UC Berkeley Cleaning up its Security Act 79
Bob Brown writes "UC Berkeley recently issued a scathing self-assessment of its IT department, which has been under fire in the wake of a couple of high profile security lapses at the school. NetworkWorld has a review of what the school's top networking guy says is being done to both secure and strengthen UC Berkeley's computer networks."
Re:Link to print version (Score:5, Informative)
Here's the article text, moderators, please mod the parent into the ground!
Securing UC Berkeley's network
School looks to shore up security in wake of breaches.
Linda Leung,Network World,04/24/06
The University of California at Berkeley has made a name for itself in networking, with innovations such as Unix, Berkeley Internet Domain Name, Smart Dust and SETI@home. But the school has made headlines over the past few years for some things of which it is less proud, namely a couple of security breaches (a stolen laptop [networkworld.com] containing personal information on graduates and a compromised database of California residents [networkworld.com]).
At the start of this year, the university published a scathing self-study of its Information Systems and Technology department [berkeley.edu]. It acknowledged the school's advanced IT network and talented professionals but recommended radical changes to the IT department's governance and structure (read the report [berkeley.edu]).
Clifford Frost, director of Berkeley's Communications and Network Services (CNS), recently spoke with Network World Senior Online News Editor Linda Leung about what the university is doing to ensure that when people think of the school, they think "innovation," not "infiltration."
How has IT evolved at the university?
It's been haphazard. In the case of the network, it's been pretty organized. Back in the '80s, there were campuswide committees that said networking is going to be important so let's start building it up now. The campus financial and administrative systems are pretty advanced. But campus student systems [such as online registration and course catalogs] are less well-funded and organized because there has not been a single high-level sponsor. This is one of key things the campus is open to addressing in the reorganization.
Also: What makes Harvard's net tick [networkworld.com]
What is your security plan?
Every networked device has to have its operating system kept up to date with security patches - Windows 95 is not allowed unless you buy a separate firewall device and stick it in front of [Windows 95]. There are microscopes controlled by old operating systems - [the owners] have to put a firewall in front of them. We have software that people can use for free - they don't have to buy their own firewall or anti-virus software.
Having a policy only goes so far. McAfee's Foundstone scanner allows us to scan the network continuously for vulnerabilities. [If something is found] we tell [the device owners] to fix it or we turn off their access. Departments can log in and scan their own nets.
How else do you secure the network?
We do intrusion detection at the border of the campus network and more and more inside the network. We monitor to detect when systems have been broken into or are being broken into or about to launch an attack, and we can turn them off. We use McAfee IntruShield Snort, Nessus and Bro Intrusion Detection System. [Intrusion detection] is a big issue because we've had some pretty big security breaches on campus [see stories here [networkworld.com]and here [networkworld.com]]. There is a big thrust in getting people to encrypt data on their desktop or laptop.
How do you get ahead of the security challenges?
The latest thing we're doing is getting people on campus to audit their systems, and the recommendation is to remove [sensitive i
Not Nearly Frightened Enough (Score:2)
Windows 95 is not allowed unless you buy a separate firewall device and stick it in front of [Windows 95].
Right idea, wrong scope.
Re:To Solve (Score:2)
Re:To Solve (Score:1)
The Article (Score:5, Funny)
has lapsed... NEXT PAGE
but we are... NEXT PAGE
doing our best... NEXT PAGE
trying to... NEXT PAGE
improve. END ARTICLE
Re:The Article (Score:2)
Re:The Article (Score:1)
You just need to practise interpreting (mumble)script in your head. Here, one-page printable article [networkworld.com].
Faulty Password Protection (Score:2, Funny)
Re:Faulty Password Protection (Score:2, Funny)
Re:Faulty Password Protection (Score:4, Interesting)
Re:Faulty Password Protection (Score:3, Interesting)
I had heard bad stories about the IT provision at Warwick (particuarly their Resnet service), but didn't realise it was that bad.
Here at Bristol, I've worked for our Resnet over the summer, which is housed along with the IT guys. Security is absolutely paramount, and even for little Resnet projects, we would sit down for a couple of hours for a threat assessment (SQL injection, what happens if a dictionary attack succeeds, could we place exponential back-off on the login page).
