About
Community
Bad Ideas
Drugs
Ego
Artistic Endeavors
But Can You Dance to It?
Cult of the Dead Cow
Literary Genius
Making Money
No Laughing Matter
On-Line 'Zines
Science Fiction
Self-Improvement
Erotica
Fringe
Society
Technology
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Activist Times #35



***** ********* *******
* * * *
* * * *
********* * *
* * * *
* * * *
* * * *******

Issue #35 March 29, 1989
Happy Birthday to The Operator (201) !!

**************
** YIPPIE! **- - - - - - - - - - .
************** /
/ /
/ /
Activist Times, Inc. ATI is a
journalistic, causistic, /
/cyberpolitical /
/organization, / 4 more info?
/trying to / send SASE
/help y'all / stamps???
change the world / to:
radically, in less / ATI
than two minutes / P.O. Box 2501
...of course! / Bloomfield, NJ
- - - - - - - 07003


Note the new address! Of course..
The only difference is that your lovely
correspondence will go to yours truly,
Ground Zero.

Ok, here's some of the correspondence
we've gotten lately. Keep the feedback
coming. We love to hear from our
readers, even if it's criticism.

.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.

From: Anonymous Location: Unknown

Finally got all of ATI34... Just a few comments.

NJ Bell isn't "favoring" AT&T over the other carriers. It's merely engaging in
the common business of selling information on its customers. Name one business
that doesn't do this, I'll show you one missing out on a nice source of easy
profit.

The New Age club: is it any worse than any of the politically correct
movements (the New Age movement, that is)? A couple of days ago I went down to
the low-rent/low-iq/high-crimerate section of town and started collecting some
of the political posters. The following was taken from a flyer advertising a
feminist rally to oppose pro-lifers:
The Link Between Forced Reproduction and Forced Sterilization!
Speaker: Elizabeth Thacker from the Revolutionary Communist Youth Brigade
I won't bother with the rest; it was a paranoid ramble about how white males
were opposing abortion to force women into being sterilized as the only means
of birth control. I could give more examples, like a press statement from the
NAACP regarding a recent civil rights decion by the federal government
The New Age movement is no worse than any other mass movement; in fact, by
your standards they should be the best. Don't they show concern for the
environment, the arms race, and poverty, and believe in Universal Love and
all the other things your average 60's-leftover leftist advocates but has
enough sense not to follow.

Regarding the Tau Kappa Et advocates but has
enough sense not to follow.

Regarding the Tau Kappa Epsilon poster: was it any more frightening than the
self-righteous censorship practiced by yourself and the other campus
feminists?

Question yourself as well as others

-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-

GZ's reply: I do question myself,quite
often, in fact. You brought up a good
point about NJ Bell, which I can agree
with. However, your refernce to the
"low rent/low-iq" part of town shows
an obvious bias against the poor. And
I am all too familiar with the
Revolutionary Communist Youth Brigade,
which often takes extreme stances on
issues, but I must say that there truly
have been many instances in which the
poor have undergone forced steriliz-
ation. And you cannot deny the fact
that regular means of birth control are
not readily accessible by poor women.
If these methods were available to poor
women in the first place, there would
be little need for abortions or ster-
ilization. And as far as censorship of
the TKE posters, I believe that I have
the right to remove materials that are
both extremely offensive and, more
importantly, dangerous to women.

-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-

From: The Worm Location: 203

I enjoy reading ATI very much. Are you the originator of this magazine?

:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:

GZ's reply: No, Prime Anarchist (203)
was the originator of ATI last summer.
When he went into the Army last
November, I took over the writing and
distribution, along with Fah-Q and
The Operator (201) and our staff,
consisting of Cygnus (203) and The
Happy Hacker (412), and other occasion-
al contributors. Thanks for your
continued support!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Ok, now for something that I think
you'll enjoy. We don't have the Doc
Telecom/Raider article ready yet, so
we will grace you with an article on
UNIX which we hope you'll find very
informative. Don't flinch, just read
it. Maybe you'll learn something..

