Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 04 Issue 48
Computer underground Digest Sun Oct 4, 1992 Volume 4 : Issue 48
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivist: Dan Carosone
Copy Editor: Etaion Shrdleax, Esq.
CONTENTS, #4.48 (Oct 4, 1992)
File 1--Wes Morgan's on J Davis & Piracy (Re: CuD 4.46)
File 2--"Whose Internet Is It Anyway?" (Online! Reprint)
File 3--Implementing System Security
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
libraries; from America Online in the PC Telecom forum under
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
Back issues also may be obtained from the mail server at
mailserv@batpad.lgb.ca.us
European distributor: ComNet in Luxembourg BBS (++352) 466893.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Some authors do copyright their material, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Mon, 28 Sep 92 10:10:41 EDT
From: morgan@ENGR.UKY.EDU(Wes Morgan)
Subject: File 1--Wes Morgan's on J Davis & Piracy (Re: CuD 4.46)
In CuD #4.46, Jim Davis writes:
>First, the reality of software production in the late 20th century is
>much different than this image. Most software production is NOT a
>cottage industry.
Agreed, but that doesn't really change my arguments very much.
>The industry has quickly matured in the past few
>years into a typical monopolized industry. Most patent filings are by
>corporations. Most software is not purchased from the individuals who
>create the software, it is purchased from companies who have required
>their engineers to sign away any rights to whatever they come up with,
>AS A CONDITION OF EMPLOYMENT. So IN MOST CASES, the creator has been
>separated from the results of his or her creativity.
Isn't this true of almost any commercial concern? Toyota engineers
sign away their rights to the design of the 1993 Camry, and contribu-
ting editors sign away their rights to their editorials in the Lexington
Herald-Leader (if printed, unsigned, as the opinion of the paper). Yet,
these individuals still profit from their work; the engineers will receive
raises/bonuses if their designs are commercially successful, and the editors
of the Herald-Leader receive greater compensation if the paper's subscrip-
tions increase. What's the difference?
>But the image of
>the sole-proprietor hacker is raised up as a shield by the software
>industry -- the public can take pity on the "defenseless" hacker;
>people don't take pity on a Microsoft or an IBM.
It isn't a question of "pity", nor have I advanced it as such.
My argument is very simple. You do not have the moral, ethical, or legal
right to take someone else's explicit design (be it computer software, a
piece of sculpture, or a 1993 Camry), duplicate it, and give the copies away.
>Here we get
>to the heart of the matter -- we're really talking about the "rights"
>of software corporations here; not the hacker, not the consumer, and
>not society.
So, the people who constitute a corporation are now in a separate class?
>Nowhere do I argue that the people who write software should not be
>compensated for their effort. Of course people should be compensated!
You say that people should be compensated, yet you wish to remove their
largest/best-protected source of compensation -- contract royalties from
legitimate purchases.
>The question is how, and how much.
"how much"? This almost sounds like a thinly disguised slam on software
prices........
>Paycheck dollars from a
>corporation, a university, a cooperative or the government all spend
>equally as well.
Of course, one's paycheck is usually proportional to the success of
one's efforts. I can't imagine anyone increasing an employee's pay
for "good societal benefits" of their work (with the exception of
the fine people in the social work careers, of course....).
>But the social benefits from the programmer's efforts
>are constrained by forcing them through the legal contortions of
>intellectual property rights and private ownership.
If the programmer (or corporation) wants to reap social benefits, they'll
place the program in the public domain (or provide 'student editions', or
educational pricing, etc.). It's *their* choice, not yours.
>The model that we
>have been using is private speculation for private gain, made possible
>via exclusive monopolies granted by the government, enforced by law. I
>am saying that other successful models exist and have generated useful
>products.
Many such models exist; however, you would force everyone into the same
model. Neither of us can dictate models to the developer.
>The subtext in the "I deserve a reward" argument is that
>someone who comes up with a really useful idea should get a special
>reward. Fine. I have no problem with public recognition of significant
>contribution, even including a cash award. Again, this doesn't
>_require_ intellectual property rights.
I can see it now -- "You've written a wonderful program! Here's a one-
time cash award of $XXXX, and we're going to spread your program around
the world, let other people use it to make more money, and you won't reap
any further benefit from it."