That said, t
Re:Faulty Password Protection (Score:2)
Doesn't that mean I can't go to college? I'm not worried about some warez monkey stealing my physics paper off the shared drive, I'm worried about them breaking into the bursar server and getting my SSN, bank account details, credit card number, etc. Colleges have no reason to clean up their act in that respect because it doesn't hurt them in the least if *your* security is compromis
Re:Faulty Password Protection (Score:2)
There needs to be a "whoosh" mod category. Can you guys at slashdot get working on that?
Grandparent knows that the password rotation scheme is common practice in *many* environments, and was pointing out the uselessness of such a strategy. It's called "illustrating absurdity with absurdity"
Re:Faulty Password Protection (Score:2)
Where I work currently, the network saves my last 27 passwords. New passwords cannot be in that list, and are checked for similarity to those passwords. A certain number of characters must be different, and not just switched around ("password" v. "apssowdr"). Users cannot just cycle through passwords, there is a minimum and a maxmimum age.
Re:Faulty Password Protection (Score:2)
Re:Faulty Password Protection (Score:2)
Re:Faulty Password Protection (Score:2)
Step 1. Once the new password is entered, you hash it, check against the list of saved hashes to see if that exact phrase had been used already. If so, deny new password, if not, move to step 2.
Step 2. Take the plain text of the new password that was entered, re-arrange and/or substitue some characters (E.G. "password" becomes "asswordp"), generate a hash of this value and check against the old saved hashes. If the new hash matches one in the lis
Re:Faulty Password Protection (Score:2)
Re:Faulty Password Protection (Score:2)
Re:Faulty Password Protection (Score:2)
As other posters mentioned there are ways around this, but still, it is focusing on the wrong area. There are much more productive ways to spend time increasing security than pissing and moaning about reusing a password several years old. 27 passwords at 3 months per password is almost 7 years. Who cares? Try dual authentication, better passwords to begin with, and better security over the network itself (e.g. encrypting traffic).
Re:Faulty Password Protection (Score:2)
Re:Faulty Password Protection (Score:2)
Instead, you'll have to do: password, hello, password1, hello1, password2, hello2
You laugh, but I've been there.
Re:Faulty Password Protection (Score:1)
Re:Faulty Password Protection (Score:4, Insightful)
But I'm not saying it's not a good idea. I just wanted to point out that the more rules you have to make your passwords secure, the less secure they may become.
Re:OpenBSD too (Score:3, Informative)
There's quite a bit seperating openBSD & the Berkeley Software Distribution. netBSD was based on the last Berkely distribution & openBSD split from netBSD because some developers wanted security to be a stronger focus.
The openBSD project has completely rewritten most userland tools & also done a complete code audit looking for security bugs. The relationship between the current codebase & what came out of Berkeley ten years ago is
Re:OpenBSD too (Score:2)
Er, thats not really the case. OpenBSD has concentrated on security for most of its life but thats not the reason that it was forked from NetBSD. The reason for that is that Theos CVS access was revoked and he had lots to contribute, so he decided to bypass NetBSD and contribute dir
From TFA (Score:3, Funny)
Astrology cluster? (Score:3, Funny)
I really want to know what goes on in the astrology cluster. Can you really parallelize reading the tarot? I wonder what kind of hardware they use; a giant Magic 8-Ball array? And what kind of qualifications does a sysadmin have to have there?
Re:Astrology cluster? (Score:2)
User: Help, my computer is broken.
Sysadmin: By looking at the entrails of your computer, I know what is wrong.
Hmmmm (Score:2, Interesting)
I wonder what kind of information is readily available?
20 years later and still the same (Score:4, Interesting)
berkeley.edu still vulnerable! (Score:2)
Re:berkeley.edu still vulnerable! (Score:2)
Where did Microsoft copy their networking code from?
Re:20 years later and still the same (Score:2)
I wonder if they still have the "rms" account... (Score:1, Interesting)
Re:I wonder if they still have the "rms" account.. (Score:1, Informative)
a password on a UCB machine, then cat the unshadowed password file. Well, then you know what to do next, right: Leave crack running on the file on the old Sun 3 in the corner and some day or days later we would have a stack of accounts. Most of them were cracked with dictionary words. Too easy.
