The RISKS Digest
Volume 13 Issue 33

Thursday, 2nd April 1992

Forum on Risks to the Public in Computers and Related Systems

ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…

Contents

William Gibson, An (On-Line) Book of the Dead
PGN
NSA and cryptographic software
PGN
US Navy radar jammers pass test despite software errors
Jay Brown
SDI (from Newsweek)
John Sloan
A remarkably stupid design decision
Geoff Kuenning
Risk of "parameter validation" hype
Mark Jackson
Re: FBI v. digital phones
Daniel B. Dobkin
Re: Laws to Ease Wiretapping
A. Padgett Peterson
Re: Aviation Software Certification
Brian Randell
WAR GAMES II
Eric S. Raymond
Info on RISKS (comp.risks)

William Gibson, An (On-Line) Book of the Dead

"Peter G. Neumann" <neumann@csl.sri.com>
Thu, 2 Apr 92 9:08:13 PST
William Gibson, well known for his "Neuromancer" (which in 1986 anticipated
what is today known as virtual reality), has a new book, "Agrippa (A Book of
the Dead)" that apparently will be available ONLY in computer-diskette form,
according to Entertainment Weekly.

As reported in the San Francisco Chronicle (31 Mar 1992, p.D3), "Gibson plans
to infect the disk with a virus that will make it impossible to transfer the
text to paper."

This supposed "virus" (more like a logic bomb or a confinement lock?) will
undoubtably present an interesting challenge to MSDOS crackers, antiviralists,
virtual realists, and foreign ripoffs.  If it were to run on Unix, where you
can external to the program trivially pipe the output to a file, at least the
text would be easy to capture.  However, perhaps this is really a situation in
which it is the graphical screen image that is relevant rather than the words.
Digitized sound would also make it hard to transfer to paper.

There is also the likelihood that a succession of home-grown purgated editions
might appear, with incremental changes in the dialogue, visuals, and plot line.
You don't like the ending?  You want pornographic augmentations?  Roll your own
modifications!  Tinkering is generally easier than creating in the first place.
So, the book also needs some sort of integrity lock (checksum or crypto seal
[is a sea-lion a cryptoseal?]) to provide tamper detection; however, many such
schemes can be defeated by careful modifications that continue to satisfy the
check.  But, if Gibson has come up with an interactive, interpretively
developed book that creates its own virtual reality on the screen, that could
be quite an exciting development.

  [Note: It is important not to confuse the SF Chronicle noted above with
  the other publication with the same handle, the Science Fiction Chronicle,
  although sometimes it is hard to tell the difference.]


NSA and cryptographic software

"Peter G. Neumann" <neumann@csl.sri.com>
Thu, 2 Apr 92 9:23:37 PST
The NSA and the Software Publishers' Association appear to have reached an
agreement that would allow some exports of cryptographic software, as long as
the keys are constrained to be sufficiently short.  The net effect is a slight
but potentially useful improvement over what was previously exportable.
[Source: An article, NSA May Loosen Curbs on Software Sales Abroad, by Don
Clark, Chronicle Staff Writer, San Francisco Chronicle, 24 Mar 1992, p.C1]

Now that NSA and RSA have come a little closer, we need to bring in BSA (the
Boy Scouts of America).  Be prepared!  Imagine, a merit badge for cryptography?

  [For some background on RSA, see Burt Kaliski's contribution on the free (to
  noncommercial users) RSAREF privacy-enhanced mail toolkit, RISKS-13.22.]


US Navy radar jammers pass test despite software errors

Jay Brown <jbrown@phoebus.ncsc.navy.mil>
Thu, 2 Apr 92 08:02:29 CST
There was a report last week on CNN Headline News about the US Navy improperly
certifying radar jamming equipment for Navy jets (I think the F-14 and the
F/A-18 were mentioned).  According to the report, the Navy tested and certified
these jammers despite the fact that the equipment failed several tests or did
not meet all the criteria for certification.  As a consequence, some
congressional subcommittee or another was investigating the Navy's
certification procedures. The Navy's excuse for certifying these systems
despite the failed tests was to blame the failures on software errors,
according to the report.

The report did not mention who manufactured the radar jammers or who wrote the
software in question.

