|
Computer hijackers and Napster users are newest Internet threat
For a technology created to serve such a noble purpose, the Internet has spawned more than its share of problems.
These include the recent headline-grabbing attacks by Internet "terrorists" on sites such as Yahoo! and eBay, as well as the development of a new software called Napster, which not only encourages copyright violations but puts inordinate strains on network resources.
The growing problems have spurred network administrators at Yale and elsewhere to forge new strategies for protecting their local computer systems, while ensuring that the resource remains open to an ever-increasing number of legitimate users.
Yale's network administrators have installed new technologies that detect vulnerabilities in the campus network and launched an educational campaign about the University's rules regarding Internet use and the importance of protecting campus computers against attacks.
To get a deeper perspective on the issues concerning Internet use at the University, the Yale Bulletin & Calendar met recently with Daniel A. Updegrove, University director of Information Technology Services (ITS); Morrow Long, University information security officer; and Joseph Paolillo, director of data network operations. The following is an edited transcript of that conversation.
Updegrove: There are 15,000 Ethernet connections on campus and another 600 dial-up lines through our remote access service. So, theoretically, we could have 15,600 Yale people using the network simultaneously. But there's the question of what you mean by the Internet. The Yale network is a component part of the Internet. Your Ethernet connects by a wire down the hall to a wiring closet; then there's a fiber optic connection to a master closet in the building; then we go underground from your building to other buildings; and everything connects and connects and connects. Finally, there's a wire that connects all the campus traffic externally to the rest of the world.
Paolillo: It's like the campus phone system. You can make calls to other campus people on their Yale telephones or you can make a call outside Yale by dialing "9" and a seven-digit number. The Internet is akin to that outside service. When you use Project X administrative applications or other web servers located on campus, strictly speaking, you're not using the Internet.
Updegrove: Theoretically, Ethernet can support 10 million bits per second of communication. Yet our connection to the Internet is only 15 Megabits per second. So, there's a very large potential for bottlenecking if you have 15,000 10-Megabit-per-second connections and only one 15-Megabit connection to the outside. How can it possibly work? The good news is most of the data communication is by people within Yale to other people within Yale. If everyone simultaneously needed information from the rest of the world, we'd fill up the connection to the commodity [commercial] Internet.
Long: Over time, our statistics indicate that inbound and outbound Internet traffic tends to focus in academic and administrative buildings during the business day and in the residence halls nights and weekends. Recently, however, we've noticed an upsurge of daytime traffic from the student residences.
Long: We look for both general trends and exceptions in traffic flows. If traffic suddenly increases in one building or from one laboratory, this could be an indicator of a problem, perhaps a system that has been "cracked." We are not, however, monitoring what individuals send and receive over the network.
Paolillo: If there's a danger to the operation of the Yale network that may disenfranchise other users, or if there's an improper use that may legally imperil the University, then we will try to determine what the problem is. I'd use the analogy of a highway system. We want to see how wide we have to make the road to accommodate all the cars, to see where we need to put bigger and better exit ramps. But we're not looking at who's driving, how many people they have with them, and where they're going.
Long: The situation that we saw recently in the news about the Internet, where one machine is sending a "packet" flood across the Internet to inundate some commercial site, that's one kind of problem we would work to detect. To build on Joe's highway analogy, we've started to put a few police with radar guns looking at the traffic, looking for speeders and people driving erratically.
Paolillo: In terms of problems, there's the problem of malicious intent -- where someone from outside the University, or maybe from inside the University, for whatever reason, tries to impair other people's use of the Internet. As you might imagine, people don't want to do this from their own machines, because it points directly back to them, so they "hijack" other machines on the Internet, in order to have the attacks emanate from them.
Long: These hijackers would like to use our machines to take advantage of Yale's bandwidth to inundate an Internet site. In fact, they'd like to get several universities' bandwidths and combine them together, because it takes a lot to "flood" a site like Yahoo!
