Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

NETCOM News

2 views
Skip to first unread message

The Right Reverend Master Tweek

unread,
Dec 26, 1994, 12:54:44 PM12/26/94
to
ka...@MCS.COM (Karl Denninger) writes:
>
>You're kidding, right. NIS?!
>
>Well, now I understand the scope of the problem. :-)

I'm curious Karl. How bad is this?


--
NEW ADDRESS: tw...@ccnet.com

tw...@ccnet.com tw...@tweekco.ness.com WW4Net-1@11551 DoD #MCMLX N6QYA
**** Regarding the Internet><WWIVNet gateway and other assorted stuff: ****
http://io.com/user/tweek/homepage.html tw...@io.com IM: Michael D. Maxfield

Karl Denninger

unread,
Dec 26, 1994, 1:14:19 PM12/26/94
to
In article <tweekD1...@netcom.com>,

The Right Reverend Master Tweek <tw...@netcom.com> wrote:
>ka...@MCS.COM (Karl Denninger) writes:
>>
>>You're kidding, right. NIS?!
>>
>>Well, now I understand the scope of the problem. :-)
>
>I'm curious Karl. How bad is this?

I can steal any password file (including the encrypted password, natch,
which are the entire point) served over NIS in about 30 seconds. At worst
I need a login account on the system I want to compromise. At best I can
do it remotely using ypx.

Then its just a session with Crack to find out whether or not I can manage
to get in. With the number of accounts Netcom has it should be trivial to
find a few hundred you can break into.

Anyone running NIS on a machine accessible from the Internet is, IMHO, an
absolute idiot.

There are versions of NIS (such as NIS+ which is shipped with Solaris) which
are more secure, but the majority of that may just be that it is new and the
hackers haven't gotten around to finding the holes yet.

Straight NIS is, from a security perspective, a joke.

--
--
Karl Denninger (ka...@MCS.Net)| MCSNet - The Finest Internet Connectivity
Modem: [+1 312 248-0900] | (shell, PPP, SLIP, leased) in Chicagoland
Voice: [+1 312 248-8649] | 6 POPs throughout the area, all 28.8 equipped
Fax: [+1 312 248-9865] | Email to "in...@mcs.net" for more information
ISDN: Surf at Smokin' Speed | WWW: http://www.mcs.net, gopher: gopher.mcs.net

The Right Reverend Master Tweek

unread,
Dec 26, 1994, 3:04:30 PM12/26/94
to
ka...@MCS.COM (Karl Denninger) writes:
>The Right Reverend Master Tweek <tw...@netcom.com> wrote:
>>ka...@MCS.COM (Karl Denninger) writes:
>>>
>>>You're kidding, right. NIS?!
>>>
>>>Well, now I understand the scope of the problem. :-)
>>
>>I'm curious Karl. How bad is this?
>
>I can steal any password file (including the encrypted password, natch,
>which are the entire point) served over NIS in about 30 seconds. At worst
>I need a login account on the system I want to compromise. At best I can
>do it remotely using ypx.

By any, do you mean to include the shadow password file? Maybe they
are just using buzzwords instead of communicating what they actually
mean, but it sure doesn't make me feel secure there...

>There are versions of NIS (such as NIS+ which is shipped with Solaris) which
>are more secure, but the majority of that may just be that it is new and the
>hackers haven't gotten around to finding the holes yet.
>
>Straight NIS is, from a security perspective, a joke.

Well, I hope that Bruce was just spouting off without thinking...???

NEW ADDRESS: tw...@ccnet.com
--
tw...@io.com tw...@tweekco.ness.com WW4Net-1@11551 DoD #MCMLX N6QYA


**** Regarding the Internet><WWIVNet gateway and other assorted stuff: ****

http://io.com/user/tweek/homepage.html IM: Michael D. Maxfield

Karl Denninger

unread,
Dec 26, 1994, 4:38:50 PM12/26/94
to
In article <3dn7ke$q...@pentagon.io.com>,

The Right Reverend Master Tweek <tw...@pentagon.io.com> wrote:
>ka...@MCS.COM (Karl Denninger) writes:
>>The Right Reverend Master Tweek <tw...@netcom.com> wrote:
>>>ka...@MCS.COM (Karl Denninger) writes:
>>>>
>>>>You're kidding, right. NIS?!
>>>>
>>>>Well, now I understand the scope of the problem. :-)
>>>
>>>I'm curious Karl. How bad is this?
>>
>>I can steal any password file (including the encrypted password, natch,
>>which are the entire point) served over NIS in about 30 seconds. At worst
>>I need a login account on the system I want to compromise. At best I can
>>do it remotely using ypx.
>
>By any, do you mean to include the shadow password file? Maybe they
>are just using buzzwords instead of communicating what they actually
>mean, but it sure doesn't make me feel secure there...

Yes. NIS by itself does not support shadow password files. You need to
understand how this works to see where the problems lie; NIS is an RPC
mechanism for retrieving password (and other) records, which happen to
include the encrypted password in the proper place!

NIS was *never* intended to be secure. It was intended to be used in a
relatively non-hostile environment where one could at least trust the other
users on the local network.

There is a "secure" varient of this which uses DES encryption, but the
problem is the root keys - they are stored on the disk. So if you hack
root on one machine, you're hosed again. This limitation makes for some
severe problems in an Internet environment.

We designed our own network password system due to exactly these reasons.
Running NIS on the Internet is, IMHO, asking to be hacked.

>>There are versions of NIS (such as NIS+ which is shipped with Solaris) which
>>are more secure, but the majority of that may just be that it is new and the
>>hackers haven't gotten around to finding the holes yet.
>>
>>Straight NIS is, from a security perspective, a joke.
>
>Well, I hope that Bruce was just spouting off without thinking...???

He wasn't. Attempting to crack passwords as a company to discover weak
ones is just about your *only* defense against a hacker doing the same
in a straight NIS environment.