>Morgan says that
>"*companies* create for financial gain" (which I certainly agree
>with), but puts this forward as if the protection of *their* financial
>gain somehow justifies the rest of us having to suffer under
>intellectual property rights.
Let's try a parallel (this usually degenerates into a flamefest, but...):
- You (Mr. Davis) write a book entitled "Intellectual Property in the
Information Age"
- Prentice-Hall, in their wisdom, deems it worthy; a First Edition is
prepared, published, and placed on sale.
- I purchase one copy, duplicate it 500 times, and distribute it to
a conference *without your permission*.
- Your book is included in the conference Proceedings, and is made
available to the public; again, neither you nor PH recognize any
compensation.
Can you honestly say that neither you nor Prentice-Hall will be concerned?
I have found that many people (NOT, necessarily, Mr. Davis) who argue against
intellectual property rights have never been in a position to earn compensation
from their personal work(s). I have been in such a position, and it definitely
changes one's opinions. (While my experience in this area does not lie within
the realm of computer software, I believe that my experience is valid.)
>Corporations are not necessary for the
>generation of the software we need.
That's well and good; you (and anyone else) is quite free to design,
implement, test, debug, document, and distribute any software you wish.
>Harlan Cleveland, .....wrote.....:
>"Is the doctrine that information is owned by its
>originator (or compiler) necessary to make sure that Americans remain
>intellectually creative?" He answers in the negative, citing the
>healthy public sector R&D efforts in space exploration, environmental
>protection, weather forecasting and the control of infectious diseases
>as counter examples.
Hmmm....."space exploration" == "NASA"
"environmental protection" == "EPA"
"weather forecasting" == "NOAA"
"infectious diseases" == "PHS/HHS/CDC"
"public sector" seems to melt into "government agencies". If you (or
Mr. Cleveland) can provide examples of such work which are outside the
governmental realm, I'd like to know about it. Of course, a great deal
of university research takes place under government grants; we might
even argue that universities are another arm of the government in this
respect.
I'm not familiar with any large-scale research which is truly in the
"public sector".
>Fourth, the notion of a solitary inventor is a popular falsehood. No
>one creates in a vacuum.
Agreed.
>The programmer's skills and creativity rest
>upon past inventions and discoveries;
This is true of almost any invention, discovery, or creation; would you
apply your arguments to cars, calculators, or novels? Heck, most musical
compositions are based on the ancient notions of scales, keys, and modes;
would you throw *all* music into the public domain, too?
>publicly supported education;
It is quite possible to complete one's education without setting foot
in a "publicly supported" school.
>the other people who produced the hardware, the manuals and textbooks
>and the development tools; as well as the artists and accompanying
>infrastructure who may have inspired or influenced the programmer.
You're absolutely correct, but it's still the programmer's invention
that made it possible.
>In
>this sense, the developer's product is a social product, and
>consequently should redound to the benefit of all of society.
Again, are you willing to apply this notion to *every* invention,
development, or creation? I still don't believe that computer
software is inherently different from any other medium.
>The
>practical problem of compensation for effort and reward for
>outstanding achievement can be addressed outside of "intellectual
>property rights."
I'd like to see some concrete ideas about the implementation of this
"compensation....and reward". You've mentioned it several times, but
you haven't presented any practical implementations.
>The public
>is already heavily involved in software production, but as is too
>often the case, the public finances something, and then turns it over
>to private corporations to reap all of the profits from it.
1) The "public" doesn't have to "turn it over" to the private sector.
2) Most programmers who develop something on their own (as opposed to
"staff programmers" at a software company) usually recognize compen-
sation in either lump-sum payment(s), increased salaries, or royalties.
3) If I decide to market my own software product, haven't I just become
one of your much-villified "private corporations"?
>Re: my point that intellectual property rights prevent intellectual
>effort, including software development, from maximizing its social
>benefit: If a copy of Lotus 1-2-3 does have use for people, and people
>are prevented from using it (e.g., because of the price barrier), then
>its potential benefit is constricted.
