| T.R | Title | User | Personal Name
 | Date | Lines | 
|---|
| 3538.1 | just saw Jurassic  :-) | HDLITE::SCHAFER | Mark Schafer, AXP-developer support | Thu Dec 01 1994 16:26 | 2 | 
|  |     ...and the security fences were turned off and the T-Rex's got out
    and...
 | 
| 3538.2 | USERNAME: Field PASSWORD: Service | BSS::C_BOUTCHER |  | Thu Dec 01 1994 16:39 | 4 | 
|  |     Is it just me, or does it make sense to discuss a customer's security
    measures (or lack there of) in this medium??
    
    Chuck
 | 
| 3538.3 | Digital products protect | ROMEOS::TREBILCOT_EL |  | Thu Dec 01 1994 17:29 | 11 | 
|  |     I think the base noter may be concerned that if they WERE using
    Digital's security products and the intruders broke in ANYWAY, then we
    had better go back to the drawing board.
    
    It would appear to me, though, that if someone is good enough and they
    want to break into a computer system badly enough, they could do it
    regardless of how many security products are on the system.
    
    The case with the DOD proved that...
    
    
 | 
| 3538.4 | Why? | STAR::BUDA | I am the NRA | Thu Dec 01 1994 19:11 | 9 | 
|  | RE: Note 3538.0 by MSDOA::MULDOWNEY
>    I have recently read that some hackers had broken into some GE
>    computers via the INTERNET.  Does anyone know if GE was using any
>    SECURITY products such as the DIGITAL SEAL software?
Why do you want to know?
	- mark
 | 
| 3538.5 | Internet Security Book | MRED::FORD |  | Thu Dec 01 1994 20:14 | 25 | 
|  |     To find out more about the topic, read:
    
    Firewalls and 
    Internet Security
    
    Repelling the Wily Hacker
    
    
    By:   Cheswick and Bellovin
    
    From: Addison-Wesley Professional Computing Series
    
    I recommend this book for anyone who is planning to hook into the
    internet.  I especially enjoyed the part about the infamous "Berferd"
    hacker, who was eventually traced to Holland.
    
    The authors, Cheswick and Bellovin, are both senior researchers at AT&T
    Bell Laboratories, where thay have designed and maintain AT&T's
    internet gateway.
    
    The book is available through the Digital library network.
    
    Happy reading,
    
    Sean 
 | 
| 3538.6 |  | OFOS02::GINGER | Ron Ginger | Thu Dec 01 1994 22:24 | 9 | 
|  |     The break at GE has been covered fairly well in the internet mailing
    list 'firewalls'.
    
    From the description of how the break occured, it could not have been a
    SEAL- they use logins on the bastion machine, and we are quite specific
    about not doing that on SEAL.
    
    It also was not a particularly complex break, it was users with dumb
    passwords.
 | 
| 3538.7 | 2c | ANNECY::HOTCHKISS |  | Fri Dec 02 1994 03:09 | 9 | 
|  |     re.5 read it,twice,loved it and it is required reading for anybody
    re.6-good points.Every system has its leaks.A lot of clients double
    lock the front door and leave the back door open-dumb passwords is the
    most common.I would venture to suggest that if SEAL is properly
    installed and ALL other exits blocked,then it is IMPOSSIBLE to
    compromise a system except by a)tunnelling or b)random discovery of
    the strongest authentication key.You can do nothing about a) since it
    requires an internal security leak-all you can do is log and for b),all
    you can do is log.
 | 
| 3538.8 |  | BBRDGE::LOVELL | � l'eau; c'est l'heure | Fri Dec 02 1994 04:43 | 20 | 
|  | 
	.0 probably has very honourable intentions and maybe
	is concerned for potential problems/opportunities for
	Digital.  I don't see why some of the replies here are
	so disparaging.
	From what I have read, the security systems in use were
	not S.E.A.L. but they are described as "firewall".  They
	were of the type "single bastion host"  which is the
	poor cousin of an effective S.E.A.L. configuration and
	is mentioned in the Digital Firewall Service (aka S.E.A.L.)
	as being not as strong as a S.E.A.L. approach.
	Real damage was done during this break-in, and Digital
	Firewall Service Business Management are informed and have
	sent briefing memos to Digital's security population.
	In short, there is some opportunity here for Digital but
	like the recent Pentium incidents, we should probably be
	circumspect in how we expolit it.
 | 
| 3538.9 | .2 Why I wanted to know | MSDOA::MULDOWNEY |  | Fri Dec 02 1994 08:21 | 12 | 
|  |     
    My intentions were not to discuss any customers security measures.  The
    break in has been discussed in various public forums.  However I have
    not seen any mention of the use of any security measures being used by
    the customer.  I am in sales and I know my customers will be asking me.
    I was just trying to be prepared to discuss the issue with my
    customers.
    
    I will use other mediums to find out!
    
    Jim                                                              
    
 | 
| 3538.10 | easy as | MBALDY::LANGSTON | our middle name is 'Equipment' | Fri Dec 02 1994 12:17 | 27 | 
|  | I'm reminded of a story in Cliff Stowell's book, the title of which I forget,
right now (the Cuckoo's Egg?).
Seems the easiest way to get a password is to ask...
Imagine this scenario...    Find the phone number of the computer control room 
of the system you're targeting.  Turn on your vacuum cleaner to simulate 
"computer room" noise.  Go into the next room so the noise isn't *too* loud and
call the phone number.  If you've done your homework enough, looked in a 
newsgroup or two, called before and ask for "Joe" and found out "Mary" was
actually on duty, etc, you know who to ask for.  Just call on the wrong shift
so Mary's not there, but ask for her anyway:
Hacker: "Hi, is Mary there?"
Dutiful Operator: "No, she works the day shift.  This is Ralph."
H: "Oh, yeah.  Is it that late already?  I've been working here at the 
switching center all day." (vacuum/computer fan whirring in the background)
"We're trying to debug the new modem bank. Can you tell me the Password?"
Dupe: "Sure, it's 'SYSTEM.'"
H: "Thanks, alot, Ralph, old buddy."
Bruce
 |