Bruce Sterling Woodcock

unread,
Dec 26, 1994, 8:36:16 PM12/26/94
to
In article <3dn15r$r...@Venus.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>In article <tweekD1...@netcom.com>,
>The Right Reverend Master Tweek <tw...@netcom.com> wrote:
>>ka...@MCS.COM (Karl Denninger) writes:
>>>
>>>You're kidding, right. NIS?!
>>>
>>>Well, now I understand the scope of the problem. :-)
>>
>>I'm curious Karl. How bad is this?
>
>I can steal any password file (including the encrypted password, natch,
>which are the entire point) served over NIS in about 30 seconds. At worst
>I need a login account on the system I want to compromise. At best I can
>do it remotely using ypx.

Well, I'm glad everyone is speculating about this, but without any facts.
Karl, did you try your ypx hack? Did it work? No? Hmm, that's too bad.

Netcom does run NIS, but with SunOS C2 shadow password security, and a few
other modifications. It's still possibly subject to some as-yet-unknown
NIS/RPC holes, but then I didn't choose NIS in the first place.

Bruce

--
Bruce Sterling Woodcock --- Systems Analyst / Admin --- ster...@netcom.com
The views and opinions expressed in this post | Power is being able
are not necessarily those of my employer, | to sneak into your
NETCOM On-line Communication Services. | house over a wire.

Karl Denninger

unread,
Dec 26, 1994, 9:24:22 PM12/26/94
to
In article <sterlingD...@netcom.com>,

Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>In article <3dn15r$r...@Venus.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>In article <tweekD1...@netcom.com>,
>>The Right Reverend Master Tweek <tw...@netcom.com> wrote:
>>>ka...@MCS.COM (Karl Denninger) writes:
>>>>
>>>>You're kidding, right. NIS?!
>>>>
>>>>Well, now I understand the scope of the problem. :-)
>>>
>>>I'm curious Karl. How bad is this?
>>
>>I can steal any password file (including the encrypted password, natch,
>>which are the entire point) served over NIS in about 30 seconds. At worst
>>I need a login account on the system I want to compromise. At best I can
>>do it remotely using ypx.
>
>Well, I'm glad everyone is speculating about this, but without any facts.
>Karl, did you try your ypx hack? Did it work? No? Hmm, that's too bad.

Yes, yes, I said I might need an account on Netcom.

And why would I want to do something which is, in fact, breaking the law?

Now, if you want to press this issue, I could always toss the gauntlet down
in front of you. Put some specifics to the challenge, as it were, and see
what you think.

>Netcom does run NIS, but with SunOS C2 shadow password security, and a few
>other modifications. It's still possibly subject to some as-yet-unknown
>NIS/RPC holes, but then I didn't choose NIS in the first place.
>
>Bruce

SunOS C2 security is not really rated "C2" if you use NIS. I have extensive
experience with this "security" system; I designed AC Nielsen's Internet
firewall and campus Unix security system a few years ago using these specific
tools. Their firewall system still runs the C2 code, but NOT using NIS.
I wasn't quite that insane.

Then again, Nielsen had real no-bullshit corporate data behind their
firewall and couldn't afford to be hacked. Among other things, if they got
hacked it would have been the end of my job. After all, I *did* tell them
I could put them (and keep them) safely on the net. That was part of my
job responsibility.

"Secure" NIS isn't. You and I both know this, and you also know (if you're
really as good an admin as some people make you out to be) that nobody in
their right mind runs NIS on an Internet accessible site.

As further proof, if you REALLY are so sure Netcom's password file is safe,
why are you busily trying to crack user's passwords? Without the encrypted
string to check against the "crackability" of a password IS OF NO VALUE TO A
CRACKER. You and I both know this to be true, Bruce.

So why are you doing it?

The fact that Netcom is now checking for "guessable" passwords means only
one thing to me -- that the encrypted strings are NOT considered secure by
the company. Why don't you just admit the truth and get on with life?

Cameron Perkins

unread,
Dec 26, 1994, 10:00:09 PM12/26/94
to
Karl Denninger (ka...@MCS.COM) wrote:
: As further proof, if you REALLY are so sure Netcom's password file is safe,
: why are you busily trying to crack user's passwords? Without the encrypted
: string to check against the "crackability" of a password IS OF NO VALUE TO A
: CRACKER. You and I both know this to be true, Bruce.

1) Nothing is absolute.
2) Even assuming that the encrypted passwords were 150% secure,
viewable only by those that should, someone could always try some
really stupid ones via login. Sure there's all kinds of logs and
possibly an account lock out, but if:
login: root
password: secret
works, then to paraphase Blazing Saddles, "WE DON'T NEED NO STEENKIN'
ENCRYPTED PASSWORDS."

--
Cameron Perkins - Lunatic, Visionary, and Future Student at Georgia Tech
<wa...@gate.net>

Bruce Sterling Woodcock

unread,
Dec 27, 1994, 12:09:15 AM12/27/94
to
In article <3dntsm$a...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>In article <sterlingD...@netcom.com>,
>Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>>Well, I'm glad everyone is speculating about this, but without any facts.
>>Karl, did you try your ypx hack? Did it work? No? Hmm, that's too bad.
>
>Yes, yes, I said I might need an account on Netcom.
>
>And why would I want to do something which is, in fact, breaking the law?

Fine, Karl. I will give you an account at Netcom and allow you to "break
the law" to demonstrate it to me. Are you game?

>Now, if you want to press this issue, I could always toss the gauntlet down
>in front of you. Put some specifics to the challenge, as it were, and see
>what you think.

There ya go.

>"Secure" NIS isn't. You and I both know this, and you also know (if you're
>really as good an admin as some people make you out to be) that nobody in
>their right mind runs NIS on an Internet accessible site.

Yawn. Same old bullshit argument... "I'm right, and the fact that you
don't agree with me only further shows that I *must* be right, because
that means your stupid!" Now, I'm not a fan of NIS, Karl. And I'm not
saying it's foolproof. Nothing is. But I am saying that I don't think
you can access those shadow passwords via any currenly known NIS hole,
especially using the likes of ypx, ypsnarf, and whatever other WaReZ
programs you want to use.

>As further proof, if you REALLY are so sure Netcom's password file is safe,
>why are you busily trying to crack user's passwords? Without the encrypted
>string to check against the "crackability" of a password IS OF NO VALUE TO A
>CRACKER. You and I both know this to be true, Bruce.

