About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Chaos Digest - Volume 1, Number 10


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Chaos Digest Lundi 22 Fevrier 1993 Volume 1 : Numero 10

Editeur: Jean-Bernard Condat ([email protected])
Archiviste: Yves-Marie Crabbe
Co-Redacteurs: Arnaud Bigare, Stephane Briere

TABLE DES MATIERES, #1.10 (22 Fev 1993)
File 1--Reseau de Donnees Scientifique Peruvien: RCP
File 2--Denning's _Computers Under Attack_ (critique)
File 3--Repondeur Telephonique sur Ligne Occupee (reprints)

Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from [email protected]. The editors may be
contacted by voice (+33 1 47874083), fax (+33 1 47877070) or S-mail at:
Jean-Bernard Condat, Chaos Computer Club France [CCCF], 47 rue des Rosiers,
93400 St-Ouen, France

Issues of Chaos-D can also be found on some French BBS. Back issues of
ChaosD can be found on the Internet as part of the Computer underground
Digest archives. They're accessible using anonymous FTP from:

* ftp.eff.org (192.88.144.4) in /pub/cud
* red.css.itd.umich.edu (141.211.182.91) in /cud
* halcyon.com (192.135.191.2) in /pub/mirror/cud
* ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD
* nic.funet.fi (128.214.6.100) in /pub/doc/cud

CHAOS DIGEST is an open forum dedicated to sharing French information among
computerists and to the presentation and debate of diverse views. ChaosD
material may be reprinted for non-profit as long as the source is cited.
Some authors do copyright their material, and they should be contacted for
reprint permission. Readers are encouraged to submit reasoned articles in
French, English or German languages relating to computer culture and
telecommunications. Articles are preferred to short responses. Please
avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Chaos Digest contributors
assume all responsibility for ensuring that articles
submitted do not violate copyright protections.

----------------------------------------------------------------------

Date: Wed Feb 17 11:43:24 EST 1993
From: [email protected] (Jose Soriano )
Subject: File 1--Reseau de Donnees Scientifique Peruvien: RCP

Bonjour,

Je vous envoye le projet sur lequel nous sommes en train de
travailler. En ce moment, nous installons notre "link" internationale
avec satellite de 64 kbps dans Panamsat. Aussi, nous sommes en
negociations avec la CEE pour etablir une connexion dediee vers
l'Europe.

=======================================================================
RED CIENTIFICA PERUANA
(Peruvian Scientific Network)
=======================================================================

INTRODUCTION

The market entry of minicomputers, adjusted to the needs and sizes
of the smallest research team, as well as the more recent spectacular
development of microcomputers have changed traditionally used research
work modes.

The abundance of ever quicker perishable information sources and
the increasing cost of the means to access them have evidenced the need
for interinstitutional cooperation and for the rationalization of
increasingly scarce resources, both in the national and international
environment.

Peruvian entities devoted to research and teaching, as well as
state and private universities, non governmental organizations, industry,
finance and commercial corporations are carrying on internal installation
of communication networks (LANS), sharing the use of these resources for
the purpose of more efficient results.

The above described development, begun some years ago, is still on
the run. The need to exploit expensive means (telecomunications with
major research centers, access to international databases, access to
focused resources) and the national and international reach of mutual
scientific and technological cooperation among teams of researchers
made the interconnection of these networks a must in both the national
and international scope. To achieve this, by late 1991 many national
organizations contributed to the establishment of RED CIENTIFICA PERUANA
(Peruvian Scientific Network).

Previous documents have described the history of this cooperative
national network and the services it renders its users. We will now
deal with its present technical structure and its growth plans for the
current two year period.


DESCRIPTION OF THE PERUVIAN SCIENTIFIC NETWORK

Organization
------------

RCP is a low cost national network that has achieved high
operational quality in short time, and so far links 132 institutions all
over the country. The main services it provides, described in further
detail are the following: electronic mail, access to distributed national
listservers, software installation, technician and user training.

It is organized as a non profit institution, and its body of members
includes one representative from each participant organization. The staff,
the Direction Committee and an Administrator are entitled by a General
Assembly, the highest authority in the association.

Under the coordination of the General Administrator reporting to the
Direction Committee, a small staff including engineersand trainees are in
charge of technical operation, node installation, administrator and user
training, as well as of permanent support to final users.

The Technical Committee, formed by representatives from member
organizations, is the consulting entity in charge of the national network
planning and development, as well as of the coordination of institutional
developments related to the national network's prospective architecture.

