home *** CD-ROM | disk | FTP | other *** search
- _____________________________________________________
- The Computer Incident Advisory Capability
- ___ __ __ _ ___
- / | / \ /
- \___ __|__ /___\ \___
- _____________________________________________________
- Informational Bulletin
-
- End of FY90 Update
-
- September 30, 1990, 1300 PST Number A-34
-
- During the twelve months of this fiscal year, CIAC team members have
- engaged in a number of activities. One of the main activities has been
- assisting sites in recovering from incidents. Our involvement has led
- to a number of valuable lessons learned--things that can improve your
- site's computer security as well as enhance the DOE community's
- coordination and handling of incidents.
-
- 1. Password problems. The main contributor to network intrusions has
- been poorly chosen passwords. There are still too many accounts in
- which the username and password are identical--an easy target for
- network attackers and worms. There is a great need for system managers
- to perform regular checks on passwords using tools such as the Security
- Profile Inspector (SPI) for UNIX and VMS systems. (Contact CIAC to
- obtain a copy of SPI.) Accounts such as DEMO, GUEST, TEST, FIELD, and
- others need to be closed--these accounts provide an easy way for
- attackers to gain unauthorized access to systems. Prohibit passwords
- that can be found in the English dictionary. CIAC strongly recommends
- that your site as well as your system(s) have a written password
- policy. This policy should be required reading for users before they
- are given an account. Violations of this policy should result in a
- lower level of privileges, i.e., lower usage priority (if practical to
- implement), or in the case of repeated violations, termination of usage
- altogether.
-
- 2. Vulnerabilities. A frequent contributor to network intrusions
- is unpatched operating system vulnerabilities. In CIAC Bulletin A-23
- we described the major exploited vulnerabilities in UNIX systems. In
- particular, ensure that sendmail, finger, ftp, tftp, the DECODE alias,
- and the host.equiv configuration do not allow attackers opportunity for
- intrusion. In CIAC Bulletin A-31 steps to improve the security of VMS
- systems are presented. It is important to secure DECNET, enhance
- auditing, disuser (or protect in other ways) all old or infrequently
- used accounts, and improve login security with LGI_xxx SYSGEN
- parameters. If you are not sure how to patch vulnerabilities, which
- particular vulnerabilities apply to your system, how to install a TAR
- tape, etc. call CIAC for assistance! Again, having a site policy for
- dealing with vulnerabilities is essential!
-
- 3. Viruses. The major viruses with which we have dealt in the
- MS-DOS arena during the last 12 months are Jerusalem, Stoned, Cascade
- (1701/1704), Ohio, Ping Pong, and Disk Killer. Of these viruses,
- Jerusalem and Disk Killer are most likely to produce damage. In the
- Macintosh arena, nVIR and WDEF are most prevalent, although neither is
- likely to damage a system. For a summary of the major viruses, refer
- to CIAC Bulletin A-15. In addition to frequently obtaining reports of
- viruses spreading through exchange of removable media (disks), we are
- also hearing about viruses spreading rapidly through Novelle and other
- microcomputer networks (see CIAC Bulletin A-33). Vendor demonstrations
- and shrink wrap software are increasingly becoming a source of virus
- outbreaks. We have found that sites with implemented procedures for
- detecting and eradicating viruses have significantly decreased the time
- and effort involved in recovering from this type of incident. Users of
- PCs, PC clones, and Macintoshes frequently do not know exactly whom to
- call if there is a suspected virus infection--the number of a support
- person should be posted on every small system! This is particularly
- important with users of classified systems. Finally, Disinfectant 2.1
- and FPROT (freeware detection/ eradication packages for Macintosh and
- MS-DOS computers, respectively) are available from CIAC for the
- asking.
-
- 4. User Accountability and Legal Considerations. We recommend
- that every user should be required to sign a statement indicating
- exactly what the user is and is not permitted to do before being
- allowed to use a computing system. We also recommend that if possible
- every system should display a login banner that prohibits unauthorized
- use (see CIAC Bulletin A-22). Failure to take these steps may provide
- a legal loophole during prosecution for computer misuse and/or damage.
-
- 5. Distribution of CIAC Bulletins. Many sites promptly distribute
- CIAC and other bulletins widely throughout the site. Some users and
- system managers, however, report that they are not receiving CIAC
- bulletins, or, if they are, there is a substantial delay. CIAC
- bulletins are sent to every site's security managers (e.g., Computer
- Security Site Managers and Computer Protection Program Managers). It
- is critical to ensure that these bulletins quickly get to those who
- need them. It is also important to avoid distributing bulletins marked
- FOR OFFICIAL DEPARTMENT OF ENERGY USE ONLY outside of the DOE community.
-
- 6. Reporting of Incidents. Sometimes a CIAC team member will
- call a system manager and inform that the system manager's system has
- been probed or penetrated by an attacker. Too often the system manager
- will not report the incident to the site security manager(s). CIAC
- does not report incidents; however, it is essential that site personnel
- comply with DOE Orders 1360.2A and 5637.1 in reporting incidents.
-
- 7. Getting Information to CIAC. When you have an incident that
- might affect others throughout DOE (e.g., a network intrusion, worm,
- new vulnerability, widespread virus infection, etc.), call CIAC. A
- large number of CIAC bulletins this fiscal year have been based on
- information supplied to us by sites. Many thanks go to the "good
- computer security citizens" who furnish this information to us--timely
- warnings have spared many sites from incidents.
-
- 8. Training and Awareness. The CIAC team has already presented
- the two-day workshop on incident handling at many sites . We
- appreciate the comments and feedback that have enhanced this workshop
- considerably. The aim of the workshop is to enable system managers,
- managers, and users to respond to incidents more efficiently as well as
- become more aware of sound computer security practices. For
- additional information, or to bring this workshop to your site, call
- CIAC.
-
- As a parenthetical note, please be advised that the identification
- number for CIAC bulletins issued on or after October 1, 1990 will begin
- with "B." Thus, the first bulletin will be B-1, the second will be
- B-2, etc.
-
- For additional information or assistance, please contact CIAC:
-
- Eugene Schultz
- (415) 422-8193 or (FTS) 532-8193
- FAX: (415) 423-0913 or (FTS) 543-0913
-
- Send e-mail to:
-
- ciac@tiger.llnl.gov
-
- Neither the United States Government nor the University of California nor any of
- their employees, makes any warranty, expressed or implied, or assumes any legal
- liability or responsibility for the accuracy, completeness, or usefulness of any
- information, product, or process disclosed, or represents that its use would not
- infringe privately owned rights. Reference herein to any specific commercial
- products, process, or service by trade name, trademark manufacturer, or
- otherwise, does not necessarily constitute or imply its endorsement,
- recommendation, or favoring by the United States Government or the University of
- California. The views and opinions of authors expressed herein do not
- necessarily state or reflect those of the United States Government nor the
- University of California, and shall not be used for advertising or product
- endorsement purposes.