You didn't address my mention of "public access" computing sites, such
as those found in many schools and public libraries. It would seem that
this growing "public access" facility would render your "price barrier"
irrelevant.
>Mr. Woodhead says that no companies specialize in educational
>software. If this in fact is the case, then this only reinforces the
>argument for the necessity of some sort of social or public or
>community (or whatever you want to call it) funding of educational
>software development.
Just go ahead and say "government funding"; you've been hinting around
the phrase for several paragraphs.
>Re: Mr. Morgan's notion of more aggressively extending patents to
>software: it's already taking place.
Good; I'll look at the references you mentioned.
>17 years (typical for
>patents) is an eternity in the evolution of software (as is 10 or 20
>years, as suggested by Mr. Morgan).
OK, let's change it to 5; we're speaking rhetorically, right? 8)
>As a sidenote, even the SPA has
>opposed software patents.
Of course they oppose it! It cuts into their profits! I've never
said that current pricing is fair.......
>Re: fair use -- the point I was trying to make is that the concept of
>"fair use" has EVOLVED and EXPANDED with increasing ability to easily
>duplicate various media.
How, exactly, has it "evolved and expanded"?
>"Taping of television programs for personal
>use appears to have become accepted as fair use of copyright material.
"appears to have"? It was explicitly affirmed in several court decisions.
>The
>rationale of the court must have been the unlikely efficacy of trying
>to put Pandora back into the box and the fact that no commercial use
>of the tapes was either alleged or documented."
Bingo! The "personal use" factor was a determinant in each decision.
You'll notice that the courts did NOT affirm any redistribution rights,
either for-profit or for free.....
>The point is that legal constructs like "fair
>use" are not brought to us by Moses -- they are determined by the
>balance of social forces through legal, political, economic and other
>forms of struggle. And therefore they are something which we can
>affect.
Agreed!
I would enthusiastically support a "free for educational purposes" waiver of
licensing. I'm the Systems Administrator for the UK College of Engineering;
we spend a great deal of money on licenses, and some vendors have my undying
gratitude (Swanson Analysis, MathWorks, and CADKEY, are you listening?).
Let me ask you a simple question:
You have championed (and rightfully so) the cause of "educational computing";
you've used education as a bulwark of your arguments. However, would you
voluntarily restrict your use of "free software" to educational purposes?
If WordPerfect gave you 10 copies for your class, would you use it to write
your next book? Would you sell that book?
>From: peter@FICC.FERRANTI.COM(Peter da Silva)
>Subject--File 2--Response to Davis/Piracy (1)
>
>Re: Wes Morgan's article in CuD #4.43
>
>I largely agree with most of his arguments, but I would like to point
>out one mistake... he says:
>
> "The whole concept of copyrights ... is based on the notion
> that the creator ... is entitled to some compensation for his
> effort"
>
>This is just not true. The whole concept of copyrights and patents in
>the United States is based on the notion that by making intellectual
>property a salable commodity subject to market forces, more and better
>intellectual property will be created and it will be distributed more
>freely.
Absolutely! I think we said the same thing; I just didn't extend my
statement far enough. (My statement was based on my experience in
more "artistic" fields, namely music; the market forces Peter mentions
are less dominant in that field.)
Thanks for clarifying, Peter.
>And, you know what, it works. There's no better refutation, nor need
>there be a better refutation, of the argument that piracy promotes
>openness. It doesn't. It promotes encrypted software, dongles, and
>trade secrets. It discourages publication. It reduces the incentive to
>create viable products of commercial quality. These are not the result
>of intellectual property laws, they're the result of the failure to
>enforce intellectual property laws.
Breakaway! Shot! Goal!
Well said.
>From: "Michael Stack" <stack@STARNINE.COM>
>Subject--File 3--Response to Davis/Piracy (2)
>
>They both seem to view copyright and
>patents as a system guaranteeing a right to profit overlooking the
>original constitutional intent to "promote the progress of Science and
>the useful Arts."
Here's the relevant citation:
[Article I, Section 8, US Constitution]
...To promote the progress of science and useful arts, by securing for
limited times to authors and inventors the exclusive right to their
respective writings and discoveries;
We may argue that the current implementation of copyrights and patents
is in need of overhaul/modification, but you cannot evade the Constitutional
"exclusive right" for inventors and authors.