?"Striving for Unix Security" ?
? Typed in by Nightcrawler for Activist Times, Inc. ?
? Originally presented in Computerworld -- March 20, 1989 ?

Last November's well-publicized worm attack struck more than Internet's
Unix-based electronic mail system. The operating system and AT & T, its
major developer, are also suffering from the impact. Other potential
victims may be corporations and governments that have accepted Unix for
its functionality and portability.
Unix has a reputation for being insecure. But is it inherently insecure?
The question has enormous economic, political and techonological sensitivity
but it and others must be answered.
The facts are that Unix's security depends on the version of the operating
system being used, what the systems administrator has established as controls
and what pressures for security improvements develop from the government
corporations and even AT & T.
What are the security problems associated with using the Unix operating
system? How can IS best safeguard information running on Unix-based systems?
What specific approaches to improving the security of Unix systems will be
effective?

"Unix popularity"
Secure or not, there is no doubt that Unix is popular. The results of a
recent survey of Unix users indicate that the reasons for Unix's growing
popularity among users range from its portability and cost-effectiveness to
its proven success in other organizations. Certain companies have little
choice in whether to select Unix, because the software programs best suited
for their needs are often Unix-based.
According to the survey, the biggest barrier to increasing Unix usage is
the lack of trained technical expertise, the lack of compatibility and the
lack of application software. Framingham, Mass.-based market research firm
International Data Corp. has cited the lack of proven commercial and
application software performance and the standards confusion as also working
against Unix.
Interestingly, security was not mentioned once in the survey results, even
though the questions were asked in December, during the height of the publi-
city surrounding the Internet virus attack. Yet security obviously should
be a concern to the more than two-thirds of the respondents who indicated
that they were using communications links between Unix and non-Unix systems
for file transfer, terminal emulation, Transmission Control Protocol/
Internet Protocol, and E-mail.
Unix's popularity is partly because of the variety of Unix-based products
out today. But because of the independent development work that has been
done on Unix, the user is often faced with the fact that one Unix product is
not always the same as another. In reality, there are a number of Unix
versions that share only certain features and security vulnerabilities.
Unix's ready availability and portability have caused it to be the
operating system of choice for both academicians and new companies develo-
ping computer systems. Vendors that use it as the operating system for a
hardware platform tailor Unix to suit their own needs. Usually this
tailoring occurs inside the kernel.

"What is Unix, really?"
Unix is composed of a set of tools and applications that run on top of a
base, or kernel, that handles the low-level functions. The tailoring inside
the kernel would not be readily visible to users even though it may be
extensive.
For example, Unix is notorious for having a file system that is hard to
repair and maintain. Thus, some vendors completely rewrite the file system
internals in hope of improving their market edge and the stability of their
system. While that vendor's system may be better, the result is that Unix
often becomes a label on a set of services that appear to be the same to
the user but are in fact very different inside.
The University of California at Berkeley has become the center for much
of the academic development that is now the basis for one of the two major
versions of Unix available in the market -- Unix Version 4.2. AT & T's
Unix System V, whose latest release -- Version 3.2, available since last
fall -- contains major improvements in security.
The Berkeley and AT & T versions are similar in some ways, but they are
different enough to cause confusion. While many of the basic tool kits
are the same, there are enough significant differences to warrant a parti-
tioning of the market. Some vendors have chosen System V, and others have
chosen 4.2. Not all of the applications running on one system run on the
other.
The industry has recognized these problems and has, for this and other
reasons, tried to organize a "standard" Unix. There are competing organi-
zations trying to create the standard Unix, including the Open Software
Foundation (OSF), Unix International, Inc., the Institute of Electrical and
Electronics Engineers (IEEE) in association with the National Institute of
Standards and Technolog (NIST) and X/Open Consortium Ltd. The hope is that
standardization will help make the operating system more consistent and thus
more secure.
As the standardization and security certification efforts heighten, more
and more inspection of the development process and the structure of the
actual code will be required. So far, the lack of development controls has
created a potential for undesirable code to reside within the system and to
be difficult to find.
But these weaknesses may also portend Unix's greatest strength: The
operating system's very openness and the scrutiny devoted to it will make
it difficult for the bugs to remain in place forever. Since no single
vendor has control over Unix, no single vendor can control or cover up the
problems. Over the next few years, most of the unknowns in Unix hopefully
will be understood and repaired.