-- John L. Brown, jbrown@phoebus.ncsc.navy.mil


Newsweek, March 23,1992, on SDI

John Sloan <jsloan@niwot.scd.ucar.EDU>
Sat, 28 Mar 92 12:16:32 MST
The March 23, 1992 edition of _Newsweek_ features an article critical
of research related to the Strategic Defense Initiative. The article
is titled "Safety Net Full of Holes" (pp. 56-59), written by Sharon
Begley and Daniel Glick. It contains this reassuring passage:

    "[The] Pentagon disagrees that deploying a space-
    and ground-based defense system poses significant
    technical challenges. The complexity of the software
    required to coordinate Star Wars, for instance, is no
    more daunting than programs that control nuclear
    reactors, it says."

Now we can all breath a sigh of relief. [ All typos are mine. ]

John Sloan, NCAR/SCD, jsloan@ncar.ucar.edu


A remarkably stupid design decision

Geoff Kuenning <desint!geoff@uunet.UU.NET>
Thu, 2 Apr 92 03:03:19 PST
I just had to pass this one on because it was so funny/sad.  A client told me
today of a consultant who designed a menu-driven system to be used by
accountants for financial purposes.  Needing a special character to signify
"return to main menu", he chose one that "nobody uses" (his words).  The
character?  The dollar sign!

Needless to say, on the first day the software was installed, my
client got a frantic call.  "Every time I try to enter a dollar
amount, it pops me back to the menu!"

Sigh.       Geoff Kuenning   geoff@ITcorp.com   uunet!desint!geoff


Risk of "parameter validation" hype

Mark Jackson <MJackson.wbst147@xerox.com>
Thu, 2 Apr 1992 06:15:04 PST
So Microsoft is touting "parameter validation" as a bold new innovation.  You
forgot to cite the obvious Risk: someone's inevitable attempt to *patent*
parameter validation. . .


Re: FBI v. digital phones (Kantor, RISKS 13.32)

"Daniel B. Dobkin" <dbd@ans.net>
Thu, 2 Apr 92 10:13:21 EST
Brian Kantor notes that a monitoring capability is an essential diagnostic
element of any telephone switch, digital or analog.  He suggests that the only
purpose conceivable for a law such as the FBI proposes is to enable wiretaps
without Telco cooperation; this in turn is most likely to occur when the FBI
doesn't have a proper warrant, either.  Hence, "[W]hat they are asking for is
the ability to make warrantless taps."

In fairness to the FBI, there are other possibilities, such as when a Telco
employee is himself the subject of an investigation.  Not much, I agree, but
let's try to assume that the Bureau's motivation is pure, even if its proposed
implementation isn't.


Laws to Ease Wiretapping

A. Padgett Peterson <padgett@tccslr.dnet.mmc.com>
Wed, 1 Apr 92 22:37:48 -0500
    This makes the second time in recent months we have heard of government
initiatives to make wiretapping of data traffic easier.  Interestinly, there
are a couple of companies currently working on devices (and must admit I have
been prodding them for a couple of years) that should make it an order of
magnitude more difficult:

    For some time now, I have been concerned about tapping, particularly when
performing my daily security duties while at conferences. Currently I rely on a
"smart card" or dynamic access device for one-time passwords to avoid spoofing.
About two years ago the following thought crossed my mind:

    Years ago when maintaining  KY-26 cryptographic equipment,
(my AFSC was 306mop0) brave souls used to bring up encrypted channels
"blind" to minimise time away from the poker game. Instead of changing
the transmit side first and using the receive side to verify reception,
we used to change both sides at once by taking a pre-established count
to go "bravo india" and create a synchronized duplex connection. If we
could communicate, we would know that it had worked (what was done if
it did not is not disclosable but involved the butt end of a large
screwdriver).

   Similarly, a couple of years ago I was talking to one of the major vendors
of "dynamic access control devices" about use to provide full encryption of all
traffic. Currently, the way such a system works is that when a login occurs,
the host sends out a multi-digit "challenge".  In my case, I enter the
challenge followed by a PIN into a card which then calculates a reply. I send
back the reply as a password that lets me into the system.

    What I postulated was that instead of sending the reply back to the
host, it be fed into my laptop as the seed for encryption. The laptop
then sends a "bravo india" to the host telling it to start encryption.
Since the host knows what the reply should be, it uses that as its own
seed. If both sides are then able to communicate, they authenticate each
other simultaneously while providing full encryption of all following
traffic.

    One of the major problems was loss of synch from line noise, but the
current crop of error-correcting modems has made such encryption not only
feasible but also easy and at whatever level (DES, RSA, ...) is desired.