Paolillo: Universities, compared to the world at large, have good Internet access. We have high-speed connections, and we have relatively open access. For instance, a corporation quite often will block access to dot-com sites so employees can't shop during the day. For universities, it's typically the reverse. We're a free and open infrastructure. We encourage the use, for academic purposes, of the Internet by our faculty, staff and students. And we want the rest of the world to be able to use our resources, to the extent that they are publicly available. So we start with no restrictions, and then we decide, based on technological and policy issues, to restrict only those things we think will damage the operation of the University's network.
Paolillo: Right.
Long: We want to spur collaboration for research and teaching. We want to provide open access for Yale people to the Internet, for various scholarly purposes.
Updegrove: We're very aware of the fact that more people are going onto the Web to get their Yale business done, to do their research or to do applicational things. We have to acknowledge that the students live here 24 hours a day, so they use their computers for more than just academic work. They contact home and buy sneakers and buy CDs, or whatever. One of our challenges is trying to determine when we have to increase the University's capacity to the rest of the world. That's fairly costly to do. Before we do that, we'd like to ensure that all of the traffic, or at least most of it, is legitimate traffic. To our knowledge, there are at least two potentially large illegitimate sources of traffic. One is if someone from outside the University has hijacked a Yale computer. Another is if legitimate Yale users are misusing the network in one way or another. For example, Yale could be affected in two ways by a denial-of-service attack. Others could attack us, or computers at Yale could be used to attack a remote site.
Long: We've seen small attacks on Yale computers in the past, but nothing on the scale of the ones recently in the news.
Long: If, instead of being a single spike, it continues on at that high rate for a long period of time, if it's an anomaly where we've never seen that level of traffic from that particular source before, that's the first sign.
Paolillo: We do have the ability to find out what machine on the campus network the data stream is coming from, within reason. If we can't easily identify it to a particular machine, we can identify it to a building.
Long: Well, you can shut down the link to the network.
Paolillo: If it's in the middle of the night, or on the weekend, and we can't get access to the computer, we will configure the device at that point where Yale connects to the Internet -- the router -- so it prohibits traffic to and from that computer address to protect it against potential malicious use until we can contact the owner and figure out what's going on.
Long: As long as you make a good faith effort to secure your machine and shut it down, in those cases, you don't have a problem. If you're the person doing it, that's a different matter.
Long: We notify people. If it's not malicious, typically people get an opportunity to deal with the problem. If there are problems which are more serious, then those problems get referred to some disciplinary body.
Paolillo: There is an Appropriate Use Policy for the network and all computer resources at Yale that all students, staff and faculty of the University are bound to (see below).
Updegrove: It's against that policy to hog resources. It's also against federal law to disrupt data networks and to crack into computers that you're not authorized to use. So, that's something that we have to be increasingly vigilant about. We want to have an increasingly sophisticated automated tool that can detect anomalies. It's extremely difficult to know what's an innovative academic use of the network, and what constitutes abuse. If there's suddenly a lot of data going from Yale to Stanford, in and of itself that's not a problem. If we get a call from Stanford saying, "One of your computers is launching a denial-of-service attack on one of our computers, please make it stop," then we respond right away.
Updegrove: We have a program we run monthly that scans all the computers on campus looking for security vulnerabilities -- because, it turns out, the "crackers" have all the same tools. They run these scanning programs over the whole Internet, looking for characteristic vulnerabilities. It's almost literally like they're going door to door, checking: Is the screen door open? Is the basement door open? Is there a ground-floor or second-floor window that's unlocked? Then, they go back to gang headquarters with the information and send out teams of people with ladders or whatever, to penetrate the places that are found to be vulnerable. We basically are in a race with the crackers.
Paolillo: It's easier than you might imagine to have a computer be insecure, because quite often these insecurities are involved with the default setting of an operating system. For instance, there's this new operating system known as Linux, which is very popular with researchers. In its out-of-the-box form, it has a lot of open services on the machine -- such as file transfer, mail, time servers and other factors -- that can really be exploited. So it's a matter, in many cases, of taking some positive steps to secure your machine.
Updegrove: All too frequently, people purchase these systems and install them, and can't be bothered reading the 200 pages of fine print -- they just want to get to work.