Education vs. Change (Score:3, Interesting)
It takes educating users. So far I haven't experienced resistance to education, but the amount we have to do is pretty staggering.
The issue is not about educating the professors and staff. Most everyone will happily participate. The issue is getting them to actually change their practices once they've been through the education. You need education, then support for the education, then regular audits about the education, then some more education.
FTA: ...the department has Smart Dust - tiny sensors that run TinyOS and TinyDB. They scatter this stuff out there - put it in trees, on animals - they're all networked together and people monitor them. That's different than [managing] a connection in every office.
I dunno, I'm pretty sure some of my past employers spend their days hanging from trees, or on animals... even in the office.
Sensitive stuff on laptops (Score:3, Insightful)
Why did they need it? "Oh, I'll just download an Excel file of every students personal details so I can make that Powerpoint presentation I want!" Why weren't they using some method of protecting the student's data at all? If I had access to data like that, I would only expect to get it on-demand from a server across a secure VPN with a tough password (SecurID perhaps).
I don't understand why you would want such information downloaded unless you were going to do something malicious. Could someone explain to me why these people were just walking out the doors with entire databases in their rucksacks?
Re:Sensitive stuff on laptops (Score:2, Informative)
Re:Sensitive stuff on laptops (Score:2)
Re:Sensitive stuff on laptops (Score:2)
Maybe they're talking about research data. Enforcing standard procedures for everyone in the registration office could be easier than, say, policing every PhD candidate that's collecting data from human subjects....
Re:Sensitive stuff on laptops (Score:3, Informative)
If the BSD root isn't secure why... (Score:1, Troll)
The first thing... (Score:2)
Re:The first thing... (Score:2)
Pretty much anybody in IT can tell you what the "best practices" are, there's nothing secret about them, and a good implementation doesn't depend on the attacker not knowing what they are.
So if the guy's ONLY strategy is to give a public interview, and then not do anything, of course he's got problems. But just giving the interview about what he's doing isn't problemat
Re:The first thing... (Score:2)
That's not the reason for my post, though. It's been my experience that someone in a position like this who does interv
Job Security (Score:1)
Security in Berkeley? Riiiight (Score:3, Informative)
You go to a (non-CS) computer lab. You login with your SID and password. A new Administrator account is created for you. Go ahead, do whatever you want - when you logout, all your files will be deleted, and everything will be restored to the original state. Completely secure, until you realize... "Duh. I have an administrator account. Why can't I just prevent the computer from restoring everything on logout?".
I reported this to one of the lab workers, and even demonstrated: she logged into her own account, but the desktop background picture said in big red letters, "Caution: This system has been haxx0red". She was pretty shocked, and said she would inform the system administrators.
This was half a year ago... Nothing has changed.
The CS labs are different, though. They run Solaris 9. Security shouldn't be a problem here. Usability is, though. How many of you guys remember what Gnome 2.0 looks like? How about Acrobat Reader 4? I do, unfortunately. And the Slashdot jokes about "^H" suddenly made so much sense...
Re:Security in Berkeley? Riiiight (Score:2)
I've never bothered to try a non-EECS domain computer... maybe I should.
Re:Security in Berkeley? Riiiight (Score:1)
Yeah. But now that Knoppix has a pretty decent NTFS write support... Well, I'm still trying to do something cool with it
Clusterfuck (Score:1)
1386 Violation (Score:2)
Most of the comments about this article are FUD, UCB is bound by the same Senate Bill 1386 [techtarget.com] as all the rest of the UC campuses.
Which means that if a security breach exposes personal or confidential information it must be reported to the state and any individual it affects, creating a whole legal mess. All UC system administrators (myself one of them) take security very seriously and do everything we can to avoid a 1386 incident. Working at a large educational institution and being a constant target of spa
Can we get the CDC-6400 back on-line? (Score:2)
Even more fun would be to get one of the SS-90's online (these were haunting the basement of Corey Hall in the early 70's).