[news.sysadmin] No RTM trial?

weemba@garnet.berkeley.edu (Obnoxious Math Grad Student) (11/14/88)

Perhaps no charges will even be brought against RTM, on the grounds
that NSA and others are more worried about the worm program becoming
public knowledge.  Which no doubt could follow from introducing the
very program as the main evidence against RTM.

ucbvax!garnet!weemba	Matthew P Wiener/Brahms Gang/Berkeley CA 94720

spaf@cs.purdue.edu (Gene Spafford) (11/14/88)

In article <16953@agate.BERKELEY.EDU> weemba@garnet.berkeley.edu (Obnoxious Math Grad Student) writes:
>Perhaps no charges will even be brought against RTM, on the grounds
>that NSA and others are more worried about the worm program becoming
>public knowledge.  Which no doubt could follow from introducing the
>very program as the main evidence against RTM.

Easily remedied.  There are lots of reverse-engineered versions of
the code out there, and new versions could be put together with
a modicum of effort.  All we need to do is post one such version.
There is no law against that....In fact, that would make an interesting
tech report, no?
-- 
Gene Spafford
NSF/Purdue/U of Florida  Software Engineering Research Center,
Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004
Internet:  spaf@cs.purdue.edu	uucp:	...!{decwrl,gatech,ucbvax}!purdue!spaf

weemba@garnet.berkeley.edu (Obnoxious Math Grad Student) (11/14/88)

In article <5424@medusa.cs.purdue.edu>, spaf@cs (Gene Spafford) writes:
>In article <16953@agate.BERKELEY.EDU> weemba@garnet.berkeley.edu (Obnoxious Math Grad Student) writes:
>>Perhaps no charges will even be brought against RTM, on the grounds
>>that NSA and others are more worried about the worm program becoming
>>public knowledge.

>Easily remedied.

Really?  I read in the papers that you were visited by NSA types, Gene.
Who apparently wanted the code kept under wraps.  Can you clarify?

>		   There are lots of reverse-engineered versions of
>the code out there, and new versions could be put together with
>a modicum of effort.  All we need to do is post one such version.

Ah, I see you are arguing closer to my side now.  One as might as well
make it a dandy all-purpose worm, with lots of include files for mix
and match bug exploitation.

>There is no law against that....

I don't know.  If current laws *do* apply to Morris's actions, does pro-
viding the code make one an accessory?

>				 In fact, that would make an interesting
>tech report, no?

There have been calls for a virus RFC, and also rumors that NSA is going
to prepare a report on it too.

What's that ancient Jewish curse?  "May you live in interesting times."

ucbvax!garnet!weemba	Matthew P Wiener/Brahms Gang/Berkeley CA 94720

cosell@bbn.com (Bernie Cosell) (11/14/88)

In article <5424@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford) writes:
}In article <16953@agate.BERKELEY.EDU> weemba@garnet.berkeley.edu (Obnoxious Math Grad Student) writes:
}>Perhaps no charges will even be brought against RTM, on the grounds
}>that NSA and others are more worried about the worm program becoming
}>public knowledge.  Which no doubt could follow from introducing the
}>very program as the main evidence against RTM.
}
}Easily remedied.  There are lots of reverse-engineered versions of
}the code out there, and new versions could be put together with
}a modicum of effort.  All we need to do is post one such version.

Note that there are two possible "trials" here.  I think it would be
*fascinating* to see if the FBI or anyone could manage a *criminal*
trial.  In such a trial, one must adhere to the rather strict rules of
evidence.  Has anyone ever been able to really *prove* that particular
person actually wrote a particular computer file?  Think they could
*prove* that RTMjr actually _released_ the worm [e.g., that it wasn't
one of the sysops who logged in as "root" and su'ed to his account]?
That he didn't have code in the file to render the worm innocuous (say
to ONLY infect other Cornell machines, or only machines from a small
explicit list) and someone ELSE unaccountably removed it?  ll of this
"evidence" seems sufficiently flimsy that I'm not even convinced that
one could recover in a civil action.