Financial resources
-------------------

As an autonomous cooperative institution, RCP counts on funds
provided by the its institutions in yearly contributions and monthly
payments, all of which sum up to form its operational budget. RCP also
aims at being granted donors' contributions and other kinds of physical
of financial collaboration from national and international cooperation
agencies.

Infrastructure
--------------

RCP is a dialup active node in the INTERNET organization, that
uses the store and forward system of NOVELL networks, Tokenring, DOS
PCs, VAX, SUN, DEC and other systems integrated in the national network,
running on UNIX operative system.

Its development is supported by the existing (or currently being
installed) national telecommunications infrastructure, both public and
private national and international telephone lines (CPT and ENTEL);
national x25 network (Perunet); special circuits or dedicated lines (CPT
and ENTEL); optic fiber network (RED DIGITAL ENTEL);cellular telephone
networks (CPT and Celular 2000). It is also supported by the transponder
in PANAMSAT I, belonging to the Ministry of Education as well as
different international carriers rendering service in Peru.

The main concentration node of the national network is accessed via
two lines within the commuted telephone line (RTC 19,200 kbps), a space
circuit x25 (Perunet 9,600 kbps) allowing for the simultaneous access of
16 users, a Netblazer router allowing for the (TCP/IP) network access
through a special circuit (dedicated line) or through a commuted
telephone line (RTC).

International communications are held several times per day through
international calls (IDD) generated by the m2xenix machine located in
Oregon, United States, where they enter the international backbone of
the National Science Foundation.


THE NATIONAL NETWORK (RCP)

General Information on the Project
----------------------------------

The organization and distribution of activities within the
national system and the scientific and technological cooperation call
for the constant exchange of information on the national, regional and
international scopes.

Electronic mail has allowed our researchers to get information
which not long ago was inaccessible by other means. It has also
contributed to the establishment of interinstitutional cooperation and
coordination links which were until now beyond imagination.

The current installation of referential data banks distributed all
over the network, accessible via electronic mail (listservers), the
establishment of thematic subnets (the health and the epidemiologic
alert networks), the operation of more than 20 interest groups
susbscribed in similar international lists all this generates a constant
increase in the dataflow through the country and also internationally.

The new needs lead us to the simultaneous development of a network
architecture to allow for means of communication in different scopes:
national (IP links), regional (IP links with our neighbors, especially
Andean ones, and through them with the rest of LAC) and international
(IP dedicated link with NSF).

National Architecture
---------------------

The dynamic development of this infrastructure is projected in two
non-exclusive stages, the development of which can be partially or
completely simultaneous.

The first stage is currently being developed in the location of
Lima, Peruvian's capital city, which gathers the majority of educational
and research institutions. It projects the interconnection of 10
concentrator nodes (by locations and / or interest areas), linked by
special circuits (64 or more kbit/s dedicated lines in the digital cable).
First preliminary tests projected for 1992-1993.

The second stage prioritizes the development of departmental nodes
that geographically concentrate the traffic and allow for a reduction in
the telecommunications costs of province located institutions. The
establishment of special circuits is also aimed at with the main RCP node,
located in Lima (x25 dedicated lines: 19,200 kbps, 64 kbit/s optic
fiber; or others: 9,200 kbps). First preliminary tests projected for
1993-1994.

RCP, based on its various national components, will enable the
interactive access of final users to the resources available in the
several institutions that form the network. Linkage of the same (IP) in
the local networks existing in each campus will imply an efficient
structure that will allow for their future evolution.

Provincial nodes located in the country borders can ensure low cost
link with neighbor countries, thus opening ways to enhance regional
cooperation and the exploitment of mutually shared resources. First
preliminary tests projected for 1993-1994.

The above mentioned link will clearly allow for an improvement of
research related communications and for a real development of regional
science and technology. It thus represents the communications means that
will be decisive in future industry, finance and trade.

This national and regional development is necessarily supported by
the establishment of a high quality linkage with the NSF international
backbone in the United States. For this purpose, we intend to establish
two 64 Kbit satellite channels, supported by the contract between Peru's
Ministry of Education and Alpha Lyracom, which provides PAS I and PAS II
(Panamsat) with a transponder. This does not exclude the possibility of
using international carriers (Sprint and MCI, available in the local
market).

All the described development is a part of the original RCP project,
elaborated in May, 1991 and later on improved through consecutive
proposals and documents published by RCP along 1991 and 1992.

Necessary Equipment for Project Implementation
----------------------------------------------

In order to implement the project in all its stages, the purchase
of equipment and the acquisition of national and international
telecommunications infrastructure is a must. This refers to both RCP
infrastructure and the concentrator nodes of national scope.

