The RISKS Digest
Volume 15 Issue 19

Wednesday, 27th October 1993

Forum on Risks to the Public in Computers and Related Systems

ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…

Contents

Optic fibre fragment kills Telecom worker
Robin Kenny
Lanocaine (sp?)
Bob Frankston
Ethernet addresses as "port" ids
Bob Rahe
File on Four on safety-critical software
Pete Mellor
Cracking feature in the small press
Jim Haynes
Re: FAA and HERF - a pun-ctilio
Peter B Ladkin
Re: Clipper
Fredrick B. Cohen
Re: Chip thefts
Mich Kabay
Re: Dangers of Anonymous Mailers
Steven S. Davis
Re: Swiss AntiViral legislation
Claudio G. Frigerio via Klaus Brunnstein
Computer-Aided Verification (CAV'94)
David Dill
Info on RISKS (comp.risks)

Optic fibre fragment kills Telecom worker

Robin Kenny <robink@hparc0.aus.hp.com>
Thu, 28 Oct 93 11:11:39 EST
Not too long ago a Telecom worker in Western Australia was reportedly killed
when a fragment of fibre optic glass accidentally got into his blood stream.
Remembering this, I was horrified to see at a recent trade show some very
casual handling of raw fibre by visitors and sales reps at a stand.  Some
children were trying to handle the fibre bundle too (I stopped them) The risk
is apparent, in the frenetic effort to "de-mytholise" [demythologize?]
technology for the general public, we (industry professionals) unknowingly
jeopardise their safety.

Can anyone confirm the Telecom worker report?  (RISKS-15.17, `Fiber Optic
Cable "Meltdown" in Connecticut' prompted this response, as it is not strictly
computing.)


Lanocaine (sp?)

<Bob_Frankston@frankston.com>
Tue, 26 Oct 1993 15:40 -0400
There was a story on the radio (which is why I can't spell it) about patients
dying from incorrect dosages of Lanocaine (sp?) because the syringes for the
different dosages look too much alike. It brings to mind the discussion on
incorrectly calculated radiation dosages. While one can argue that the
computer-based systems are very complex and need to meet high standards, I
wonder how the problems of such systems compare with those of more
conventional systems. The estimates I've heard about incorrect dosages during
normal hospital procedures is very high. (Yes, I'm being vague but I don't
have the actual numbers readily available).


Ethernet addresses as "port" IDs

Bob Rahe <bob@hobbes.dtcc.edu>
Wed, 27 Oct 1993 19:40:08 EDT
  In RISKS 15.18, padgett@tccslr.dnet.mmc.com (A. Padgett Peterson) discusses
a scheme for using the ethernet MAC address as a mechanism for verifying
location, much like we used to do with hardwired mainframe ports.

  Unfortunately, there are two problems here.  The first is probably the
most damaging - the ethernet address is the address of the transmitting unit
ON THAT ETHERNET segment.  If the unit is not on that segment and is sending
via a router, for example, then the ethernet address will be that of the
router's ethernet transmitter, and not the originator's physical address.

  As to re-writing the ethernet address in the unit itself, I believe that
cicso routers can do that rather easily.  I don't have the manuals here at home
but I seem to remember that is a functionality that is needed in the DEC world.

  Bob


File on Four on safety-critical software

Pete Mellor <pm@csr.city.ac.uk>
Sun, 24 Oct 93 21:13:07 GMT
The BBC Radio 4 programme "File on Four" last Tuesday was devoted to the
subject of safety-critical software.

It discussed the causes of the "software crisis", described a number of the
famous recent disasters, and then considered what can be done about it.

The problems that arise with software are due to "complexity", "novelty",
and "discontinuity".

Prof. Cliff Jones of Manchester characterised the complexity of software in
terms of the number of branch points it may contain, and hence the number of
possible paths through it. The combinatorial explosion of possible paths
makes exhaustive testing impossible in all but the simplest programs. It may
be difficult to achieve with 50 Lines of code and 10 branch points. With
10,000 LOC and the same density of branch points, the testing time would
exceed the time elapsed since the big bang. As he pointed out, the Sizewell B
Primary Protection System contains 100,000 LOC.