"Unix insecurity"
The fact remains that Unix does have many sceurity vulnerabilities that
are well known to computer and network managers. These weaknesses are also
well known to hackers, computer hobbyists and others who may be interested
in testing their technological skills. They have easy access to published
articles, Unix documentation and bulletin-board information sources on
back doors into Unix.
The Unix security problem is composed of Unix-specific and non-Unix-
specific elements. Unix-specific sceurity risks are those inherent in the
architecture of th eoperating system and therefore are not likely to
disappear from most existing Unix systems in the near future. Included in
this classification are the "superuser" user category, which provides
universal access, and the "setuid" and "setgid" system calls.
Non-Unix-specific security risks are those associated with the normal
usage of computer systems and software. On a Unix system, these can lead
to great damage because of how Unix functions. Included in this category
are the risks in having software conatin back doors or Trojan horses as
well as unsecured physical locations where networks, computer rooms,
terminals, tapes and disks can be accessed by unauthorized persons.

"Unix-specific issues"
The inherent operating qualities of Unix create a vulnerability that opens
the doors to some security attacks. For the Unix-proficient, these struc-
tures can be summarized in the superuser, setuid and setgid functions. A
user who becomes a superuser is able to remove all the security barriers that
exist within Unix. Thus, one problem deals with keeping unauthorized users
from becoming superusers. This problem is common to a variety of Unix
systems and has a rather standard set of administrative solutions.
Many of the tools and utilities in Unix need to change modes into
superuser for a brief period of time in order to reach some service that
the system calls. When properly executed, these place the program executing
them into superuser status. In most cases, such programs are well debugged
and there is little risk of decreasing the stability of the system. However,
teh existence of a mechanism that allows the garnting of unlimited privileges
to some programs can be easily exploited. The xeploitation can occur through
poor design or through maliciousness. There are many documented cases of
poorlydebugged and/or maliciously designed programs being run in this mode
and creating inadvertent or intentional damage.
In one case, an administrator wrote a program that, among other things,
allowed users store information in certain privileged directories. The
program used a file, itself in a privileged directory, to control the
directories that were to be written into. Unfortunatley, the file contained
an entry for its own directory. A user saw this and rewrote the entire file,
giving himslef the ability to write into any directory in the system. Were
he malicious, he could easily have placed viruses, Trojan horses, back doors,
or other programs in any system or user directory.
Thus, any program capable of reaching superuser status needs to be care-
fully managed and certified. In an environment that is open and free, what
often happens instead is that software can be passed from one machine to
another without proper certification. In one experiment, a researcher gave
one such maliciously designed program to a nonprivileged Unix installation
user and observed its migration to the status of a privileged program within
a few days.
Software travels quickly, and seemingly useful software travels even more
quickly. Thus, while the mechanism within Unix can be safeguarded, it is
more difficult to ensure that the people around Unix will act with the
proper caution.

"Non-Unix-specific issues"
This scenario leads to the non-Unix-realted aspects of security. There
are two popular methods for attacking a computer system -- a Trojan horse
and a back door. These two types of attacks are used in many types of
systems, not just Unix systems. A Trojan horse is a program that contains
code whose instruction is to do some kind of damage.
For all practical purposes, the program provides some useful service.
However, it also contains logic that will do something other than what the
program was intended to do. These Trojan hore programs have caused a
variety of damage, ranging from corrupting files to surreptiously sending
files across a network to someone who otherwise would not have access to
the transferred data.
A back door is similar to a Trojan horse except that it is a piece of code
that is left behind to be triggered by an outside agent. The person who
inserted the back door activates the code. Once activated, it responds to
the commands of the intruder. The Internet virus in the Unix E-mail system
allegedly came in through such a back door.
In Unix, these and similar attacks pose special dangers because, by
judicious manipulation, the attacker can become a superuser and gain access
to anything in the machine. These unsophisticated computer attacks can be
very effective in Unix, more so than in some other systems.

