| Title: | -={ H A C K E R S }=- |
| Notice: | Write locked - see NOTED::HACKERS |
| Moderator: | DIEHRD::MORRIS |
| Created: | Thu Feb 20 1986 |
| Last Modified: | Mon Aug 03 1992 |
| Last Successful Update: | Fri Jun 06 1997 |
| Number of topics: | 680 |
| Total number of notes: | 5456 |
================================================================================
Note 151.30 The Probe 30 of 31
VLNVAX::MDLYONS "Michael D. Lyons DTN 297-5911" 161 lines 14-OCT-1986 15:20
--------------------------------------------------------------------------------
-< AUDPACK >-
I stripped off some of the headers, but left the original ones
on so everyone could see the intended audience....
Message-class: DECMAIL-MS
From: NAME: MEGNA
INITLS: JOE
FUNC: DIGITAL TELECOM
ADDR: VRO5-2/Y3
TEL: 273-3100 <MEGNA@DECMAIL@HYPER@MRO>
Posted-date: 29-Sep-1986
To: DISMC:: ROGER BEDARD @VRO,
HASKELL CEHRS @VRO,
MIKE CONNOR @PKO,
GINNY COVINO @AKO,
BEL CROSS @VRO,
SERGIO GIACOLETTO @GEO,
PAT GILLOGLY @CHM,
KEN GORDON @VRO,
JIM HOGAN @AKO,
DAN INFANTE @MLO,
LANA LEE @VRO,
RUSS PITTENGER @VRO,
MARTY SACK @VRO,
SUZEE WOODS @VRO
Cc: NAME: MAGUIRE
INITLS: ED <169093 @DECMAIL@DONJON@VRO@*>
Cc: NAME: MCCAULEY
INITLS: BOB <70002 @DECMAIL@DONJON@VRO@*>
Subject: AUDPACK
FOLLOWING IS A DESCRIPTION OF THE AUDPACK PROGRAM WHICH HASKELL
DISCUSSED WITH YOU AT A RECENT DISMC MEETING. HASKELL ASKED
THAT I SEND IT TO YOU IN HIS ABSENCE. PLEASE REVIEW IT AND PROVIDE ME
YOUR APPROVAL AND/OR COMMENTS. REGARDS.
Remote Security Testing
Following is the program summary to develop, implement, and support
a security software tool called AUDPACK. The intent of this program is to
provide an integrated security diagnosis and management reporting system.
This program is an integral part of our strategy to provide written
standards, which are implemented at the node level using SECURPACK, and
monitored remotely using AUDPACK.
I. Development
-----------
In its present form, AUDPACK is only capable of testing password
management and the protection of User Authorization lists. These
functions are important; therefore, the system will be implemented in
its present form. However, there are other security vulnerabilities
that AUDPACK will not diagnose. Two examples, are World Writable COM
files and PASSTHRU logs. The tool must be upgraded to include these and
other security vulnerabilities. Plans are to include these security
tests in a future version of AUDPACK or a similar security software
tool, by the end of FY 87.
II. Implementation
--------------
A. Operating Procedures
1. Responsibilities
Since this software could be misused to gain access to nodes on
EASYNET, AUDPACK use is restricted to Digital Telecommunications.
The Network Security Program Manager has overall responsibility
for running the program throughout the United States and GIA
EASYNET Areas.
The EASYNET Area Managers are responsible for assuring that the
security shortcomings identified by AUDPACK are corrected.
2. Schedule
Each EASYNET Area will be tested at least quarterly. Approximately
10% of the nodes will be tested weekly. The tests will be performed
on week ends, according to a published schedule.
3. Operating Procedure
The process which will be followed is:
(a) The EASYNET Area Managers will be notified by electronic mail
before nodes in their Area are tested.
(b) The Area system managers will receive two electronic mail
messages before their systems are tested. These mail messages
will request acknowledgment by the system managers.
(c) The node registration data base will be the reference data
base for testing. The EASYNET Area Managers will assure that
their respective nodes are properly registered.
4. Metrics and Reporting
(a) The EASYNET Area Manager will be provided with a detailed
report of their respective areas, after each weekly run.
(b) The system managers will receive electronic mail, in cases
where AUDPACK detects an insecure system.
(c) Appropriate graphs will be prepared for publication in
management reports. These graphs will be of a generic nature.
5. Responsibilities for Resolving Security Problems
(a) The system manager should promptly correct security problems
identified by AUDPACK.
(b) The EASYNET Area Managers are responsible for the security
of the nodes in their respective areas and to make sure
that the system managers have corrected the security problems
identified by AUDPACK. Follow up security tests will be
scheduled to monitor compliance.