Updegrove: Napster is the most recent sophisticated example of desktop computer programs that can access and play digital music over the Internet. A format called MP3 was developed for data compression of very large music files to make it more feasible to store them on your hard drive and transfer them over the Internet. Music in MP3 format has become very popular over the Internet. MP3s are not inherently illegal. If you had your own band, and you wanted to record music and share it with friends, the MP3 format would be a good way of doing that. Some bands have seen MP3 on the Internet as an ideal way to get exposure without having to have a contract. Or if you have purchased a CD, and you want to play the music in a different order, it's perfectly legal to copy that CD on your hard drive so you can play the songs back over your earphones from your computer.
Paolillo: It's like making yourself a cassette tape from a CD you own to play in your car. But it's illegal to make a copy and give it out or sell it for cheaper to all your friends.
Updegrove: The problem that has arisen is that it's easy to copy commercial CDs into MP3 format and then exchange them over the Internet. A few months ago there were a whole set of directories telling you where you could find MP3s, but it was rather a tedious process of surfing from directory to directory to find who's got this artist or this kind of music. Napster came along and built a much better mouse trap. They provide one big directory at www.napster.com that is said to have over a quarter-million songs available. You can download the Napster program onto your PC. It accesses the Napster website, and you just type in the artist or title that you're looking for. You can then just click on it, and the music will start coming into your computer from someplace -- you don't have to know where that someplace is.
In addition, Napster keeps a record of which files you have downloaded. You then become a potential source for that file for somebody else. Moreover, it scans your hard drive to see if you have copied any of your own CDs, and it shares that information in its directory. A number of Napster users think of it as a music playing device not realizing it is also sharing their music with the rest of the world. Our monitoring systems have detected some computers at Yale that are simultaneously serving 20 remote users through Napster. So we've seen a fairly big run-up in the outbound traffic through our Internet gateway. On some weekends, over 45% of our outbound traffic is Napster traffic.
Updegrove: We believe that a lot of people aren't aware that this is happening. The Napster software interface doesn't exactly highlight this feature. In fact, the software was designed in a rather questionable manner. Even though you might think you've terminated the program, it's still resident in your computer's memory and still serving up files to the outside world, even though you've gone off to class or left Yale for the weekend.
We then have two separate but related problems with Napster. One is that, because it can send out simultaneous streams like this, a small number of Napster servers can saturate our outbound Internet gateway. Anecdotal evidence suggests that, although some of the MP3 music being shared is legal, the lion's share is illegal. So, for people who have legitimately copied music for their own use, the act of sharing it through Napster takes them from legal to illegal behavior. We think some users are aware that they're violating the law and just think they'll get away with it. Others are not aware and need to be informed.
In both cases, people need to be aware that essentially everything on the Internet is identifiable. So someone who's sharing music around the world is exposing himself or herself to substantial legal liability if these, in fact, are copyright violations. Moreover, if people are using an excess amount of the Yale network -- and if they're sending 20 music files at a time, they are -- then they're violating our Appropriate Use Policy, even if there are no copyright violations.
Long: Not at this time. We're looking at voluntary cooperation through an education
Paolillo: There is a process for notifying students of violations of the Appropriate Use Policy. They are formally notified by e-mail or letter. In some cases, depending on the severity, their master or college dean is also notified. That's usually the first step.
Long: And if they continue, we may block their network access, or at least their Internet access.
Paolillo: We routinely do. Over the years, as the use of the Internet has grown, we have done this a number of times. Keep in mind, however, that this is an expensive resource. Our goal is to upgrade it and provide what is needed. While we don't wish to block people or restrict their use of this resource, we do want to make sure it's being used wisely. If we see that a significant percentage of the resource is being taken in a use like Napster, the question becomes: Do we just wantonly buy more bandwith? That costs everyone. We don't want to dictatorially say, "That use will stop." We want to try and educate people that "This is a community resource, folks; use it wisely."
New ITS policy
Yale has established a new Information Technology Appropriate Use Policy.
The previous policy covered only the use of facilities and services operated by Information Technology Services (ITS). The new policy, which covers use of all Yale-owned and -managed computers, networks, hardware and software, is located at www.yale.edu/policy/itaup.html.
T H I S
Bulletin Home
|