"Other openings"
In addition to ecternally produced Trojan horses and back doors, two
mechanisms within Unix are important to security. When users enter a command
in Unix, the system searches for the program named by that command along a
search list of names defined by the variable "PATH." If this search list is
altered in some fashion, everyday users can be invoking Trojan horse programs
that are disguised to look like standard programs. In general, PATH is set
up to search through a standard set of drirectories for the program. If PATH
is altered to search through a directory that has not been allocated privi-
leged status and does not belong to the user typing commands, then any
program placed in that directory could be chosen before the standard program.
Thus, one alteration to PATH can lead to an endless set of bogus programs.
A security audit product currently on the market uses such a technique to
determine if the security of the system has been breached. The security audit
program masquerades as the common utility "ls." When "ls" is invoked, a
security audit is done in addition to the normal work "ls" usually performs.
While this use of the mechanism is for security reasons, other uses may not
be for that purpose. Ensuring that PATH is not altered can control accidental
triggering of malicious programs.
The sceond major security concern found within Unix is the connection of
the system to the network. Unix systems, by and large, tend to be connected
to networks. Hiwever, besides their valuable use as user and data
connectors, networks can also be thought of as vehicles for bringing in
uncertified software and sending out private data.
Unix has many tools that will alow it to become part of the growing commu-
nity of newtwork users within the industry. The Unix-to-Unix Copy Program
is one such mechanism that allows the system to send and receive mail and
script files from users on other systems.
In addition, network file systems represent another threat by requiring
users to reach across the network for their file systems. This intimate
link between users and their file systems can potentially be more easily
intercepted than when this communication takes place within a single internal
system. The network in effect puts the Unix system out in the open, where it
may be more vulnerable to access attempts.
Network connectivity also creates a need for adequate physical security.
Many precautions must be taken to provide enough security for a Unix system
just as for any other system. While Unix's physical sceurity requierments
are no different from any other system, the availability of ways to connect
to other systems over the network, local or worldwide, makes physical
security harder to achieve than with other systems of lesser capability.