(c) The appropriate DISMC member will be notified when the
identical security problem is identified on two successive
AUDPACK runs.
III. Support
-------
(a) Digital Telecommunications will coordinate support and
enhancement of AUDPACK with European IS Network Management.
IV. Security Plan
-------------
(a) Copies of software will be strictly controlled. Three
copies exist in the world.
(b) Processing will be from a dedicated system.
(c) The system will be in a physically secure area.
(d) The process will be performed by one person for
accountability.
(e) The system will be disconnected from EASYNET, whenever
security tests are not being performed.
(f) The software and files will be encrypted using the DES
algorithm and a key known only by two persons. The key will
be changed monthly.
V. Legal Requirement
-----------------
(a) GIA legal issues will be reviewed with the GIA Telecom
Manager and the Legal Department, prior to implementation
in this Geography.
VI. Internal Audit Group
--------------------
(a) Digital Telecom will provide security testing support for
Internal Audit Group. The notification procedures
specified in section II-3 will be followed.
================================================================================
Note 151.31 The Probe 31 of 31
PASTIS::MONAHAN 6 lines 15-OCT-1986 04:56
--------------------------------------------------------------------------------
As the person who wrote AUDPACK, I have suggested that any further
extensions should be directed towards checking Ultrix and possibly
RSTS systems rather than attempting more detailed checking of VMS
systems which the memo in .30 suggests.
Comments??
| T.R | Title | User | Personal Name | Date | Lines |
|---|---|---|---|---|---|
| 333.1 | its the P R O B E !!!!! | ACE::BREWER | John Brewer Component Engr. @ABO | Wed Oct 15 1986 20:44 | 12 |
OK... A free New Mexican dinner to anyone who can write something
to "auto reply" to the " P R O B E" . (Travel and accomidations
not included!)
Something like "I see you big Brother!" or some such, automatically
returned to the prober upon being probed.
All in (semi) fun,
-John
(Do it Jym!)
| |||||
| 333.2 | SUBSYS::LAWLER | Real Pilots do it on Grass! | Thu Oct 16 1986 12:05 | 2 | |
How about trying to load a worm back onto the probing system?
| |||||
| 333.3 | The best defense is to be offensive | MDVAX3::COAR | A wretched hive of bugs and flamers. | Thu Nov 26 1987 13:45 | 16 |
Presumably, the network and accounting logs on a probed system will
identify the probing node. How about a bunch of worms throughout
the net that watch for that node becoming reachable, and then bombard
it? Wouldn't it be fun if the prober succumbed to penetration during
its probing?
Of course, the reasonable thing for them to do would be to switch
node IDs between probes of individual systems, so that such worms
*couldn't* get back to it. However, that leave a finite set of
node IDs, although still large.
Maybe something that intercepts accounting records as they're written,
filters out login failures on network access to standard accounts,
and activates the worm?
#ken :-)}
| |||||
| 333.4 | as the person who wrote it ... | PASTIS::MONAHAN | I am not a free number, I am a telephone box | Thu Nov 26 1987 21:44 | 10 |
I think I don't understand the last suggestion.
Audpack is the security guard, going round to check that windows
are closed and doors are locked at night, protecting Digital's
property, and maybe yours too if you have left anything personal
on the premises (disks).
Sure, you can beat him unconscious and go home leaving the door
open, but I thought the sense of the original was "How do you give
him a polite 'Good evening'".
| |||||
| 333.5 | Reality vs. perceptions | SQM::HALLYB | Profitus Interruptus | Thu Nov 26 1987 22:16 | 12 |
Pat, you probably know more about this process than other readers
of this file. The concern seems to be that Audpack somehow does
an evaluation of how well the system manager has done the job.
If Audpack manages to break into my node, what happens? Does my
Cost Center manager get a telegram from Bel Cross ordering me to
be hung, drawn, and quartered? Maybe not, but the impression is
that somehow system managers are being "evaluated" by some cold
piece of software. Under the circumstances its mighty tempting
to fight back...
John
| |||||
| 333.6 | Mea culpa, sort of | MDVAX3::COAR | My hero? Vax Headroom, of course! | Thu Dec 17 1987 17:24 | 8 |
Indeed. I personally have no squabble at all with the process of
the probe, as long as the results are kept confidential between the
probe and the manager involved. Repeat offenses (more than, say, two)
I can understand going higher in the management chain. Even in
an open, trusting environment (which some parts of DEC are), a `snitch'
is generally disliked, despised, and subject to abuse.
#ken_who_felt_a_twinge_at_your_analogy_of_beating_the_guard_unconscious :-(
| |||||