On the other hand, it would be an incredible set of legal precedents if it
made it (you'd surely think twice before you pissed off the sysop on your
machine, no?  Considering what he could do, *actionably*, in your name!)

   __
  /  )                              Bernie Cosell
 /--<  _  __  __   o _              BBN Sys & Tech, Cambridge, MA 02238
/___/_(<_/ (_/) )_(_(<_             cosell@bbn.com

spaf@cs.purdue.edu (Gene Spafford) (11/15/88)

In article <16966@agate.BERKELEY.EDU> weemba@garnet.berkeley.edu (Obnoxious Math Grad Student) writes:
>Really?  I read in the papers that you were visited by NSA types, Gene.
>Who apparently wanted the code kept under wraps.  Can you clarify?

It wasn't the NSA, per se, but the NCSC.  Admittedly, they are an agency
affiliated with the NSA, but they aren't the same thing.

I wasn't visited by them, I got some e-mail and a phone call.  The folks
there are paid to worry about computer security, and they do a reasonable
job of it.  They requested that anything we might have that could be used
to recreate the virus code not be widely distributed.  No threats, no
rules, just a request for cooperation.  For now, everyone I know who
may have reverse-engineered code is willing to go along with that
suggestion.

>Ah, I see you are arguing closer to my side now.  One as might as well
>make it a dandy all-purpose worm, with lots of include files for mix
>and match bug exploitation.

I'm not arguing *any* side.  I'm saying what I've been saying all along --
this could be written by lots of people, and many people could recreate
the code.  Tightening security is not going to be sufficient protection
all by itself, even if we could get everyone to do it.  We need to
work on the security threats as well as the security holes.

>I don't know.  If current laws *do* apply to Morris's actions, does pro-
>viding the code make one an accessory?

If providing code makes one an accessory, then AT&T, Berkeley, DEC & Sun
will be co-defendents at the trial.

Publishing the code is not illegal in any way, unless all the variables
are named in such a way that reading the code presents a pornographic
story. :-)   By analogy, I can purchase books on toxicology and I can
mix up poisons in my basement -- legally.  However, if I attempt to
dump some in the local water supply, I'm in deep doo-doo with the legal
authorities.  By the same token, selling a gun doesn't make the store
owner an accessory so long as s/he follows all applicable laws in the
sale.

The concept is well-established in law and would apply to the worm, too.
(However, note that I'm not a lawyer, so you're getting what you pay for,
advice-wise.)

>There have been calls for a virus RFC, and also rumors that NSA is going
>to prepare a report on it too.

Yeah, I'm working on a paper for it now, and a few people have
nominated me as the one to do the RFC.  We'll see.  If nothing else, I
will shortly have a tech report with a functional description of how
the worm infects a system and what it tries to do.  I've had a chance
to go through 2 completely separate reversed-engineered versions of the
code (the only person to do so, I think).  I'll have the material ready
by the end of the week, I hope.

>What's that ancient Jewish curse?  "May you live in interesting times."

Better than living in California.... :-)
-- 
Gene Spafford
NSF/Purdue/U of Florida  Software Engineering Research Center,
Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004
Internet:  spaf@cs.purdue.edu	uucp:	...!{decwrl,gatech,ucbvax}!purdue!spaf

dhesi@bsu-cs.UUCP (Rahul Dhesi) (11/16/88)

In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford)
writes:
>Publishing the code is not illegal in any way...

I suspect it is.  The worm code is an unpublished work, and Robert
Morris is the copyright owner.  One does not need to include a
copyright statement to preserve ownership of an unpublished work.
-- 
Rahul Dhesi         UUCP:  <backbones>!{iuvax,pur-ee}!bsu-cs!dhesi

henry@utzoo.uucp (Henry Spencer) (11/16/88)

In article <32219@bbn.COM> cosell@BBN.COM (Bernie Cosell) writes:
>... Think they could
>*prove* that RTMjr actually _released_ the worm [e.g., that it wasn't
>one of the sysops who logged in as "root" and su'ed to his account]?

