The RISKS Digest
Volume 18 Issue 15

Friday, 24th May 1996

Forum on Risks to the Public in Computers and Related Systems

ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed…

Contents

U.S. National Research Council Study of National Cryptography Policy
Herb Lin
TILT! Counterfeit pachinko cards send $588M down the chute
Peter Wayner
Security by accident
Douglas W. Jones
A few little UK vignettes ...
Les Hatton
The Power of Alta Vista
Rachel Polanskis
Senate Hearing #1 on Information Security: GAO Report issued
David Kennedy
Ted Lee
Alan Tignanelli
Frequently used German passwords
Martin Virtel
The risks of calling 800 numbers?
Bob Blakley III
Re: pornography on net: real risk?
Bob Morrell
Re: Non-universal names for symbols
Angus Duggan
Society and the Future of Computing Update
Rick Light
Info on RISKS (comp.risks)

U.S. National Research Council Study of National Cryptography Policy

"CRYPTO" <crypto@nas.edu>
Fri, 24 May 96 15:20:00 EST
The Computer Science and Telecommunications Board (CSTB) of the National
Research Council (NRC) has completed a congressionally mandated study of
national cryptography policy.  The final report, Cryptography's Role in
Securing the Information Society, will be released to the public on May 30,
1996 at a public briefing.  Many of the authoring committee members will
attend.

The public briefing will take place in the Main Lounge of the National Press
Club, 14th and F Streets, N.W., Washington, D.C., from 1:00 PM to 3:00 PM,
on Thursday, May 30, 1996. Committee members will respond to questions from
attendees, and a limited number of pre-publication copies of the report will
be available at that time.  By the close of business on May 30, a summary of
the report will be made available through http://www2.nas.edu/cstbweb; the
full publication will be made available when final printed copies of the
book are available (probably around the beginning of August).

The committee also intends to conduct a second public briefing on the report
in Menlo Park, California at SRI International.  The briefing will be held
in the Auditorium of the International Building from 10 to 11 am on
Wednesday, June.5.  The address is 333 Ravenswood Avenue, Menlo Park,
California, 94025.  For more information about the briefing at SRI, contact
Alice Galloway at 415-859-2711 (alice_galloway@qm.sri.com).

If you have suggestions about other places that the committee should offer a
public briefing, please let me know (crypto@nas.edu or 202-334-2605).

If you wish to be kept informed of various other public activities regarding
dissemination of this report, you can sign up for an e-mail list by visiting
the web page ttp://www2.nas.edu/cstbweb/notifyme.html.

I apologize to you for the short notice on this invitation, but hope that
you will be able to attend.

                       Herb Lin
                       Senior Staff Officer
                       Study Director
                       CSTB/NRC Study of National Cryptography Policy


TILT! Counterfeit pachinko cards send $588M down the chute

Peter Wayner <pcw@access.digex.net>
Thu, 23 May 1996 08:17:19 -0400
The *Wall Street Journal* of 22 May 1996 (A18) reports that two Japanese
firms lost about 55 billion yen when criminals counterfeited the stored
money cards that they manufactured.  These cards are used to pay for
pachinko games, but you can get refunds wired to an account if you cash in a
card. If my memory serves me correctly, there is a certain amount of skill
involved. If you play well or are lucky, you might even add money to the
cards. But I'm not sure about this detail. In any case, the people with the
counterfeit cards could get refunds when they didn't pay for the original
card.

The Journal mentions three interesting details. First, the cards were pushed
by the police as a means to track the flow of cash and stop money
laundering. Obviously, there wouldn't be these losses if they could really
track the flow. Second, the convenience of the new cards initially boosted
profits because it was so much easier to play with the cards that
automatically kept track of your money. Finally, the Journal reported that
there are 18,244 pachinko parlors in Japan.


Security by accident

Douglas W. Jones <jones@pyrite.cs.uiowa.edu>
22 May 1996 21:29:50 GMT
I serve on the Iowa Board of Examiners for Voting Machines and Electronic
Voting Systems, and last Monday, we met to examine a new modem feature added
to the already approved BRC Eagle mark-sense voting machine.

One question that came up immediately is that, given the fact that Iowa's
current voting law bases the official canvass of votes on hand-delivered
reports from each precinct, what value does a modem serve?  The answer is
trivial — unofficial counts phoned in from the precincts are routinely used
to compute unofficial totals that are then released to the public and press
soon after the polls close.  Right now, these totals are usually phoned in
manually (or should I say, orally), but a modem in the voting machine can
easily serve the same purpose.

