[comp.org.eff.talk] Georgia Tech's Restriction on Internet Access

gt6004a@prism.gatech.EDU (Michael Goldsman) (03/08/91)

This was recently posted to a georgia tech newsgroup:

February 13, 1991



MEMORANDUM




To:	Vice Presidents
	Deans
	Directors
	Department Heads
	Lab Directors
	Academic Services Computing Subcommittee

From: 	F. L. Suddath
	Vice President for Information Technology

[misc stuff deleted]

In order to comply with  NSFNET, SURAnet, and Internet "Acceptable Use" 
policies and security guidelines, Network Technologies will implement a 
Network Access Control Policy utilizing a Trusted Host model for 
managing network security.  The intent of the model is to ensure the 
integrity and security of GTnet and the Internet, while having the 
minimum impact on the connectivity of the networks users who depend upon 
the network.  The Trusted Host model would provide support for Internet 
access for remote login and file transfer via a secure machine.  Support 
for the exchange of electronic mail would be provided by a secure mail 
gateway system.  Any member of the faculty or staff, with authority to 
access remote resources across the Internet, would be granted an account 
on the Trusted Host.  Postdocs, Graduate Research Assistants, and 
Undergraduate students with a valid requirement to access remote 
resources would receive sponsorship from the appropriate faculty/staff 
member and be granted an account on the trusted host.  Additional 
automated request services would be available to support Anonymous FTP 
with locally cached directories from a trusted FTP server.  Tech would 
not be the first site to implement such a network security model.  
Numerous site on the Internet currently support Trusted Host network 
access including: MIT, Digital Equipment Corporation, Sun Microsystems, 
and numerous government sites.

[stuff to the end deleted]

Questions for you guys:


1.  Have any other universities restricted access as Tech is about to do?

2. what exactly are NSFNet and SURAnet's policies??


We are going to try to fight this,  and  as of yet seems to have lots
of support among student here.


Please commment on this evil memo from hell...

-Mike

kessler@hacketorium.Eng.Sun.COM (Tom Kessler) (03/08/91)

I find it interesting to note that this is very similar to the policy used
by many large corporations (Sun included).  A lot of the quality of
network access and how restrictive it becomes for users depends on how 
you implement such a policy.

hes@ccvr1.ncsu.edu (Henry E. Schaffer) (03/08/91)

In article <23808@hydra.gatech.EDU> gt6004a@prism.gatech.EDU (Michael Goldsman) writes:
| ...  Any member of the faculty or staff, with authority to 
|access remote resources across the Internet, would be granted an account 
|on the Trusted Host.  Postdocs, Graduate Research Assistants, and 
|Undergraduate students with a valid requirement to access remote 
|resources would receive sponsorship from the appropriate faculty/staff 
|member and be granted an account on the trusted host.  Additional 
|automated request services would be available to support Anonymous FTP 
|with locally cached directories from a trusted FTP server.   ...
|
|Please commment on this evil memo from hell...

  Exactly what is evil about this?  I can see several aspects which
various people might not like - but what specifically are the
problems (both real and potential) with this policy?

--henry schaffer  n c state univ

lear@turbo.bio.net (Eliot) (03/08/91)

NSFNET requires connected networks must be able to identify those using
the Internet at any given time.  This seems to me an extreme
interpretation of that policy.
-- 
Eliot Lear
[lear@turbo.bio.net]

wayner@thrall.cs.cornell.edu (Peter Wayner) (03/08/91)

Many companies have trusted host systems where one host acts as a gateway
to the network. All but a few computers have no connection to the 
Internet. Mail and news are routed through these gateways in a way
that is essentially transparent to the user. (Unless this one machine
goes down or grows overloaded.) Rlogin, telnet and ftp priviledges
though must be exercised by logging into the gateway machine. I've used
the system at Xerox and the only problem I had was having to rlogin 
in an extra time. 

The added security was, in some ways, a good compromise. People with
internal machines could set them up to do all sorts of things and not
have to worry about the keeping them up to corporate security standards.
On the other hand, they could easily get out to the net if they had
an account which everyone at PARC did. The gateway machine was very
stripped down and didn't run fun, but insecure, toys like finderd. 

So, if Georgia Tech wants to do this, it also allows them to have much
freer standards internally and not worry about the one bad dude
wrecking havoc. They can make their root passwords known globally (as
MIT often does) so that any joe can fix their machine. Meanwhile they didn't
need to worry about random hackers finding out about the root because
these machines were only on the internal network. 

Silicon Graphics has a company wide root password that is a great
thing. If an employee needs to fix something on a random, internal 
machine can just step right up. No nasty security  that hamper
productivity. One friend at another company (unnamed) needed to 
change something on his workstation in a way that required root priviledges.
He wasn't cleared for this and the overworked support staff needed to 
help him. The friend couldn't get any help for a week so he just
booted the Sun station in single user mode and slipped in. Security
was a major hassle and cost productivity.

