home *** CD-ROM | disk | FTP | other *** search
-
- ==Phrack Inc.==
-
- Volume Three, Issue 26, File 5 of 11
-
- COSMOS
-
- COmputer System for Mainframe OperationS
-
- Part One
-
- by King Arthur
-
- Introduction
- %%%%%%%%%%%%
-
- Throughout the last decade, computers have played an ever growing role in
- information storage and retrieval. In most companies, computerized databases
- have replaced a majority of all paper records. Where in the past it would take
- 10 minutes for someone to search through stacks of paper for some data, the
- same information can now be retrieved from a computer in a fraction of a
- second.
-
- Previously, proprietary information could be considered "safe" in a file
- cabinet; the only way to see the data would be to have physical access to the
- files. Now, somebody with a computer terminal and a modem can make a quick
- phone call and access private records. It's unfortunate that there are
- "hackers" who try to gain unauthorized access to computers. Yet, it is just as
- unfortunate that most reported computer break-ins could have been prevented if
- more thought and common sense went into protecting computers.
-
-
- Hackers
- %%%%%%%
- There have been many cases of computer crime reported by the Bell
- Operating Companies (BOCs), but it is hard to say how many actual break-ins
- there are. Keep in mind that the only reported cases are those which are
- detected. In an interview with an anonymous hacker, I was told of one of the
- break-ins that may not have ever been reported. "My friend got the number when
- he misdialed his business office -- that's how we knew that it was the phone
- company's. It seems this Unix was part of some real big Bellcore computer
- network," says the hacker.
-
- The hacker explains that this system was one of many systems used by the
- various BOCs to allow large Centrex customers to rearrange their Centrex
- groups. It seems he found a text file on the system with telephone numbers and
- passwords for some of Bellcore's development systems. "On this Bellcore system
- in Jersey, called CCRS, we found a list of 20 some-odd COSMOS systems....
- Numbers, passwords, and wire centers from all over the country!" He adds,
- "Five states to be exact."
-
- The hacker was able to gain access to the original Unix system because, as
- he says, "Those guys left all the default passwords working." He was able to
- login with a user name of "games" with the password being "games." "Once we
- were on we found that a large number of accounts didn't have passwords. Mary,
- John, test, banana, and system were some, to name a few." From there he was
- able to eventually access several COSMOS database systems -- with access to ALL
- system files and resources.
-
- COSMOS
- %%%%%%
- COSMOS, an acronym for the COmputer System for Mainframe OperationS, is a
- database package currently supported by Bellcore. COSMOS is presently being
- used by every BOC, as well as by Cincinnati Bell and Rochester Telephone.
- COSMOS replaces paper record-keeping and other mechanized record systems for
- plant administration. COSMOS' original purpose was to alleviate congestion in
- the Main Distributing Frame (MDF) by maintaining the shortest jumpers.
-
- It can now maintain load balance in a switch and assign office equipment,
- tie pairs, bridge lifters and the like. Additional applications allow COSMOS
- to aid in "cutting-over" a new switch, or even generate recent change messages
- to be input into electronic switches. COSMOS is most often used for
- provisioning new service and maintaining existing service, by the following
- departments: The frame room (MDF), the Loop Assignment Center (LAC), the
- Recent Change Memory Assistance Center (RCMAC), the network administration
- center, and the repair service.
-
- Next year COSMOS will celebrate its 15th birthday, which is quite an
- accomplishment for a computer program. The first version or "generic" of
- COSMOS was released by Bell Laboratories in 1974. In March 1974, New Jersey
- Bell was the first company to run COSMOS, in Passaic, New Jersey. Pacific
- Telesis, NYNEX, Southern Bell, and many of the other BOCs adopted COSMOS soon
- after. Whereas Southwestern Bell waited until 1977, the Passaic, NJ Wire
- Center is still running COSMOS today.
-
- Originally COSMOS ran on the DEC PDP 11/45 minicomputer. The package was
- written in Fortran, and ran the COSNIX operating system. Later it was adapted
- to run on the DEC PDP 11/70, a larger machine. Beverly Cruse, member of
- Technical Staff, COSMOS system design at Bellcore, says, "COSNIX is a
- derivation of Unix 1.0, it started out from the original Unix, but it was
- adapted for use on the COSMOS project. It bears many similarities to Unix, but
- more to the early versions of Unix than the current... The COSMOS application
- now runs on other hardware understandard Unix."
-
- "The newest version of COSMOS runs on the standard Unix System V operating
- system. We will certify it for use on particular processors, based on the
- needs of our clients," says Ed Pinnes, the District Manager of COSMOS system
- design at Bellcore. This Unix version of COSMOS was written in C language.
- Currently, COSMOS is available for use on the AT&T 3B20 supermini computer,
- running under the Unix System V operating system. "There are over 700 COSMOS
- systems total, of which a vast majority are DEC PDP 11/70's. The number
- fluctuates all the time, as companies are starting to replace 11/70's with the
- other machines," says Cruse.
-
- In 1981 Bell Laboratories introduced an integrated systems package for
- telephone companies called the Facility Assignment Control System (FACS). FACS
- is a network of systems that exchanges information on a regular basis. These
- are: COSMOS, Loop Facilities Assignment and Control System (LFACS), Service
- Order Analysis and Control (SOAC), and Work Manager (WM). A service order from
- the business office is input in to SOAC. SOAC analyzes the order and then
- sends an assignment request, via the WM, to LFACS. WM acts as a packet switch,
- sending messages between the other components of FACS. LFACS assigns
- distribution plant facilities (cables, terminals, etc.) and sends the order
- back to SOAC. After SOAC receives the information form LFACS, it sends an
- assignment request to COSMOS. COSMOS responds with data for assigning central
- office equipment: Switching equipment, transmission equipment, bridge lifters,
- and the like. SOAC takes all the information from LFACS and COSMOS and appends
- it to the service order, and sends the service order on its way.