Re: Aviation Software Certification

<Brian.Randell@newcastle.ac.uk>
Mon, 30 Mar 92 12:56:51 BST
Last month I sent to RISKs a copy of an article that appeared in the (UK)
Computer Weekly on 6 February which carried the headline "Experts warned CAA
before Airbus disaster". Attached is a letter, from the experts concerned,
complaining at this article. This letter was I understand published by Computer
Weekly on February 13, and has just been drawn to my attention. Despite the
delay, I suggest that it be included in RISKs, in view of the comments it makes
on the original article.
                                           Brian Randell

                                -----------

AIRBUS SOFTWARE IN THE CLEAR

We are the three BCS "software experts" who visited the CAA in January to
discuss the new draft standard for software in aircraft systems D0-178B.

We believe that it is misleading that you linked our technical visit to the CAA
to the subsequent A320 Airbus crash. There is no evidence of any fault in any
safety-critical software on the A320 Airbus crash. It is too early to know the
causes of the crash and irresponsible to imply that we were in any way trying
to "warn the CAA" about the A320.

Our concerns about the draft D0-178B are technical and relate to its inadequacy
as a basis for objective certification of the reliability of software in
airborne systems. All modern passenger aircraft contain safety-critical
software and our comments to the CAA did not relate to any specific aircraft.

The CAA received our comments constructively and readily agreed to pass each
criticism to the international team which is reviewing the draft standard.

Bev Littlewood, Martyn Thomas, Brian Wichmannn

Computing Laboratory, The University, Newcastle upon Tyne, NE1 7RU, UK
EMAIL = Brian.Randell@newcastle.ac.uk   PHONE = +44 91 222 7923
FAX = +44 91 222 8232


WAR GAMES II

Eric S. Raymond <eric@snark.thyrsus.com>
2 Apr 92 02:34:52 GMT
            WAR GAMES II
                or
    How I Learned To Start Worrying and Hate The Bomb

[posted to comp.risks; an incomplete version previously went to other groups]

   Some of my friends call me an `improbability vortex' --- the kind of person
weird stuff just naturally happens around.  Occasionally I manage to to forget
why; my life doesn't seem bizarre to *me*.  Then, something happens to remind
me...

   Wednesday, March 25 1992: a fairly ordinary day in the life of Eric Raymond,
Boy Hacker.  Shower, read netnews, phone calls, some revision on the clone
hardware buyer's guide I've been working on for comp.unix.sysv386.  Will the
top ten vendors go for my idea of a competitive "UNIX Dream Machines Bake-Off"?
Hmm...well, Swan Tech wants to sign up, that's a start.  Ah, the mail's in.

   Riffle, riffle.  What's this?  Forwarded from MIT Press.  Something about
the book, no doubt...

   The Book: if you don't know it already, I edited a lexicon called
_The_New_Hacker's_Dictionary_  (MIT Press, 1991, ISBN 0-262-68069-6).  It's
all about hacker language and folklore.  Sold 14,000 copies in its first
seven months, got rave reviews everywhere, good stuff like that.  Got my
first nut-case letter about a month back --- always heard that was supposed
to happen to authors.  Some of the fallout has been weird.  Ouch, fallout ---
*bad* choice of words.  Back to our story.

   Hm.  From ISPNews.  INFOSecurity Product News.  Eh?  Never heard of them;
sounds like some trade rag for professional paranoids.  Computer form on the
inside; addressed to ERIC RAYMOND EDITOR, THE MIT PRESS, MASS INST OF
TECHNOLOGY, CAMBRIDGE MA 02142.  I see what happened; the Press's editorial
address miscegenated with my book credit in someone's mailing-list software,
and some clerical droid at the Press didn't look at content and forwarded
a piece of mail that should have stayed in-house.

   What we've got here is, oh, yeah, must be a report from the magazine's
bingo card.  Reader service; they circle numbers, you get a bunch of product
info requests.  OK, who wants to know about my book?  Maybe I'll give them
a surprise and answer it myself.  They probably all think the book is a how-to
manual for crackers.  Damn all journalists for what they did to the word
"hacker", anyhow...

   There were four.  First one:

   DAVID CARGILL SYSTEMS A
   GUARDIAN LIFE INS
   STE 201
   888 SEVENTH AVE
   NEW YORK         NY 10106

   Oh, boring, I thought to myself.  Actually he turned out not to be; I spoke
with him, later, and the guy turns out to be an old UNIX hand who, when I
explained what the book is really about, cheerfully expatiated on Cargill's
Theory of Fat Electrons.