An aside: Why the big push for instant results?  Sure, the press wants fast
access to the totals, and counties compete to see who can get their totals
in first, but we'd probably be better off as a nation if there was a news
blackout on vote totals until the day after!

It seems likely that electronic reports will soon be used to formulate
the official canvass.  Currently, the canvass is done by reading the
tapes printed out by computerized voting machines and manually (or with
the aid of calculators and computers) tallying the votes; this introduces
a needless source of error.

Because of this, we decided to examine BRC's new modem feature with an eye
towards the possible incorporation of direct electronic vote total reporting
into the official canvass.  An obvious question that comes up in this
context is, how secure is the system.  BRC's written answer to this question
(one I submitted in writing in advance) boiled down to:

  1) BRC uses a proprietary protocol
  2) The central host, on receiving a report by modem, gives no feedback
       until it receives the whole packet of vote totals.
  3) The central host demands that each voting machine present the correct
       8 digit ID code before it accepts a record of votes cast.
  4) Each voting machine has a 4 digit ID code that is padded to 8 digits
       to make the required ID code.
  4) Failed connection attempts are logged and flagged on screen at the
       central site.

Needless to say, the idea of a 4 digit PIN being sufficient didn't impress
me, nor did the idea of security through obscurity.  The lack of feedback
helps security, but in a jurisdiction with hundreds of voting machines,
the 4-digit code space will be pretty full.  As a result, we had an
interesting discussion of the security issue; this ended when Herb Deutsch
from BRC, said the following, almost in passing (quoted from memory):

  "Oh, by the way, we also include a timestamp in the data and verify that
   it is right.  It's the time the PROM customizing that particular voting
   machine for that particular election was burned, and it's accurate to the
   IBM PC clock precision.  I didn't even think of it as a security
   feature, but I guess it is."

Not only hadn't he thought of this feature as being part of the security
of modem-based vote reporting, but he then went on to explain why the
software included a feature to allow a total with the wrong timestamp to
be accepted despite a timestamp mismatch error.  There was no similar way
to override a 4-digit PIN mismatch.

We approved the machine (Of course, we also tested other things, for
example, by injecting line noise on the phone line while totals from a
test election were being reported).  We also made the administrative
recommendation that, despite the fact that vote totals delivered by modem
are currently not official, central election workers should not override
timestamp mismatches or other overridable error conditions without
explaining why in the presence of witness from at least two political
parties (this is the usual precaution required for all manual vote
processing steps).

If electronically reported vote totals become part of the official
canvass, we concluded that we'd like to see some of the time spent
manually tallying the canvass spent auditing the machine computed
results.  Right now, in Iowa, no recounting of votes is allowed unless
there is a call for a recount.  As currently set up, this prevents
reasonable auditing steps such as recounting randomly selected
precincts or post-vote testing of randomly selected voting machines.
We concluded that these kinds of tests should be routine and should
be completed prior to the certification of an automatically computed
purely electronic canvass.

We also concluded that, someday soon, we'd like to see standards for
electronic vote reporting from machine to central counting location.
Security through obscurity isn't desirable, and cross-vendor compatability
is important!  Voting machines are expensive, and a standard would
significantly simplfy incremental replacement of old voting machines.

Doug Jones  jones@cs.uiowa.edu


A few little UK vignettes ...

"Les Hatton" <les_hatton@prqa.co.uk>
23 May 1996 13:44:15 +0000
1) Election results.  The BBC operates a magnificently indulgent set of
computer graphics for predicting the various results of elections.  In an
interview on BBC News Extra on 3 May 1996, its presenter, Peter Snow, was
asked if there were ever problems.  "Oh yes", he replied.  "For example, in
the Dudley (a Midlands town) bye-election, the swing away from the (ruling)
Conservative government was so large that the entire screen went blank
because the programmers had not allowed for the Conservatives having no
seats (i.e. elected representatives)".

2) Airline entertainment systems.  During a single flight from Singapore to
London experienced by myself in April 1996, the Singapore Airlines inflight
entertainment system, "Krisworld", was rebooted twice in the first two
hours, numbered its video channels with the rather eccentric numbering
system, 1,2,3,4,5,6,48,8,... and then lost the numbers completely for a
while so the video channel had to be guessed.  This is a regular occurrence
according to my colleagues.

3) Taxation.  It was recently reported in the UK (April 1996 on
www.netaccountants.com) that "A VAT Tribunal has shown the Customs & Excise
VAT computer was incorrectly calculating VAT surcharges for late filing of
returns.  Customs have estimated that about 90,000 default surcharges were
too high and have said that the way that the computer was programmed means
that Customs cannot identify the businesses that have been overcharged !"