As I see it, the situation at Georgia Tech is not necessarily any
big deal. It depends on the attitude of the administrators handing
out passwords to the gateway. If they'll only give it to you with 
signatures from 15 faculty members then this is a drag. If they are
reasonable, it no problem. 

It should be noted that pornographic GIF files are the main attraction
for undergraduates. These consume megabytes and megabytes of bandwidth
for a cause that is wasteful (Penthouse has better bandwidth/dollar) and
also a potential political timebomb. The next great usage for net access
is faking mail and postings. It is much better if people do this locally, 
learn the insights and not clutter the net. 

The one thing that is lost is universality. I've enjoyed remotely logging
into a host of systems around the country like Cleveland's Freenet. These
are potentially great resources that are lost if the net doesn't include
everyone. 



Peter Wayner   Department of Computer Science Cornell Univ. Ithaca, NY 14850
EMail:wayner@cs.cornell.edu    Office: 607-255-9202 or 255-1008
Home: 116 Oak Ave, Ithaca, NY 14850  Phone: 607-277-6678
Copyright 1991 Peter Wayner, All Rights Reserved.

gt1111a@prism.gatech.EDU (Vincent Fox) (03/09/91)

wayner@thrall.cs.cornell.edu (Peter Wayner) writes:
[stuff deleted]
>It should be noted that pornographic GIF files are the main attraction
>for undergraduates. These consume megabytes and megabytes of bandwidth
>for a cause that is wasteful (Penthouse has better bandwidth/dollar) and
>also a potential political timebomb. The next great usage for net access
>is faking mail and postings. It is much better if people do this locally, 
>learn the insights and not clutter the net. 
[more stuff deleted]

Exactly where do you get your sweeping statistics? I know lots of undergrads
in both engineering and computer science. Out of about 40, I can only think
of 2 who professed any interest in this sort of thing. What do we use ftp
for? Mainly jumping to uunet and similar places to get source code. I wish
you would refrain from such statements without SOME sort of statistics.

I am one of the many here at Tech opposed to this sort of restriction.
We have a security guard in our library to glance at people's ids as they
come in. But we don't X-ray and strip-search them, or lock off reference books
for only "approved use".  The kind of stringent security measures that
are such a terrific idea for IBM, etc. are nothing but a massive annoyance
in an academic environment.

>Peter Wayner   Department of Computer Science Cornell Univ. Ithaca, NY 14850
>EMail:wayner@cs.cornell.edu    Office: 607-255-9202 or 255-1008
>Home: 116 Oak Ave, Ithaca, NY 14850  Phone: 607-277-6678
>Copyright 1991 Peter Wayner, All Rights Reserved.
-- 
Vincent Fox (That's Mr. Bucko to you)|"Fleshy-headed mutant, are you friendly?"
Georgia Tech, Atlanta GA             |"No way, eh! Radiation has made me an
SR-71: gt1111a@prism.gatech.edu      | enemy of civilization."
Pony Express:...!gatech!prism!gt1111a|             - Bob & Doug in Strange Brew

wayner@kama.cs.cornell.edu (Peter Wayner) (03/09/91)

gt1111a@prism.gatech.EDU (Vincent Fox) writes:

>wayner@thrall.cs.cornell.edu (Peter Wayner) writes:
>[stuff deleted]
>>It should be noted that pornographic GIF files are the main attraction
>>for undergraduates. These consume megabytes and megabytes of bandwidth
>>for a cause that is wasteful (Penthouse has better bandwidth/dollar) and
>>also a potential political timebomb. The next great usage for net access
>>is faking mail and postings. It is much better if people do this locally, 
>>learn the insights and not clutter the net. 
>[more stuff deleted]

>Exactly where do you get your sweeping statistics? I know lots of undergrads
>in both engineering and computer science. Out of about 40, I can only think
>of 2 who professed any interest in this sort of thing. What do we use ftp
>for? Mainly jumping to uunet and similar places to get source code. I wish
>you would refrain from such statements without SOME sort of statistics.

Well, okay, so it was a sweeping statement, and it was based on my
experiences with a few undergraduates. In retrospect (note the time of
the posting) it is almost certainly not true for any sort of majority.
Graduate students are probably just as culpable. It could be even
distributed over all users, but I get the impression that it is
something people tend to grow out of.  I've just known a few who
filled disk packs with stuff they found over the net. A real pain when
you need to space. 

Sorry about lumping all undergraduates into the same lumpen mass. 

Peter Wayner   Department of Computer Science Cornell Univ. Ithaca, NY 14850
EMail:wayner@cs.cornell.edu    Office: 607-255-9202 or 255-1008
Home: 116 Oak Ave, Ithaca, NY 14850  Phone: 607-277-6678
Copyright 1991 Peter Wayner, All Rights Reserved.

richd@prism.gatech.EDU (Richard Dellaripa) (03/10/91)

gt6004a@prism.gatech.EDU (Michael Goldsman) writes:

[quoting from a memo from the Office of Information Technology]

>...  Any member of the faculty or staff, with authority to 
>access remote resources across the Internet, would be granted an account 
>on the Trusted Host.  Postdocs, Graduate Research Assistants, and 
>Undergraduate students with a valid requirement to access remote 
>resources would receive sponsorship from the appropriate faculty/staff 
>member and be granted an account on the trusted host.  

