[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

531.0. "unbothering bother?" by AUNTB::SOEHL (On to Mt. Pilot) Fri Aug 14 1987 11:16

    At the risk of being labeled a fascist, I would ask that someone
    would help me in plugging the hole allowed by the BOTHER command
    procedure, the use of PHONE.  You see, I work at a customer site
    as a system manager.  This customer has the possibly silly notion
    that they've spent 1.5 million dollars on machines to enhance the
    execution of their business, not to allow a sandbox for hackers
    to play in.  Some of these reactionary managers and their secrataries
    for some reason get upset when some unidentified person sends 
    "Eat my shorts" or "Stick your head up your ass" to them while they're
    in the middle of editing a file.  I know, I know, it's just good
    clean fun (giggle) but they don't like it.  Seeing as how the customer
    is in the top 2 of our customers (duPont), when they get upset,
    some people in digital listen.  
    
    Yesterday was the first time I saw this com file, and when I saw
    how it was sending the message, I thought "My, that certainly is
    brilliant." The author can feel proud.  Here's the creative use
    of a utility that's pretty damn useful, especially for system managers
    who need to work from home.  I could remove the network object for
    phone, and then I could only use phone on this node.  That is my
    present solution.  Of course, then someone will use the MAIL utility
    and we'll be back where we were.  Deleting all the files won't work,
    because they'll just get them back again.  
    
    Patrick
    
    
    
    
    
T.RTitleUserPersonal
Name
DateLines
531.1VINO::RASPUZZIMichael RaspuzziFri Aug 14 1987 13:0120
    Of course, there is the SET BROADCAST=NOPHONE to prevent the message
    from being blasted on a terminal.
    
    I can understand where you are coming from. In the DECNET account
    directory you can find the NETSERVER.LOG files to see where this
    message came from. All you need to know is the time of the infraction
    and who it went to. Then you look at the NETSERVER.LOG file and
    see who was talking to the PHONE server at that time. Then you can
    severely chastise the perpetrator and use him/her as an example
    so no one else wil do this.
    
    It is really hard for PHONE and MAIL to verify if the information
    coming to them is valid. If 2 machines are networked together, one
    can lie to the other. Networks are "hostile". Clusters are not.
    Clusters are "friendly". Of course, "hostile" and "friendly" are
    relative terms to each other (from a network/ethernet and a CI
    standpoint that is).
    
    Good luck.
    Mike
531.2Seek and destroy!USHS01::BLANDOReality, what a concept!Fri Aug 14 1987 13:0217
    I don't have the answer, but does the PHONE object have PROXY enabled,
    or does it use a default account?  If it uses a default account,
    make a UAF cpy of the account, and assign PHONE to that copy.  Then
    in the LOGIN.COMdo a DEFINE FAL$LOG 17_32.  This will cause a lot
    of data to be generated, but some of the data will point to the
    origine.  Also a SHOW LOGICAL SYS$NET.
    
    Then next time it occurs, find the correct .LOG file, and trace
    the user.  If you use PROXY, you will have to look in the accounting
    file to find information.  You can do it, and then once 1 person
    is caught and is taken care of, publisize it.  You will not have
    the problem again!  (Unless nothing is done about it, in which case
    you have a managment problem more than a computer problem)
    
    FJBlando
    
    P.S.	What site is having the problem?
531.3set an exampleMAY20::MINOWJe suis Marxist, tendance GrouchoFri Aug 14 1987 13:134
Don't chastize the person, fire him.  The word will get around.

M.

531.4BrevardAUNTB::SOEHLOn to Mt. PilotFri Aug 14 1987 14:575
    Thanks for the suggestions.  .2, the site is Brevard, NC.  Aren't
    you at a duPont site?  I seem to remember seeing the name Blando
    in duPont conferences.  
    
    Patrick
531.5Another Duponter...CHOVAX::YOUNGBack from the Shadows Again,Sat Aug 15 1987 02:2622
    Re .4:
    
    Yes Pat, Frank is at the Beaumont Texas site, and I am at the Jackson
    Labs site (Deepwater NJ).  I also am very concerned to hear about
    this misuse of our customers system and our DECnet product.  There
    are a lot of folks at Dupont Corporate headquarters who would love
    to embarass us with this kind of information.
    
    Maybe we should get together and stop whoever the hell is doing
    this before WE start getting a bad rep.
    
    Re .2:
    
    Are you sure that FAL$LOG will work for a non-fal image like PHONE
    and MAIL, Frank?  Also if you do use this trick I would recommend
    getting rid of the 2nd bit and the byte count, thus;
    	Define FAL$LOG 13
    This will disable the hex dumps which generate a huge amount of
    logging, while still keeping all of the other information.
    
    --  Barry
    
531.6ERIS::CALLASStrange days, indeed.Mon Aug 17 1987 10:357
    FAL$LOG will do nothing for PHONE. The way to catch the person is to go
    sifting through the NETSERVER.LOG files and looking for accesses to the
    PHONE object. Now, of course, you have to find the right one, but if
    this person is in the habit of doing it, you should be able to find a
    pattern. 
    
    	Jon
531.751586::KEWI'll let the fancy take you...Tue Aug 18 1987 09:5311
A friend of mine was having similar trouble and I did

$def/key/terminate pf4 "mc ncp show known links"

in their login.com, then, whenever they got a bother they hit pf4, the link 
lasts long enough to spot whoever was coming in.

They caught the offender straight away and used a bother variant to send 
the offenders terminal into self-test. 

Jerry
531.8Mea culpaUSHS01::BLANDOReality, what a concept!Tue Aug 18 1987 11:254
    oops!  I was in the ozone layer, taking a deep breath.  FAL$LOG
    is not looked at by PHONE!
    
    FJBlando
531.9.7 (bother variant)????FXADM::SORRENTINOTue Aug 18 1987 19:378
    
    .7
    
    	"a bother variant"???
    	is it better?  less detectable?  Fill us in...
    
    Peter
    
531.10Hidden by Big Brother51586::KEWI'll let the fancy take you...Wed Aug 19 1987 04:28115
531.11Please don't do that!UFP::MURPHYRick MurphyWed Aug 19 1987 11:386
    Reluctant moderator here...
    As this little toy has made it's way to customers, and is becoming
    an embarrasment to Digital, I'd appreciate it if you wouldn't post
    copies here. Thanks.
    Note 531.10 was a copy of same, and is now hidden.
    	-Rick
531.12Please E-Mail me a copyTOOK::MICHAUDJeff MichaudWed Aug 19 1987 22:4312
    Re: .10
    
    Could you please email me a copy since big brother has
    hidden your posting.  I will not be bothering anyone
    with it, but will be using it to see if my DECnet-
    Ultrix implementation of PHONE is fooled in the same
    way as VMS.
    
    				Thanks,
    
    				jeff
    				decnet-ultrix
531.13How about this way?INFACT::NORTHERNLook quick, it won't last!!!Thu Sep 10 1987 21:339
    couldn't you do something with replacing the phone object definition
    back to the old style, and to SYS$SYSTEM:PHONE.COM?
    
    You could then hack away at whatever logicals, and things needed
    to be run to try and find the perpetrators...
    
    (haven't tried this one myself, but think it might help...)
    
    				- Lou