In most cases, RCP member institutions are financially able to
afford these needs on their own. For other cases, cooperative solutions
will be found, based on interinstitutional collaboration aiming at the
purchase of necessary equipment. In most cases, RCP's task focuses on
searching the best international prices for all the network member
institutions, on the reception and entry of the equipment; but also
consists essentially in providing orientation as for equipment
characteristics, aiming at a better individual and common use of it.


GENERAL OBJECTIVES

1. To provide the Peruvian academic community with better services in
national communications, such as a better link with the
international backbone of academic networks;

2. To develop a coherent national INTERNET network;

3. To increase inter-institutional cooperation in the national,
regional and international scope;

4. To reduce the national research system's communication costs, and to
allow for a future reduction of regional costs over the basis of
cooperation;

5. To start an IP regional backbone that links Peru, Ecuador, Colombia,
Bolivia, Chile; and, through the latter, Argentina, Uruguay and
Brazil.

SPECIFIC OBJECTIVES

1. To provide RCP, the Peruvian National Network, with equipment
for the installation and implementation of a national IP network and
an international link;

2. To provide RCP, the Peruvian National Network, and the regional
networks with the equipment necessary to install and implement links
with neighbor countries' networks;

3. To provide RCP, the Peruvian National Network, with the resources
necessary to establish a lasting IP link with the international
backbone (one cost time, or for a reasonable period of time);

4. To train human resources on the national and regional levels for
using new equipments and technologies. National and regional level
training and divulgation of new technologies.

Jose Soriano
Peruvian Scientific Network Administrator
--
un abrazo
Jose
***********************************************************************
Jose Soriano - Red Cientifica Peruana - e-mail : [email protected]
Av. del Ejercito 1870 - San Isidro - Lima - Peru
TE: ( 51 -14) 46 - 16 -95 / 36 89 89 anexo 527 / fax: 36 01 40
-----------------------------------------------------------------------

------------------------------

Date: Fri Feb 19 14:33:00 -0600 1993
From: [email protected] ("Rob Slade, DECrypt Editor, VARUG NLC... )
Subject: File 2--Denning's _Computers Under Attack_ (critique)
Copyright: Robert M. Slade, 1993

_Computers Under Attack: intruders, worms and viruses_
Peter J. Denning, ed.

ACM Press (11 W. 42nd St., 3rd Floor, New York, NY 10036, 212-869-7440)
ISBN 0-201-53067-8

This book is a very readable, enjoyable and valuable resource for anyone
interested in "the computer world".

That said, I must admit that I am still not sure what the central theme of
this book is. Denning has brought together a collection of very high
quality essays from experts in various fields, and at one point refers to
it as a "forum". That it is, and with a very distinguished panel of
speakers, but it is difficult to pin down the topic of the forum. Not all
of the fields are in data security, nor even closely related to it. (Some
of the works, early in the book, relating to what we now generally term
"the Internet", do contain background useful in understanding later works
regarding "cracking" intrusions and worm programs.)

All, however, are interesting and sometimes seminal works. Some are
classics, such as Ken Thompson's "Reflections on Trusting Trust" and Shoch
and Hupp's "The Worm Programs". Others are less well known but just as
good, such as the excellent computer virus primer by Spafford, Heaphy and
Ferbrache.

(Please do not consider my confusion over the subject to be a criticism,
either. I do want to recommend the book. I just find myself wondering to
whom to recommend it. Also, in fairness, I must say that Peter Denning,
who has had a chance to respond to the first draft of this review as
usual, doesn't consider it a review. Which, I suppose, makes us even :-)

The book is divided into six sections. The first two deal with networks
and network intrusions, the next two with worms and viral programs, and
the last two with cultural, ethical and legal issues. While all of the
topics have connections to data security, there are some significant
"absences". (There is, for example, no discussion of the protection of
data against "operational" damage, as in accidental deletions and failure
to lock records under multiple access.)

In addition to shortages of certain fields of study within data security,
the treatment of individual topics shows imbalances as well. The division
on worm programs contains seven essays. Six of these deal with the
Internet/Morris worm. The seventh is the unquestionably important Shoch
and Hupp work, but it is odd that there is so much material on the
Internet/Morris worm and nothing on, say, the CHRISTMA EXEC.

Sad to say, the essays are not all of equal calibre. This is only to be
expected: not all technical experts have equal facility with langauge.
However, in spite of the noted gaps, and the occasional "bumps" in the
articles, most of the articles can be read by the "intelligent innocent"
as well as the "power user". At the same time, there is much here that
can be of use to the data security expert. At the very least, the book
raises a number of ongoing issues that are, as yet, unresolved.