I'd also argue that the very presence of hundreds of software companies
validates the "progress of science and useful arts"; I receive informa-
tion on new software releases on an almost-daily basis.
>To be able to accuse someone of stealing or to claim something
>as property (and to subsequently grant licenses on how this property
>is to be used) implies there exists rights of ownership in the first
>place. The crux of Mr. Davis's article questions this right. The
>respondents by-pass this altogether.
I didn't bypass it at all; in fact, my entire argument is based on
the premise of "I made it, and it's mine!". 8)
>Their articles are but
>explanations of the existing order in case we didn't already
>understand.
The "existing order" is entirely Constitutional. Mr. Davis' questions
bypass the Constitutional provisions of "exclusive rights" for creations
and inventions. Would you support a Constitutional amendment to revoke
those "exclusive rights"?
Keep in mind that any such action would invalidate *all* trademarks,
copyrights, and patents. None of the parties in this discussion have
provided justification for applying different standards to computer
software, so it's in the same boat as any other "writings and discoveries".
>The fact that "alls not well in the state of Denmark"
>in itself punches large holes in the system the two respondents
>defend.
>Both belittle the spectre of "police state" raised by Mr. Davis.
>Amazingly, this is done within the pages of a publication which has
>spotlighted many instances of "police-state" behavior: doors
>kicked-in in the early hours of morning, guns drawn, threats,
>equipment confiscated (permanently?), "guilty till proved innocent,"
>etc.
I didn't "belittle" the police-state notion at all!
Of course, those are matters of criminal law, not copyright infringement.
I have yet to hear mention of such a "police state" approach to copyrights.
>--On the one hand you argue "If I pour 4 years of my life into the
>development of SnarkleFlex, I DESERVE to profit from it" but then you
>append a caveat which undoes this assertion "(assuming that people
>want to purchase/use it)." Doesn't this condition make your
>capitalized assertion self-destruct?
How about "I deserve the OPPORTUNITY to profit from it"?
>Do you deserve to be rewarded
>for your work, yes or no, or is it to be let dependent on market
>caprice?
Market caprice, absolutely! That's the basis for ANYONE's living; one
must provide a service (or goods) which people need or want. If there
is no market for your skills, you get to find another job. That's self-
determination.
>--You ask "Would you make a copy of Webster's Dictionary and give it
>to a friend?" and you sport(!) "Xerox(tm)[ing] your entire printed
>library for me..." "...would be just fine, right?" Yes, it would --
>if the library and dictionary were in a readily distributable form and
>the copy cost me near nothing i.e. in digital form. I'd be happy to
>give you a copy. I could give it to anyone. As to how I'd have a
>library in the first place we can discuss (perhaps outside of this
>forum).
"how I'd have a library......we can discuss.....outside of this forum"?
Oh, my! Let's translate this a bit.....
"Sure, I'll give you a copy; just don't ask where I got it."
>Michael Goldhaber in his book Reinventing Technology states "Since new
>information technology includes easy ways of reproducing information,
>the existence of these [intellectual property] laws effectively
>curtail the widest possible spread of this new form of wealth."
Your alternative is anarchic, is it not? I'll ask you a simple question,
one for which no one has provided a suitable answer:
If I choose to make my living as a software author (either "on
my own" or as part of a company/corporation), how will your
proposed "freedom of information" help me earn a living? Will
it, in fact, hinder me in earning a living?
--Wes
------------------------------
Date: Thu, 1 Oct 92 08:58:29 EDT
From: Rich=Gautier%SETA%DRC@S1.DRC.COM
Subject: File 2--"Whose Internet Is It Anyway?" (Online! Reprint)
This entire article was re-typed by Richard A. Gautier
(RG%SETA%DRC@S1.DRC.COM). If there are any SPELLING errors, they are
probably his. If there are grammar errors, they are Dr. Grundners, or
the editors. Mr. Gautier HAS obtained permission to electronically
disseminate this article from ngarman@tso.uc.edu who represents ONLINE
magazine. Her comment was that this article really does belong in the
electronic (Internet) forum, and that it was really a shame that I had
to ask with an article like this.