Okay, now it's my turn to play superior sysadmin. If you truly think that
having a good password is not necessary if the encrypted fields are
inaccessible, then you have truly learned very little about security indeed.
I suggest you spend some time away from the literature of theorists and
spend some time in the real world.

And there are dozens of other possible explanations. Perhaps the password
file is safe, but wasn't safe in the past due to some old NIS hole. Or
perhaps root access was gained at some point, and thus while NIS is just
fine, the password file was obtained through other means. Be honest, Karl...
you really *don't know* do you? You're making guesses, and hypothetical
accusations, but you really *don't know* the truth. And thus, you could be
wrong. And thus, you should stop commenting on things you really don't
know enough about to make a good judgement... okay?

>The fact that Netcom is now checking for "guessable" passwords means only
>one thing to me -- that the encrypted strings are NOT considered secure by
>the company. Why don't you just admit the truth and get on with life?

This actually does bring up a good question. Whether or not we would say
something if we did have a breakin isn't up to me. But I ask you, Karl...
if root was compromised on some of your systems, or security of passwords
breached in some way, *would* you tell your customers? What if doing so
meant you would lose money? What if your stockholders told you not to
tell them, because *they* didn't want to lose money? You said before you
do what's best for them, and what if that meant sacrificing honesty? I
guess this isn't really that much of an ethical dillema for you at all...
after all, you did it for net99....

Mike Peeler

unread,
Dec 27, 1994, 12:48:21 AM12/27/94
to
In article <sterlingD...@netcom.com>,
Bruce Sterling Woodcock <ster...@netcom.com> wrote:

ka...@MCS.COM (Karl Denninger) writes:
>> Without the encrypted string to check against the "crackability" of a
>> password IS OF NO VALUE TO A CRACKER.

> If you truly think that having a good password is not necessary if the


> encrypted fields are inaccessible, then you have truly learned very
> little about security indeed.

I have nothing of substance to contribute, but I can point out that the
paraphrase is inaccurate. K did not say a good password is not needed.
K clearly wants to get one. What K indicates is that the only good way
to crack them is to make guesses, encrypt the guesses, and compare the
results against a known encrypted password. Any other technique, such as
repeated logins, either takes too long or gets you caught. No expert I,
farbeit from me to endorse this information, but my reading comprehension
is fairly reliable.
--
-Z-
ntionally left blank. This signature intentionally left blank. This s
ignature intentionally left bank. This signature intentionally west ba

Bruce Sterling Woodcock

unread,
Dec 27, 1994, 1:58:36 AM12/27/94
to
In article <zconceptD...@netcom.com> zcon...@netcom.com (Mike Peeler) writes:
>In article <sterlingD...@netcom.com>,
>Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>
>ka...@MCS.COM (Karl Denninger) writes:
>>> Without the encrypted string to check against the "crackability" of a
>>> password IS OF NO VALUE TO A CRACKER.
>
>> If you truly think that having a good password is not necessary if the
>> encrypted fields are inaccessible, then you have truly learned very
>> little about security indeed.
>
>I have nothing of substance to contribute, but I can point out that the
>paraphrase is inaccurate. K did not say a good password is not needed.
>K clearly wants to get one. What K indicates is that the only good way
>to crack them is to make guesses, encrypt the guesses, and compare the
>results against a known encrypted password. Any other technique, such as
>repeated logins, either takes too long or gets you caught. No expert I,
>farbeit from me to endorse this information, but my reading comprehension
>is fairly reliable.

If he believes that, then he is wrong. It is also a logical conclusion
that if he believes that, he therefore doesn't see the need in having a
good password, since no one would attempt to break it because it would take
too long, or they would get caught. And if he truly thinks that, then he
has truly learned very little about security indeed.

Mike Peeler

unread,
Dec 27, 1994, 2:11:55 AM12/27/94
to
In article <sterlingD...@netcom.com>,
Bruce Sterling Woodcock <ster...@netcom.com> wrote:

ka...@MCS.COM (Karl Denninger) writes:
>>>> Without the encrypted string to check against the "crackability" of a
>>>> password IS OF NO VALUE TO A CRACKER.

Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>>> If you truly think that having a good password is not necessary if the
>>> encrypted fields are inaccessible, then you have truly learned very
>>> little about security indeed.

zcon...@netcom.com (Mike Peeler) writes:
>> paraphrase is inaccurate. K did not say a good password is not needed.
>> K clearly wants to get one. What K indicates is that the only good way
>> to crack them is to make guesses, encrypt the guesses, and compare the
>> results against a known encrypted password. Any other technique, such as
>> repeated logins, either takes too long or gets you caught.

> If he believes that, then he is wrong. It is also a logical conclusion


> that if he believes that, he therefore doesn't see the need in having a
> good password, since no one would attempt to break it because it would
> take too long, or they would get caught. And if he truly thinks that,
> then he has truly learned very little about security indeed.

Polly wanna cracker? Bruce, you must be short on sleep. "Truly learned
very little [blah blah]" is very low on information content. The only
logical conclusion is that he believes that the encrypted passwords CAN
be obtained. If you simply argue that they cannot, it is meaningless to
conclude anything else from following his line of reasoning.

Lewis De Payne

unread,
Dec 27, 1994, 3:45:30 AM12/27/94
to
Bruce Sterling Woodcock stopped to think, then wrote:
: >Bruce Sterling Woodcock <ster...@netcom.com> wrote:
: [-- stuff about cracking passwords --]
: >ka...@MCS.COM (Karl Denninger) writes:
: [-- stuff about cracking passwords --]

Now Bruce... Karl... be nice... Let's not start up another flame war
like the Karl/Ross one that just won't seem to die... and then have
j...@mcs.com start calling everyone a pedophile to spice things up.

--
"Mum's the word" - Justin Petersen || cc: Kennie G. McGuire, SA, FBI, LA CA
"Did you use SAS?" - Terry Atchley || Kathleen "Hottub" Carson, SA, FBI
"I am not a crook" - Richard Nixon || Behave - or I'll tell Janet Reno!