What, then, is the book? It is not a data security manual: the technical
details are not sufficient to be of direct help to someone who is
responsible for securing a system. At the same time, a number of the
essays raise points which would undoubtedly lead the average system
administrator to consider security loopholes which could otherwise go
unnoticed.

Is it a textbook? While it would be a valuable resource for any data
security course, the "missing" topics make it unsuitable as the sole
reference for a course. The breadth of scope, and the quality of the
compositions make it very appealing, as does the inclusion of the large
social component.

While the book won't have the popular appeal of a "Cuckoo's Egg", it is
nevertheless a "good read" even for the non-technical reader. The
section on international networks is particularly appropriate as society
is becoming more interested in both email and "cyberspace". The overview
it gives on related issues would benefit a great many writers who seem to
have a lot of "profile" but little understanding.

My initial reason for reviewing the book was primarily as a resource for
those seeking an understanding of computer viral programs. As such,
there are definite shortcomings in the coverage, although what is there
is of very high quality. The additional topics, far from detracting
from the viral field or clouding the issue, contribute to a fuller
understanding of the place of viral programs in the scheme of computers
and technology as a whole. Therefore, while it would be difficult to
recommend this work as a "how to" for keeping a company (or home) safe
from viral programs, it should be required reading for anyone seriously
interested in studying the field.

One point is raised by the inclusion of the cultural, social and legal
essays within the book. It was with a trepidation growing almost to a
sense of despair that I read the last two sections. Here we see again
the same hackneyed phrases, and the same unmodified positions that have
been a part of every discussion of computer ethics for the last twenty
years. (Or more.) This is by no means to be held against Denning: on
the contrary, it is the fact that he has selected from the best in the
business that is so disheartening. Do we really have no more options
than are listed here? Can we really come to no better conclusions?

One illustration that is repeatedly used is that of credit reporting
agencies. We feel that such entities must be watched. We note that
the computer systems which they depend upon must be checked for
anomalies, such as bad data or "key fields" which cross link bad data
with good people. Still and all, we see them as a necessary evil.
Breaking into such systems, however, is an invasion of privacy, and
therefore wrong. Carried to its logical conclusion, this attitude
states that "free" access to such semi-private information is wrong,
but that it is "right" for companies to make money by "selling" such
information.

Of course the situation is not quite that simple. (It never is, is it?)
After all, a large corporation needs the goodwill of the public for its
continued existence. The corporation, therefore, has more of a vested
interest in safeguarding confidential information than any random
individual with a PC and a modem. This belief in the "enlightened self
interest" of corporations, however, would seem to more properly belong
to an earlier age: one in which corporations didn't go bankrupt and
banks didn't fall like dominos. After all, it used to be that
companies kept employees on for forty years before giving them the gold
watch. Now even the most stable might lay off forty thousand in one
year.

A single thread runs through almost all sixteen articles, four
statements and ten letters in the final two sections. It is a call,
sometimes clarion, sometimes despairing, for "computer ethics". Not
once is there proposed what such an animal might be. Even the NSF
(National Science Foundation) and CPSR (Computer Professionals for
Social Responsibility) statements only hint at some legalistic
definitions, but never try to look at what a foundation for such
"ethics" might be. With our society discarding moral bases as fast as
possible, the most useful statement might be Dorothy Denning's, when,
in conversation with Frank Drake, she states that, "The survival of
humanity is going to demand a much greater level of caring for our
fellow human beings ... than we have demonstrated so far."

Still even the disappointments of this final part of the book are
important. "Computers Under Attack" is a realistic overview of the
current state of thinking in information technology, and the problems
facing society as a whole. Far from the "gee whiz" of the futurist, and
equally distanced from the sometimes dangerous "CH3CK 1T 0UT, D00DZ!" of
the cyberpunk, Denning's collection of essays is important not only for
the concerned computer user, but also for anyone concerned with the
future of our increasingly technically driven society.

