textfiles-politics/politicalTextFiles/hacking.txt
2023-02-20 12:59:23 -05:00

454 lines
25 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Mail-From: ARPAnet host SRI-CSL rcvd at Wed Sep 28 15:58-PDT
Date: 26 Sep 1983 20:08-PDT
Sender: GEOFF@SRI-CSL
Subject: Telecommunications Security and Privacy.
From: the tty of Geoffrey S. Goodfellow
Reply-To: Geoff@SRI-CSL
To: Human-nets:,
To: Telecom:,
To: Security-Forum:,
To: Info-Micro:
Cc: csl:,
Cc: others:
Message-ID: <[SRI-CSL]26-Sep-83 20:08:20.GEOFF>
Redistributed-To: dist:
Redistributed-By: GEOFF at SRI-CSL
Redistributed-Date: 28 Sep 1983
On Monday, September 26th, I appeared before and presented invited
testimony at the U.S. House of Representatives Subcommittee on
Transportation, Aviation and Materials on the subject of Telecommunications
Security and Privacy.
Due to the activities of the Milwaukee 414s and the subsequent hoopla that
has been generated in the media, HACKING has been getting a bad name. I
therefore decided to address my testimony to the TRUE nature of computer
hackers and hacking (in an attempt to put the entire situation in some type
of perspective). I also addressed what can and should be done to help
abate the 'unsavory' hacking problem. And lastly, how low tech the current
hackings have been and what we might be seeing more of in the future.
I'm told the hearings went out live over CNN -- there were at least 16
video cameras that I could count and the rest of the room was jammed to
standing room only with reporters and other media.
Individuals who presented testimony were: Neal Patrick (of the 414s); Jimmy
McClary (Los Alamos Division leader for Security); Donn Parker and myself
(from SRI); and Steve Walker (formerly of DARPA/Pentagon).
Those interested in what I had to say about hacking and such are invited to
FTP a copy of my prepared testimony from [SRI-CSL]<GEOFF>HOUSE.DOC; There
is also a .LPT version with line-printer overstriking, should you want
that. If you cannot FTP a copy for whatever reason, I'll be able to send
one by netmail if you mail a request to Geoff@SRI-CSL.
Geoff
...............................................................................
...............................................................................
TESTIMONY BY GEOFFREY S. GOODFELLOW
Before the Subcommittee on Transportation, Aviation and Materials
on the subject of Telecommunications Security and Privacy.
26 September 1983
1. Introduction
My name is Geoffrey S. Goodfellow. I am primarily employed by the
Computer Science Laboratory at SRI International, Menlo Park, California.
For the past 10 years at SRI, I have been involved in research efforts
related with packet switched computer network communication systems,
protocols and security technologies. I have also been involved in
various operating and sub-system development projects. Currently, my
responsibilities include a position as Principle Investigator of SRI's
involvement in a Department of Defense program aimed at developing and
proving secure computer systems, that operate at different security
levels and communicate via networks. A detailed biography of my career
from 7th grade school where I discovered computers (which
eventually lead to my permanent abandonment of the formal educational
system during high school) to how I got to where I am today with no
degrees or any type of equivalency to my name is included at the end of
my testimony.
I am a coauthor of the Hacker's Dictionary -- A Guide to the World of
Computer Wizards, a new book being published this fall.
THE STATEMENTS INCLUDED HEREIN ARE MY OWN AND DO NOT NECESSARILY
REPRESENT THOSE OF SRI INTERNATIONAL OR ANY CLIENTS OF SRI.
2. The Nature of Computer Hackers and Hacking.
The primary nature of a computer hacker can be defined as follows:
- A person who enjoys learning or knowing the details of computer
systems and how to stretch their capabilities, as opposed to most
users of computers, who prefer to learn or know only the minimum
amount necessary in order to get their job done.
- One who programs computers enthusiastically, for the sheer fun of it,
and gets a non professional amount of enjoyment out of using them.
- A person capable of appreciating the irony and beauty (i.e. `hack
value') of a program.
- A person who is good at programming quickly or is an expert on a
particular program. (This definition and the proceeding ones are
correlated, and people who fit them congregate).
Unfortunately, though, hacking has an unsavory faction to it:
- A malicious or inquisitive meddler (i.e. `poacher') who tries to
discover information by poking around. For example, a "password
hacker" is one who tries, possibly by deceptive or illegal means, to
discover other people's computer passwords. A "network hacker" is
one who tries to learn about the computer network (possibly because
he wants to interfere--one can tell the difference only by context,
tone of voice and manner of approach).
Hackers of all factions, whether benign or of the unsavory flavor,
consider themselves somewhat of an elite, though one to which new members
are gladly welcome. Hacking is meritocracy based on ability.
