The Risks Digest

The RISKS Digest

Forum on Risks to the Public in Computers and Related Systems

ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Volume 6 Issue 52

Friday 1 April 1988

Contents

o April Fool's warning from Usenet
Gene Spafford via Cliff Stoll
o Quebec Probing Leak of Government Information --
Glen Matthews
o New virus reported
Wes Brzozowski via Dave Goldblatt via Al Stangenberger
o Virus precursor: "ANIMAL"
Mike Van Pelt
o More On Race and Ethnicity Questions...
Mike Pabrinkis
o Re: Short stories of old computer risks
Ephraim Vishniac
o Re: Notifying users of security problems
Hugh Davies
o Credit-limit handling found overly restrictive
Henry Mensch
o Bankcard authorizations
Fred McKay
o Terminals and checking the facts
Jerry Leichter
o Info on RISKS (comp.risks)

April Fool's warning from Usenet

Cliff Stoll <cliff@Csa5.LBL.Gov>
Thu, 31 Mar 88 12:17:48 PST
Here's the warning from USENET's  news.announce.important:

From: spaf@cs.purdue.EDU (Gene Spafford)
Subject: Warning: April Fools Time again (forged messages on the loose!)
Date: 1 Apr 88 00:00:00 GMT
Organization: Dept. of Computer Sciences, Purdue Univ.

Warning: April 1 is rapidly approaching, and with it comes a USENET
tradition. On April Fools day comes a series of forged, tongue-in-cheek
messages, either from non-existent sites or using the name of a Well Known
USENET person. In general, these messages are harmless and meant as a joke,
and people who respond to these messages without thinking, either by flaming
or otherwise responding, generally end up looking rather silly when the
forgery is exposed.

So, for the next couple of weeks, if you see a message that seems completely
out of line or is otherwise unusual, think twice before posting a followup
or responding to it; it's very likely a forgery.

There are a few ways of checking to see if a message is a forgery. These
aren't foolproof, but since most forgery posters want people to figure it
out, they will allow you to track down the vast majority of forgeries:

        o Russian computers. For historic reasons most forged messages have
          as part of their Path: a non-existent (we think!) russian
          computer, either kremvax or moscvax. Other possibilities are
          nsacyber or wobegon. Please note, however, that walldrug is a real
          site and isn't a forgery.

        o Posted dates. Almost invariably, the date of the posting is forged
          to be April 1.

        o Funky Message-ID. Subtle hints are often lodged into the
          Message-Id, as that field is more or less an unparsed text string
          and can contain random information. Common values include pi,
          the phone number of the red phone in the white house, and the
          name of the forger's parrot.

        o subtle mispellings. Look for subtle misspellings of the host names
          in the Path: field when a message is forged in the name of a Big
          Name USENET person. This is done so that the person being forged
          actually gets a chance to see the message and wonder when he
          actually posted it.

Forged messages, of course, are not to be condoned. But they happen, and
it's important for people on the net not to over-react. They happen at this
time every year, and the forger generally gets [his/her] kick from watching the
novice users take the posting seriously and try to flame their tails off. If
we can keep a level head and not react to these postings, they'll taper off
rather quickly and we can return to the normal state of affairs: chaos.

Thanks for your support.                                     Gene Spafford

           [Especially if the forger is into forging Trojan horseshoes.  PGN]


Private Access to Government Information --

Glen Matthews <GLEN%MCGILL3.BITNET@CORNELLC.CCS.CORNELL.EDU>
Thu, 31 Mar 88 10:40:15 EST
              Quebec Probing Information Leak 

The following is from a newpaper article today in Montreal. It is reproduced
here without permission. It is an example of the possible abuses when
government files are accessed, and illustrates why system designers should
take pains to make illict access as difficult as possible.

    Quebec Probing Information Leak - by Peggy Curran and Nancy Wood
    Montreal Gazette, Thursday, March 31, 1988

   Justice Minister Herbert Marx yseterday ordered a police investigation
into the sale of confidential information on welfare recipients by a South
Shore (of the St. Lawerence River) firm. And two other government probes
were launched in light of a Gazette story which outlined the activities of
Groupe Elite of Boucherville.
   Tuesday, company official Serge Peloquin denied previous claims the
company had access to government files on welfare recipients.
   However, an investigation conducted for the Gazette showed the firm was
able to come up with personal  information on a welfare recipient in less
than 4 hours.
   Yesterday, the Gazette learned that the Boucherville firm may also have
access to personal files on people on unemployment insurance.
   In the National Assembly yesterday, Manpower Minister Pierre Paradis
promised a thorough inquiry within his department. "We believe the welfare
recipient's right to confidentiality is an unalienable right and we intend
to take the measures necessary to see it is protected", Paradis said.
   Communications Minister Richard French said the Access to Information
Commission, which protects the privacy of personal documents, will conduct
its own investigation.
   "We expect to know shortly whether we're dealing with a technological
problem - that is to say, whether we're not protecting adequately the data
in the computer - or whether we're dealing with an employee who isn't
respecting the ethics appropriate to his position, or whether there's some
other kind of situation", French said.
   In a letter dated March 7, the company promised potential customers
the current mailing address of any person on welfare for a $10 fee. The firm
claimed to get its data "directly from the ministry".
   On Tuesday, Peloquin dismissed the offer sent to collection agencies as
"a kind of false advertising", designed to attract business. He said all of
his information is available from computers at the Montreal courthouse.
Minutes earlier, he'd given a private detective hired by the Gazette a
welfare recipient's home address, parents' names and unlisted telephone
number, and the fact that he receives a disability pension.
   Couthouse computers carry only the names of those who have been involved
in a civil or criminal action. Even then, listings do not include telephone
numbers, relatives' names, or welfare classifications.

[... the story goes on to recount the experience of an unidentified "victim"
who was tracked down by a finance company. He said that his address and
unlisted phone number were known to only a handful of relatives and the
Unemployment Insurance Commission ...]

   Raymonde Bellerive, a public affairs officer for Employment and
Immigration Canada, said UIC has not received a formal complaint and there
are strict guidelines on the use of confidential data. But Bellerive said
the charges are worrisome and UIC will certainly investigate if the man
complains. (UIC is the Unemployment Insurance Commission.)
   Michel Patenaude, an investigator for the Access to Information
Commission, said it's certainly not the first time confidential information
has leaked from a governmental or para-public agency. Leaks are apt to happen
whenever you have confidential information - and large numbers of employees
with access to it. But Patenaude said the case does raise the question of
of the way Social Insurance Numbers are widely used.
   "With computers, the Social Insurance Number has become the key that
opens the door to all kinds of information. Once you've got it, it's not
that difficult to find someone who'll plug it into the system."

... the story goes on to report the reaction of groups such as the Coalition
of Welfare Recipients (churchs, food banks, etc.), and the Ligue des
Propprietaires (landlords association) ...


New virus reported

forags@violet.Berkeley.EDU <Al Stangenberger>
Thu, 31 Mar 88 09:06:32 PST
Article 16275 of comp.sys.ibm.pc:
From: dave@sun.soe.clarkson.edu (Dave Goldblatt)
Newsgroups: comp.sys.ibm.pc,comp.sys.zenith.z100,comp.misc
Subject: New Virus found..
Date: 31 Mar 88 14:26:22 GMT
Reply-To: dave@sun.soe.clarkson.edu (Dave Goldblatt)
Organization: Clarkson University, Potsdam, NY

I just pulled this from my bulletin board...

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

FROM: Wes Brzozowski

SUBJECT: New Trojan Virus

There's a new virus program that's been seen on the West Coast, that's a 
lot nastier than the COMMAND.COM virus. This one doesn't need COMMAND.COM 
to carry it. It inserts itself into the boot record of diskettes, and 
takes 3 unused clusters, which it then marks as "bad" in the FAT. As 
such, it doesn't show up in any DOS file. Booting up from such an 
infected diskette will cause all subsequent diskettes to be infected. The 
original program that carries the thing is no longer needed, and in fact, 
no one seems to know what the original program is, so it could be here. 
I've been given a deactivated copy of the virus for study, so I know that 
this piece of trash really exists. It appears to only go for diskettes 
(only infects the A & B drives), not hard drives. I haven't gotten far 
enough to find out what nastiness it will eventually do. It seems that it 
will change the volume labels of the diskettes to "(c) Brain". The boot 
record contains a message to beware of this virus, and gives an address 
(in Pakistan, no less!!) to write to for protection. This seems like a 
joke, but there's always an outside chance that someone is trying to do 
some extortion. An infected diskette will show three bad clusters if you 
run a CHKDSK on it. (So says the person who made the virus available; I 
have no intention of actually activating it to check this out.)
In any case, if you happen to see this weird volume label, or start 
seeing bad clusters in your diskettes, or (most likely) both, let us all 
know about it. We may be able to find the source of this virus, which 
would be a great service to everyone. By the way, this virus looks for 
two "innoculation bytes" in two normally unused bytes in the boot record. 
It presently looks like setting these to the proper value will make the 
virus ignore your diskettes. I'll give more details on these after I've 
gone completely through the code and am absolutely sure I know what I'm 
talking about. Until then, please keep your eyes open. Take care.
                                                    Wes B.

 * Origin: * N I T E W I N G * 607_687_3470 * Owego,NY * (Opus 1:260/410)
SEEN-BY: 260/10 313 314 320 322 325 330 335 345 350 360 410


Virus precursor: "ANIMAL".

Mike Van Pelt <unisv!vanpelt@unix.SRI.COM>
29 Mar 88 16:23:54 PST (Tue)
  'Way back when on the Univac 1108 there was a program which had some of
the characteristics of today's viruses, though it wasn't a virus by the
strict definition.  For one thing, it was perfectly harmless except for
the waste of disk space and programmer time it caused.
   "ANIMAL" is a popular game program which (minus the 'virus') has been
written an rewritten for all kinds of machines.  It's your basic "20
questions, guess the animal" game that remembers every animal it fails to
guess.  However, while the user was playing the game, "Pervading ANIMAL"
was copying itself into every program file (very roughly equivalent to a
direcory in Unix) that the user had assigned to his session write enabled.
    It was fairly intelligent about this -- it checked to make see if a
copy of ANIMAL existed in the file, and if it did, checked to see which
version was the most current.  It even went so far as to put an illegal
time in the creation date of the copy, and used that to determine if the
ANIMAL program it was about to overwrite was created by ANIMAL.  It would
thus avoid destroying any other program which just happened to have been
named "ANIMAL".  
   To avoid possible undesirable legal entanglements, (I don't THINK he'd
mind, but I don't want to take any chances) I won't name the author,
though he is a VERY big name in the PC world these days.  His stated
objective was to recieve a copy of ANIMAL on a Univac system release tape.
(Of course, if he recieved it, so would everyone else in the whole
world.)  Rumor has it that an operating system release was pulled at the
last minute when someone noticed ANIMAL in the system library.
   The 'virus' action of the program was in a rather elegant little
subroutine called "PERVADE", which had some really classic documentation:

      "Pervasive Release: A new means of distributing software:
      ... When someone calls you and asks you for a copy of your
      program, you can tell them that in all probability they
      already have it, much to their own surprise."  
      (Hey, maybe the GNU people would like this... :-)

   There were a number of copies of ANIMAL that had been "fixed" so that
they didn't pervade.  Of course, in classic Darwinian fashion these were
vastly outnumbered by the ones with intact reproductive powers.  Then 
with release 33 of Exec 8 the format of file item table was changed, and
ANIMAL pervaded no more, though it still played a good game of "ANIMAL".
Rumor has it that somewhere someone updated the PERVADE subroutine to
recognize the new file item format, but I haven't heard more about it
in several years.  Game playing on mainframes is a dying pastime, anyway.
(We're all too busy reading NetNews :-)

Mike Van Pelt        Unisys, Silicon Valley       vanpelt%unisv@ubvax.ub.com
Bring back UNIVAC!                              ...uunet!ubvax!unisv!vanpelt


More On Race and Ethnicity Questions...

<mpabrin@nswc-g.ARPA>
Tue, 29 Mar 88 21:16:52 est
Les Earnest (and Peter Neumann):

First, thank you for what is *really* one of the best (longest, and most
enjoyable) RISKS items I've read.  If you *really, really* think about it,
there is no way to justify a RACE or ETHNICITY question, unless you accept the
notions of quotas, percentages, much et cetera, in lieu of selecting the best
qualified candidate for a position.

For several years, on various forms [I've lived in Virginia for 15 years] I've
answered RACE: HUMAN (but I must confess, intermittently).  Strangely, the
answer has *never* been questioned, or at least, I've not been questioned about
it.

Before I entered the Federal Civil Service [Summer, 1963] I completed the
standard background questionnaire.  To the question about membership in
organizations (by its placement, obviously derivative of the McCarthy-era
mentality) I answered ARBEITER SAENGER JUGENDCHOR, loosely the [German]
Workingmen's Singing Youth Chorus.  It was based at the Labor Lyceum, a hotbed
of Socialist activity in the Thirties, and pro-German sentiment in the Forties.
My singing career was [very] short.  It [began and] ended in the mid-Fifties,
but for its brief duration, I was in closely harmonious contact with many, many
holdovers from the earlier eras.  Until today I never realized *why* my
background checks were *always* among the first ones completed.

Lately it is fashionable [some slug might say mandatory] in working for that
same employer to be an EEO [Equal Employment Opportunity] champion.  Years ago
I was invited to join an Officers' Club.  The application clearly stated that
membership was restricted to Commissioned Officers and Civil Servants at and
above a particular grade-level.  I did not join, and in my declination letter
[with copy to the C.O., *always* the local EEO officer] I wrote, "...I TAKE
OFFENSE AT AN INVITATION TO JOIN AN ORGANIZATION WHICH DISCRIMINATES IN ANY
WAY, ...AND DISCRIMINATION BY RANK OR PAY GRADE IS DISCRIMINATION JUST AS
SURELY AS DISCRIMINATION BY COLOR, AGE, ETHNICITY, GENDER OR RELIGION."  I
received [his] written reply which cited four references for the maintenance of
"status quo", and repeated the invitation to join.  I don't think he got my
meaning, and I'm sure he *knows* I didn't get his.

More recently, after receiving literally tens of pages of flyers and electronic
mail messages of invitation to [month of February] racially and ethnically
identifiable celebrations - NO ANNUAL LEAVE REQUIRED - I invited my immediate
manager to the "Left-Handed Second Son of the Left-Handed Second Son of the
Immigrant Lithuanian Cloth Cutter Quarter-Hour of Silence" (to be held sometime
between 12:00 and 14:00 on Monday, 30-May-88).  She seemed to avoid me for a
week.  When I explained that it would involve hamburgers, hot dogs, beer and a
swimming pool, she began to understand.

What has any of my establishment-bashing (or Les Earnest's, - Come on! Are you
*really*?) got to do with RISKS [of Computers and other Technology In Society]?
Just this.  We manufacture and implement and profit by the use of tools in our
society.  We also think (and choose and love and eventually die - every one of
us, I trust).  If one continuously chooses the *safe* [non-risky] path in one's
society [including *safe* answers to obviously obnoxious, albeit entrenched,
questions on forms of many organizations within the greater society], neither
the person nor the society grows.  Get out there and challenge the bigots! Both
you and the society will grow.  Oh, but do it reasonably.  Finally, the
tie-in...  The same habit of questioning, analysis, refusal to accept [a
less-than-good] existing tehnology, and suggestion of a better way, is usually
rewarded by a fair-minded manager [both within and without the Government].
I've often wondered *why* the same person who will not accept or tolerate
shoddy work or thinking on the job, will choose to ignore or tolerate or accept
or embrace any shoddy societal norm.

  Mike Pabrinkis         (K33)              mpabrin@nswc-g.arpa
  Naval Surface Warfare Center                 (703)663-7529
  Dahlgren, VA           22448                  (AV)249-7529

  DISCLAIMER: Yes, the opinions are *only* mine.  You are invited to
  ignore, tolerate, accept or embrace [or even rebut].

  and POSTSCRIPTS: If you'd like to know more details about the 30-May-88
  "...Quarter-Hour", contact me directly [less-RISKy].

  A tender apology for punning Les's name.  He *really* is Les Earnest.

  Now, go back and *analytically* re-read the subject-line.  Thank you.


Re: Short stories of old computer risks (Les Earnest)

<ephraim@Think.COM>
Thu, 31 Mar 88 14:46:34 EST
In RISKS 6:50 Les Earnest writes of his trials and amusement with a
system that tried to classify him:
  > The incidents described span a period of twenty years ending 25
  > years ago, but I think they are still amusingly relevant.  

His recollections of institutional racism reminded me of an anecdote
from my father, and that in turn suggested a forward-looking moral to
both stories.  First, the story:

In about 1955, my father was stopped for running a stop sign.  (He
didn't see it, honestly.)  The policeman asked my father for various
information, including his nationality.  "I'm American." he replied
with a thick accent.  The officer was unconvinced.

"But where are you *from*?"
"Well, I was born in Berlin."
"German, then."
"I was never a German citizen.  I was Latvian.  But now I'm American."
"Latvia?  Where's that?"
"It's not there anymore.  It's part of the Soviet Union."
"So you're Russian."
"No, my father was Russian, not me.  My mother was Latvian.  We're all
 American now."

The officer called the station for instructions.  He had a lively
discussion with the desk sergeant, during which my father overheard
him exclaim that, "You're not American unless you're six ways a
bastard!"  Eventually they concluded that, given the presence of a
valid Connecticut driver's license, nationality wasn't really that
important on a traffic ticket.

Second, the moral:

It's difficult now to imagine the social climate of the 1950's in
which these incidents occurred.  It's sometimes claimed that some
system, power, or technology won't be abused because society - social
pressure, morals, or current law - prevent it.  But next year things
will be different, and in thirty years the social climate of today
will be almost impossible to recall.  That's why it's important, in
forums such as this Risks Digest, to consider the conceivable risks
and not only the present ones.

Ephraim Vishniac                      ephraim@think.com
Thinking Machines Corporation / 245 First Street / Cambridge, MA 02142-1214


Re: Notifying users of security problems

<"hugh_davies.WGC1RX"@Xerox.COM>
31 Mar 88 01:25:29 PST (Thursday)
In RISKS 6.50, Andy Goldstein (goldstein%star.DEC@decwrl.dec.com) states..

"Sending out notice of the presence of a bug without a correction or
workaround is of course even more irresponsible."

When I first saw this I couldn't believe what I was reading. Well, I've reread
it several times, and it still says the same thing. I only hope that Andy was
joking, or that I have grasped the meaning wrongly, because what I think that
it means is that I can get bitten by a bug that someone knows about, but
hasn't told me because he doesn't have a fix or workaround.

Surely, just knowing about a bug is enough to help avoid it causing problems?
If I know that doing a particular operation causes problems, I will avoid
doing that operation, and that is a workaround in itself.

Also, knowing that a bug exists in a particular area will save me manhours, and
therefore money, investigating a problem which is already known.

Please, Andy, tell me I've got it wrong!

Hugh Davies.


Credit-limit handling found overly restrictive (RISKS-6.50)

Henry Mensch <henry@GARP.MIT.EDU>
Wed, 30 Mar 88 22:44:09 EST
   Date: Tue, 29 Mar 88 13:48 PST
   From: Wm Brown III <Brown@GODZILLA.SCH.Symbolics.COM>

   Look at the number of characters in an authorization code; it is far
   too small to reflect the number of authorizations issued ...

When I worked at Chase Manhattan in New York authorization codes (for
check encashment, not credit card authorization, but I suspect they
work in similar ways) were a function of the dollar amount of the
item, the day of the week and the date.  Other institutions may have
other (perhaps proprietary) ways to compute an authorization code.
The functions used probably have no relation to the number of
transactions authorized in a single business day.