============== ______________________
Vancouver [email protected] | | /\ | | swiped
Institute for [email protected] | | __ | | __ | | from
Research into rslade@cue.bc.ca | | \ \ / / | | Mike
User p1@CyberStore.ca | | /________\ | | Church
Security Canada V7K 2G6 |____|_____][_____|____| @sfu.ca

------------------------------

Date: Fri Feb 19 08:56:55 EST 1993
From: [email protected] (Robin Cover )
Subject: File 3--Repondeur Telephonique sur Ligne Occupee (reprints)
Copyright: BT Plc , 1989 (pour le 1er), Whk Eng'g Corp., 1993 (le 2e)

[Moderateur: Page 22 d' _Industries et Techniques_ no. 735 du 5 courant,
une breve donne le texte suivant: "En Angleterre, Orpington a concu un
repondeur qui prend des appels meme quand la ligne est occupee. Le
CallMinder se branche sur le reseau telephonique sans equipement
particulier (New Scientist 02/01)". Aucune trace d' "Orpington" sur l'
annuaire electronique anglais, 3619 code GB1.]

Stealing: A March on Thieves
Swift, Peter
British Telecom World PP: 44-45 Sep 1989 ISSN: 0953-8429

ABSTRACT: Auto Tracer, a new automobile security system, was developed by a
UK businessman, Bernard Hunt. The system allows an automobile owner to
reclaim a stolen car by dialing a secret paging number. This turns on the
car's hazard lights and headlights, starts a siren, replaces the license
plate with a message reading "stolen car," and stops the engine by
eliminating the flow of gasoline. Telecom Security offers home protection
with a system that has covered door sensors to detect forced entry, an
infrared motion detector, a smoke sensor, an internal siren, a control
keypad, and a master control panel. An external dummy bell box acts as a
visual deterrent to criminals. Callminder, from Commtel, offers total
control over all outgoing telephone calls except emergency, free-phone, and
operator fault notification calls.

GEOGRAPHIC NAMES: UK
DESCRIPTORS: Security systems; Automobiles; Homes; Crime; Fire alarm
systems; Detection alarms

+++++++

UK: TELECOM WATCH - NEW TELEPHONE ANSWERING SERVICE - CALLMINDER
Electronic Times (ELTIM) - January 14, 1993 Page: 8
By: Peta Firth

Several months ago I was selected by BT to try out an intelligent network
service before it went on sale. I was invited to apply to be connected
free to test a proposed new service called Callminder.

The invitation was couched in "while stocks last" and "first come first
served" terms so I sent off the form not really expecting to hear much
about it again. After all it seemed like a good offer. Callminder, a
telephone answering system based at the local exchange, was something
useful for nothing: always an attractive proposition, I thought.

But I was selected, and soon received the literature on how to use it
along with a personal identity code to access messages.

On the morning the service was set to begin I rushed excitedly to the
office to try it out. I called my home number but nothing happened. There
was no answer. Disappointed, I called the enquiry number supplied by BT.
But instead of an explanation I was given a "hotline" number to dial. This
turned out to be hotter than expected: it was the British Gas emergency
number. I called the first number again to check the hotline number was
correct. After explaining that I doubted British Gas would be able to help
I was politely put through to someone else in BT.

The second BT person said: "Ah yes, You are ahead of us, you know." He
suggested it might begin later that afternoon.

It did, so I recorded my message to replace the computer generated one
and cheerfully thought to myself: at last, I have an answering machine.

But over the course of the next few weeks my opinion of the service
slipped. For a start it kept breaking down. I would only find out when
callers told me I must have been imagining I had an answering service
because there was no answer when they tried to ring me. I explained to BT
that if an answering machine was not working when I thought it was, it was
causing more confusion than if I never had one in the first place. After
this complaint BT agreed to at least tell me when the system had been out
of action.

When the system is working, which to be fair is most of the time, it
still puts callers off. Even people who have overcome their dislike of
answering machines are put off by the interruption after my recorded
message of a brisk computer generated voice in school mistress tones
demanding the caller's name and message.

The final straw came when I discovered the service did not work in the
small hours of the morning. BT suggested I might like to buy an answering
machine to cover the period. This, of course, would make Callminder
pointless.

The reason I am telling you all of this is that the DTI issued a
consultative document about intelligent networks just before Christmas.
The document calls for comments from ptos, switch and computer
manufacturers, service providers and users on how to liberalise
intelligent network services. The plan is to take "exclusive control of
the service away from the switch manufacturer" by creating a "generic
software platform" which can be produced and implemented by an vendor.

This could turn the fortunes of switch manufacturers on their head. It
could destroy any hopes they may have had that pouring money into software
development will maintain their market share. A host of tiny software
houses will be able to undercut the giant switch manufacturers who are
busy expanding their hardware expertise into software.

If my experience with Callminder is anything to go by, that would be a
great shame. because for me it turned out that if I want reliability I
have to turn to an answering machine: dedicated hardware.

------------------------------

End of Chaos Digest #1.10
************************************
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS