RISKS@KL.SRI.COM (RISKS FORUM, Peter G. Neumann -- Coordinator) (10/13/88)
RISKS-LIST: RISKS-FORUM Digest Thursday 1 October 1988 Volume 7 : Issue 64 FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Contents: 100 digit primes no longer safe in crypto (Dave Curry) Risks of computer controlled doors (Piet van Oostrum) NSFnet Backbone Shot (Gene Spafford) Intersection of ANI and Voice Mail Risks (Gary McClelland) New Feynman book (Eugene Miya) High `Rev'ing Volvo (Hartel) Stevie Wonder gives an Ear-itating Performance (Marshall Jose, PGN) OMB "Blacklist"? (Hugh Miller) Re: Ethics of Conflict Simulation (Scott Wilde) The RISKS Forum is moderated. Contributions should be relevant, sound, in good taste, objective, coherent, concise, and nonrepetitious. Diversity is welcome. CONTRIBUTIONS to RISKS@CSL.SRI.COM, with relevant, substantive "Subject:" line (otherwise they may be ignored). REQUESTS to RISKS-Request@CSL.SRI.COM. FOR VOL i ISSUE j / ftp kl.sri.com / login anonymous (ANY NONNULL PASSWORD) / get stripe:<risks>risks-i.j ... (OR TRY cd stripe:<risks> / get risks-i.j ... Volume summaries in (i, max j) = (1,46),(2,57),(3,92),(4,97),(5,85),(6,95). ---------------------------------------------------------------------- Date: Wed, 12 Oct 88 20:34:01 -0700 From: davy@riacs.edu <David A. Curry> Subject: 100 digit primes no longer safe in crypto Taken from the San Jose Mercury News, Oct. 12, 1988, Page 8A: Computers able to make light work of cracking code (Los Angeles Times) Some secret codes intended to restrict access to military secrets and Swiss bank accounts may not be as safe as had been presumed, a team of computer experts demonstrated Tuesday. The team succeeded in doing what security experts thought could not be done: using ordinary computers to break down a 100-digit number into the components that produce it when multiplied together. That process, called factoring, holds the key to many security codes. Before Tuesday, experts had believed that if the number was large enough - up to 100 digits - its factoring would take about 10 months with a Cray super- computer, one of the most powerful computers in the world. But computer experts across the United States, Europe and Australia solved the problem more quickly by using 400 processors simultaneously. They linked their computers electronically and factored a 100-digit number in just 26 days. The number has two factors, one 41 digits long and the other 60 digits long. And that, according to Arjen Lenstra, professor of computer science at the University of Chicago, should be quite sobering to experts who believe they are secure with codes based on numbers that large. Lenstra headed the project, along with Mark S. Manasse of the Digital Equipment Corp.'s Systems Research Center in Palo Alto. [ quotes from experts ] Rodney M. Goodman, associate professor of electrical engineering and an expert on cryptography at the California Institute of Technology in Pasadena, described the achievement as "significant," because it means that some systems may not be as secure as had been thought. But he said it did not mean that security experts around the world would have to rebuild their systems. "All the cryptographers will do is increase the length of the number by a few more digits," he said, "because the problem gets exponentially worse as you increase the size of the number." A larger number is more cumbersome, and cryptographers had tried to kep the number as small as possible. [ explanation of the idea behind using large numbers with prime factors in cryptography ] Last year, Lenstra decided to tackle the problem on "a small scale, just to see if he could do it," according to Larry Arbeiter, spokesman for the Univ- ersity of Chicago. "It was a pure science type of effort." Several months ago, Lenstra presented his idea to Manasse, a computer re- search scientist with Digital. Manasse became so intrigued with the problem that his company agreed to fund much of the cost, including the use of more than 300 computer processors at the Palo Alto company during off-duty hours. The company manufactures DEC computers. "I was interested in the general problem of taking a program and breaking it up into small pieces" so that many could work simultaneously toward the sol- ution, Manasse said. Other computer enthusiasts from the "factoring community" clamored aboard and this fall more than 400 computers around the globe were ready to give it a try. The computers ranged in size from microcomputers to a Cray supercomputer, but even personal computers with large memories could have been used, Lenstra said. Each of the participating computers was given a different part of the problem to solve, and success came early Tuesday morning. ------------------------------ Date: 12 Oct 88 11:20:12 GMT From: piet@ruuinf.UUCP (Piet van