Prof. Bev Littlewood of CSR criticised the tendency of manufacturers to take
advantage of the presence of software to make systems perform more and more
new functions, so that the soft-centred systems are many times more complex
than those they replace, and are also attempting completely novel things,
whose consequences may be poorly understood.

Cliff Jones returned to describe the discontinuous nature of digital systems,
whereby changing one bit in the internal state or input may cause a vast
change in the output. This is in contrast with the "traditional" engineering
approach which relies on the fact that, in systems which are governed by
the laws of physics instead of the rules of logic, a continuous variation
of input leads to a continuous variation of output.

I spoke briefly about the problems of certifying software to a certain
numerical level of reliability, with particular reference to avionics systems,
where the regulations specifically exclude software from reliability
measurement, with the result that manufacturers treat its reliability as 1
for the purposes of calculating overall system reliability.

Martyn Thomas described the guidelines for avionics software as simply
exhorting the manufacturer to "try harder" with the more critical stuff.
Dan Hawkes of the CAA pointed out that "do your best" is an approach often
used with certain hardware systems on aircraft, and said that software was
treated no differently from some hardware.

Martyn was in favour of using formal methods on safety-critical software, and
also of qualifying the people who work on it. There are no formal
qualifications required before a practitioner may tackle a safety-critical
item of software, and yet, as Cliff Jones pointed out, programming
productivity has been found to vary by up to a factor of 10 between
individuals. "Error-prone" modules are regularly found in industry, and this,
Cliff speculated, could be due to their being written by error-prone
individuals.

Various disasters were cited, including the recent Gripen crash in Stockholm,
and the London Ambulance fiasco. Both have been well covered on the list.
A couple of anecdotes of interest concerned the man who called an ambulance
for his mother, who had suffered a stroke. After several hours, he took her
to hospital in his own car. The ambulance turned up 10 hours later. The crew
of another ambulance radioed base after being sent out on a call and asked why
the undertaker had managed to get there before them!

My favourite item concerned the garage owner who specialises in tuning
software. He gets the binary from the engine management ROM by mounting it
in some harness on his PC. With experience, he is able to spot the data
tables containing the engine parameters, and he alters the values. By trial
and error, he has found how to undo the "detuning" that is often designed
into these systems, and he makes the car give you "... a bigger kick in the
back, when you give it some boot!" (or words to that effect!).

Regarding Sizewell B PPS, which was discussed at some length, a "confidential
leaked document" had found its way into the producers' hands, and was
quoted at length. Presumably, this was the same as the one that was featured
on BBC Channel 4 TV news not long ago, and is now being sold for two pounds
by Computer Weekly? I'll let you know when I receive my copy! :-)

Peter Mellor, Centre for Software Reliability, City University, Northampton
Sq., London EC1V 0HB, Tel: +44(0)71-477-8422, JANET: p.mellor@csr.city.ac.uk


Cracking feature in the small press

Jim Haynes <haynes@cats.ucsc.edu>
Sat, 23 Oct 93 21:33:10 -0700
This week's (October 21) "Coast Weekly", a Monterey County free entertainment
(mostly) paper has an article on "hacking" by staff writer Nicole Volpe.
I'll quote part of an introduction from the editorial page.
    "While interviewing computer hackers for this issue, it occurred
    to me that there are a lot of similarities between reporters and
    cyberpunks - We share a belief in freedom of information, a general
    suspicion of those in power who operate secretly, and an unfortunate
    tendency to invade privacy.

    This reporter got a taste of what it's like to be on the receiving end
    of privacy invasion when a hacker I was interviewing handed me a
    printout of personal information about me that he had retrieved,
    using nothing more than my home phone number.  His reasons were valid
    enough - he wanted to be sure I was who I said I was.  As a reporter
    I was impressed with the investigation, but on a personal level, it gave
    me the creeps.  It was a lesson they don't teach you in J-school..."