Lewis De Payne

unread,
Dec 27, 1994, 4:08:34 AM12/27/94
to
Bruce Sterling Woodcock stopped to think, then wrote:
:
: This actually does bring up a good question. Whether or not we would say

: something if we did have a breakin isn't up to me. But I ask you, Karl...
: if root was compromised on some of your systems, or security of passwords
: breached in some way, *would* you tell your customers? What if doing so
: meant you would lose money? What if your stockholders told you not to
: tell them, because *they* didn't want to lose money? You said before you
: do what's best for them, and what if that meant sacrificing honesty? I
: guess this isn't really that much of an ethical dillema for you at all...
: after all, you did it for net99....

Karl, once again I want to apologize on Bruce's behalf. I didn't realize
he had made this post. Bruce - I suggest you stop harassing Karl unless
you want him to cut off Netcom's packets. Karl - please rest assured
that Bruce was not trying to associate any of your misdeeds with the
operation of Net99. Now, alias each other's systems, and move on...

Bruce Sterling Woodcock

unread,
Dec 27, 1994, 5:39:27 AM12/27/94
to
In article <zconceptD...@netcom.com> zcon...@netcom.com (Mike Peeler) writes:

Hello? McFly? Is there anyone in there? Are you reading the same posts
I am?

You are horrible confused. Karl says:

Without the encrypted string to check against the "crackability" of a

password IS OF NO VALUE TO A CRACKER. Therefore, if an encrypted string
is secure, it takes too long to guess a weak password, or you'll get caught
doing it. So no matter what the password is (i.e. "password"), it's
secure so longs as the encrypted string is secure. Therefore, there is
no need to attempt to "crack" such a password for security reasons, unless
your encrypted strings are *not* secure.

And I say:

Therefore, you are an idiot. You truly have learned very little about
security indeed.

Please, Mike, don't enter into this discussion unless you can follow the
logic involved. Karl understands my points; he just doesn't agree with
them.

Btw, as a hint, SunOS PatchID #100482-05 implements access control lists
on your NIS servers.

NIS *is* evil, but it's not necessarily a big gaping hole waiting for a
truck to be driven through it.

Karl Denninger

unread,
Dec 27, 1994, 1:05:32 PM12/27/94
to
In article <sterlingD...@netcom.com>,
Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>In article <3dntsm$a...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>In article <sterlingD...@netcom.com>,
>>Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>>>Well, I'm glad everyone is speculating about this, but without any facts.
>>>Karl, did you try your ypx hack? Did it work? No? Hmm, that's too bad.
>>
>>Yes, yes, I said I might need an account on Netcom.
>>
>>And why would I want to do something which is, in fact, breaking the law?
>
>Fine, Karl. I will give you an account at Netcom and allow you to "break
>the law" to demonstrate it to me. Are you game?

Deliver to me the following:
A notarized and signed statement from the President of the company
authorizing me to (1) break in if I can, and (2) format the disks
if I succeed. Include a standard shell login ID and password
valid for the next year.

Either I fail, in which case I will publically admit same, and you're
right, or I succeed, in which case everyone knows in a few minutes of the
time that I manage to do so. This'll get my "free time" budget, as I'm a
busy guy and aren't going to take time from my primary duties to enjoy
myself in this fashion.

You like high stakes poker, eh? How's this Bruce?

Remember, if I get root via *any* means I win -- because I can then write a
10 line "C" program to get the passwords. "ypx" doesn't have to enter into
the equation here.

>>Now, if you want to press this issue, I could always toss the gauntlet down
>>in front of you. Put some specifics to the challenge, as it were, and see
>>what you think.
>
>There ya go.

See above.

>>As further proof, if you REALLY are so sure Netcom's password file is safe,
>>why are you busily trying to crack user's passwords? Without the encrypted
>>string to check against the "crackability" of a password IS OF NO VALUE TO A
>>CRACKER. You and I both know this to be true, Bruce.
>
>Okay, now it's my turn to play superior sysadmin. If you truly think that
>having a good password is not necessary if the encrypted fields are
>inaccessible, then you have truly learned very little about security indeed.
>I suggest you spend some time away from the literature of theorists and
>spend some time in the real world.

Yeah, right. The most common "easily guessed" passwords will not be found
by a dictionary search. Besides, if your login program is reasonably
intelligent it takes steps to prevent this kind of "guess the password"
game. BSD's, for example, stock out of the box, starts doing an
exponential delay when you miss three times. The fourth time waits 2
seconds, the 5th 4, the sixth 8, etc, and you start getting logged on
top of i. You can't guess many times in this environment without setting
off the alarms.

If my password is "biteme" that only helps you if you *know* what it is.
If you want to guess then you can go ahead, but no password checker in the
world is going to save you much. You're dealing with single-digit
percentage improvements here.

>And there are dozens of other possible explanations. Perhaps the password
>file is safe, but wasn't safe in the past due to some old NIS hole.

Ah, but instead of forcing everyone to change their password (oops - I
forgot that aging is BROKEN in SunOS if you're running NIS, I guess that's
not an option) you try to crack them? Why Bruce?

> Or
>perhaps root access was gained at some point, and thus while NIS is just
>fine, the password file was obtained through other means.

Doesn't matter. Hacked is hacked right?

I have been told in email by a number of people the last few days that
Netcom's root is *still* compromised. Hell, there's a goddamn mailing list
out there on your security problems! Now I can't *prove* that you're
compromised without breaking in myself and testing the theorem, but I do
know where to look to see if the traces are still around.

> Be honest, Karl...
>you really *don't know* do you? You're making guesses, and hypothetical
>accusations, but you really *don't know* the truth.

Accusations? Nope. NIS is not secure enough for *my* taste on ANY
Internet connected site. Period. That's not a guess or an accusation.
Its a statement of fact. I understand how it works, which is enough for
me to make an analysis. You can believe that it is secure, or you can
really not believe it and say it is for political reasons. That's your
call. I am honest enough to say "no damn way" on my hardware.

>And thus, you should stop commenting on things you really don't
>know enough about to make a good judgement... okay?

Sorry, Bruce, but my professional opinion as a security analyst is that
NIS is NOT SUITABLE for serving passwords on any Internet connected site.
Period.

NIS+, as shipped with Solaris, is not well-enough understood by me at this
time to have an opinion which I am willing to stake my reputation on.

>>The fact that Netcom is now checking for "guessable" passwords means only
>>one thing to me -- that the encrypted strings are NOT considered secure by
>>the company. Why don't you just admit the truth and get on with life?
>
>This actually does bring up a good question. Whether or not we would say
>something if we did have a breakin isn't up to me. But I ask you, Karl...
>if root was compromised on some of your systems, or security of passwords
>breached in some way, *would* you tell your customers?

Yep. We have had people's passwords sniffed, and have notified them. We
had people try the "write a .rhosts file" game on people's accounts that
they had unwittingly opened up to be world-writable. That one didn't work,
becuase we don't honor "+" in .rhosts files. So what? We lock down the
account, call the customer, tell them what happened, suggest strongly that
they change their password from a direct dial-in immediately, and take it
from there. Its called being responsive to our customer base.

> What if doing so
>meant you would lose money?

What if not doing so and being caught as a liar later meant I would lose
more money?

> What if your stockholders told you not to
>tell them, because *they* didn't want to lose money?

Ah, now we get to the rub, don't we?

Heh, I'll never say that any system, other than one in a faraday cage
running on batteries with an armed guard outside the door, is completely
secure. I'm not stupid. If we get hacked, then we get hacked. You find
the reason, tell the affected people, and fix it. Has happened before to
systems under my control, and people have gone to *prison* as a result.
I make a hobby of catching assholes who like to break into systems, and set
all kinds of traps for them to trip over and fall into.

> You said before you
>do what's best for them, and what if that meant sacrificing honesty? I
>guess this isn't really that much of an ethical dillema for you at all...
>after all, you did it for net99....
>
>Bruce

Did what for Net99? More innuendo Bruce?

Will Spencer

unread,
Dec 27, 1994, 1:17:00 PM12/27/94
to

>Deliver to me the following:
> A notarized and signed statement from the President of the company
> authorizing me to (1) break in if I can, and (2) format the disks
> if I succeed. Include a standard shell login ID and password
> valid for the next year.

Karl:

You are making an ass out of yourself. Please stop, it's embarassing
just to be around you at a time like this.



>Remember, if I get root via *any* means I win -- because I can then write a
>10 line "C" program to get the passwords. "ypx" doesn't have to enter into
>the equation here.

The discussion was regarding NIS. root hacking is old hat and is an
obviously lame attempt to grasp victory from the teeth of defeat. You
are basically admitting you were wrong. Grow up, admitting you are
wrong is not going to kill you.



>Either I fail, in which case I will publically admit same, and you're
>right, or I succeed, in which case everyone knows in a few minutes of the
>time that I manage to do so. This'll get my "free time" budget, as I'm a
>busy guy and aren't going to take time from my primary duties to enjoy
>myself in this fashion.

Basically, you are attempting to radically alter the subject (NIS vs.
root hacking) and the parameters (NIS attacking vs. disk wiping) of
this discussion. It is obvious, to even the most casual bystander,
that this is a lame attempt to deny defeat.

You, Karl, are simply being a sore loser.

Will

--
\* Will Spencer : The advancement and diffusion of knowledge *\
\* Unix geek : is the only guardian of true liberty. *\
\* PC guru : -- James Madison *\
\* Revolutionary : 4th U.S. President *\

R Agent

unread,
Dec 27, 1994, 5:45:19 PM12/27/94
to
In article <3dpl1c$f...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM>
wrote:
[...]

>Yeah, right. The most common "easily guessed" passwords will not be found
>by a dictionary search. Besides, if your login program is reasonably
>intelligent it takes steps to prevent this kind of "guess the password"
>game. BSD's, for example, stock out of the box, starts doing an
>exponential delay when you miss three times. The fourth time waits 2
>seconds, the 5th 4, the sixth 8, etc, and you start getting logged on
>top of i. You can't guess many times in this environment without setting
>off the alarms.

Does this 'exponential delay' thingy work for ftp as well?

(followups redirected to comp.security.unix)

RA

ro...@ccs.neu.edu (Rogue Agent/SoD!/TOS/KoX/ACT Kha Khan) - pgp key on request
------------------------------------------------------------------------------
The NSA is now funding research not only in cryptography, but in all areas
of advanced mathematics. If you'd like a circular describing these new
research opportunities, just pick up your phone, call your mother, and
ask for one.

Karl Denninger

unread,
Dec 27, 1994, 2:43:47 PM12/27/94
to
In article <durrellD...@netcom.com>,

Bryant Durrell <dur...@netcom.com> wrote:
>In article <3dpl1c$f...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>>I have been told in email by a number of people the last few days that
>>Netcom's root is *still* compromised. Hell, there's a goddamn mailing list
>>out there on your security problems! Now I can't *prove* that you're
>>compromised without breaking in myself and testing the theorem, but I do
>>know where to look to see if the traces are still around.
>
><boggle>
>
>"I have in my hand a paper listing the names of 47 Americans..."
>
>I've been told that you fuck sheep for a living, Karl. For that
>matter, I could create a mailing list concerning your sheep-fucking.
>In fact, I just did. But I don't *believe* it. At this point, you're
>getting into highly slimy behavior; if you have evidence that Netcom's
>been cracked, you know where to go to present it. If you don't, you're
>making unsupported innuendos concerning a competitor.

I have no such evidence, and I said that I can't prove anything. I am not
on the named mailing list, but I have been told of its existance and where
it is. And no, I am not interested in being on it, or in hacking other
systems, including Netcom. In fact, I deleted the mail sent to me
regarding same.

That doesn't change the fact that I *did* receive mail from one of the
people purporting to have such information, or that they claimed that root
was compromised. As I said, the veracity of that is unknown, but I did
give the sender a couple of things to look at to verify whether or not
there really was a problem.

And yes, the mail making the claim did come from a Netcom account.

>If you have serious concerns, I strongly suggest you take it to private
>email. Bruce, allow me to extend the same suggestion to you; I mean
>this in a friendly way in both cases. Cause frankly, I don't think
>public mud-battles do anyone involved any good.