-
- Computer Security
- %%%%%%%%%%%%%%%%%
- Telephone companies seem to take the brunt of unauthorized access
- attempts. The sheer number of employees and size of most telephone companies
- makes it very difficult to keep tabs on everyone and everything. While
- researching computer security, it has become evident that COSMOS is a large
- target for hackers. "The number of COSMOS systems around, with dial-ups on
- most of the machines... makes for a lot of possible break-ins," says Cruse.
- This is why it's all the more important for companies to learn how to protect
- themselves.
-
- "COSMOS is power, the whole thing is a big power trip, man. It's like Big
- Brother -- you see the number of some dude you don't like in the computer. You
- make a service order to disconnect it; COSMOS is too stupid to tell you from a
- real telco dude," says one hacker. "I think they get what they deserve:
- There's a serious dearth of security out there. If kids like us can get access
- this easily, think about the real enemy -- the Russians," jokes another.
-
- A majority of unauthorized access attempts can be traced back to an
- oversight on the part of the system operators; and just as many are the fault
- of the systems' users. If you can keep one step ahead of the hackers,
- recognize these problems now, and keep an eye out for similar weaknesses, you
- can save your company a lot of trouble.
-
- A hacker says, "In California, a friend of mine used to be able to find
- passwords in the garbage. The computer was supposed to print some garbled
- characters on top of the password. Instead the password would print out AFTER
- the garbled characters." Some COSMOS users have half duplex printing
- terminals. At the password prompt COSMOS is supposed to print a series of
- characters and then send backspaces. Then the user would enter his or her
- password. When the password is printed on top of the other characters, you
- can't see what it is. If the password is being printed after the other
- characters, then the printing terminal is not receiving the back space
- characters properly.
-
- Another big problem is lack of password security. As mentioned before,
- regarding CCRS, many accounts on some systems will lack passwords. "On COSMOS
- there are these standardized account names. It makes it easier for system
- operators to keep track of who's using the system. For instance: all accounts
- that belong to the frame room will have an MF in them. Like MF01, you can tell
- it belongs to the frame room. (MF stands for Main Frame.) Most of these names
- seem to be common to most COSMOS systems everywhere. In one city, none of
- these user accounts have passwords. All you need is the name of the account
- and you're in. In another city, which will remain unnamed, the passwords are
- the SAME AS THE DAMN NAMES! Like, MF01 has a password of MF01. These guys
- must not be very serious about security."
-
- One of the biggest and in my eyes one of the scariest problems around is
- what hackers refer to as "social engineering". Social engineering is basically
- the act of impersonating somebody else for the sake of gaining proprietary
- information. "I know this guy. He can trick anybody, does the best BS job
- I've ever seen. He'll call up a telco office, like the repair service bureau,
- that uses COSMOS. We found that most clerks at the repair service aren't too
- sharp." The hacker said the conversation would usually take the following
- course:
-
- Hacker: Hi, this is Frank, from the COSMOS computer center. We've had a
- problem with our records, and I'm wondering if you could help me?
-
- Telco: Oh, what seems to be the problem?
-
- H: We seem to have lost some user data. Hopefully, if I can correct the
- problem, you people won't lose any access time today. Could you tell me
- what your system login name is?
-
- T: Well, the one I use is RS01.
-
- H: Hmm, this could present a problem. Can you tell me what password and wire
- center you use that with?
-
- T: Well, I just type s-u-c-k-e-r for my password, and my wire centers are: TK,
- KL, GL, and PK.
-
- H: Do you call into the system, or do you only have direct connect terminals?
-
- T: Well, when I turn on my machine I get a direct hook up. It just tells me
- to login. But I know in the back they have to dial something. Hold on,
- let me check. (3 Minutes later...) Well, she says all she does is call
- 555-1212.
-
- H: OK, I think I have everything taken care of. Thanks, have a nice day.
-
- T: Good, so I'm not gonna have any problems?
-
- H: No, but if you do just give the computer center a call, and we'll take care
- of it.
-
- T: Oh, thank you honey. Have a nice day now.
-
- "It doesn't work all the time, but we get away with it a good part of the
- time. I guess they just don't expect a call from someone who isn't really part
- of their company," says the hacker. "I once social engineered the COSMOS
- control center. They gave me dial-ups for several systems, and even gave me
- one password. I told them I was calling from the RCMAC and I was having
- trouble logging into COSMOS," says another.
-
- This last problem illustrates a perfect example of what I mean when I say
- these problems can be prevented if more care and common sense went into
- computer security. "Sometimes, if we want to get in to COSMOS, but we don't
- have the password, we call a COSMOS dial-up at about 5 o'clock. To logoff of
- COSMOS you have to hit a CONTROL-Y. If you don't, the next person who calls
- will resume where you left off. A lot of the time, people forget to logoff.
- They just turn their terminals off, in the rush of going home."
-
- The past examples do not comprise the only way hackers get into systems,
- but most of the problems shown here can exist regardless of what types of
- systems your company has. The second article deals with solutions to these
- problems.
- _______________________________________________________________________________
-