Les Hatton, Ph.D. C.Eng, Director of Research & Engineering, Programming
Research Ltd, England  les_hatton@prqa.co.uk  +44 (0) 1 932 888 080


The Power of Alta Vista

Rachel Polanskis <r.polanskis@nepean.uws.edu.au>
Thu, 23 May 96 19:44:35 1000
This is about a discovery I made with Alta Vista the WWW search engine, and
its robot "scooter".

The system I hit on had a high port of 8000 and I accessed it via Netscape 1.1N
for the PC, through Alta Vista...

I can not believe what happened to me, and it has elicited a bit of interest
around the place.  I hope I never see it again!

Here is the article I posted:

Hello everyone.

I thought I might share with you an experience I had today while searching
the Internet for information on some programming topics.

I used Alta Vista to do a search on some programmers' libraries,
for my home UNIX network.

The software I wanted is actually commercial, and not freeware, and is
unavailable except by purchasing it.

Imagine my surprise when Alta Vista returned in its little search screen:

"Directory of /lib"

Hmmmm.....

I proceeded to follow this link, hoping I might have hit on a public
archive of software made available on the public domain, as the OS I
wanted it for is basically obsolete.

I was even more interested when I saw several system libraries scroll by
on my screen...

A quick check of the root home page of the system (i.e. just the domain
name without a path to files) brought back the following:

> Index of /
>     Name            Last modified     Size  Description
>
>     bin/            15-May-96 14:20      -
>     boot            17-Nov-93 00:12   101K
[...]
>33 files

To the uninitiated, this is the *root filesystem* of the UNIX host I was
visiting via netscape.

I changed directory to /etc and was amazed to see everything available to me.

I clicked on /etc/motd and that was enough to tell me I could have had the
password file had I wanted to.

I mailed the site's admin and postmaster telling them of the security breach.

The site is now offline since I checked tonight.

Now, people - that is what Alta Vista can do on an unsecured UNIX server.

Their whole machine - user private directories and everything - even files made
read by the system only were publically available for anyone to download.

Had I been malicious, I could have downloaded the password file,
cracked it with crack, logged in as root, and deleted the syslogs and no
one would have been the wiser to my presence, at least for a while anyway.

There is no moral to this story - if there was one it would be
something like:  "You Are Being Indexed" - if you do not take care.
Be careful of what you put on your computers.
If there is a hole, Alta Vista will find it.
And it is damn good at indexing Hard Disks.

The site was indexed by Alta Vista's robot more than a week ago...

Rachel Polanskis, Kingswood, Greater Western Sydney, Australia
grove@zeta.org.au  r.polanskis@nepean.uws.edu.au


Senate Hearing #1 on Information Security: GAO Report issued

David Kennedy <76702.3557@CompuServe.COM>
23 May 96 13:40:31 EDT
Courtesy of Associate Press via CompuServe's Executive News Service
Copyright 1996 The Associated Press. All rights reserved.

Computer Security
   By JIM ABRAMS,  Associated Press Writer
<>   WASHINGTON (AP) — Hackers infiltrate Pentagon computers
<>more than 160,000 times a year, threatening "catastrophic
<>damage," but the military rarely detects and seldom
<>investigates the interlopers, government investigators said
<>Wednesday.    "At a minimum, these attacks are a
<>multimillion-dollar nuisance to Defense. At worst, they are a
<>serious threat to national security," the General Accounting
<>Office said.

o   GAO repeated the DoD estimate of 250K attempts last year.  Testimony
highlighted it was an estimate, but also that in GAO's opinion it was
probably more accurate of an estimate than anyone else's.

[DMK: The article states 65% of these were successful, but that was not what
was in the testimony before the Senate.  I watched the testimony on CSPAN
last night (yes I do too have a life) and the testimony was that DoD
estimates 250K attempts, and _DoD's_own_testing_ had a success rate of about
65%.]

<>   The report, presented to the Senate Governmental Affairs
<>subcommittee on investigations, dealt with the more than 90
<>percent of Pentagon data that is unclassified. It nevertheless
<>could contain highly sensitive information on troop movements,
<>procurement and maintenance of weapons systems.

o   Testimony included 120 countries (identity classified) have or are
developing computer attack capabilities.