I've tried to talk to Netcom's NOC on multiple occasions, and frequently get
either bad answers or no answers. My last request, for them to look up a
sendmail ID of a forged message sent to some of our subscribers, drew TWO
responses:

1) One correctly identifying the source of the message. We are now
chasing this through the real source (which, not surprisingly, is
nih.gov, a source of lots of trouble in the past).

2) A second, sent this AM, claiming that the source was *MCSNET* even
though the message ID was CLEARLY from Netcom's systems. The second
response was from the generic "NOC" account and the sender was
not identified clearly enough to be able to tell who it was.

This says to me, in plain english, that at least one of their technical staff
is incompetent as hell -- the header was staring this guy RIGHT IN THE FACE
when he replied to me.

>--
>Bryant Durrell dur...@netcom.com
>------------------------------------------------------------------------------
> ABSCOND, v.i. To "move in a mysterious way," commonly with the property of
> another. -- Ambrose Bierce

---------

From netcom.com!durrell Tue Dec 27 12:23:04 1994
Return-Path: <dur...@netcom.com>
Received: by mercury.mcs.com (/\==/\ Smail3.1.28.1 #28.5)
id <m0rMgY3...@mercury.mcs.com>; Tue, 27 Dec 94 12:23 CST
Received: by netcom20.netcom.com (8.6.9/Netcom)
id KAA26915; Tue, 27 Dec 1994 10:22:29 -0800
Date: Tue, 27 Dec 1994 10:22:29 -0800
From: dur...@netcom.com (Bryant Durrell)
Message-Id: <1994122718...@netcom20.netcom.com>
To: sheep-...@pft.com
Subject: One-Time
Status: OR

Just to prove it. <wry grin>

-- Bryant


--------

Is mail forgery a violation of your user agreement with Netcom?

Mike Peeler

unread,
Dec 27, 1994, 2:35:11 PM12/27/94
to
In article <sterlingD...@netcom.com>,
Bruce Sterling Woodcock <ster...@netcom.com> wrote:

>>> If he believes that, then he is wrong. It is also a logical conclusion
>>> that if he believes that, he therefore doesn't see the need in having a
>>> good password, since no one would attempt to break it because it would
>>> take too long, or they would get caught. And if he truly thinks that,
>>> then he has truly learned very little about security indeed.

>> Polly wanna cracker? Bruce, you must be short on sleep. "Truly learned
>> very little [blah blah]" is very low on information content. The only
>> logical conclusion is that he believes that the encrypted passwords CAN
>> be obtained. If you simply argue that they cannot, it is meaningless to
>> conclude anything else from following his line of reasoning.

> Without the encrypted string to check against the "crackability" of a


> password IS OF NO VALUE TO A CRACKER. Therefore, if an encrypted string
> is secure, it takes too long to guess a weak password, or you'll get
> caught doing it. So no matter what the password is (i.e. "password"),
> it's secure so longs as the encrypted string is secure. Therefore, there
> is no need to attempt to "crack" such a password for security reasons,
> unless your encrypted strings are *not* secure.

That's what I said. I agree with you that the conclusion doesn't follow,
and furthermore, it's wrong. The facts presented so far aren't enough to
say whether or not the encrypted passwords are easily obtained.

> And I say: Therefore, you are an idiot. You truly have learned very
> little about security indeed.

And I say: that's not information. If all you mean is, easy passwords
are likely to be guessed and used by someone else, that's trivial. I'd
hope you could get KD to agree to that. What he wants to talk about is,
what a pro could do systematically. I agree with you that that isn't the
only legitimate concern.

> Please, Mike, don't enter into this discussion unless you can follow the
> logic involved. Karl understands my points; he just doesn't agree with
> them.

Sure. I'm gone. As I said, I don't have enough background to add to the
discussion. No, I've had no trouble with the logic. We have unsupported
claims on one side, and ad hominem attacks on the other. What could be
simpler than that?

> Btw, as a hint, SunOS PatchID #100482-05 implements access control lists
> on your NIS servers.
> NIS *is* evil, but it's not necessarily a big gaping hole waiting for a
> truck to be driven through it.

Unlike what you've said before, that is informative. My point is, what
you know but cannot divulge, is of no real help to you in an argument.

I'm happy that Netcom is trying to crack weak passwords and encouraging
its customers to protect themselves. Even if they have no private data,
their account is, in effect, their *identity*. I'd be surprised if my
password were cracked (it could be sniffed, of course). I'd be annoyed
at Netcom for the inconvenience if they locked my account. I'd still
rather learn a lesson from my ISP than from a criminal.

Justin Harvey

unread,
Dec 27, 1994, 2:50:12 PM12/27/94
to

Wait a sec, why the HELL are you sending mail to NOC regarding forged messages?

Karl Denninger

unread,
Dec 27, 1994, 1:27:38 PM12/27/94
to
In article <sterlingD...@netcom.com>,
Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>You are horrible confused. Karl says:
>
>Without the encrypted string to check against the "crackability" of a
>password IS OF NO VALUE TO A CRACKER. Therefore, if an encrypted string
>is secure, it takes too long to guess a weak password, or you'll get caught
>doing it. So no matter what the password is (i.e. "password"), it's
>secure so longs as the encrypted string is secure. Therefore, there is
>no need to attempt to "crack" such a password for security reasons, unless
>your encrypted strings are *not* secure.
>
>And I say:
>
>Therefore, you are an idiot. You truly have learned very little about
>security indeed.

Yep. Karl says exactly what you quoted.

My password can be "X", and unless you have some REASON to try "X" you will
NEVER guess it.

Now it is true that you *should* use a relatively long password, just to
eliminate people trying letters of the alphabet. So we require at least
four characters. Some people require 6.

Now start with "a" and get to "zzzz". Just alpha, mind you. And try this
*without* encrypted strings to check against. While you're at it, do so in
a fashion that doesn't set off my "hack attack" alarm due to too many
invalid login attempts.

Good luck. I'll see you in prison. If you even get off a small fraction of
the 456,976 attempts required, and that just includes the lower case alpha
character set, you'll be caught. End of discussion and theory.

As a hint, it is *far* better for a person to use a password they can
*remember* than a random string that they have the write down. The
second leaves open all kinds of possibilities for game playing.