The legal system deals with "who do we believe?" situations all the time.
I doubt that there would be any great problem, especially since (as I
understand it) RTMjr has admitted he did it.
-- 
Sendmail is a bug,             |     Henry Spencer at U of Toronto Zoology
not a feature.                 | uunet!attcan!utzoo!henry henry@zoo.toronto.edu

spaf@cs.purdue.edu (Gene Spafford) (11/16/88)

In article <4770@bsu-cs.UUCP> dhesi@bsu-cs.UUCP (Rahul Dhesi) writes:
>In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford)
>writes:
>>Publishing the code is not illegal in any way...
>
>I suspect it is.  The worm code is an unpublished work, and Robert
>Morris is the copyright owner.  One does not need to include a
>copyright statement to preserve ownership of an unpublished work.

You are correct.  I meant to say "publishing any reverse-engineered code
is not illegal..."
-- 
Gene Spafford
NSF/Purdue/U of Florida  Software Engineering Research Center,
Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004
Internet:  spaf@cs.purdue.edu	uucp:	...!{decwrl,gatech,ucbvax}!purdue!spaf

erc@unisec.usi.com (Ed Carp) (11/16/88)

In article <4770@bsu-cs.UUCP>, dhesi@bsu-cs.UUCP (Rahul Dhesi) writes:
> In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford)
> writes:
> >Publishing the code is not illegal in any way...
> 
> I suspect it is.  The worm code is an unpublished work, and Robert
> Morris is the copyright owner.  One does not need to include a
> copyright statement to preserve ownership of an unpublished work.
Yes, but if you don't your case is MUCH weaker in court.  Check it out with your
attorney.

-Ed

friedl@vsi.COM (Stephen J. Friedl) (11/16/88)

In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford)
writes:
<Publishing the code is not illegal in any way...
 
In article <4770@bsu-cs.UUCP>, dhesi@bsu-cs.UUCP (Rahul Dhesi) writes:
< I suspect it is.  The worm code is an unpublished work, and Robert
< Morris is the copyright owner.  One does not need to include a
< copyright statement to preserve ownership of an unpublished work.

How about the fair use provision, especially by a University for
the purposes of research or whatever...


-- 
Steve Friedl    V-Systems, Inc.  +1 714 545 6442    3B2-kind-of-guy
friedl@vsi.com     {backbones}!vsi.com!friedl    attmail!vsi!friedl
------------Nancy Reagan on the worm: "Just say OH NO!"------------

bill@twwells.uucp (T. William Wells) (11/16/88)

In article <4770@bsu-cs.UUCP> dhesi@bsu-cs.UUCP (Rahul Dhesi) writes:
: In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford)
: writes:
: >Publishing the code is not illegal in any way...
:
: I suspect it is.  The worm code is an unpublished work, and Robert
: Morris is the copyright owner.  One does not need to include a
: copyright statement to preserve ownership of an unpublished work.

Ah yes, but distributing a work to many people, who are not know to
you, is what constitutes "publishing". So, perhaps, the right way to
look at it is that the absence of a copyright notice means the thing
was released into the public domain?!

---
Bill
{uunet|novavax}!proxftl!twwells!bill

cory@gloom.UUCP (Cory Kempf) (11/17/88)

In article <4770@bsu-cs.UUCP>, dhesi@bsu-cs.UUCP (Rahul Dhesi) writes:
> In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford)
> writes:
> >Publishing the code is not illegal in any way...
> 
> I suspect it is.  The worm code is an unpublished work, and Robert
> Morris is the copyright owner.  One does not need to include a
> copyright statement to preserve ownership of an unpublished work.

But he did publish it! or it least it seems that way to me! (I mean
what else can you call sending out multiple copies to over 6000 different
computer sites thoughout the nation??? 

However, the real question is Was there a Copyright Notice in the 
actual worm as published by the Wormer?  If so, is there a name on it?
if not, then (obviously) it is in the public domain...

+C


-- 
Cory (the last person to escape alive from riverside) Kempf
UUCP: encore.com!gloom!cory
	"...it's a mistake in the making."	-KT

trn@warper.jhuapl.edu (Tony Nardo) (11/17/88)

In article <4770@bsu-cs.UUCP> dhesi@bsu-cs.UUCP (Rahul Dhesi) writes:
>In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford)
>writes:
>>Publishing the code is not illegal in any way...
>
>I suspect it is.  The worm code is an unpublished work, and Robert
>Morris is the copyright owner.  One does not need to include a
>copyright statement to preserve ownership of an unpublished work.

I think Morris has to actually claim copyrights on this material in some
manner, even if it is just having a listing notorized or prepending "the poor
man's copyright" (a "copyright" comment at the top of the module).  Anyone
with more expertise on this matter care to comment?

Anyway, I suspect no one else would wish to claim prior creation of this
code.  :-)  I doubt if Robert Morris will have any problems protecting his
work on that regard.

Anyone know if releasing the worm source code files (the ones that came over
as *.c files) is tatamount to releasing them into the public domain?  The
object files?  [1/2 :-)]

This really belongs in misc.legal...

==============================================================================
ARPA:   trn%warper@aplvax.jhuapl.edu   OR   nardo%str.decnet@capsrv.jhuapl.edu
BITNET:	trn@warper.jhuapl.edu		(also for smart Internet mailers)
UUCP:	{backbone!}mimsy!aplcomm!warper!trn

50% of my opinions are claimed by various federal, state and local governments.
The other 50% are mine to dispense with as I see fit.
==============================================================================

brian@ncrcan.Toronto.NCR.COM (Brian Onn) (11/17/88)

In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford) writes:
>...  By the same token, selling a gun doesn't make the store
>owner an accessory so long as s/he follows all applicable laws in the
>sale.

Interesting that this isn't so yet, considering that many drinking 
establishments are thinking twice about pouring that next drink. The owners
can often be held accountable for any injuries/deaths that the patron
might have caused when he/she leaves the place.

I would expect that the same lines of thinking should be applied to the
sale of guns, too.

Follow-ups have been re-directed to misc.legal.

Brian.

-- 
 +-------------------+--------------------------------------------------------+
 | Brian Onn         | UUCP:..!{uunet!mnetor, watmath!utai}!lsuc!ncrcan!brian |
 | NCR Canada Ltd.   | INTERNET: Brian.Onn@Toronto.NCR.COM                    |
 +-------------------+--------------------------------------------------------+

crossgl@ingr.UUCP (Gordon Cross) (11/18/88)

In article <4770@bsu-cs.UUCP>, dhesi@bsu-cs.UUCP (Rahul Dhesi) writes:
> In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford)
> writes:
> >Publishing the code is not illegal in any way...
> 
> I suspect it is.  The worm code is an unpublished work, and Robert
> Morris is the copyright owner.  One does not need to include a
> copyright statement to preserve ownership of an unpublished work.

As I understand it, Mr. Morris (assumming he is the curprit which has yet to
be proven in court) has already lost his copyright since he distributed
thousands of copies of the code that did not carry a copyright notice [or did
it?  I am amused when I think of the line "This worm Copyright (c) 1988 by
Robert Morris Jr.  All right reserved."  :-) :-)]  Wouldn't the worm's
propagation be considered "publishing" it??

DISCLAIMER:  I do not claim to be a lawyer nor the reincarnation of one...


Gordon Cross
Intergraph Corp.  Huntsville, AL
...uunet!ingr!crossgl

spaf@cs.purdue.edu (Gene Spafford) (11/20/88)

The opinion of our University legal department is that the author of
the original Worm code has lost any copyright on the binary of the
code.  Anything reverse-engineered by anyone can be copyrighted by
those "engineers" if they so desire.

