan and get a response. I can write this article in West Virginia and send it in electronic format to San Francisco. As a matter of fact, almost every guest article we have received has been sent to us through cyberspace. Within minutes of receiving the article, it is imported into the newsletter and finalized. This is a fascinating technology. The dark side of cyberspace Alas, while the technology offers major advantages, it also offers some very frightening avenues as well. What is scary to me in regard to some of the avenues is the ability for individuals to get to so many different types of information, individuals that may initially be too naive to know what they are stumbling into. I am not stating that I think information should be shielded from individuals. I am saying that turning people, children for example, loose in cyberspace may have some unpleasant results. I once went to a presentation about hackers. The presenter told a story about a mother who took her child's computer modem out into the driveway and ran over it after her son had been arrested for hacking. The presenter said that you should never let your child use a modem unattended. While hackers spend time developing their skills and learning how to master cyberspace they also use cyberspace to share information about what they have learned. Information has been found on how to steal long distance phone calls from the phone company, how to make a pipe bomb and how to perform satanic rituals before sitting down to hack. I hesitate to write the above because I don't want people to avoid the technology. Everything I have found is in most libraries, but the accessibility of it through computers makes it much easier to obtain. In an earlier issue of the ISSM, we published a code of computer ethics being used by schools throughout the nation. If you have purchased a modem for your child for Christmas, you may wish to dig that issue out and go over that with him or her. On a brighter note I thoroughly enjoy cyberspace. Cyberspace has fantastic legitimate resources and places to visit that are good for the entire family. For example, you can dial up CompuServe and get access to encyclopedias. This is a great way for a child to research a school project. The AIS Security Branch accesses numerous electronic bulletin boards(bbs) that keep us up to date on security issues and provides us with a network of security professionals. As a matter of fact, we actively participate in cyberspace by running our own bbs. There is really no way of knowing where a person will end up once he/she starts exploring cyberspace. The technology is addictive and before you know it you are constantly searching for more computers to call and more people to learn from. Cyberspace is a great world, but if you are not careful, it can carry you away. Don't ignore the technology, if you don't know about it, you are already behind. Dive in, experience it, have a great time. You will be fascinated by what you discover. -------------------------End of Article--------------------- /^\ _ /_ \_\ /\ Clyde....dedicated to the pursuit / /\ \ / \ of security ... /__/ \__\ | | @ @ ______ __ </ __ | \ \______/ / | \_______/ | DEAR CLYDE...responses to questions for those who are searching for the truth............................................. Dear Clyde, How do I select a good password? Signed, ABCDE Dear ABCDE, One method is to choose a 5 or 6 character word at random and then add 2 or more random characters to it. This should give you something relatively easy to remember with the additional characters making it more difficult to compromise. It is not a good practice to choose a word that can be associated with you. Send your comments or questions to Clyde c/o the AIS Security Branch in Parkersburg, WV, Room 1011, or leave them in Clyde's mailbox located on the Security bulletin boards located throughout the Parkersburg office. You may also leave Clyde an email message on the AIS Security Branches bbs (304-420-6083) -------------------------End of Article--------------------- //Computer Speak: Computer terms and their meanings\\ SYSOP n. The operator (and usually the owner) of a bulletin-board system. MODEM n. A device that connects a computer and a terminal via a telephone line. Short for modulator/demodulator. NETWORK n. A data communications system that allows a number of systems that allows a number of systems and devices to communicate with each other. TRAP DOOR alt. trapdoor n. A breach created intentionally in an EDP systems for the purpose of collecting, altering, or destroying data. HARDWARE n. Physical equipment used in data processing. Such as PC, disk drives, mainframe, keyboard, etc. SOFTWARE n. Computer programs, procedures, rules, and possibly associated documentation. -------------------------End of Article--------------------- ^^^^^VIRUS FIGHTERS What is a computer virus? The term "computer virus" is derived from and analogous to a biological virus. The word virus itself is Latin for poison. A computer virus is a computer program that will copy (infect) its code into the machine codes of other programs, and when those infected programs are run performing some apparently useful function, such as a login, it