I would like to point out that this set of conditions is almost
identical to those Georgia Tech used to issue computer accounts before
they started issuing accounts to all students, faculty and staff. (I'll
also point out that all students got accounts a couple years before all
faculty/staff received accounts). As I recall, in general, the
restrictions were considered only a bother, as all it usually took was
a friendly professor and/or some interesting project to gain an
account. I have seen no indication that gaining an account on the
trusted host would be much more difficult than that. If one is doing
something reasonable that requires Internet access, then implications
are that Internet access will be given. Most complaints about this
policy announcement seem to merely complain that people can't use up
precious bandwidth on whatever strikes their fancy at the moment, or a
fear that people who truly need Internet access will be denied it. The
first SHOULD be stopped, and the second will not, IMHO, be a problem.


                   Richard C. Dellaripa -- GTRI/EOL
     "The opinions contained within are solely those of the author"
        Georgia Institute of Technology, Atlanta, Georgia, 30332
         Internet: richd@prism.gatech.edu Phone: (404) 894-3357

louisg@vpnet.chi.il.us (Louis Giliberto) (03/10/91)

In article <23808@hydra.gatech.EDU> gt6004a@prism.gatech.EDU (Michael Goldsman) writes:
>
>
>1.  Have any other universities restricted access as Tech is about to do?

Ha!  I go to Loyola University in Chicago, and they NEVER let students on
Internet or even Bitnet.  They have a mainframe that's used by the libraries
and the Medical Center, but they also have tons of machines running Unix. To
my knowledge, they have 1 AT&T 3b15 and 3!!!! AT&T 3b2's.  That's a lot of
computing power for a University this small, not including the 386's they have
running Unix, plus the mailer programs they have on the mainframes and the VAX's, but the policy is all staff gets access and accounts whether they use them or
not.  Grad students get it on request, and undregrads only with special
permission (in other words, you don't get it).  On top of that, we only
get a Unix account for 1 year unless we take classes that need it and the
classes extend past one year.  The only reason I'm here is that the system
I'm on is one of the few public access Unix systems in the country, and I pay
out of my own pocket to use it.

Now, my sister goes to U of I in Champaign, and they INVITE!!!! students to
come and use their Internet links.  I guess the more logon id's, the more
funding they get.

At any rate, it's a crock.  Most of the teachers don't even use their accounts,
and comp sci majors such as myself have to beg to get access (and then they
wonder why people hack into systems to use them).

It's a load of crap, and I've asked around who made the policy, but everyone
points a finger at someone else.  What they teach in the classroom is NOT
enough to let you survive in the real world of computing (though theory *is*
very important), and those who would like to learn and talk to others on
their own time are not allowed to.

On top of all that, the security on ALL the systems is VERY VERY bad.  They
don't even use a shadow file for the passwords on the 3b15.  There are ways
to access the mailer and elite operations on the mainframe using a one word
command that the system administrators aren't even aware about.  The LAN they
have that students use for word processing and Turbo Pascal and stuff is a joke.I could blow (anyone could) that whole thing apart with a 100 byte  or so
virus in the programs.  You can even write to the master hard drive!!!

I've seen some of the "administrators," and what theymostly do is drink coffee
and gab.  If I had the guts, and didn't want a career in computer science,
I'd pull a Morris on them and show everyone how they are failing to do
anything for the academic community.

If you expect to get any results, don't.  When you start making waves you
can expect them to find a reason to ban you from the system (as has happened to
people I know at other colleges).  One guy just want up to the root directory,
and they said he was "a security risk."  Yeah, right.  The only security risk
is the system administrators' laziness.

Good luck, though.  If it works, I'll be surprised.


Louis

-- 
---------------------------------------------------------------------------
!       "As above, so below; as below, so above" -- The Kybalion          !
!       "I don't trust him; he has dark hair" -- My girlfriend's mother   !
!       "So I'm stupid; what's your point?" -- Me                         !

cat@tygra.UUCP (John Palmer) (03/10/91)

In article <Mar.7.17.02.23.1991.5169@turbo.bio.net> lear@turbo.bio.net (Eliot) writes:
>NSFNET requires connected networks must be able to identify those using
>the Internet at any given time.  This seems to me an extreme
>interpretation of that policy.
>-- 
>Eliot Lear
>[lear@turbo.bio.net]

MichNet (also known as Merit) has similar rules, although not that facist.
You can theoretically access the greater net by simply dialing into a 
modem pool. They had to put restrictions on TELNETing out of net 35
(MichNET territory). Now they have an authorization server which will
allow anyone to TELNET out as long as they have an authorization 
server account ($35/month). CAT-TALK will be allowing its users to 
TELNET from our site in a few months.
 
The purpose of the "trusted host" site is that each TELNET/FTP/etc... 
session be tied to a user who can be identified. That seems reasonable
to me. Why can't undergrad accounts at GA TECH access TELNET/etc?? They
are identifiable users. Sound like another policy to exclude the ones
who pay the most tuition.... Sigh.                              
-- 
CAT-TALK Conferencing System   |  "Buster Bunny is an abused | E-MAIL:
+1 313 343 0800 (USR HST)      |   child. Trust me - I'm a   | cat@tygra.UUCP
+1 313 343 2926 (TELEBIT PEP)  |   professional..."          | ..sharkey!tygra!
********EIGHT NODES*********** |   -- Roger Rabbit           | ..cat

qseclrb@prism.gatech.EDU (BOB BAGGERMAN) (03/11/91)

In article <23963@hydra.gatech.EDU>, richd@prism.gatech.EDU (Richard Dellaripa) writes:
> As I recall, in general, the
> restrictions were considered only a bother, as all it usually took was
> a friendly professor and/or some interesting project to gain an
> account. I have seen no indication that gaining an account on the
> trusted host would be much more difficult than that. If one is doing
> something reasonable that requires Internet access, then implications
> are that Internet access will be given. Most complaints about this
> policy announcement seem to merely complain that people can't use up
> precious bandwidth on whatever strikes their fancy at the moment, or a
> fear that people who truly need Internet access will be denied it.

When I was an undergrad in the late 70's computer accounts where very
restricted.  In order for me to log on to the new, wonderful, and fast 
CYBER system to learn what it was all about I had to go kiss some guys butt
in the EE department and convince him that I already was a CYBER jock so I
could persue some worthwhile project.  In reality I just wanted enough 
resources so I could get on, plunder around, and learn what it was all about.
The experience after I finally got the account was invaluable.

As an ACADEMIC institution, students (and researchers) need to be able to
have and use these resources with as much freedom and openness as possible.
Only in that way will we learn and be creative with this wonderful technology.
The issue of academic freedom is one that I couldn't feel stronger about.  I
think we as a major technical institute should be fostering free and creative
thinking and not saddle us with artificial restrictions.  What if only the
blessed few could have access to all the library books?

Another major point (in my mind, anyway) is the level of service and access
that IT can provide the campus.  Way back when if you wanted to do serious 
computing you had to sign up for one of the major campus computers.  Now most
of the computing power is distributed around and is sitting on peoples desktops.

I've got 150 MB of disk space on my VAX, 40 MB on my PC, but IT only gives me
256 kB on my hydra account.  That's less than a floppy disk!  The nature of
computing now days is distributed and interconnected.  There is no way IT can
support by themselves all the users that require much less want internet
access.  And these days IT seems to be interested in providing less services
and putting more of the responsability for support on the end users.  Just look
at the concept for the new mail system.

I could support a more restrictive atmosphere if I felt it addressed a real
problem and it was the only means to address that problem.  But so far no one
has demonstrated that a real problem exists, just a lot of what ifs.  I
strongly feel that I great disservice will be done to the overwhelming number
of creative, inquisitive minds become someone on the hill perceives that one
or a small number of trouble makers may do something regrettable and IT will
powerless to do anything about it when it happens.  Seems to me there are too
many starched shirt and tie types running the show and not enough pasty skinned
pencil necked geeks.  I'd hate to see us go back to the days when only a few
could use all the resources we have all helped to pay for.


-- 
Bob Baggerman                         !  rwb@csdvax.gatech.edu
Communications Systems Division       !  qseclrb@hydra.gatech.edu
Georgia Tech Research Institute       !  bbaggerm@gtri01.gatech.edu
Atlanta, GA  30332                    !  404-894-3525

pwh@bradley.bradley.edu (Pete Hartman) (03/11/91)

In <23988@hydra.gatech.EDU> qseclrb@prism.gatech.EDU (BOB BAGGERMAN) writes:
>As an ACADEMIC institution, students (and researchers) need to be able to
>have and use these resources with as much freedom and openness as possible.
>Only in that way will we learn and be creative with this wonderful technology.
>The issue of academic freedom is one that I couldn't feel stronger about.  I
>think we as a major technical institute should be fostering free and creative
>thinking and not saddle us with artificial restrictions.  What if only the
>blessed few could have access to all the library books?

There's a point of difference.  The potential cost to the net at large is
much greater (at least it seems to be to me) if someone gets out of hand
than it is if someone succeeds in stealing/damaging library books.  Just
look at the projected costs from the Internet Worm (of course a fair amount
of the blame rests on the holes in the system, but my point is the cost,
not the means).  Not only that, but being new technology, it's a more
interesting place to vandalize than the local library.

>I could support a more restrictive atmosphere if I felt it addressed a real
>problem and it was the only means to address that problem.  But so far no one
>has demonstrated that a real problem exists, just a lot of what ifs.  

At our site, we have a long history of concrete examples of how some
students (all of whom are given an account for the asking on one of
our Unix systems or on our Cyber 932, depending on what they ask for)
will abuse every break you give them.  It becomes a serious drain on
the time of the system administrators (there are two of us for the whole
campus--it's a smallish campus, but there are quite a number of machines
that we are responsible for) to have to find, verify, and shut down every
single one of these people.