-- 
Gene Spafford
NSF/Purdue/U of Florida  Software Engineering Research Center,
Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004
Internet:  spaf@cs.purdue.edu	uucp:	...!{decwrl,gatech,ucbvax}!purdue!spaf

allbery@ncoast.UUCP (Brandon S. Allbery) (11/22/88)

As quoted from <5424@medusa.cs.purdue.edu> by spaf@cs.purdue.edu (Gene Spafford):
+---------------
| In article <16953@agate.BERKELEY.EDU> weemba@garnet.berkeley.edu (Obnoxious Math Grad Student) writes:
| >Perhaps no charges will even be brought against RTM, on the grounds
| >that NSA and others are more worried about the worm program becoming
| >public knowledge.  Which no doubt could follow from introducing the
| >very program as the main evidence against RTM.
| 
| Easily remedied.  There are lots of reverse-engineered versions of
| the code out there, and new versions could be put together with
| a modicum of effort.  All we need to do is post one such version.
| There is no law against that....In fact, that would make an interesting
| tech report, no?
+---------------

Aaaagh.  Aren't there *any* other Mac users out there reading this
newsgroup, or are they forgetting a certain little something...?

Spaf, I respect you highly as a Usenet administrator and de-facto Keeper of
the Active File.  But releasing the source to this virus would be a disaster.
Let me tell you -- and everyone else -- a little story:

Sometime in 1987, a Mac programmer in West Germany posted some sample viruses
(in source form) to a BBS in order to convince people that something should
be done about viruses; he'd been victimized a few times by them.  He did
*too* good a job of warning them (perhaps analogous to RTM?):  there are
MANY, MANY utilities now available for the Mac that do nothing but sniff out
the various mutations of those viruses that sprang up all over the place.
Indeed, I haven't seen a virus detector for the Mac *yet* that didn't have
some special code to trap "nVIR" viruses.  As far as anyone knows, the nVIR
plague has been wiped out; but it may yet return in modified form, like the
Black Plague -- and there have been others, like Scores (which is as
infamous as nVIR in the Mac community), which aren't related except in that
they are viruses.

IS THIS WHAT YOU WANT TO DO TO THE INTERNET?

*Don't* post the virus code.  People who really want to get it can undoubted-
ly decipher it themselves, or design their own; assuming they're intelligent
enough to do so, you couldn't stop them anyway.  But making it freely available
to all is just asking for any moron to launch an attack on the Internet.

++Brandon
-- 
Brandon S. Allbery, comp.sources.misc moderator and one admin of ncoast PA UN*X
uunet!hal.cwru.edu!ncoast!allbery  <PREFERRED!>	    ncoast!allbery@hal.cwru.edu
allberyb@skybridge.sdi.cwru.edu	      <ALSO>		   allbery@uunet.uu.net
comp.sources.misc is moving off ncoast -- please do NOT send submissions direct
      Send comp.sources.misc submissions to comp-sources-misc@<backbone>.

leonard@qiclab.UUCP (Leonard Erickson) (11/24/88)

In article <4770@bsu-cs.UUCP> dhesi@bsu-cs.UUCP (Rahul Dhesi) writes:
<In article <5432@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene Spafford)
<writes:
<>Publishing the code is not illegal in any way...
<
<I suspect it is.  The worm code is an unpublished work, and Robert
<Morris is the copyright owner.  One does not need to include a
<copyright statement to preserve ownership of an unpublished work.

But if you distribute a work *without* the notice, you lose the copyright
unless you did so inadvertently, or take immediate steps to remedy the
ommision. Right? 
-- 
Leonard Erickson		...!tektronix!reed!percival!bucket!leonard
CIS: [70465,203]		...!tektronix!reed!qiclab!leonard
"I used to be a hacker. Now I'm a 'microcomputer specialist'.
You know... I'd rather be a hacker."