"WHOSE INTERNET IS IT ANYWAY? -- A CHALLENGE"
By Dr. Tom Grunder
From--Online! Magazine, July 1992, pp. 6-7, 10.
It began innocently enough. I was rummaging around the Internet
looking for some NREN information to include in a proposal I was
writing, when I came across a rather one-sided "debate."
It was a string of messages written mostly by people from academic
computing centers bemoaning the fact that NREN _might_ be made
available to K-12 schools, businesses, libraries, and (horror of
horrors) even to the general public. They were beside themselves.
"The Internet and the NREN are supposed to be for academic and
research purposes," they said. "What's going to happen if we allow
all these other people on? There's not going to be enough bandwidth.
Transmission time will suffer. Before you know it, the NREN is going
to be just as bad as the Internet is now."
As the messages came in, their outrage seemed to build. So did
mine.
Finally I came across a message that simply read: "Why should we
let them use it at all???" and suddenly the terrible mistake we've
been making became clear. We in the non-university networking
community have been framing the wrong issue.
Until now, the issue has been whether K-12 schools and community
users are going to have access to the NREN. It should have been
whether K-12 and community users are going to
_allow_the_academic_centers_ to access the NREN. Somehow we had
gotten our priorities crossed.
Who do they think is _paying_ for all this? When the NREN comes
online, the money to build it will be coming from that apparently
forgotten group of people called "taxpayers." Who do they think is
paying for the current Internet backbone? The National Science
Foundation? Wrong! It's the taxpayers. Who do they think is paying
for those mid-level networks, and for the high-speed data lines to
connect their colleges to those networks, and for the nice
high-powered servers that makes the connection so easy? Do they think
that money is coming from good ole Siwash State U.? If so, then who,
pray tell, is funding Siwash State? Right again. Taxpayers!
So now we come along, with hat in hand, begging for permission to
have minimal access to the Internet and to be a part of NREN. Why?
So we can set-up K-12 networks that will allow the _taxpayers'_ kids
to learn the information age skills they will need to be competitive
in the 21st century. So we can provide the _taxpayers_ access to
electronic mail, government information, and other resources via
libraries and community computer systems. So we can provide some
piece of the information age to the people who paid for it in the
first place! And the academics treat us like beggars in a subway
station.
_Absurd!_ Absurd, but not surprising.
To understand this attitude, you have to keep in mind that, in
most locations, these university computing centers are designed for
the people who work there plus 35 of their buddies. No one else -
including the other students and faculty on their own campuses - need
apply. In most locations, students or faculty members seeking to use
the Internet are given a blinking cursor that dares them to come up
with some combination of nonsense syllables to make it do something.
That's it. No help. No training. No assistance. Nothing. It is
not surprising that the idea of letting the community have access to
this preciously guarded resource would send chills up their spines.
But, in many ways, we in the non-academic computing circles have
made our share of mistakes as well. Not only have we been apologetic
in our claims to this national resource, but we have engaged in what I
call the "Balkanization" of the information age - the fragmentation of
our efforts into dozens of competing networks and special interest
systems. We should be working toward a common framework with enough
"conceptual bandwidth" to include everyone.
As a function of developing my organization, the National Public
Telecomputing Network, I am asked to speak at a lot of conventions and
conferences; and what I find at those meetings has become quite
predictable. Everyone is excited about computer networking. When I
go to a K-12 convention; everyone is talking about K-12 networks.
When I go to a library conference; everyone is talking about library
networks, and so on - all in direct competition with each other.
It doesn't make sense.
Let's say you are proposing a statewide network that will link
your libraries together, complete with Internet connections - the
whole bit. And let's say you take it to your state capital and,
amazingly enough, you get it funded. Now, what happens if a month
later the K-12 people (or someone else) shows up with a proposal to
fund their network; or worse, what happens if they get there a month
_before_ you? Some one must lose; it is inherent in that kind of
competitive process.
But our mistakes do not end with the competition for monies. They
run deeper than that. We have also failed to come up with a
comprehensive plan to show how any of our ideas fit together. Let me
use the K-12 initiatives as an example.