>									I
>strongly feel that I great disservice will be done to the overwhelming number
>of creative, inquisitive minds become someone on the hill perceives that one
>or a small number of trouble makers may do something regrettable and IT will
>powerless to do anything about it when it happens.  Seems to me there are too
>many starched shirt and tie types running the show and not enough pasty skinned
>pencil necked geeks.  I'd hate to see us go back to the days when only a few
>could use all the resources we have all helped to pay for.

There's a balance to be struck, I think.  Free access, damn the consequences,
seems pretty irresponsible to me, because it fails to protect the users
who AREN'T a problem.  And while there are a fair number of those capable
of protecting themselves by way of their technical sophistication, at our
site at least, the vast majority of users are very technically naive and
appear to have no desire to change.  As a sysadmin, I don't see it as my
mission to force them to change.
-- 
-----
Pete Hartman		  Bradley University		pwh@bradley.bradley.edu
    One final word to the young people who listen to this record.  Be cool.
 The retina of the eye quivers to the dance of soundwaves.  Turn on.  Tune in.

Cherry@Frodo.MGH.Harvard.EDU (J. Michael Cherry) (03/11/91)

 gt6004a@prism.gatech.EDU (Michael Goldsman) writes:
 [quoting from a memo from the Office of Information Technology]
 >...  Any member of the faculty or staff, with authority to 
 >access remote resources across the Internet, would be granted an account 
 >on the Trusted Host.  Postdocs, Graduate Research Assistants, and ...

Correct me if I'm wrong but it seems that the position that Georgia Tech 
is taking will slow the use of network services. In the science of 
molecular biology we are at the dawn of information sharing via network 
client/servers. Molecular Biologist's need access to very large databases 
of information that are growing at an ever increasing rate. Several 
university and government groups are developing network client/servers 
that will allow the scientists to query remote database servers and 
retrieve information. These servers are not simply a oneway exchange like 
a mail server, rather because of the amount of information and the type of 
questions molecular biologist's ask about this information the server and 
client interact in a dialogue traversing levels of organization and types 
of information. Ideally this exchange will occur using a familiar GUI to 
the user on microcomputers in laboratories where the data is used and 
generated. Requiring that all outside network exchange go through a 
trusted host may be just a bother to mail or telnet users but it 
eliminates the ability of the lab computer from accessing the remote 
server. All these clients will need to be placed on the trusted host and 
sufficient file space offered. The user also completely loses the GUI 
interface as they are being developed if one must login on a trust host. 
This will ultimately make use of the Internet more difficult of the 
non-computer savy users and require more network programming or redundant 
services within the restricted campuses.

Mike Cherry
cherry@frodo.mgh.harvard.edu
Department of Molecular Biology
Massachusetts General Hospital, Boston

gt1020a@prism.gatech.EDU (Ken Yousten) (03/11/91)

In article <1991Mar10.175557.4595@bradley.bradley.edu> pwh@bradley.bradley.edu 
 (Pete Hartman) writes:
>There's a point of difference.  The potential cost to the net at large is
>much greater (at least it seems to be to me) if someone gets out of hand
>than it is if someone succeeds in stealing/damaging library books.  Just
>look at the projected costs from the Internet Worm (of course a fair amount
>of the blame rests on the holes in the system, but my point is the cost,
>not the means).  Not only that, but being new technology, it's a more
>interesting place to vandalize than the local library.

But we have not been given any reason to think that the "trusted host" scheme
will actually address the problems we are being told that it is a reaction
to.  Your example of the Internet worm is particularly meaningless.  A
trusted host there would not have stopped it, the only purpose served by
bringing it up here is to explain the hysteria.  Instituting more security
measures in a knee-jerk fashion, without thinking about how they will 
accomplish desired ends is foolish.

I am not objecting so much to the trusted host idea itself, just the 
way it is being "explained" to us.  It's hard to object to the idea, when
you are not given any straight information on it.
--
  o   Ken Yousten               "Oh my god...you're from the 60's! Back!"
o   o arpa: gt1020a@prism.gatech.edu
 o o  uucp: ...!{allegra,amd,hplabs,seismo,ut-ngp}!gatech!prism!gt1020a

theo.bbs@shark.cs.fau.edu (Theo Heavey) (03/11/91)

gt6004a@prism.gatech.EDU (Michael Goldsman) writes:

> Questions for you guys:
> 
> 
> 1.  Have any other universities restricted access as Tech is about to do?

We have the same policy from our Academic Computing Organization. However
we are very lucky that our Dept of Comp. Sci. is much more enlightened
and permits our student chapter of the ACM to run a BBS that has USENET
capability as well as internet access.

Yes, I am a student and a researcher. However, under those restrictions 
I would be hard pressed to continue the frre flow of information needed
for timely results and progress.
> 
> 
> Please commment on this evil memo from hell...
                        ^^^^^^^^^^^^^^^^^^^^^^
I think that what may have prompted this is the amount of bandwidth being
generated at the location. OR the other "normal" complaint is that
they have no control on what their users actually do via e-mail or ftp.

