[comp.edu] Net Access Policies?

spaf@gatech.UUCP (01/19/87)

We're about to get hooked up to SURAnet, and thence to the Internet.
There are some concerns here about suddenly making Internet ftp and
rlogin a reality for many hundreds of students.

Our first thought is to draft some kind of document stressing that it
is impolite and possibly illegal to snoop around the net or try to
break into other systems.  This document would be distributed along
with accounts.

How do other campuses handle this issue?  Is it handled?  Has there
been much incidence of problems?  We tend to have very aggressive and
adept students here, so our concern is more than just the usual
paranoia :-)
-- 
Gene Spafford
Software Engineering Research Center (SERC), Georgia Tech, Atlanta GA 30332
CSNet:	Spaf @ GATech		ARPA:	Spaf@gatech.EDU
uucp:	...!{akgua,decvax,hplabs,ihnp4,linus,seismo,ulysses}!gatech!spaf

neves@ai.WISC.EDU (David M. Neves) (01/19/87)

Unless DARPA has changed its policy (which I doubt) its network is for
use by DARPA work only.  If you have gateways into Internet then it is
your job to see that non authorized persons do not have access.  DARPA
has pulled the plug on sites in the past (I can think of one) that
violate its policies.

Now being realistic only a fraction of network traffic could be
considered valid.  There are many researchers who use utilities like
mail and FTP and this greatly aids the research community as a whole.
There is also a good deal of traffic in human interest mailing lists
and there are some sites that serve as file servers for micro related
files.  For now DARPA looks the other way on these uses of its network.

If you are worried about your undergraduates then you should restrict
read assess to FTP, telnet, rlogin, etc.  I believe this is done at
our site.  I am sure Unix wizards could come up with more imaginitive
ways.  At our site we have all students sign a sheet that gives our
definition of malicious hacking and describes penalties that are
levied (such as loss of account) if our rules are not followed.  If
the student does not sign the sheet he does not get an account.

You have to be careful if you decide to restrict some things and not
others.  I do remember getting an account on a site for the first time
and finding that I didn't have access to telnet.  I used FTP to get a
telnet from a "public access" site and used it until root gave me the
right privs.
-- 
David Neves, Computer Sciences Department, University of Wisconsin-Madison
Usenet:  {allegra,heurikon,ihnp4,seismo}!uwvax!neves
Arpanet: neves@rsch.wisc.edu

yerazuws@rpics.RPI.EDU (Crah) (01/19/87)

In article <9994@gatech.EDU>, spaf@gatech.EDU (Gene Spafford) writes:
> We're about to get hooked up to SURAnet, and thence to the Internet.
> There are some concerns here about suddenly making Internet ftp and
> rlogin a reality for many hundreds of students.
> 
> Our first thought is to draft some kind of document stressing that it
> is impolite and possibly illegal to snoop around the net or try to
> break into other systems.  This document would be distributed along
> with accounts.
> 
> How do other campuses handle this issue?  Is it handled? 
	
Every account comes on a piece of paper that has "Computer Ethics" printed
on it- and a notation that screwing with what thou art not supposed to
screw with is a punishable offense.  I don't think the boilerplate contains
a reference to the ECPA of 1986, but it should.
	
Problems?  Sure, occasional problems.  But if you treat electronic 
burglary the same as physical burglary the situation improves very 
quickly after a couple of years.
	
Maybe someday "hacker" will come to mean what it used to mean.

	-Bill Yerazunis

lear@aramis.UUCP (01/19/87)

I am a student at Rutgers University and I do systems support work
here on the side.  At Rutgers, 99% of the time, in order to get onto
the ARPAnet, one needs to present a grant number or one has to be
involved in support.  The DEC-20s provide a mechanism for control,
and Dr. Hedrick has added code into the UNIX kernels so network
access can be controlled.  Furthermore, our gateways contain access
mechanisms to restrict packets out onto the ARPAnet.

Rutgers is particularly tight about access because at one point, we
had our plug pulled.  From what I understand, Berkeley and MIT are
considerably looser about access.

					...eliot
-- 

[lear@rutgers.rutgers.edu]
[{harvard|pyrnj|seismo|ihnp4}!rutgers!lear]

trent@cit-vax.Caltech.Edu (Ray Trent) (01/19/87)

In article <490@ai.WISC.EDU> neves@ai.WISC.EDU (David M. Neves) writes:
>If you are worried about your undergraduates then you should restrict
>read assess to FTP, telnet, rlogin, etc.  I believe this is done at
>our site.  I am sure Unix wizards could come up with more imaginitive

Unfortunately, (fortunately?) there is almost no secure way of doing
this except ripping out the ARPA connection by its roots. (short of
kernal and device hacking) 

Just as an example, even if you make all of these files unreadable,
telnet/ftp et al, are really not all that hard to write from scratch.

Possibly better, is to hack up an addition to these programs that
logs the people who use them, then---either by hand or automatically---
restrict their access until they go talk to the sysman who will slap
them on the wrist and restore access. (unless they have priors)

Of course, this isn't secure either, but...