I have seen a number of proposals going around that (depending on
the proposal) would provide every school in the city/state/country
with a connection to the Internet - so every child will have access to
the information resources to be found there. That's fine. In fact,
on the surface, it sounds wonderful.
But what happens _after_ the student graduates from high school or
college? Do we toss him or her out into a world where those resources
are utterly unavailable? If so,
_what's_the_point_of_training_them_on_the_resources_
in_the_first_place? It's like having mandatory driver education in a
world without cars!
It doesn't make sense. We create plan after plan, proposal after
proposal, with no common conceptual framework to tie them together.
I believe we must start developing our programs in the context of
community-wide information systems. The guy who runs the corner gas
station (and who was in a K-12 class only a few years ago) should have
at least as much information access as the K-12 students who are in
class right now. But we can't do that; we can't achieve it; unless we
can band together somehow to speak with one voice.
And...we need leadership.
Where is that leadership going to come from? One logical source
is the library community. But I don't see that happening. What I see
is a profession divided. Half the librarians I've talked to see this
network technology as exactly the kind of thing libraries should be
embracing; and the other half (usually higher-level officials) see it
as the work of the devil - with no detectable middle ground.
We can't continue without leadership, without a plan, and in
direct competition with each other. Perhaps what is needed is a plot
of ground that stands outside existing territory, a place where
everyone can stand, and around which we can all rally.
Let me try out an idea on you.
Suppose a super-fund was created for the development of a
nationwide network of computerized community information systems.
These systems would be free to the user in the same sense that the
public library is free to its patrons. Of equal importance, each of
these systems would have a place on them for the library community,
the K-12 community, the medical community, government officials, and
anyone else who wanted to use it. In addition, each system would be
linked by, and would provide its users with controlled access to, the
Internet/NREN. From a technological standpoint, there are no barriers
to the development of these systems. Indeed, there currently exist
several pilot systems that are already accomplishing all the above and
more.
How would we fund it? One way would be to ask every Regional Bell
Operating Company to contribute, along with every high-tech
corporation, the federal government, every state government, every
major city, and every major foundation. If necessary, we would
approach the various state Public Utility Commissions to ask that a
surtax be placed on phone company data line profits. The fund would
be charged with developing a minimum of 100 community computers
covering all 50 states by the year 2000. Initial cost would be about
$30 million dollars.
Could it be done? Without any doubt, yes. We've done it before.
Most people do not realize that 100 years ago there was no such
thing as the public library as we know it. But we reached the
point in this country where literacy levels got high enough (and
the cost of producing books cheap enough) that the public library
became feasible. People across the country began to come together
around the idea of free public access to the printed word; and the
result was a legacy from which everyone reading this article has
benefitted.
What I am saying, is that in this century _computer_ literacy
levels have gotten high enough (and the cost of computer equipment
cheap enough) that it is time from a similar movement to form around
the development of free public-access computerized community
information systems. It is time for us to stop being apologetic, and
to stop competing wih each other. In short, it is time for us to
leave a legacy of our own.
Do you see what I am saying?
Would you support such a plan? I mean, would you support it
personally?
Would you work for it?
Would your company or institution support it?
Would they contribute to it? If so, let me know.
Send me electronic mail, send me snailmail, but let me know. The
key here is not the technology, that's already in place, it is "wil."
Do we have the will to do it?
The issue is no longer _whether_ we will enter an information age.
That part has been settled. We have. What is at issue is whether the
information age is something that happens _to_ us, or something that
happens _for_ us.
Fortunately, that decision still remains in our hands.
++++++++++++++++
_TOM_GRUNDNER_ is the president of the National Public
Telecomputing Network, and the founder of the Cleveland Freenet. The
freenets are community information systems, located in several Ohio
communities and in Peoria, Illinois. A column in DATABASE (April
1988, pp. 97-99) by Steve Cisler describes the Cleveland Freenet in
its early stages.