There is a certain self-satisfaction in identifying yourself as a hacker
(but if you claim to be one and are not, you'll quickly be labelled
`bogus').
The hacker is intensely interested in technology and is a very
inquisitive person. Many are social outcasts who don't enjoy the same
things as most other kids their age. Hackers of the unsavory flavor are a
very curious breed of individual -- many can best be described as
loners looking for someone to appreciate their talents. They know full
well that what they're doing errs on the `dark side (of the force)' --
to coin a phrase. Unsavory hackers want to get caught so they can be given
the appreciation they desire -- and the process of getting caught adds an
essence of thrill to their endeavor.
I would like to state for the record, that benign hackers, such as I,
deplore the unsanctioned entry and subsequent rummaging of mainframe
computer systems and networks. These types of activities are tarnishing
the profession of hacking and giving it a bad name.
In the Real World, computer system organizations are generally run
like totalitarian police states. This unfortunate reality fosters
resentment in hackers and a desire to challenge the reverence of
authority develops. As a result, the way hackers bring themselves to a
system managers attention is via the medium they know and relate to best:
a terminal and modem and your computer system. In most cases, the hacker
wouldn't personally think of or know how to go about calling up the
director of a computer system and offering his services to you as a bright
young guy for the fear of reprisals or not being taken seriously.
Instead, they choose to `introduce' you to them by meddling with your
computer system, cavalierly circumventing security and protection
mechanisms, in order to satiate their hunger for knowledge and
develop an understanding of how things work.
The organization will respond in kind by trying to `plug the leak' of
an intrusion into their system by erecting barriers. This type of
reaction is precisely the wrong approach to take, because the hacker
will notice the beefed-up defenses and see them as a further
challenge of his prowess and ingenuity and legitimate users are subjected
to greater inconvenience.
Instead, what an organization should do is try to befriend hackers which
have penetrated their inner sanctums. The perspective that should be
taken is one of "Is it helpful or useful for you to do this?" rather
than "Are you authorized to do this?". You must in effect come down to
the hackers level and circulate among them. Show them that you appreciate
their talents. If you ask them nonforeboding questions and take a genuine
interest in what they're doing, most of the time you'll find they're more
than happy to tell you exactly what it is they're looking for or
interested in. The hacker wants to learn and you can be their
guide/teacher. This is how I was dealt with by the firm that caught
me during my unsavory hacking days in 1973 when I breached security on a
large commercial timesharing network and many of its host computer
systems. I was very much inspired by this method of catching and steering
unsavory hackers towards more constructive use of their talents.
There is, however, a more virulent strain of the unsavory faction, namely
the electronic vandals or joy-riders (N.B. NOT HACKERS). This strain
includes, for example, kids whose parents are of an affluent nature. As a
result, these kids have an inflated world picture and little or no true
sense of reality, due to the nature of their care-free life styles and
upbringing. These kids plague computer systems and networks as they
would spray paint on school walls, t-p someone's house, or engage in the
use of so called 'recreational' drugs. In other words, these illicit
activities are engaged in with absolute reckless abandon and disregard for
the rights or sovereignty of other people's property. As with regular
vandalism, the primary motivators seems to be simply doing it because
they can get away with it, and because of the respect it brings them
among their equally disrespectful peers. This differs from the unsavory
hacker in that there is no constructive purpose or motive involved, such
as learning or acquiring knowledge. This problem is further
exacerbated by the juvenile age of the perpetrators and the unlikelihood of
prosecution, even if caught. The perpetrators are smugly aware of their
immunity in most cases!
3. What Can and Should Be Done to Help Abate The Unsavory Hacking Problem?
From my own observations and inspections of systems and from what I have
been reading in the press, I have come to the conclusion that
computer site administrators are not taking reasonable and prudent
measures to protect their computer systems from even the most casual
methods of circumvention. A rather egregious example of this would be the
installation of which the 414s allegedly logged into with username "test"
and password "test". Usernames and passwords of this sort are not uncommon
and sites which set up logins like this are just asking for a break in
-- just as someone who would leave a key in the lock on the front door of
their house, complete with the WELCOME! mat out for all to see, invites
the casual burglar.
The way I view `reasonable and prudent' measures of protection from the
casual penetration is by drawing a paradigm with the way DoD classified
information is handled.
With respect to the handling and use of classified information, it is
the responsibility of the organization to which you belong, in conformance
with DoD guidelines, to provide you with rules and regulations in
the handling of classified information. It is also the responsibility of
your organization to provide you with a safe place (i.e. a vault) to
store said information and to provide adequate safeguards (such as alarm
systems, security personnel and patrols) to prevent unauthorized access.
The same methodology should be taken to heart by administrators of
computer systems. It's their responsibility to provide reasonable and
prudent measures to prevent unauthorized access attempts from gaining
access to the system. This means a few very basic things like:
- Forcing users to choose reasonable passwords - not their spouse's
name or their dog's name.