The main article covers the exploits of some crackers in the Monterey area,
their concern about the Clipper proposal, some stuff about arrests of
crackers in other parts of the country, and an interview with a security
man from Metromedia's long distance business.  The latter says, "If you
picked up the phone a year ago, dialed one digit, and then hung up, I
could go back and find out what that one digit was.  All the records are
stored on magnetic tape."     [Balance of message was apparently truncated.]


FAA and HERF - a pun-ctilio

Dr Peter B Ladkin <pbl@compsci.stirling.ac.uk>
27 Oct 93 22:32:49 GMT (Wed)
Dennis Chamberlin, in an otherwise illuminating article, says:

> And, the airplane itself is a mixed and intradependent package of fairly
> high-power emitters (radio, transponder, radar),

Watt counts as a high-power emitter? I'd be ohm-bliged for amp-lification.
The radios (including transponder) in my humble Archer take roughly 7 amps at
something approximating 14 volts when transmitting.

Peter Ladkin

    [PL actually wrote "appoximating", but I didn't think that was punny,
    so I corrected it.  Appox on both your gausses.  What a re-volting
    development.  And, yes, I do have a susceptance for puns.  Sorry if my
    resistance ebbed.  I was in a Faraway Cage.  PGN]


Re: Clipper

Fredrick B. Cohen <fc@Jupiter.SAIC.Com>
Wed, 27 Oct 93 05:47:34 PDT
I refer all of the risks readers to a set of articles in the LA Times of
10/3/93 which discusses risks related to the Clipper chip.  And to fuel the
debate, I add my own comments:

    IF we hinge everything on the clipper chip and an enemy breaks it,
we are vulnerable at every level.  Isn't diversity a good idea for protecting
the US combined information assets?

    I will be willing to use the clipper chip for all of my encryption IF
the NSA, DoD, and ALL US Government applications use the clipper chip for ALL
of their encryption as well.  Do they really trust it that much?  I doubt it.

    The NY Times article says the US is considering giving clipper chip
keys to other governments so they can monitor our communications as well!
Does this mean France will be able to steal our trade secrets?  They have
already started doing it on airplanes, but now they will be able to do it
en-masse at low cost - sponsored by the US Government.

    Now that we all know the clipper chip is manufactured by Micronix in
Torrence, CA, how long will it be before spies manage to get the design and
the `secret' keys?  Do we really believe that security there is good enough
to trust our entire national assets to it?

    Is the US Government giving a monopoly to Micronix for all cryptography
in the US?  Since when do they have that right?

    Won't the criminals the government claims to be trying to catch be able
to buy encryption from the rest of the world?  Even if it's illegal to do so,
they are criminals, so they will probably be willing!  That means that only
the criminals will be able to avoid surveillance designed to only observe
criminals.

    If there are only a thousand or so legitimate phone taps per year in
the US, is it really worthwhile to spend $26 per chip times a few hundred
million chips (over 2 billion dollars) nationwide just to assure 1,000 phone
taps?  That's 2 million dollars per (phone tap per year)!  I would think that
for 2 million dollars per criminal, the US Government could come up with a
much more effective plan for getting the information they need.

    Suppose the NSA is wrong?  They've been wrong before!  Suppose Clipper
becomes not so hard to break because of some mathematical breakthrough?  Are
they willing to bet the farm on this?

Well, that should get things going - FC


Chip thefts

"Mich Kabay / JINBU Corp." <75300.3232@compuserve.com>
United Press Intl newswire via CompuServe Executive News Service:

  Computer chip manufacturer seeks way to stem theft
     SANTA CLARA, Calif. (UPI) — One of the nation's largest manufacturers
  of computer chips said Friday it will start to put serial numbers on its
  products in an effort to stem the rising tide of robberies."