Oostrum) Subject: Risks of computer controlled doors Amsterdam, The Netherlands The new Amsterdam Stopera (combined town hall - music theater) has to undergo $1 million of upgrading, although it is only a few years old. One of the things to be done is redoing the computers controlling the doors, as several people have had the experience of being locked up. Piet van Oostrum, Dept of Computer Science, University of Utrecht Padualaan 14, P.O. Box 80.089, 3508 TB Utrecht, The Netherlands Telephone: +31-30-531806 UUCP: ...!mcvax!ruuinf!piet ------------------------------ Date: 12 Oct 88 19:14:22 GMT From: spaf@purdue.edu (Gene Spafford) Subject: NSFnet Backbone Shot The following mail was forwarded to me a few minutes ago. This refers to the MCI fiber used to carry the NSFnet backbone. No wonder some of my mail has disappeared recently! [From: field inadvertently deleted?] => Date: Wed, 12 Oct 88 12:47:00 EDT => To: watchdogs@um.cc.umich.edu, ie@merit.edu => Subject: A bit of trivia => => The fiber that goes from Houston to Pittsburgh was broken due => to a gun blast....that is right, a gun blast. => Somewhere in the swamps of the Bayou (between Alabama and New Orleans) => the fiber cables are suspended above the swamps and a good ol' => boy was apparently target practicing on the cable. => => Traffic has been rerouted and when the investigation has taken place => and the cable fixed we will be put back on the original circuit. Gene Spafford NSF/Purdue/U of Florida Software Engineering Research Center, Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004 Internet: spaf@cs.purdue.edu uucp: ...!{decwrl,gatech,ucbvax}!purdue!spaf ------------------------------ Date: Tue, 11 Oct 88 00:14 MDT From: MCCLELLAND_G%CUBLDR@VAXF.COLORADO.EDU Subject: Intersection of ANI and Voice Mail Risks Recent reports in RISKS of nefarious deeds committed by hackers who entered a system via voice mail prompted me to inquire about the voice mail security of my university's system. A year ago the U bought its own fancy switch for on-campus communications. Some of the goodies include voice mail and ANI. I tried the voice mail once but since I much prefer e-mail I long ago forgot my voice mail password (yep, only 4 digits if the hackers want to start guessing). I called the telecommunications office to determine where I needed to go in person and with how many photo ID's to get my voice mail password. Even though I hadn't identified myself, the clerk said, "Oh that won't be necessary, Mr. McClelland, I'll just change your password back to the default password and you can then change it to whatever you want." I said, "But how do you know that I'm McClelland?" He replies, "Because it shows on the digital display on my phone both the phone number and name of the caller." [Most phones are in private offices so a unique name can be attached to each number.] I tried to explain that all he really knew was that I was someone calling from the phone in McClelland's office and that I could be the janitor, a grad student, or almost anyone. But security wasn't his problem so he wasn't very concerned. I was afraid to ask how many folks never bother to change their default password. As I was about to hang up, he said, "By the way, if you check your voice mail from your own extension you don't even need to enter your password." I said , "Thanks, that's reassuring" but I don't think he caught the sarcasm. Gary McClelland ------------------------------ Date: Wed, 12 Oct 88 23:41:09 PDT From: Eugene Miya <eugene@amelia.nas.nasa.gov> Subject: New Feynman book I remembered that many fans of RISKS are also Richard Feynman fans. I ran into Stacey's briefly today and just happened to see this: %A Richard P. Feynman %T "What Do YOU Care What Other People Think?" %I W. W. Norton %C New York %D 1988 %$ 18 Relevance to RISKs readers comes in two forms (his essay on the Value of Science at the end and the appendix to the Challenger report which makes up over 50% of the book). Note that the text is longer and not verbaum to the articles in Engineering and Science or Physics Today. --eugene miya, NASA Ames ------------------------------ Date: Tue, 11 Oct 88 10:10:15 EDT From: hartel@mitre.arpa Subject: High `Rev'ing Volvo I have an old disreputable '82 Volvo which gave me an object lesson in sensor circuit design recently. Beginning several months back the car began to exhibit a mind of its own about engine speed. The local ace Volvo dealer couldn't find anything wrong after $400 worth of effort, and since the car's independence of mind seemed to be limited to brief and infrequent periods, I let the matter slide. Poor idea. I took the car to the wilds of northern Wisconsin, far from the nearest Volvo fixit shop, where the old car turned on me. Previously my problems with engine speed had been limited to surges in speed at idle, up to no more than 2500 RPM. There had been no signs of bad behavior when the car was in gear. Once up in the great frozen north however, the car decided it was going to idle at fifty MPH, as in 2700 RPM in fourth gear up a hill. Kept doing it too. Made it hard to drive thru the camp ground, observe nature, stay alive. I studied the owner's manual. It has an elementary schematic of the fuel system, and one particular element which caught my eye was the constant idle control, a servo motor that appeared to affect manifold vacuum. Got inputs from several sensors and the engine microprocessor. When I disconnected the control, idle dropped to nominal, and the car was drivable. In the end the Volvo dealer found the problem, which was that a spade connector had come adrift from one of the engine sensors. The idle control interpreted lack of signal from the sensor as low engine speed, so it exerted its maximum effort to raise the idle speed to acceptable levels. It strikes me as poor design that an open circuit mimics the operative signal in a sensor system. Automotive engine compartments are well knows as hell on earth for electronics, and loose connections and broken wires are to be expected. Lack of signal should cause the automated system to go off line, not off its head. ------------------------------ Date: Tue, 11 Oct 88 11:06:37 EDT From: mjj@stda.jhuapl.edu (Marshall Jose) <@aplvax.jhuapl.edu:mjj@ ...> Subject: Stevie Wonder gives an Ear-itating Performance The following is regrettably anecdotal and I wish I had more firsthand info on it; anyway, here goes: For one of his tours, Stevie Wonder contracted with Northwest Sound to build a set of PA speakers of extraordinary capability -- response nearly flat out to 45 kHz, etc. A few weeks into the tour, though, the performances seemed to be souring. Everybody -- artists, crew, even the audience -- seemed irritable and impatient. Indeed, the performances started out well enough, but an hour or so into the show the audience became testy and actually were moved to boo during pauses, for no apparent reason. Finally, during one show, one of the sound guys was examining the audio spectrum analyzer screen, and mistakenly pushed the 20 kHz - 200 kHz range button instead of the 2 kHz - 20 kHz button. Imagine his alarm at the sight of a potent 28 kHz component, the product of all the synthesizers' DAC update clocks. It was lying just outside the (ordinarily) high hearing limit of 20 kHz, so it was never noticed by the sound crew and their instrumentation. Cause discovered, the noxious 28 kHz spike was eliminated with an equalizer, and everybody went home happy but chastened. The person who related this story to me suspects that the event is not widely known, being of large embarrassment and trivial cause. Is he right? Has anyone else heard about this? ------------------------------ Date: Wed, 12 Oct 88 15:00:28 PDT From: Peter G. Neumann <Neumann@KL.SRI.COM> Subject: Ear-itation I am reminded of the not-computer-related experience of the Columbia professor who noticed that his body went limp in a record store whose speakers were blaring a particular rock tune. He took the record back to his lab and analyzed it -- discovering some sort of a alpha- or beta-wave resonant frequency with the human brain of his students, for that particular rhythm -- an AN-A-PEST with the accent on the last syllable -- DA-DA-DUM. It was many years ago, but still worth relating for the younger folks who like to listen to hard-beat music... Beware of the anapest. ------------------------------ From: Hugh Miller <@CORNELLC.CCS.CORNELL.EDU:HUGH@vm.utcs.utoronto.ca> Subject: OMB "Blacklist"? To: RISKS Moderator <RISKS@csl.sri.com> The following appeared in the 1987 annual report of Project Censored, a U.S. group operating out of Sonoma State University. They compile an annual list of what they consider to be the 25 most un- or under-reported stories of the year. This is #22 on the latest hit parade. The collection is widely available on local RCPM's; the one I pulled down was labelled CENSOR.ARC. [Hugh Miller, University of Toronto, (416)536-4441] OMB COMPILING NATION-WIDE BLACKLIST OF GRANT VIOLATORS The Office of Management and Budget is compiling a master computer list of those debarred or suspended from participating in government agency grant programs. Gary Bass, executive director of OMB Watch, a public interest group that monitors the budget office, said the goal of reducing waste, fraud and abuse is laudable but warned that the program "can become a hit list for individuals and organizations that the administration does not agree with." The controversial program will cover a wide range of transactions, including grants, cooperative agreements, scholarships, fellowships, loans and subsidies. It would apply to both recipients of federal funds and those "doing business" with them. The system is expected to be fully operational by May, 1988. Under the new law (Reagan's Executive Order 12549), 20 agencies which disburse $100 billion in grants will forward their debarred lists to the OMB. The master list will be computerized and placed on a nation-wide automated telephone system. Regulations published in the Federal Register (5/29/87) say that the master list will contain names and "other information" about currently debarred or suspended grant recipients, as well as about those whose debarment is pending. Under the directive, federal, state and local agencies, private organizations and individuals handling federal funds must check the list before providing anyone a federally-aided service, grant, loan or other assistance such as day care. Any person or organization that fails to check the list may also be placed on it. In addition, employees of federally-funded agencies and organizations, as well as anyone "doing business" with them or wishing to do business with them must submit annual certifications that neither they nor anyone "associated with" them are on the list, or being considered for it. Grounds for placement on the list include 1) violating any term of a "public agreement," regardless of whether federal funds were involved; 2) failure to repay a government-backed or assisted loan, such as a home mortgage, student or crop loan; 3) "failure to perform" or poor performance on a grant or other "public agreement;" 4) lack of "business integrity or honesty" or conviction of "business" crimes; 5) debarment or suspension by a public agency at any level of government, federal, state, or local. One can also make the blacklist if one: is a public school teacher and goes on strike despite a no-strike clause in one's contract; performs poorly on any grant from a public agency, regardless of whether federal funds were involved; does business with anyone known to be on OMB's new list. Various agencies already keep records of those who violate rules of grants, using the lists to prevent such recipients from getting additional grants from the agency involved. But, under current law those same recipients may obtain grants from other federal agencies. Rep. Jack Brooks (D-TX), chair of the House Government Operations Committee warned that the OMB's implementing guidelines "endorse guilt by association, reverse the presumption that a person is innocent until proven guilty, and define the operative offenses so vaguely as to potentially encompass many entirely legitimate activities." SOURCES: THE NEW YORK TIMES, 12/23/87, "U.S. Plans to Make Master List ...", by Martin Tolchin; OMB WATCH 1987 ANNUAL REPORT; FOUNDATION NEWS, July/August 1987, page 8. ------------------------------ Date: Mon Sep 26 15:08:41 1988 From: wilde@hor-res.UUCP <@RELAY.CS.NET:hor-res!wilde@gte.com> Subject: Re: Ethics of Conflict Simulation In RISKS-FORUM 7.55, Mike Trout makes several statements regarding the past and present state of the conflict simulation industry. While I do not wish to digress too far from the purpose of this list, I feel that the picture he presents is somewhat inaccurate. The main issue confronting game designers doing work for the military is one of integrity, as Mike pointed out. The problem is not some nebulous fear of the Pentagon "poisoning" the industry as a whole, but rather that they would interfere _with the particular game under consideration_. The designers want to be free to model a situation as they see it. The military, however, gets upset when someone gives them a simulation that says their high tech weapons have an expected lifetime of 3 minutes in actual combat. As a result, most designers will not consider working for the govt. unless they are assured of complete freedom in doing their designs. As for Pentagon influence "subverting" the game industry, I have yet to see any indication that anything more than a small fraction of game designers and publishers revenues come from military contracts. Many games have been produced dealing with hypothetical modern conflicts, but I believe this is a reflection of the interests of gamers , not the result of some sinister military infiltration. I definitely feel there is no justification for saying these games were developed to find "better ways to slaughter people". Only a handful of games on the market were originally developed as simulations for the military. Mike's statement about having fun is somewhat puzzling. These designs are _GAMES_. Most people play them for the enjoyment of intellectual competition. They also play them to more fully understand history (and future possibilities). The two are not incompatible goals. Scott Wilde ...bunny!hor-res!wilde ------------------------------ End of RISKS-FORUM Digest 7.64 ************************ -------