   See, Con Edison sucks its line current out of the big generators with a pair
of coil taps located near the top of the dynamo.  When the normal tap brushes
get dirty, they take 'em off line to clean up, and use special auxilliary
taps on the *bottom* of the coil.  Now (sez Cargill) this is a problem,
because when they do that they get not ordinary or `thin' electrons, but the
fat'n'sloppy electrons that are heavier and so settle to the bottom of the
generator.  These flow down ordinary wires OK, but when they have to turn a
sharp corner (like in an IC via) they get stuck.  This is what causes computer
glitches.

   I laughed, said "You sound like a man who wants to hear about {quantum
bogodynamics}" and directed him to the on-line version of the book at prep.
Back to our story...

   Next guy...

   BRADLEY H EDWARDS  SEC SPE
   SECURITY-SAFETY
   CONSULTS
   PO BOX 536
   TOPEKA            KS 66601

Well, the phone number attached to this one was out of service.  Security
Specialist, eh?  For sure he's got the cracker/hacker bug on the brain.  Then
my eyeballs tripped over the third address

   PAMELA D MILLER CHIEF
   USSPACE COM
   STOP 4
   J2C/SS0-C
   CHEYENNE MTN AFB  CO 80914

and I went into the mental equivalent of TILT TILT TILT.  Now, any of you who
ain't congenital idiots raised in a rain barrel somewhere on the butt-end of
nowhere will already have decoded that address to "U.S. Space Command, Cheyenne
Mountain Air Force Base".  Yeah, that's right.  NORAD; the big tunnel complex
under the mountain from which they be plannin' to fight World War III if it
ever goes down.  Huge walls of blinkenlights, 30-foot-thick blast doors,
"We could tell you, sir, but then we'd have to kill you", the whole weird trip.
Cornpone accents with their fingers on the pulse of the Apocalypse.

   Oh, *man*, I said to myself.  I have to talk to this woman.  I haven't
forgotten the nationwide media flap after _War_Games_ came out.  You remember,
that silly movie where the kid with the voice-controlled IMSAI (snort) cracks
into NORAD's computers and accidentally damn near starts a nuclear war?  God
damn; I'll bet the plot of that sucker is seared into the collective psyche of
every security officer at Cheyenne Mountain, they probably screen the video
every couple months just to keep the newbies on their toes.

   What kind of hideous Federal heat could land on me if PAMELA D MILLER has
hacker/cracker confusion on the brain?  I imagine some steel-eyed amazon in a
blue suit exuding grim determination to Nip This Menace In The Bud.  *Bad*
scene for a guy who is, after all, better known in some circles for practising
witchcraft and stone anarchist-loony politics than for The Book.  Yiiiii ...
visions of sinister limos and Men In Black pulling up to my front porch.  "We
want to ask you a few questions, sir."  So I called my editor Terri and Guy
Steele (credited coauthor) and told them all the proceedings so far.  Nervous
laughter all around.  Lugubrious jokes.

   I need to convince this woman and her unknown masters that I'm a *harmless*
lunatic.  Time to track PAMELA D to her lair. (Yes.  Think of her that way,
Pamela D., like one of those impossible anonymous synthetic blondes in an
upscale skin magazine.  "Well, I'm into sailing Sunfishes and I really like
kids, you know?".  Good.  A *much* less threatening mental tableau.)  I limber
up my phoning fingers and call the number blazoned above her address.

   <click> <sputter> "NORAD operator ten.  What extension?"
   Gulp.  "Uh, I'm trying to reach Pamela D. Miller?  I got a product
information query from her."
   "Do you have an extension, sir?"
   "Um, no I don't.  Just this number.  And her address." I reel it off.
   "Try the base locator at Peterson, sir.  554-4020."
   "Thanks", I said, and hung up."

   Ohhh-kay.  NORAD for sure.  Hail Eris! PAMELA D's hanging out somewhere
under a couple of cubic miles of rock, likely in some cramped little office
with 1950s-era furniture and walls painted institutional puke-green.  And an
old-style black phone. (How long has it been since you've seen a black phone?)
(Trust me, this is what the military version of bureaucratic rabbit warrens
looks like.)  Or maybe at some gleaming console watching telemetry from all
those KH-11s we're supposed to pretend don't exist.  Hah.  Heads up, Pammy;
constructive chaos is about to enter your life.  All hail Discordia!

   This is about where things started to get really Kafkaesque.  The base
locator is their directory information desk.  I ask for Pamela D. Miller's
extension and get 3247 (remember that number).  I call it.  Some guy who sounds
exactly like Andy Griffith answers: "

        
    

Please report problems with the web pages to the maintainer

x
Top