- Setting up proper modem controls on dial-up/remote access ports so
that disconnection causes any jobs (or trojan horses left on the
port) to be flushed and results in resetting the port to not-logged
in status.
- Reporting incorrect password attempts to the system console or log
file.
- Causing line disconnection after a few successively repeated
incorrect password attempts.
- Using encrypted passwords, so it is not possible to compromise an
entire systems password list when circumvention of a systems
protection mechanisms is attained. This is analogous to the DoD's
compartmentalization of information -- so a breach in one area does
not sacrifice security in all areas.
The second facet of the paradigm is the users' responsibility. I don't go
out to lunch and leave my secrets sitting on my desk. I put them in a
vault. And I don't go throwing them over the embassy walls. So it is
the same for the computer system user. It is the users
responsibility to choose reasonable passwords and not leave them written
down anywhere, such as on their desk blotter or white board or to
pass them out to others.
The third matter is a paradigm of a different nature. This has to do
with socially acceptable values. Namely, when I was brought up, I was
taught about trespassing. If I went to someone's house and found the front
door wide open, I don't really know of anyone who would walk right in
and look around. They would instead stand at the door, ring the doorbell
or knock or call out. This type of responsibility or sense of morals
has to be applied to the computer technology field.
Research into methods of improving the safeguarding of information flow
through technology should be pursued. One such project is the one of which
I am the Principle Investigator of at SRI, which has to do with this type
of technology. Our involvement has to do with developing and proving
technologies that will absolutely assure that I will only have access to
information in a computer system database of which my clearance and
my `need to know' entitles me too, while prohibiting me from information I
am not cleared or permitted to access. However, one must carefully weigh
the value of increased security with the cost in user convenience and
flexibility.
Explicit federal and state criminal statutes should be enacted to
allow a vehicle for vigorous prosecution, should it be warranted or
desired, by injured parties. These explicit laws would also hopefully
act as a method of deterrence.
4. Let Us Not Lull Ourselves into a False Sense of Security.
In general unsanctioned computer system penetrations can be
performed by individuals who possess three basic aspects of computer
knowledge: access, skill and information.
Access can be defined as a terminal and modem. Skill can be
defined as ingenuity or familiarity with computer systems, especially
with the given system type that the penetration is directed
towards. Information can be defined as dial-up phone numbers, network
address or means of accessing a given computer system -- perhaps even
physical. Information can also include various methods, most likely in the
form of 'bugs' (i.e. shortcomings) or 'features' (i.e. an aspect
inherent to the hardware or software design of the system) which will
permit the holder to circumvent the operating system security and
protection mechanisms, and in effect gain carte blanche access to the
computer. Carte blanche can be defined as allowing the holder to override
file security and protection considerations, in that you can read or alter
any data and even change the nature of the computer operating system
software itself.
In the good ol' days such skill and information was not widely known.
However, with the ever increasing number of computer systems, both
personal and mainframe alike, information and skill is spreading to an
ever increasing number of individuals and institutions.
Unfortunately, not all of the individuals are as scrupulous as they
should be. Such instruments as `Pirate Bulletin Board' systems are
being used to disseminate this information on a nationwide, on-call, as
needed basis.
What does this mean?
Up until now most unsanctioned computer system penetrations have not been
the high technological acts of chicanery the media has made them out to
be. They were primarily performed by individuals who were as familiar
with computer technology as, say, an auto enthusiast is with what goes
on under the hood of your car. The 'auto whiz' has the breadth of
knowledge necessary to 'hot wire' a motor vehicle, just as your computer
literate individual has the breadth necessary to perform a
technological 'hot wire' inside a computer system.
However, the current low to medium technological approaches to
system penetrations are likely to change.
I define the technological levels as follows: high tech is defined as a
new method of circumvention. High tech methods are primarily
invented by individuals or a group of individuals who have an in depth
understanding of the desired technology the caper is directed against.
Medium tech can be defined as an individual who has the same basic level
of understanding as the high tech guy, but uses the knowledge and
perhaps fine tunes or refines it a bit (i.e. the medium tech individual is
a knowledgeable user). The low tech individual is just a user of
the knowledge with little or no understanding of what is involved in making
the technology perform its desired function.
In the not to distant future with higher stakes, increased levels of
knowledge and other aspects better understood, I believe we will see a
trend towards a more 'higher tech' level of system penetrations and
circumventions. These capers will be harder to detect and deter.
The further development of formal specification and verification techniques
and associated technologies will permit the system developers,
reviewers or specifier himself to verify that a given system
specification is consistent with a given model of desired operation.