>Btw, as a hint, SunOS PatchID #100482-05 implements access control lists
>on your NIS servers.

Doesn't matter; if I'm on your system when I make the request then I'm a
valid machine in the ACL and the request will be served.

All the ACL patch does is prevent me from running YPX *here*.

>NIS *is* evil, but it's not necessarily a big gaping hole waiting for a
>truck to be driven through it.
>
>Bruce

>NETCOM On-line Communication Services. | house over a wire.

Thank you Bruce. You admit its evil, eh? So why run it at all?

Bryant Durrell

unread,
Dec 27, 1994, 1:21:40 PM12/27/94
to
In article <3dpl1c$f...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>I have been told in email by a number of people the last few days that
>Netcom's root is *still* compromised. Hell, there's a goddamn mailing list
>out there on your security problems! Now I can't *prove* that you're
>compromised without breaking in myself and testing the theorem, but I do
>know where to look to see if the traces are still around.

<boggle>

"I have in my hand a paper listing the names of 47 Americans..."

I've been told that you fuck sheep for a living, Karl. For that
matter, I could create a mailing list concerning your sheep-fucking.
In fact, I just did. But I don't *believe* it. At this point, you're
getting into highly slimy behavior; if you have evidence that Netcom's
been cracked, you know where to go to present it. If you don't, you're
making unsupported innuendos concerning a competitor.

If you have serious concerns, I strongly suggest you take it to private


email. Bruce, allow me to extend the same suggestion to you; I mean
this in a friendly way in both cases. Cause frankly, I don't think
public mud-battles do anyone involved any good.

--

Karl Denninger

unread,
Dec 27, 1994, 4:11:03 PM12/27/94
to
In article <jharveyD...@netcom.com>,

Justin Harvey <jha...@netcom.com> wrote:
>In article <3dpqpj$o...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>In article <durrellD...@netcom.com>,
>>I've tried to talk to Netcom's NOC on multiple occasions, and frequently get
>>either bad answers or no answers. My last request, for them to look up a
>>sendmail ID of a forged message sent to some of our subscribers, drew TWO
>>responses:
>>
>>1) One correctly identifying the source of the message. We are now
>> chasing this through the real source (which, not surprisingly, is
>> nih.gov, a source of lots of trouble in the past).
>>
>>2) A second, sent this AM, claiming that the source was *MCSNET* even
>> though the message ID was CLEARLY from Netcom's systems. The second
>> response was from the generic "NOC" account and the sender was
>> not identified clearly enough to be able to tell who it was.
>
>Wait a sec, why the HELL are you sending mail to NOC regarding forged messages?

Because our SMTP daemon identified the source of the connection as Netcom,
and therefore, Netcom knows the next hop (or it was the site which originated
the message itself).

Therefore, you contact the NOC asking them to look at the logs and determine
where the message came from, and please tell you so you can chase the
responsible party(s).

Hell is for those who believe in it. Frankly, I think its firmly rooted
behind the technical support desk of a company in California :-)

Bruce Sterling Woodcock

unread,
Dec 27, 1994, 1:47:17 PM12/27/94
to
In article <3dpl1c$f...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>In article <sterlingD...@netcom.com>,
>Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>>In article <3dntsm$a...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>>In article <sterlingD...@netcom.com>,
>>>Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>>>>Well, I'm glad everyone is speculating about this, but without any facts.
>>>>Karl, did you try your ypx hack? Did it work? No? Hmm, that's too bad.
>>>
>>>Yes, yes, I said I might need an account on Netcom.
>>>
>>>And why would I want to do something which is, in fact, breaking the law?
>>
>>Fine, Karl. I will give you an account at Netcom and allow you to "break
>>the law" to demonstrate it to me. Are you game?
>
>Deliver to me the following:
> A notarized and signed statement from the President of the company
> authorizing me to (1) break in if I can, and (2) format the disks
> if I succeed. Include a standard shell login ID and password
> valid for the next year.
>
>Either I fail, in which case I will publically admit same, and you're
>right, or I succeed, in which case everyone knows in a few minutes of the
>time that I manage to do so. This'll get my "free time" budget, as I'm a
>busy guy and aren't going to take time from my primary duties to enjoy
>myself in this fashion.
>
>You like high stakes poker, eh? How's this Bruce?

Pretty good, but no dice. I can authorize you an account and an attempt
to get encrypted passwords, but not to "break root" or do anything as root.
Also, the President doesn't authorize this... I do. It's nice to work in
a progressive company. :)

>Remember, if I get root via *any* means I win -- because I can then write a
>10 line "C" program to get the passwords. "ypx" doesn't have to enter into
>the equation here.

Welp, sorry, that wasn't the deal. You said you could get the passwords
via NIS security problems. Any who has root on a machine can get them.
So your job is to live up to your word of getting the encrypted passwords...
not get root. Two very different thinks, there.

>>Okay, now it's my turn to play superior sysadmin. If you truly think that
>>having a good password is not necessary if the encrypted fields are
>>inaccessible, then you have truly learned very little about security indeed.
>>I suggest you spend some time away from the literature of theorists and
>>spend some time in the real world.
>
>Yeah, right. The most common "easily guessed" passwords will not be found
>by a dictionary search.

Then you're using the wrong dictionary.

>Besides, if your login program is reasonably
>intelligent it takes steps to prevent this kind of "guess the password"
>game. BSD's, for example, stock out of the box, starts doing an
>exponential delay when you miss three times. The fourth time waits 2
>seconds, the 5th 4, the sixth 8, etc, and you start getting logged on
>top of i. You can't guess many times in this environment without setting
>off the alarms.

You are naive if you think this is both A) The only method for testing,
and B) too slow/annoying/dangerous for crackers to use.

>If my password is "biteme" that only helps you if you *know* what it is.
>If you want to guess then you can go ahead, but no password checker in the
>world is going to save you much. You're dealing with single-digit
>percentage improvements here.

One account is enough when you're talking an alt.2600 spam...

>Ah, but instead of forcing everyone to change their password (oops - I
>forgot that aging is BROKEN in SunOS if you're running NIS, I guess that's
>not an option) you try to crack them? Why Bruce?