It definitely SUCKS but we must enlighten these people. The easiest way
may be through their own system -- I submit that a quick note to the
responsible agency may clearly identify the reasoning behind the "memo
from hell".

> 
> -Mike

jon@athena.mit.edu (Jon A. Rochlis) (03/12/91)

Two comments:

First, MIT's name is being used in vain.  MIT does not use and
is not contemplating such a system to restrict access to the Internet.
We would view such a system as a giant step backwards.  As well as one
which would not achieve the results desired.

	Eliot Lear stated that:

	   NSFNET requires connected networks must be able to identify
	   those using the Internet at any given time.  This seems to me an
           extreme interpretation of that policy.

I don't believe this is accurate.  The NSFnet Interim Acceptable Use
Policy mentions nothing about identification of network users.  It
basically says that traffic over NSFnet must be either research or
education releated or in support of such research/education
activities.  You don't need to be able to identify network users in
order to comply with that!  (Think about it.  It helps sometimes but
it is not required and may well be counter-productive.)

My own personal belief is that even if you try to restrict network
access to only the good guys you can't possibly win.  Face it: the genie is
out of the bottle.  If you don't design and run systems that assume
*everybody* in the world has access to the network you are asking to
lose.  Efforts to snuff out anonymous terminal servers might buy six
months of safety for some sites, but I think that is arguable.

If you think mail and packet filters are the way to go you should have
heard Dave Clark's talk on the subject at Interop '90.  He basically
said that they break the internet model because they weren't
considered when the architecture was developed.  You lose a lot of
what the network is for (new interactive applications that run *now*
for everybody without 50 site admins updating tables) and you don't
even get security because mail systems are one of the biggest security
vulnerabilities (witness the Moris virus ... your corporate mailhub
being infected by sendmail would easily get your whole "protected"
corporate net).


		-- Jon Rochlis (jon@mit.edu)
		   MIT Network Services

lee@wang.com (lee) (03/13/91)

  As someone who hasn't been an undergrad for 25 years, I'd like to
comment on this business of "faculty and staff" access to the Internet.

(1) It's primarily a RESEARCH network, yet "postdocs" at Georgia Tech are
apparently not to be routinely granted full access without "staff"
authorization.  The administration, "of course", gets unquestioned
access.

(2) It's secondarily an EDUCATIONAL network, yet it's considered important
for political reasons (I remember something about congressional approval)
to prevent those being "educated" (largely undergraduates) from having
full access.

(3) Porno GIF files are popular at commercial Internet and Usenet sites,
too.  Some of our best programmers collect them.  They do take too
much disk space.  The solution is to determine how much public disk
space will be allowed to an individual, and discipline those who can't
give a very good reason for using an outrageous amount more.

I can still remember being an undergrad at Harvard in the early '60s,
where despite the many-thousand-dollar "surety bond" of tuition, we
were not permitted to check out books from Widener, the math library,
the music library, etc., for even a single day (and even books that
hadn't been read for generations) without specific faculty
authorization each time.  I shelved books in Widener for spending
money, and still remember how the administration's lackeys would
make sure that we were out of the stacks when our jobs were done
(presumably to prevent our reading unauthorized material).  At
46 years old, and 20 years beyond any contact with the procedures
of universities, I still boil at the thought, and still refuse
to contribute to the college fund.


--

------------------------------------------------------------------------
  Lee Story (lee@wang.com) Wang Laboratories, Inc.
     (Boston and New Hampshire AMC, and Merrimack Valley Paddlers)
------------------------------------------------------------------------

wrs@Apple.COM (Walter Smith) (03/13/91)

Apple uses the "trusted host" scheme.  We have a big VAX (apple.com) that 
speaks to the Internet and transfers mail, and an internal network that is 
completely separate.  To use the Internet you must get an account on 
apple.com, which usually requires very little effort (at least for R&D 
employees).

Providing a "trusted host" was fine in the ancient (more than five years 
ago) Internet environment, where mail and remote login was pretty much the 
entire functionality one could want from a network.  However, in the 
modern Internet, we have progressed beyond such childish 7-bit ASCII games.

The most common example I can think of is the X Window System.  To connect 
the window server on my local workstation with a client on the Internet 
requires the client to initiate a connection with my workstation.  In the 
trusted host scheme, this is impossible, since the client doesn't even 
know my workstation exists.

As Internet technology progresses, I imagine that more services based on 
such client/server protocols will appear.  An institution that follows the 
remote-login-and-mail-only trusted host model will be preventing its 
members from using such services.

Certainly, there are valid concerns related to loosing thousands of young 
explorers with Ethernet-equipped PC's onto the Internet.  I think, 
however, that eliminating these concerns by restricting an entire 
institution to whatever Internet resources can be accessed through one-way 
Telnet connections may be too extreme a solution.