This move should make it harder for thieves to sell their loot; one hopes it
will therefore make warehouses less attractive targets for the armed gangs who
have terrorized Silicon Valley in recent months.

And the problem with stealing chips is that you can't take just one....

Michel E. Kabay, Ph.D., Director of Education, National Computer Security Assn


Re: Dangers of Anonymous Mailers

"Steven S. Davis" <ssdavis@dpsc.dla.mil>
Wed, 27 Oct 1993 08:51:52 -0400 (EDT)
In Risks 15.17, an32153@anon.penet.fi remarked upon the dangers of including a
signature with anonymous postings.  It's not quite as absurd as it seems, if
someone uses a mailer that appends the signature automatically ( I can't
imagine that anyone who cared about their anonymity, as opposed to those who
just are assigned an anonymous id because they reply to somebody who uses one,
would deliberately append a revealing signature ).  The solution to that, at
least on anon.penet.fi, is simple: The server considers anything after a line
beginning with two dashes as a signature and cuts it off ( this can be a
complication if someone tries to append a document to a message and uses a row
of dashes to separate it from the main text ).  So if you want to send mail
anonymously, either dump your signature or be certain it starts with --.

   [Also noted by Chris Moore <Chris.Moore@src.bae.co.uk>.  PGN]


Re:Swiss AntiViral legislation

Klaus Brunnstein <brunnstein@rz.informatik.uni-hamburg.d400.de>
Thu, 21 Oct 1993 16:33:37 +0100
Colleagues and friends, thanks for the very helpful and positively critical
comments. I append Mr. Frigerio's reply for your information. Klaus
(Oct.21,1993)

PS: Mr. Frigerio will have another fight with lawyers who think that any
legislation is dangerous as it may also hurt the "good viruses". I argued that
"good viruses" exist only in Dr. Cohen's head, as those applications which he
always mentions can be realized by non-replicative methods. Moreover, any auto
matic reproduction has an unwished side-effect, as copyrights for any software
does only apply to the original (=uninfected) program, so viruses "steal" also
legal rights from both the originator and the user (who looses the guarantee,
if any, of a working program :-)

>>>>>>>>>>>>>>>>>>>>>>> Mr. Frigerio's response <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Thanks to everybody who replied on the subject of Swiss Anti-Virus Legislation.

As somebody noticed there was a word missing in the English translation. It
should have been: "... destructs electronically or similarly saved or
TRANSMITTED data will..."

The text posted to the net, was a trial to include into the "data damaging"
even creation and dealing/circulating computer viruses. The idea behind this,
is that the virus itself already carries the malicious intent of his author.
Therefore it is dangerous in any circumstance. Actually a virus can not be
abused, as the idea of abuse includes the possibility, that a virus can be
used in a good way too. As I have been told by specialists, there is no such
"good use" of a virus as any unauthorized change of data has the potential of
interfering with other data and/or programs in environments, that the virus
author did/could not foresee. And even the unauthorized use of storage space
is a damage, as this space will not be available for authorized uses of the
computer system. Computer virus are an "absolute danger", and as any other
dangerous thing (like explosive, poison, radioactive materials or genetic
materials in specialized labs) computer virus should not be created or
circulated without restrictions.

It has been remarked that in the text there was no word about the requisite
intent or requisite knowledge of the committer. This way any BBS sysop would
always risk criminal charges, if his BBS carries any virus infected software
but the sysop isn't aware of it.

I apologize for not having told that Swiss Penal Law only considers
intentional crimes, if there is no explicit indication that negligent acts are
punished too. Therefore according to Swiss Penal Law terminology and system,
the text posted to the net only considers who "knowingly and willingly"
commits the act. That means that the author of the virus has to know it was a
virus, what he created: this is always the case. And who circulates the virus
has to know it was a virus and he wanted to circulate it. The knowledge that
SW was or carried a virus can be proved easily by the fact that nobody
knowingly stores viruses without labeling or marking them in any way, in order
not to be infected himself (yes, I know: if there really is somebody so
foolish, I have to find another way to prove his knowledge). For BBS a "Virus
Directory" containing viruses or virus source codes is evidence enough for the
"requisite knowledge and intent". The law does no want to punish accidental
distribution of viruses.