"Securing Unix"
While it may appear that Unix users are without protection, that is not
the case at all. While Unix is not as strong as many in information
security would like, newer versions of Unix have improved security, and
additional tools are available to make Unix more secure. There are also
future developments that will increase the ease of security management.
Systems using Unix can be better protected. Yet, they are only as secure
as their systems administrators allow them to be. The security of any
operating system can be attributed directly to how well that system has been
administratively reviewed and secured.
IS must set up accounts, create passwords, add new software to the systems
and give access rights to various pieces of data. The dynamics of admini-
stering a system dictate ongoing change in the access and relationship of the
various accounts, files and programs. Without careful and deliberate
execution, the best automated mechanisms can be subverted.
Beyond the system administrators, the vendors of systems with known
weaknesses also have responsibilities to pay more attention to system
security. They need to provide information and pass on timely patches to
their customers when holes are discovered in their systems. They will have
to work to increase their systems' security to stem lost sales opportunities
as well as to prevent potential lawsuits, which, even if unsuccessful, can
become public relations nightmares.
While there may not always be enough pressure put on vendors solely by
corporations requiring a secure Unix, the federal government has been quite
active in seeking ways to induce security within the vendor community. Over
the next few years, the government will strengthen the security requirements
of all the systems -- Unix or otherwise -- that it procures, and as
commercial vendors comply with these regulations, these products will become
available to the private sector. Thus, systems purchased in 1992 should, in
all likelihood, have significant security improvements over today's systems.
In any case, the government-vendor cooperatie relationship can be examined in
a number of ways.
The current conflict over standards affects Unix security, and that is
what links the vendor community with the federal government, which holds a
major stake in Unix security. (The government purchased $1.93 billion worth
of Unix systems in 1988, with approximately two-thirds of that eramarked for
the defense agency.) According to recent published reports, US Department of
Defense officials are so concerned about the security aspects of both AT &
T's System V and OSF's Unix offering that they may try to force the two
groups together to come up with an acceptable operating system.
Recently, in response to the latest outbreak of computer viruses, the
Defense Department formed the Computer Emergency Response Team (CERT). CERT
is a group of experts who will be available to fly to federal sites around
nation to assist in fighting viruses. Last December, /Usr/Group, the Unix
trade association, applauded the establishment of CERT and suggested that the
computer industry supplement these government efforts by agreeing on standard
procedures for dealing with emergencies such as viruses. The user group
recommended considering the best way to disseminate information when computer
networks are artificially congested through viruses or other exceptional
network problems.
The government also supports Unix security improvements through its
testing procedures. In late 1986, the National Security Agency's National
Computer Security Center studied a prototype secure system derived from
AT & T's Unix System V, Release 2. The study assigned that system with the
B2-level of assurance requirements defined in the Trusted Computer System
Evaluation Criteria (TCSEC). The study concluded that is possible to build
a B2, B3, or A1 system with an interface very much like that of Unix.
However, it also concluded that major problems exist with today's common
Unix implementations.
Fortunately, vendors have started to respond to the government's security
concerns. Several firms have announced secure versions of Unix to help them
capture contracts with organizations such as aerospace companies. The
Department of Defense issued Directive 5200.28 last year, requiring that by
1992 virtually all multiuser computer systems meet at least the C2 level of
the TCSEC. This level provides for need-to-know protection, audit capabi-
lity, and user accountability. Certain vendors have announced that they are
seeking even higher levels of security. AT & T's next release of Unix is
expected to have C2-level security features.
In addition, the Department of Commerce's NIST, which develops standards
for the civilian agencies of the federal government and interfaces with the
private sector, has a Unix security project. Posix is concerned with
security standards efforts associated with IEEE P1003.6, which is an
inetrface-specific standard. The objectives and scope of this effort are to
establish functional interface standards consistent with but not limited by
the TCSEC. Elements of Posix wil include basic security mechanisms, discre-
tionary access controls, auditability mechanisms and nondiscretionary access
controls.
Without a doubt, Unix security will improve over time. How it will
improve and the costs involved in increased security are less certain.
Those decisions await the push of an organized IS community.
IS has a major stake in improving Unix security, but only such that the
security serves other IS needs. If upgrading Unix security interferes with
information flow or complicates network management, it will continue to
receive insuffiecient attention. A balance between production and protec-
tion will have to be addressed.
IS managers have an absolute right to impress upon vendors their interest
in security improvements within certain rpoduct lines. IS can also make it
quite clear to the Unix standards groups that these organizations must agree
on security as a priority area, aside from their other disagreements
concerning standards.
Finally, IS can advise and work with the government to define the security
needs of the private sector. Firms should get into both the definition and
decision loops at this time or be prepared to stand around and complain after
some very essential decisions have been made. By that time, it may be too
late to do very much.
The Internet virus attack brought Unix security problems out into the
open. Ironically, the attack took place while major efforts were already
under way to improve the security of this operating system. Eventually,
secure Unix may no longer be a contradiction in terms.

============================================================================

Did you like it? I hope so. Thanks a
bunch to Nightcrawler (516) for
contributing it!

Welp, that's all for ATI35. ATI36
will be out within the next week. We
promise. Look forward to a LOT of
good stuff. In the meantime, stay
cool, and remember....It's better to
be pissed off then pissed on!

Ciao...

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Simpsons movie!!
blazing saddles SUCKED
Gummo
Hannibal Rising
Who's Your Caddy?
Requiem for a dream
Mobster Movies
Top Ten Movies to Watch on Acid
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS