EC0N@TE.CC.CMU.EDU (Eric R. Crane) (11/13/85)
One solution might be to do something similar to what was done with the Tops-20 mailing list. Create a subset of INFO-VAX which contains only system managers. Then if someone has a security issue they send it to something like INFO-VAX-SECURE. The only way that the problem can be solved is to split the list. No matter how freely we want information to flow the first time that my systems crash because someone decided to play around with something that they saw on the list I will be a bit upset. I think that this goes for most people out there. - Eric Crane -------
TIHOR@NYU-CMCL1.ARPA (Stephen Tihor) (11/13/85)
No matter how we organize the secure INFO-VAX list it will contain people who, in a perfect world, should never be allowed with reach of computer. The Unix wizards security list contains two system crackers that I have had problems with in the last few years. Therefore you must assume that the enemy (self proclaimed) is listening. Certainly if you are going to publish anything on the list that can crash or crack open a system you should have SPR-ed it to DEC and there should be some solid reason to publish it...if its a Security problem I would rather let ignorance be DEC's ally until the next minor release gets out but if you do publish it here please include a workaround. For example I am now going to have to go and set ACL's on a bunch of logical name tables since someone has already done this I would personally prefer if they just included the code to handle the standard tables at the end of their message. I regret that DEC does not provide a service whereby we can get such patches by an at least semi-secure E-Mail channel. \\ Stephen Tihor / CIMS / NYU / 251 Mercer Street / New York, NY 10012 // (( DEC Enet: RHEA::DECWRL::"""TIHOR@NYU-CMCL1.ARPA""" NYUnet: TIHOR.CMCL1 )) // ARPAnet: Tihor@NYU-CMCL1 UUCPnet address: ...!ihnp4!cmcl2!cmcl1!tihor \\ -------
sasaki@HARVARD.HARVARD.EDU (Marty Sasaki) (11/13/85)
Creating a sub-list is going to be a hassle. Someone will be stuck with verifying that a person who sends a request is a bona-fide system manager. I don't read this list from a VMS system, but from a UNIX system, which means that it will be difficult to verify via electronic means that I am a system manager. There is also the problem that many sites (probably most sites) don't read this mailing list. An article published that showed a security hole, even with a fix might never make it to a site. Could the poster of the article be sued if someone penetrated a system and did real harm as a result of an article? Another problem is that there will always be a time lag between when the article is posted and when I finally get around to installing it. Let's suppose that a bunch of interesting security type stuff is discussed at the upcoming DECUS Symposium and an article is posted (with fixes). It happens that I am taking two weeks of vacation after the Symposium. That means that at least two weeks will pass before the news gets out and I get a chance to read it. I remember when I was managing an RSX-11D system. A brand new terminal driver was part of the release (version 6.2 I think). It was posted in the RSX campground that typing the three character sequence control-c, tab, and rubout would crash the system. Before I could get home that evening (the DECUS was held in Boston, about 5 miles from where I worked) someone had crashed the system. Marty Sasaki
TIHOR@NYU-CMCL1.ARPA (Stephen Tihor) (11/13/85)
People may be interested in CDC's method of handling security problems with the NOS operatings systems: The PSR (SPR) is listed in the database as SECURITY RELATED The only other information presdent is the patch-equivalent to fix and a notation to indicate if this is a USER supplied workaround or a CDC-supplied workaround. Their database is rather like DEC's DSIN system except that it is not bundled the same (painfully expensive) way and it offers a reliable file transfer protocol to download patches. \\ Stephen Tihor / CIMS / NYU / 251 Mercer Street / New York, NY 10012 // (( DEC Enet: RHEA::DECWRL::"""TIHOR@NYU-CMCL1.ARPA""" NYUnet: TIHOR.CMCL1 )) // ARPAnet: Tihor@NYU-CMCL1 UUCPnet address: ...!ihnp4!cmcl2!cmcl1!tihor \\ -------
mooremj@EGLIN-VAX.ARPA ("MARTIN J. MOORE") (11/14/85)
If a system cracker were to make use of some of the bugs/holes published in the newsletter and cause economic damage, the injured party could probably make a lot of trouble for the originator and/or INFO-VAX. I don't know if anyone would be liable for damages (I'm no lawyer) but I'll bet a really angry system manager could get INFO-VAX -- and maybe a bunch of other groups -- kicked off the Arpanet. This is purely conjecture. I have no facts to back it up. marty moore (mooremj@eglin-vax.arpa) ------