<>   The report quoted the Pentagon as accepting that the
<>document fairly represented the increasing threat of Internet
<>attacks. Officers attributed some of the problems to poorly
<>designed systems or to the use of off-the-shelf computer
<>products without inherent security safeguards.

o   Both the Senate testimony and the Pentagon spokeperson highlighted
the issue is unclassified information and that classified information was
secure.  [Well, not quite...  PGN]

<>   Pentagon spokeswoman Susan Hansen also stressed that the
<>report focused only on unclassified transmissions between the
<>department and the outside world.    Information on weapons
<>systems and other classified material was secure, she said. "We
<>have invested in those systems so they are not subject to those
<>attacks," she said, "but we are not taking lightly the
<>repetitive and constant attacks" on unclassified Pentagon
<>networks.

o   Testimony include the Griffiths AFB penetration by the hacker
Datastream Cowboy in early 1994:

<>   To avoid detection, the hackers went through international
<>telephone lines, passing ports in South America, Seattle and
<>New York to reach the Air Force computer. From there, they
<>broke into computer systems of NASA, Wright-Patterson Air Force
<>Base, defense contractors around the country and South Korea's
<>atomic energy center.
...
<>   The report noted that the Defense Information Systems Agency
<>has conducted 38,000 attacks on Defense computer systems via
<>the Internet to see how well they are protected. The agency
<>gained access 65 percent of the time.
<>   Of these successes, only 4 percent were detected by target
<>organizations, and in only 27 percent of those cases was the
<>detection reported to the systems agency.

Dave Kennedy [CISSP] Information Security Analyst, National Computer Security
Assoc.

  [The report is available from the Government Accounting Office,
  GAO/AIMD-96-84, Information Security: Computer Attacks at Department
  of Defense Pose Increasing Risks.  Cliff Stoll, Bob Anderson of RAND,
  and I were at the hearing, having been invited to testify.  However, our
  testimony has been postponed because the Senate decided to do a blitz
  voting on 40 issues at 10 minute intervals, so the hearing was cut short.
  PGN]


Senate Hearing #1 on Information Security: GAO Report issued

Ted Lee <tmplee@MR.Net>
Wed, 22 May 1996 16:07:51 -0600
... I have three questions: a) how did they
go about collecting such statistics, b) if the systems had software good
enough to notice that they had been penetrated, why couldn't they have
stopped the penetration, and c) how many successful or unsuccessful attempts
were not detected?  (Not that I have any idea how one would go about getting
that number.)  I will grant, for instance, that if the attack is a password
attack where the search was done on another system on a copy of the password
file one might not detect it until considerably after the fact, but unless
the penetrators actually caused damage I would suspect any such successful
attacks wouldn't be noticed at all (who bothers to look at the "last login
time" notice, if there even is one?) — the impression I have (but one must
also question here how one would validate this) is that most hackers don't
damage data, just look at it.  I will also grant that intrusion detection
systems (which can detect mosquito bites but not technically competent
attacks) might work slowly enough as not to be able to stop an attack in
progress, but I suspect that most of the systems involved (the stories said
something about mass-marketed computers) don't have any intrusion detection
installed.

I don't doubt the message (things are bad and getting worse); what I do
doubt is whether there is any scientific validity to the numbers.  The
RISKs? a) an unecessary amount of money will be spent on solving a
non-problem, or b) the problem actually is real, but the flawed nature of
the statistics will be questioned and the opposite will happen.

Dr. Theodore M.P. Lee Consultant in Computer Security PO Box 1718 MN 55345
tmplee@MR.Net Minnetonka, 612-934-4532


Senate Hearing #1 on Information Security: GAO Report issued

Alan Tignanelli <75453.2055@CompuServe.COM>
23 May 96 12:41:59 EDT
... The part that I found interesting was this quote (from the Pittsburgh
Post-Gazette, by Nolan Walters of the Knight-Ridder News Service):

  "A 16-year-old kid from the United Kingdom, with the computer nickname
`Datastream Cowboy,' used a common 486 SX desktop computer, with *only a
170-megabyte hard drive,* to break into the Rome Laboratory sytem..."  (my
asterisks for emphasis - AT)

Is it just me??  "Only a 170-megabyte hard drive??"  Good thing he didn't
have one of those fancy-schmancy 2-Gig drives - think of what kind of
systems he could have broken into!!!!  Yet another example of the uninformed
writing for the uninformed.