executes its hidden code performing an unwanted, usually malicious function. How does a computer virus work? A program infected with a virus and loaded and executing in the main memory of a computer can infect another executable (object) program in the computer's disk storage system by secretly requesting the computer's operating system to append a copy of the virus code to the object program, usually at the start. The infection makes the object program slightly longer. When the newly infected program is itself loaded into memory and invoked, the virus in it takes control and performs hidden functions, such as infecting yet other object programs. The virus may also perform destructive functions before transferring control to the original entry point. The virus code contains a marker so that the virus won't attempt to infect a program already infected by its own kind: multiple infections would cause an object file to grow ever larger, leading to easy detection. The same principle works in personal computers, where floppy disks play the role of object programs in the description above. In this case, the virus usually attacks the copy of the operating system contained on the floppy disk so that the virus is automatically invoked whenever the disk's operating system is started. Since the operating system then resides in the PC's main memory, it can infect any diskettes inserted into the PC. What can be done to protect against viruses in a computer or workstation? An additional measure of protection can be obtained by care in the way one uses a computer. Analogies with food and drug safety are helpful. Just as one would not consider purchasing food or capsules in unsealed containers or from untrusted sources, one can refuse to use any unsealed software or software from untrusted sources. Can the operating procedures followed by those who use a computer system lower the risk? Yes! The following are some procedures that would help lower the risk: . Never insert a diskette that has no manufacturer's seal into your PC. . Never use a program borrowed from someone who does not practice digital hygiene to your own standards. . Beware of software obtained from public bulletin boards. . Purchase programs that check other programs for known viruses. . Be wary of public domain software (including virus eradicators!). . Monitor the last-modified dates of programs and files. . Don't execute programs sent in electronic mail--even your friends may have inadvertently forwarded a virus. . Don't let employees bring software from home, unless it is approved and checked to be virus free by user management. What are some of the computer virus symptoms? When a strange behavior occurs, do not dismiss it as simply a bug. Instead, suspect a virus and respond accordingly - acting quickly may save your data. The following are possible symptoms of a viral infection: . Strange screen graphics or displays. . Unexpected musical tones or sound effects. . Alteration of text or commands. . Unusual behavior on reboot. . Reduction in system performance. . Unexpected disk access patterns. . Changes in file length or alteration times. . Bugs in previously reliable software. . Bad sectors on floppy disks, or unusually large numbers of bad sectors on hard disks. . Reduction in available memory. . Unexplained changes in the system clock. . Unknown, new files or directories/folders appearing on disk. . Problems in time-dependent tasks such as communications or printing. . The system will not reset or reboot. What to do if you expect a virus. . Leave the machine on! Any evidence of intrusion or infection may be lost if the machine is powered down. Turn off the machine only at the instruction of your management, your security group, or your technical support group. . If your desk-top computer is connected to any kind of network, break the network connection logically. NOTE: BPD EMPLOYEES MUST CONTACT THE COMMUNICATIONS BRANCH IN THE DIVISION OF PROGRAMS AND COMMUNICATIONS (OAIS) SO THAT THEY MAY BREAK THE PHYSICAL CONNECTION. . Let people know about your suspicions. Alert your own management. . Use your regular trouble reporting procedure to notify technical support of your problem. Additional information on viruses can be obtained from publications available in the AIS Security Branch. The information above was obtained from the publication "Computers Under Attack - Intruders, worms, and Viruses" by Peter J. Denning. -------------------------End of Article--------------------- DON'T FORGET, THE AIS SECURITY BRANCH RUNS ITS OWN ELECTRONIC BULLETIN BOARD SYSTEM(BBS). GIVE US A CALL AND LET US KNOW WHAT YOU THINK. THE NUMBER IS 304-420-6083. The ISSM is a quarterly publication of the Department of Treasury, Bureau of the Public Debt, AIS Security Branch, 200 3rd Street, Parkersburg, WV 26101, (304) 420-6363. The ISSM is also available in paper format. Let us know if you would like a copy or if you would like to download a copy of the print file. The print file can be copied to a HP II or III laser printer and you will receive a copy with all graphics and formatting. Editors: Bob Settles, Ed Alesius, Kim Clancy, Joe Kordella Downloaded From P-80 International Information Systems 304-744-2253