The phrase "means destined for unauthorized deletion" has been considered
unclear. "Means" certainly includes not only software, but source code (on
paper as on disks) too. It has been remarked that it's the classical toolmaker
problem: a knife can be used as woodcarver to make a great work, but it might
be used by a thug to commit murder.  I realized this problem, but would you
consider a knife as generally destined to commit murder? Or would you consider
explosive as generally destined to create damage? We have to be aware that
most items can be used in a legal or abused in an illegal way.  Seldom an item
can only be used in an illegal way, but computer viruses are such items!  I do
not speak about software using virus specific reproduction techniques (like
"killer viruses" for copyright enforcement or "anti-viruses" supposed to fight
viruses) that make data changes with the explicit (contract/license) or
implicit (highly probable agreement of the user) authorization of the user.
This kind of SW is actually not included in the definition of "means destined
for unauthorized deletion, modification, or destruction of data".  Therefore
you cannot say that Norton Utilities, WipeFile or any other similar general
purpose SW or utilities are "destined for unautorized deletion, modification
or destruction", although they certainly could be used for this.

The text doesn't say anything about malice, malicious intents or the intent to
damage, as these elements are very difficult to prove in trial, if the accused
denies any such intention. Actually I considered these subjective elements as
not really necessary, as the virus already carries the malicious intent of its
author: the malice of the author is proved by his virus, and the malice of
somebody circulating the virus is proved, if his knowledge, that he was
circulating a virus, is proved.

According to general principles of penal law the site of crime is the main
link to charge somebody. If a virus has been created or circulated outside the
national borders of Switzerland, Swiss Penal law cannot be applied. But if a
virus created outside Switzerland is transferred electronically to
Switzerland, the downloader will be held responsible, no matter if he was in
Switzerland or abroad, as "importing" as a way to circulate the virus.  The
"success" of the act will take place in Switzerland. Anyway Art. 7 of Swiss
Penal Law follows the principle of territoriality and the "Ubiquitaetsprinzip"
(sorry: didn't find the correct English word: an act is considered being
committed not only where the committer was, when he started his crime, but
also where the "success" has been realized. Anyway I do consider clarifying
this by inserting that "importing" virus is considered as "circulating in any
way".

As this crime is prosecuted as soon as police or prosecution authority knows
about it (so called "ex officio", there is no need for a specific complaint: a
detailed information about a fact is enough to start investigations, no matter
where the information came from (e.g. abroad).

There is no doubt, that professional ant-virus specialists and scientists
should have access to viruses and be allowed to even create viruses. As long
as this is covered by the aim of studying strategies to fight computer
viruses, this is OK. I actually planned a system of registering these people
with a federal authority (e.g. the IS Security Dptm. at the Swiss Federal
Office of Information Technology and Systems or the Ministry of Justice). The
posted text would be then need to be completed as follows: "Who, without being
registered with the proper federal authority, creates...  Only trustworthy
individuals, who are professionally or scientifically active in combatting
such means, may be registered on demand."

The Swiss legislator is actually not only considering "data damaging" but
"hacking", "time theft" and computer fraud too, but these ARE NOT subjects of
the discussion in this forum now. The same applies to software piracy, already
ruled by another law. I will gladly email/fax the German, French or Italian
text of the Penal Law draft to anybody interested. Please do not ask me an
English translation of these, as I am not a professional English translator of
legal text.

I am aware that the UK and Italy have/are going to have laws allowing to
prosecute the creation and circulation of computer viruses. If anybody knows
of other countries, may he please let me know in any way and as soon as
possible.