Communications to the author should be addressed to Dr. Tom
Grundner, National Public Telecomputing Network, Box 1987, Cleveland,
OH 44106; 216/368-2733; Internet-aa001@cleveland.freenet.edu;
BITNET-aa001%cleveland.freenet.edu@cunyvm. (Editor's Note: Write to
Tom Grundner, or write to ONLINE (ngarman@tso.uc.edu), to answer this
challenge and comment on this controversial issue facing the library
and online community. ONLINE will publish as many notes and letters
as we have room for in coming issues. --NG)
------------------------------
Date: 25 Sep 1992 11:07:31 -0700 (MST)
From: RayK <KAPLAN%UAMIS@ARIZVMS.BITNET>
Subject: File 3--Implementing System Security
Toward the Implementation of a System and Network Security-Related
Incident Tracking and Vulnerability Reporting Database
by Ray Kaplan
Consider the need for a system and network security-related incident
tracking and vulnerability reporting database (herein referred to as
ITVRD for convenience).
Such a database might be a relational combination of reported
vulnerabilities and incidents that could answer queries such as "show
me recorded instances of compromise for version xxx of operating
system yyy on zzz hardware" or "show me a list of known
vulnerabilities of the login sequence for version xxx of operating
system yyy on zzz hardware" or even, "show me a list of reported
compromises of version AAA of third party product BBB running under
version xxx of operating system yyy on zzz hardware". We might even
be able to ask "show me known instances of password guessing attacks
on version xxx of operating system yyy on zzz hardware at banks."
It is widely known that the flow of security-related information is
carefully controlled and that such information is not readily or
widely available to those who need it to protect their systems and
networks. There is plenty of information available - but, its
availability seems limited to the underground. While this apparently
serves those who know and control this information, but it does little
to help those who are trying to protect their systems and networks.
Security by obscurity is widely known to be a flawed concept. My
argument would be that this game of security incident/vulnerability
tracking is a lot like dealing with the AIDs crisis. If we don't
start talking openly about it, we are all in trouble(1).
While some of the various computer incident handling capabilities do
an excellent job of distributing SOME significant vulnerability and
incident information publicly(2), VERY LITTLE detailed information
gets disseminated in comparison to the number of known vulnerabilities
and known incidents. In addition, those who are not connected to the
Internet have a difficult time staying abreast of those incidents that
are reported. Worse yet, I speculate that the majority of systems and
private networks that exist in the world today are simply not even
tapped into the meager flow of security-related information that does
exist.
I believe that this sad situation is due to the politics of security
vulnerability information between vendors in the market(3), and an
inherent desire to control the distribution of this information by the
portion of the security community that has placed themselves in charge
of it. As proof of this, consider that prototypes of system and
network security-related ITVRDs are known to have been funded by the
government, but were stopped when the funding agency wanted to
classify the effort making it publicly inaccessible(4). What we - as
a community - are left with is an odd situation where the best
collections of vulnerability information are to be found only on the
clandestine sources of the world's underground computer community.
At this writing, the Defense Advanced Research Projects Agency's
(DARPA) Computer Emergency Response Team (CERT) is reporting on the
order of 3 incidents per day, but we - as a community - hear very
little about the exact nature of these problems, how they can be used
against our systems or their fixes. While the relatively new Forum of
Incident Response and Security Teams (FIRST) is working on the
problems associated with the design and implementation of a ITVRD,
their discussions are carefully restricted to their members and this
topic has been under discussion for quite a long time with no
apparent movement. In addition, most of us are not members of FIRST,
so we can't contribute to the discussions even if we wanted to do so.
Since I know that the formation of a widely available ITVRD is a very,
very emotional issue in the security community and since I am not
willing to suggest that I have the best design and implementation plan
for it in mind - I'm simply throwing the question out into the
community for an open, vigorous debate: how can a system and network
security-related ITVRD be implemented - or should it even be
implemented? Based on my recent, unsuccessful experiences in trying
to get members of the legitimate security community at large to talk
to members of the world's computer underground, I have decided that it
is not prudent for me to proceed with the design and implementation of
a ITVRD until some consensus in the community is reached about how -
or even if - such a thing should be done.
As a seed for the debate, here are some of the questions surrounding
the implementation of a ITVRD that I think need vigorous discussion by
the community. Please consider them carefully and offer us your
thoughts. Post your reply to this channel or send it to me at any of
the addresses below and I will collect it, combine it with others that
I receive and report it in some regular manner which is yet to be
determined.