# Henry Mensch / <henry@garp.mit.edu> / E40-379 MIT, Cambridge, MA
#      {ames,cca,rochester,harvard,mit-eddie}!garp!henry


Bankcard authorizations

<FMCKAY%HAMPVMS.BITNET@MITVMA.MIT.EDU>
Thu, 31 Mar 88 18:38 EST
Many years ago I was asked to set up a system to monitor phone traffic for a
regional authorization center in Florida.  I was told by someone there that
the authorization code was a checksum on such things as card number, merchant
number, and AMOUNT.  It seems to me that if this is the case, an authorization
for an estimated amount would make the code formula tilt if the charge was
later challenged.

I currently accept MC/Visa in my business and once received an authorization
for a charge that the bank returned as invalid.  Since the card number was
read to me over the phone, I assume something got garbled in the process.
However, how did the authorization go through?

I would be curious to hear of similar experiences but I make no representation
as to the accuracy of the formula information considering the age and source.

Fred McKay ----   FMCKAY@HAMPVMS.BITNET


Terminals and checking the facts

LEICHTER-JERRY@CS.YALE.EDU <"Jerry Leichter>
Thu, 31 Mar 88 13:46 EST
In RISKS 6.51, A.E. Mossberg takes me to task for not considering the security
of block mode in VT220's, and proceeds to outline a way to use block mode to
cause a VT220 to send an arbitrary set of commands back to the host.

The problem with the scenario is that it has nothing to do with reality.
Neither the VT220, nor any of the VT200 series, has any block mode instruc-
tions!  Mr. Mossberg claims to have "looked in the VT220 manuals" to construct
his scenario; clearly he didn't look very closely.

Ignoring ancient history like the VT62 and speciality products, the only DEC
terminals with block mode are VT131 and VT132 (both now two to two and a half
generations old and obsolete; I won't discuss them further) and the VT330 and
VT340.  (The VT320 MIGHT have block mode; I doubt it but don't have a manual
to check.)

There are two ways to configure block mode on a VT3xx.  Normally, sending from
the screen is initiated from the keyboard by the user hitting the Enter key.
This mode provides no direct opportunity for a host to read back stuff from
the screen "on its own", though of course it is not risk-free - the user may
be too trusting and hit Enter when there is stuff on the screen that he didn't
put there and doesn't want sent!  The other mode is also nominally controlled
from the terminal:  When the user hits Enter, the terminal sends a "request to
send screen" message; the host responds with a "send screen now" message.  The
manual doesn't say whether a "send screen now" message received when the ter-
minal hasn't sent a "request" will be honored.  If it is, there's a potential
hole; if it isn't - certainly an option that's easy to implement - the user
remains in control.

All that said, having block mode is INHERENTLY somewhat riskier than not
having it, though the risk can be made quite small by proper design.*  This
fact was recognized by the designers of the VT3xx:  There is a SETUP option
that disables block mode completely.  The host can then send "Enter block
mode" sequences as much as it likes, with no effect.

                            -- Jerry

* The way to make a truely secure block mode terminal is to realize that the
source of the problem is the ability of a malicious program to cause input
indistinguishable from user typein to get sent down the line.  If block mode
transmissions were always wrapped in a recognizable sequence - for example,
if they were always within a distinctive DCS - the host could filter out
block transmissions received in places where none were expected.  Of course,
ALL software on the system that could be vulnerable to such replayed data
would have to filter it.  Fortunately, if you look at the way user interfaces
work, you'll see that typically making the shell-equivalent "careful" is
enough.

Why isn't this done?  Mainly, I suppose, because block-mode terminals are
intended for use with applications that completely control the terminal with
trusted software.  Programmers don't use block-mode terminals; data entry
people do.  So the issue isn't of such great import.  The VT3xx, which is
intended to serve multiple markets, takes just the right approach:  Block mode
is there if you want it, and you can disable it otherwise.

Please report problems with the web pages to the maintainer

Top