Alan Tignanelli


Frequently used German passwords

Martin Virtel <M.VIRTEL@BIONIC.zerberus.de>
Thu, 23 May 1996 10:46:40 +0100
RISKS readers are well aware the RISKS of frequently used (and thus easy to
guess) passwords. For the record (and for those of you who run sites where
German speakers have passwords), here is the "most popular passwords" list
for German, as obtained by a computer magazine's (PC Welt Extra) survey and
reproduced by AP in Sueddeutsche Zeitung, May 22nd 1996, p.12:

1. Passwort     ("password", could also be spelled <HTML>Pa&szlig;wort</HTML>)
2. Pass         (no translation)
3. Liebe        ("love")
4. Sex          (same)
5. Gott         ("God")
6. Genie        ("genius")
7. Hacker       (same)
8. Geheim       ("secret")

Next are names, of the users themselves as well as names of spouses and
children. I wonder if there is anybody willing to comment something on "German
character" due to the passwords Germans are choosing, or any similar lists
for other languages leaving room for (risky) "national character" studies :-)

Martin Virtel

PS. Any occurrences of this message being held up by mail filters because of
the fourth most popular password welcome.


The risks of calling 800 numbers? (Slade, RISKS-18.14)

Bob Blakley III <blakley@VNET.IBM.COM>
Wed, 22 May 96 19:47:42 EDT
There are risks associated with assuming you're smarter than the spammers.

Here the tactic is simple, regardless of whether auto-billing to originating
callers is possible: spam this number from pay phones.  They all dial 800
numbers (isn't it a regulatory requirement, like 911?), their users are
completely anonymous, and their operators would almost certainly not be held
liable for charge-backs under this scheme.

Bob Blakley, IBM Austin, 11400 Burnet Rd. Bldg 903 Rm 7b-01
(blakley@vnet.ibm.com)  FON 512 838-8133 t/l 678, FAX 838-0156 t/l 678


Re: pornography on net: real risk?

Bob <bmorrell@bgsm.edu>
Thu, 23 May 1996 11:05:19 -0400 (EDT)
In Risks 18.13 (May 17, 1996) Simson L. Garfinkel said of his small ISP:
>
> ... we specifically block the alt.binaries groups. The principle reason
> that we do this is to conserve our bandwidth: receiving alt.binaries
> would require that we triple our off-island throughput.
                        ^^^^^^
Now, skipping the moral and legal points noted by Mr. Garfinkel, with which
I mostly agree, my main observation was this: is this what the internet
=really= is all about? This and other stories, some on RISKS suggest that
the search for soft and hard core porn make up the majority of internet
traffic. This is a very disheartening to those of us who wish the net to
thrive and realize its potential. The net will not thrive if its main
purpose is the exchange of pornography. Eventually society will recognize
its non-productive nature and abandon it. Indeed the predictions of the
collapse of the net, widely reported recently, addressed this perception
that few real uses for the net had been found.

The risk? As more and more =quantitative= stories like Mr. Garfinkel's
come to light, the size and scope of the net's "dirty secret" becomes
apparent, commercial, scientific, and other interests will decide the net
is a bad neighborhood to hang out in. If more ISP's took Mr. Garfinkel's
stance, the =long term= interests of the net would be better served.

Bob Morrell  bmorrell@bgsm.edu http://pandoras-box.bgsm.edu/micro/tech.html


Non-universal names for symbols (Re: Mackie, RISKS-18.14)

<angus@harlequin.co.uk>
Thu, 23 May 1996 10:19:37 +0100
There is another risk here, partly computer-related, which is that of using
names for symbols which are not universally recognised. There was has recently
been a long discussion on comp.fonts about the proper name for the '#' symbol.
The concensus seemed to be that while US readers recognised the name 'pounds'
for this symbol, UK readers did not. They tended to know the symbol by the
names  'hash', 'square', or 'sharp'. This name by which this symbol is known
appears to be related to the context in which it is encountered; other names
included 'nittle' (apparently used in the building trade) and 'octothorpe'
(used by some phone companies).

We use symbols in computing which are not part of normal everyday life; the
risks are that as more non-technical people use computers, there will be
more mistakes and confusion stemming from the wrong symbols being used, or
symbols being used inappropriately.

Angus Duggan, Harlequin Ltd., Barrington Hall,  | INET: angus@harlequin.co.uk
Barrington, Cambridge CB2 5RG, U.K.     | FAX: +44(0)1223 873873


ociety and the Future of Computing Update

Rick Light <rxl@lanl.gov>
Wed, 22 May 1996 16:14:26 -0600 (MDT)
         Society and the Future of Computing '96
                  June 16-19, 1996, Snowbird, Utah, USA
                http://www.lanl.gov/SFC

All conference information and the registration form are available
through the Web site (http://www.lanl.gov/SFC/96/).

Any questions or comments you might have may be addressed to sfc96@lanl.gov.

   [See RISKS-18.07 for earlier announcement.  PGN]

Please report problems with the web pages to the maintainer

x
Top