A Myriad of hard questions:
What of the morals and ethics questions that surround the
establishment of a widely available ITVRD? While this is not a new
idea(5), we are talking about the morals and ethics of making an ITVRD
available to anyone who wants access to it. This necessarily includes
those that are not members of the legitimate security community. Even
though information such as that which an ITVRD would hold is readily
available now, it takes a lot of time and energy to find it. An ITVRD
would make incident and vulnerability information trivially available
to anyone who wanted it.
How should an ITVRD be accessible? Should it be a database on the
network that can be accessed by simply sending a well-formed query via
electronic mail to a database server? Should an ITVRD allow
interactive access? Should it be available via a toll-free, 1-800
number? A pay per-call, 1-900 number?
Since it has its own very well-developed channels of communication,
why would the underground even care to contribute to such an ITVRD?
Would a widely accessible ITVRD threaten or replace popular
underground publications like Hack-Tic or 2600? Would the underground
be happy with attribution for the holes that they find? Would the
contributors to an ITVRD even want to be identified?
Should a subscriber-based ITVRD pay its contributors for their
submissions? If so, on what basis and how much? Should it be
available to those that want to passively access it without
contributing to it? Should this access be on a subscription basis?
If so, does such a subscription service need some sort of
authentication to restrict access to only legitimate, paid
subscribers?
Should the contents of an ITVRD be exactly what is submitted to it, or
should submissions to it be edited and/or verified for authenticity.
If editing, verification and authentication of submissions are to take
place, who should do this and under what rules should it be done? In
recognition that many organizations do not currently report their
security problems, should anonymous submissions be allowed?
Should such an ITVRD be in the public domain or should it be private
property.
Where should an on-line ITVRD be maintained? Should it be located
outside the traditional boundaries of countries that would restrict its
availability?
I am sure that I have missed many, many important questions. Please
contribute to this discussion.
Electronic mail:Internet - kaplan@mis.arizona.edu
BITNET - KAPLAN@ARIZMIS
Snail mail:
Ray Kaplan
P.O. Box 42650
Tucson, AZ 85733-2650
FAX - (602) 791-3325
This has been posted to:
Some common Network Newsgroups, and the DECUS DECUServe bbs.Several of
the world's underground publications: 2600 and HacK-Tic.Selected
members of the security community.
Please feel free to re-post this anywhere you see fit - it is hereby
released into the public domain. If you post it somewhere - please let
me know where you put it so I can try and track the discussions - I'd
like to do a summary of it all one of these days.
In advance, thanks for your time and consideration. Since I know that
the ire of powerful forces in the security community may be stirred up
by the idea of publically discussing the design and operation of an
ITVRD, I only hope that a reasoned exchange of ideas will follow.
++++++++++
(1) I get into some interesting discussions with people who argue that
secrecy is the best course of action. For instance, while splitting
hairs on the tough subject of when you begin (of if there even should
BE) sex education, there is an argument that says educating very young
people about their sexuality will induce them to experiment where they
otherwise might not do so. In my view, this is similar to discussions
that I have with those that oppose the implementation of an ITRVD.
There are those that say the mere availability of an ITRVD will cause
more incidents. In the face of this criticism, I say that while this
may be true, at least system and network managers WILL have a
reference for this information where currently there is none. Just
think, the formation of an ITRVD may lead to vendors actually shipping
a document that describes the known vulnerabilities of their systems
to their customers. Sort of like the warning from the surgeon
General's warning on alcohol and tobacco products?
(2) Of note here is the Defense Advanced Research Projects Agency's
(DARPA) Computer Emergency Response Team (CERT). While these
consummate professionals do an excellent job of distributing incident
and vulnerability-related information to the Internet community, not
nearly enough is being done.
(3) While it is clear that there are vulnerabilities which affect many
vendors, there is evidence to suggest that some vendors in the
incident response community don't acknowledge those reports by other
vendors which clearly affect their own systems - let alone reporting
all of the vulnerabilities of their own systems.
(4) References available if you'd like them.
(5) There most certainly are ITVRDs currently being maintained in
various places.
------------------------------
End of Computer Underground Digest #4.48
************************************