On Monday, 25 October 1993, there will a meeting with the Ministry of Justice
in order to convince them to propose this to the Parliament. This will be very
very difficult, as there generally is very little knowledge on, or concern for
the threat through computer viruses. Most people have simply never suffered an
attack of computer viruses.

Thanks again for following this item with your comments.

Claudio G. Frigerio

P.S.: Please do not suggest to me to send them a floppy with a ..... just
to make them more aware of the risks...
P.P.S.: You can phone/email/fax/write to me in Italian, German, French,
Spanish or English.

Claudio G. Frigerio, Bundesamt fuer Informatik/Stabsdienste, Feldeggweg 1,
CH-3003 Bern (Switzerland) +41/31/325-9381 bfi@ezinfo.vmsmail.ethz.ch


Computer-Aided Verification (CAV'94)

David Dill <dill@hohum.stanford.edu>
Tue, 26 Oct 93 15:01:04 PDT
                   CALL FOR PAPERS

          CONFERENCE ON COMPUTER-AIDED VERIFICATION
            Stanford University, Stanford CA, USA
                June 21 - June 24, 1994


This conference is the sixth in a series dedicated to the advancement of
the theory and practice of computer-assisted formal verification.
Emphasis will be placed on research results that may potentially
result in improved techniques, implementation issues for existing
verification results, and application of methods to real verification
problems.

Special sessions for tutorials and demonstration of verification tools
are planned.

The boundaries of the conference are not rigid.  In the past,
papers on the following topics have been enthusiastically received:


Application areas:  synchronous and asynchronous circuits, computer
arithmetic, protocols, distributed algorithms, real-time systems,
hybrid systems.

Methods based on: automata, model-checking, automated deduction.

Theoretical issues:  decidability of verification problems and logics,
computational complexity results, verification algorithms.

However, any paper that is of potential interest for computer-aided
verification will be considered.


SUBMISSION:

Electronic submission of Postscript(tm) files is REQUIRED, except for
authors who do not have reasonable access to electronic mail through
Internet, BITNET, etc.  Draft papers should be no more than 10 pages
long (with normal font sizes, line spacing, margins, etc.)  Papers
should provide sufficient detail so that their technical contributions
can be assessed by members of the program committee.  Accepted papers
will be published in the conference proceedings.  Submissions must be
received by January 14, 1994.  Authors will be notified of acceptance
or rejection by March 11, 1994.


Program Chairman:       David L. Dill
                CIS 135
                Stanford, CA  94305-4070
                cav@cs.stanford.edu

Steering Committee:

E. M. Clarke, Carnegie Mellon University, USA
R. P. Kurshan,  AT&T Bell Laboratories, USA
A. Pnueli, Weizmannn Institute, Israel
J. Sifakis, Verimag-IMAG, France

Additional members of the program committee:

R. Alur, AT&T Bell Labs, USA
R. Brayton, U. of California, Berkeley, USA
E. Brinksma, U. of Twente, The Netherlands
R. Bryant, Carnegie Mellon U., USA
R. Cleaveland, N. Carolina St. U. USA
C. Courcoubetis, U. of Crete, Greece
R. de Simone, INRIA, France
A. Emerson, U. of Texas, Austin, USA
M. Fujita, Fujitsu, Japan
S. German, GTE Labs, USA
O. Grumberg, Technion, Israel
N. Halbwachs, France
G. Holzmann, AT&T Bell Labs, USA
K. Larsen, Aalborg U., Denmark
K. McMillan, AT&T Bell Labs, USA
L. Paulson, Cambridge U., United Kingdom
N. Shankar, SRI International, USA
F. Somenzi, U. of Colorado, Boulder, USA
B. Steffen, Techical U. of Aachen, Germany
P. Varaiya, U. of California, Berkeley, USA
P. Wolper, U. de Liege, Belgium
T. Yoneda, Tokyo Inst. of Tech., Japan

Please report problems with the web pages to the maintainer

x
Top