5. Recommendations
In conclusion, I would like to say that I believe the scale of the
hacking problem is going to escalate dramatically as more of the technology
makes its way into the mass market. There is no one easy solution to
these problems. The directions that need to be taken are technological,
ethical/moral and social. Hopefully an increased awareness of the
vulnerability of our systems to penetration and circumvention will allow us
to see the light, in the form of solutions, at the end of the tunnel. And
hopefully that light, is not a train.
6. Biography (The Making of a Hacker)
My first experience with computers (and the world of `hacking')
manifested itself during my 7th grade school when I discovered a room
full of teletypes connected to a computer system at Stanford University
which offered Computer Assisted Instruction/drill programs.
Having discovered `The Computer Room', I started arriving at school early
each day to be able to play with them. I would also spend the lunch
hour, recess and as long as I could after school in the computer room, as
well.
Luckily, that summer I was permitted to hang-out at the Stanford facility
which had the computer system that served our school and others. This
allowed me the opportunity to interact with the system designers and
learn how everything worked. At the facility, I quickly began to
develop a keen interest in system-level software, such as the
operating system and privileged type programs which only `the wizards'
could run or know the inner workings of. However, I did not let this
fact keep me from learning about the system.
During the 8th grade, my parents wishing to contribute to their son's
apparent avid absorption of computer technology, procured a used teletype
machine and modem from a large time-sharing computer firm. I don't
know how, but in the process, they managed to talk the firm out of `free'
account for after hours and weekend use. The firm then promptly
forgot about me. After running the usual course of computer games, which
quickly became quite boring, my attention turned towards the operating
system and its protection mechanism, which I took delight in finding
ways around. This of course, was noticed by the time-sharing
company and one summer evening, after they were sure it was me inside
their system, their vice president and district manager came knocking at
our door, and in effect said, "gotcha!". The result of being caught was
that I was hired for the summer to help them make their system more
secure and plug the holes that I had uncovered in my wanderings.
While employed for the summer, 1973, I chanced to meet up with another
summer hire who had done some work at NASA-AMES and had knowledge of a
Department of Defense computer network, called the ARPANET, which linked
together computers all over the country at various research
establishments, universities and military bases. My new-found friend
passed me a dial-up number, and on a scrap of paper, wrote a few commands
that would allow me to connect up to various systems on the network.
In these early days of the ARPANET (which pioneered packet
switching technology, a method for allowing computers of different flavors
and types to `talk' to one-another), the majority of the computers had
`guest' accounts on them with purposefully obvious and published passwords.
This was done in order to promote the free use of resources at other host
systems and to let users of the network have a chance to explore, learn and
use said systems.
Needless to say, this was a gold mine that no hacker, such as myself,
could pass up. So I spent the better part of the summer learning and
using as many different computer systems as possible, all over the country.
One of my favorite systems to use was the guest login account on a host
called SRI-AI, a PDP-10 running the Tenex operating system, which
belonged to the Stanford Research Institute's Artificial Intelligence
Center. I thought it nice to have a system right in my very own home
town. I made it a point to get to know the operations of this system as
well as I could in hopes that perhaps someday I might have a login account
of my own to use and it would be nice to be familiar with it in such an
event.
Well, that day came when, as usual, I logged into the public guest account,
and out popped a message of the form "Welcome to the SRI-AI computer
public guest account. If you think you have a need for your own account,
send a note (with the on-line electronic mail program, of course) to
the system administrator, explaining your need."
Such an invitation was just to good to pass up and having my very own
login account is something I had dreamed about. So, I took it upon myself
to send a message saying I was a hacker who had been spending time on the
public guest account learning about their system and wanted to have an
increased level of access and login area of my own to store files. In
return, I would freely help improve the systems capabilities thru my
hacking.
After some initial trepidation on the part of the systems administrator
was overcome, my account was granted. This allowed me to make SRI-AI my
home base of network operations. I immediately proceeded to hack
away to my heart's content, now that, in effect, I had become a legitimate
network user.
After demonstrating my competence and some semblance of responsibility, I
was granted system privileges (i.e. carte blanche access to all system
resources). This permitted me to learn and develop a further understanding
of the system.
So, I hung around SRI for about 9 months. I was given a building pass, so
as to have physical as well as electronic (remote) access to the computer
systems. This allowed me to come and go at odd hours, which are the
hours hackers are best known to keep.
Then, there was an opening for a part-time weekend computer operator's job,
and since I had demonstrated my competence, I was immediately hired
for the position. I was now in my senior year of high school, and as a
result of my increased access to computers, my grade average followed the
typical hacker curve, i.e. down. until, two weeks into the final quarter
of my senior year in high school, I dropped out, and became full-time at
SRI. I have never returned to a classroom since the day I left school in
1974.
I dropped out, and became full-time at
SRI. I have never re