- W

P.S. I hope no one takes offense at the phrase "young explorers".  I
     myself am a young explorer with an Ethernet-equipped Macintosh...
     and a few years ago (at CMU), it was even on the Internet.
--
Walter Smith                            wrs@apple.com, apple!wrs
Apple Computer, Inc.                    (408) 974-5892
My corporation disavows any knowledge of my activities on the network.

lear@turbo.bio.net (Eliot) (03/14/91)

Jon,

I'm sorry, you're right.  It indeed may not be an NSF requirement, but
I believe that FARNET members are requiring that subscribers be able
to identify who is/was? using the Internet at a given time.  Certainly
BARRNET requires it; and I think JvNC does as well (I seem to recall
the people at Rutgers going through some hoops over this one), the
point being that when someone does break in to some site, there will
be means to trace the culprit.  Again, it's not that they want to
keep people out, per se, but they want to be able to identify who is
on.
-- 
Eliot Lear
[lear@turbo.bio.net]

emv@ox.com (Ed Vielmetti) (03/14/91)

In article <Mar.13.18.37.23.1991.14919@turbo.bio.net> lear@turbo.bio.net (Eliot) writes:

   I'm sorry, you're right.  It indeed may not be an NSF requirement, but
   I believe that FARNET members are requiring that subscribers be able
   to identify who is/was? using the Internet at a given time.  

Michnet seems to be jumping through some hoops right now to able
to support these kinds of restrictions.

nic.near.net:/docs/farnet-acceptable-use.txt has the most recent
farnet suggested guidelines that I can find.  The closest thing in it
that I can see which would justify this kind of a policy is 

	Access to the internet should be protected through the use of
	prudent security measures.  Unauthorized connections to the
	internet should not be permitted.

There may be further exegesis hiding somewhere describing what exactly
they mean, but I haven't seen it.

Eliot (or whoever), could you describe who and what FARNET is?  All
the opinion that I have of them so far is quite negative, with them
more or less saying "you can't do that on the internet".  Their press
release promised more position papers on interesting things (network
design and engineering, value-added services, commercialization) but
so far I have not seen one bit of it.

-- 
 Msen	Edward Vielmetti
/|---	moderator, comp.archives
	emv@msen.com

zane@ddsw1.MCS.COM (Sameer Parekh) (03/16/91)

In article <52892@cornell.UUCP> wayner@thrall.cs.cornell.edu (Peter Wayner) writes:
>need to worry about random hackers finding out about the root because
>these machines were only on the internal network. 

	If a random hacker found out the root password, there wouldn't be
a problem.
	If a random normal person (who knew how to use the system) found
out the root password, there would be a problem.


-- 
zane@ddsw1.MCS.COM

zane@ddsw1.MCS.COM (Sameer Parekh) (03/16/91)

In article <23887@hydra.gatech.EDU> gt1111a@prism.gatech.EDU (Vincent Fox) writes:
>We have a security guard in our library to glance at people's ids as they
>come in. But we don't X-ray and strip-search them, or lock off reference books
>for only "approved use".  The kind of stringent security measures that
>are such a terrific idea for IBM, etc. are nothing but a massive annoyance
>in an academic environment.
	No.  They are not an annoyance.  They are a hindrance.  There
is a difference.  (If there was a high-pitched soft squeal while I was
trying to relax, that would be an annoyance. If I had to study for
a final and the middle 400 pages of my book were missing, that would be
a hindrance.)


-- 
zane@ddsw1.MCS.COM

brian@ucsd.Edu (Brian Kantor) (03/17/91)

Either
1) Georgia Tech has decided to abandon inter-university network research
or
2) that "secure host" is going to have a lot of tunnels through it
or
3) there will be a bunch of hosts at GAT that are on the network side of
the "secure host".

Hiding all your machines behind a secure gateway is incompatable with an
awful lot of the things that university networking people like to do, it
seems to me.  I rather expect the end result to be a lot less draconian
than the initial announcement would seem to be.

But consider:
It is very clear to me that the 18 to 25 year old span of the typical
undergrad represents a WIDELY varying range of responsibility; the
problem ALL we university people are faced with is how to provide the
maximum facilities to those capable of handling them, and preventing damage
by and to those who are not yet ready.  And the hardest part is figuring
out who is who, and when the previously immature have become mature.
I don't know how to do it, and I'll wager no one else does either.

So what do you do?  Letting everyone have unrestricted access to the
network has caused problems in the past, but it could be that that is
the price we have to pay for the advantages gained thereby.  Letting no
one on to the network makes the network useless.  Exams?  Hostages?
Monetary Bonds?  Academic penalties?  Someday someone may come up with
the right answer.  So far as I know, they haven't.  Personally, I think
GAT has come up with the wrong answer, but we'll have to see.
	- Brian

louisg@vpnet.chi.il.us (Louis Giliberto) (03/19/91)

In article <1991Mar16.042742.19416@ddsw1.MCS.COM> zane@ddsw1.MCS.COM (Sameer Parekh) writes:
>
>	If a random hacker found out the root password, there wouldn't be
>a problem.
>	If a random normal person (who knew how to use the system) found
>out the root password, there would be a problem.

I'm confused.  Knowing or not knowing how to use the system has nothing to
do with the danger involved (I wonder what rm *.* does? Let's see....). 
The danger is comes from the intent of the intruder, and only the intruder
knows his intent.

There is a problem if anyone knows it since he may tell others.  Of course,
the bigger problem is that all the security is bypassed with one simple
password.  Not very secure if you ask me.  I remember reading an article in
CuD about partitioning accounts or something like that.  Maybe that would be
a better way.

At any rate, if there was an acceptable amount of access given, the only people
who would be after the root would be those who wanted to cause harm rather than
those who just want to upgrade their accounts so they can access USENET.

The more access given, the less interesting the root account becomes.  If, for
example, they limited undergrads to viewing say 10 USENET groups and sending
20 letters per month (more with special permission), I, as an undergrad, would
find that reasonable and serving both the student and the university in the
best way.

All this stuff is software dependent, not hardware dependent, so it can be
changed to suit the policy.  Shutting people out is not the right approach.

Louis Giliberto

-- 
---------------------------------------------------------------------------
!       "As above, so below; as below, so above" -- The Kybalion          !
!       "I don't trust him; he has dark hair" -- My girlfriend's mother   !
!       "So I'm stupid; what's your point?" -- Me                         !

studly@blake.u.washington.edu (Brian Boru) (03/19/91)

In article <1991Mar18.214218.29444@vpnet.chi.il.us> louisg@vpnet.chi.il.us (Louis Giliberto) writes:

>The more access given, the less interesting the root account becomes.  If, for
>example, they limited undergrads to viewing say 10 USENET groups and sending
>20 letters per month (more with special permission), I, as an undergrad, would
>find that reasonable and serving both the student and the university in the
>best way.

	Lesse - shared accts, limited # of mail messages, gee, doesn't that
sound familiar?  All we need is censored newsgroups, and we've got Prodigy!
Neat!  Prodigy finally comes to the Net!  :-/

	Brian

--  Free Ireland!!

louisg@vpnet.chi.il.us (Louis Giliberto) (03/20/91)

In article <18668@milton.u.washington.edu> studly@blake.u.washington.edu (Brian Boru) writes:
>	Lesse - shared accts, limited # of mail messages, gee, doesn't that
>sound familiar?  All we need is censored newsgroups, and we've got Prodigy!
>Neat!  Prodigy finally comes to the Net!  :-/
>
>	Brian
>
>--  Free Ireland!!

I don't see the parallel.  I was talking about a site, not the Net in general.
Also, a limited acct. due to disk space restrictions and networking costs is notunreasonable especially since universities have budgets within which they must
work.  Most people would be willing to compromise since they would admit that
the resources should be allocated to research projects and classwork before it
is allocated to "recess" on the net.   THe restrictions I talked about were 
meant to be implemented for extra-curricular use (learning on your own).

Louis
(louisg@vpnet.chi.il.us)

-- 
---------------------------------------------------------------------------
!       "As above, so below; as below, so above" -- The Kybalion          !
!       "I don't trust him; he has dark hair" -- My girlfriend's mother   !
!       "So I'm stupid; what's your point?" -- Me                         !

gl8f@astsun7.astro.Virginia.EDU (Greg Lindahl) (03/20/91)

In article <1991Mar19.211732.14152@vpnet.chi.il.us> louisg@vpnet.chi.il.us (Louis Giliberto) writes:

>>	Lesse - shared accts, limited # of mail messages, gee, doesn't that
>>sound familiar?  All we need is censored newsgroups, and we've got Prodigy!
>>Neat!  Prodigy finally comes to the Net!  :-/
[...]
>I don't see the parallel.  I was talking about a site, not the Net in general.
>Also, a limited acct. due to disk space restrictions and networking
>costs is not unreasonable especially since universities have budgets
>within which they must work.

Well, the limitations mentioned above are pretty trivial to work
around. And they probably won't address the things that cost money.
Most universities have plenty of bandwidth on their internet
connection; they may lack disk space or terminals, but a limit on the
# of mail messages won't address that problem.

Stupid solutions rarely work, but at least they inspire creative
work-arounds.

zane@ddsw1.MCS.COM (Sameer Parekh) (03/24/91)

In article <1991Mar18.214218.29444@vpnet.chi.il.us> louisg@vpnet.chi.il.us (Louis Giliberto) writes:
>In article <1991Mar16.042742.19416@ddsw1.MCS.COM> zane@ddsw1.MCS.COM (Sameer Parekh) writes:
>>
>>	If a random hacker found out the root password, there wouldn't be
>>a problem.
>>	If a random normal person (who knew how to use the system) found
>>out the root password, there would be a problem.
>
>I'm confused.  Knowing or not knowing how to use the system has nothing to
>do with the danger involved (I wonder what rm *.* does? Let's see....). 
>The danger is comes from the intent of the intruder, and only the intruder
>knows his intent.

	Sorry if I confused you.  I was trying to say that the use
of the word 'hacker' implied intent.


-- 
The Ravings of the Insane Maniac Sameer Parekh -- zane@ddsw1.MCS.COM