On the other hand, you could just trust them not to f*ck around out there,
as is done here. (I would be willing to bet our students are as, if
not more, devious as/than GA Tech's)
-- 
"A journey of a thousand miles..."
					../ray\..
 (trent@csvax.caltech.edu, rat@caltech.bitnet, ...seismo!cit-vax!trent)

glgreely@athena.mit.edu (Greg Greeley) (01/20/87)

In article <9994@gatech.EDU> spaf@gatech.EDU (Gene Spafford) writes:
...
>There are some concerns here about suddenly making Internet ftp and
>rlogin a reality for many hundreds of students.
>
>How do other campuses handle this issue?  Is it handled?  Has there
>been much incidence of problems?  We tend to have very aggressive and
>adept students here, so our concern is more than just the usual
>paranoia :-)

I've worked as a Student Consultant for MIT's Project Athena for
several years now.  We have several thousand students (most of them
new to the timesharing world) on our system, and each of them has
access to the internet.

To the best of my knowledge,  we've had few, if any, problems with
this situation.  I think there are two reasons for this: 1) we don't
announce the fact that ftp, telnet, etc. connect to the rest of the
world (i.e. off campus), and 2) those people who can figure out that
we connect to the rest of the world are usually hired to help run or
develop software for some system.

--
Greg Greeley
glgreely@athena.mit.edu

tihor@acf4.UUCP (Stephen Tihor) (01/20/87)

There are a set of kernel hacks around to add Internet validation down at the
low level netowrk code.  I will ask our networks guru about their origin.

jtr485@umich.UUCP (Johnathan Tainter) (01/21/87)

In article <1535@cit-vax.Caltech.Edu>, trent@cit-vax.UUCP writes:
> In article <490@ai.WISC.EDU> neves@ai.WISC.EDU (David M. Neves) writes:
> >If you are worried about your undergraduates then you should restrict
> >read assess to FTP, telnet, rlogin, etc.  I believe this is done at
> >our site.  I am sure Unix wizards could come up with more imaginitive
> 
> Unfortunately, (fortunately?) there is almost no secure way of doing
> this except ripping out the ARPA connection by its roots. (short of
> kernal and device hacking) 
When I was at uofwisc-madison (where neves is), until a little over a year
ago they had multiple machine.  These were devided into educational and
research and only the research machines actually had access to the outside
world.  The educational machines used a more restrictive local network to 
talk to the other machines.
Of course, things were getting pretty muddy as I was leaving with the
introduction of many sub microscopic vaxen and other new equipment.
The 'I promise I will do only what my professor says to on this account'
paper was a recent creation.  It was actually a thrown together response to a 
security breach.  The breach scared some of the administrators who were afraid
the boondoggles they have been living under would get exposed and they were
going to heavily overreact.  This was curbed fortunatedly by more moderate and 
realistic viewpoints.
--j.a.tainter
> 					../ray\..

gds@sri-spam.UUCP (01/24/87)

In article <490@ai.WISC.EDU>, neves@ai.WISC.EDU (David M. Neves) writes:
> Unless DARPA has changed its policy (which I doubt) its network is for
> use by DARPA work only.  If you have gateways into Internet then it is
> your job to see that non authorized persons do not have access.  DARPA
> has pulled the plug on sites in the past (I can think of one) that
> violate its policies.

Well, not everyone uses the ARPA Internet for "strictly" DARPA funded or
associated research.  The military uses it for operational purposes
(that's what the MILNET (net 26) basically exists for).  The ARPANET
(which nowadays just consists of net 10 of the ARPA Internet) is
primarily used for DARPA funded research.  In general, I believe that
access to the ARPA Internet is negotiated through the DCA (Defense
Communications Agency) and their DDN PMO (Defense Data Network Program
Management Office).

My personal views on net access policies are somewhat biased from my
undergraduate experiences at MIT.  Some areas of MIT have in the past
and to my knowledge continue to grant "guest accounts" to individuals
(they need not be MIT students) which provide explicit or implicit
access to the ARPA Internet.  For example, mail from MIT's campus
Chaosnet can be sent and received from the ARPA Internet, even via
student course accounts with no other net access privileges.  MIT's
policy is more or less "don't cause trouble".  People who cause trouble
have been dealt with in various ways too numerous to mention here.
People who have obeyed the rules have gone on to become network hackers
at MIT and elsewhere.

It's my feeling that some network access needs to be restricted, but not
all.  I don't believe receiving or sending Internet mail ought to be
restricted if a good case can be made for the exchange (for example, the
student may have an interest in an Internet mailing list which is not
yet a usenet newsgroup).  Access to junk mail lists ... well ... if it
does not tie up the machine or use too much disk, I would be willing to
look the other way.  Probably access to other things (telnet, ftp, ping)
should be restricted as they could be used maliciously.  As others have
said, people who become knowledgeable in the use of such programs
typically go on to support these systems which are attached to the
Internet, and they become authorized users.

Disclaimer: This should not be construed as the official position of MIT
on student access, but as a former MIT student's position on observed
student access.

--gregbo