The details of system administration on a site you know nothing about
should be beyond your scrutiny, Karl. There are reasons, just as I in turn
accept there are reasons MCS is doing primary DNS for some NET99 customers.

>Doesn't matter. Hacked is hacked right?

Wrong. Certain kinds of hacking may not mean that the encrypted passwords
are currently compromised, which was your assertion. I am pleased that you
are retracting that now.

>I have been told in email by a number of people the last few days that
>Netcom's root is *still* compromised.

Ooooh. And that constitutes proof?

>Sorry, Bruce, but my professional opinion as a security analyst is that
>NIS is NOT SUITABLE for serving passwords on any Internet connected site.
>Period.

Fine. This is your opinion. However, you stated as fact that this meant
you could gain access via the encrypted fields either remotely, or if you
had an account on the system, due to NIS security flaws. You didn't state
this as "Hypothetically, given what I know of NIS, there probably *is* such
a hole... NIS is really ugly and problematical like that" but rather as a
definite fact. So now, either put your money where your mouth is, or admit
that you know of no such security hole, and merely suspect them. Hell, I
suspect them myself... I hate NIS. But your specfic accusations in this case
are totally unfounded.

>>This actually does bring up a good question. Whether or not we would say
>>something if we did have a breakin isn't up to me. But I ask you, Karl...
>>if root was compromised on some of your systems, or security of passwords
>>breached in some way, *would* you tell your customers?
>
>Yep. We have had people's passwords sniffed, and have notified them. We
>had people try the "write a .rhosts file" game on people's accounts that
>they had unwittingly opened up to be world-writable. That one didn't work,
>becuase we don't honor "+" in .rhosts files. So what? We lock down the
>account, call the customer, tell them what happened, suggest strongly that
>they change their password from a direct dial-in immediately, and take it
>from there. Its called being responsive to our customer base.

I think this is the right approach to take. I agree with you totally.

>> What if your stockholders told you not to
>>tell them, because *they* didn't want to lose money?
>
>Ah, now we get to the rub, don't we?
>
>Heh, I'll never say that any system, other than one in a faraday cage
>running on batteries with an armed guard outside the door, is completely
>secure. I'm not stupid. If we get hacked, then we get hacked. You find
>the reason, tell the affected people, and fix it. Has happened before to
>systems under my control, and people have gone to *prison* as a result.
>I make a hobby of catching assholes who like to break into systems, and set
>all kinds of traps for them to trip over and fall into.

Great! What I'm asking, tho, is what if your *stockholders* disagree...
what if they say, "Karl, you can't admit to a breakin because the stock
will go down and we'll lose money... all of our customers will flee to
more secure competitors. I know, *you* think that's not the case and we
are better off being honest, but *we* feel otherwise."? What do you do
then? Do you go ahead and go against the stockholder wishes, or do you
concede? What if in doing so you turn out you were wrong, and you *do*
lose a large chunk of money over a security incident. Do you then resign?

I'm not trying to imply anything bad here. Just in the past, you seemed
to indicate you would do what the stockholders wanted, even if the action
was unpopular with some customers. Now you seem to be favoring the customers
over the stockholders. I'm trying to determine if you really have a hard
and fast rule, or if the lines get blurry at some point.

>Did what for Net99? More innuendo Bruce?

Didn't you claim Net99 was a multi-peering, multiply-connected backbone
when in fact it was only connected via MAE-East, and then quietly hushed
up when people fouund that out? I know that Net99 has such a backbone as
it's *goal* (it might even be there now; I haven't kept track) but certainly
it was *not* such a backbone when you were making claims that it *was*...

Thor Lancelot Simon

unread,
Dec 27, 1994, 8:34:51 PM12/27/94
to

I agree 100%. The last three or four times I've tried to contact Netcom
about security matters, their "NOC" hasn't been bothered to answer the
telephone. First it's rung busy for a Long Time, and then it's rung -- just
rung -- for a long time.

Nice bunch of lazy incompetent administrators you've got there, Bruce.

What I particularly like is that they don't answer email sent to either
sup...@netcom.com or ro...@netcom.com, when you *do* actually get them on
the telephone they just tell you to send mail to sup...@netcom.com -- and
never have an answer when you tell them that you're calling because they
ignored your email -- and that when, with a reasonably urgent problem,
despairing of ever getting an answer from their ring-ring-ring telephone
line or their black-hole email "support", one is so bold to send a talk
request or a piece of email to an *individual* Netcom staff member -- like,
say, Mr. Sterling Woodcock, the noted NIS and security expert -- what one
gets back is usually a nasty note telling one not to send email to said
staff member's "personal" account.

Of course, it's got to be a nice system they have set up there with their
"NOC" account and their other pseudononymous accounts -- they can provide
no, inept, or contradictory service, and never have a stitch of accountability.

I love that line of BS they try to feed the world about keeping their security
problems secret because they're accountable to their stockholders and afraid
of scaring their users. You want my best guess as to why they keep their
security problems so secret? They do it because they're afraid that they'll
get held liable at some point for failing to deal with known security problems
that then went and stomped on other people's feet, data, or machines.

Care to know what made "Cracker Buster" (fsim...@netcom.com) go away? I can
tell you, because I happened to be monitoring his traffic when he got nailed.

After having all the relevant information -- including days and days of
repeated warnings from me that the "fsimpson" account on Netcom, among others,
was being used as a convenient stepping-stone to try to break into other
people's systems, at least one warning that the fsimpson account was being
used for something (I didn't have enough data to tell what) to do with
"Cracker Buster", and *the information that a number of accounts on netcom
had the identical password "thief*****" and appeared to be being used by
multiple individuals for various bad purposes*, and failing to do anything,
before Netcom got to "Cracker Buster", some other pissed-off sysadmin did.

*Hours* before Netcom sent out a vague, confusing form letter to all the
administrators who had anything to do with this "Cracker Buster" mess, I
sat there and had one of the best belly laughs of my life as I watched a
tcpdump log of fsimpson getting kicked out of his electronic house-and-home by
someone who he and Netcom had evidently managed to piss off to the point of
willingness to break the law.

So you want to know where Hell is? Hell is where they sit around and do
nothing and have to wait for some kind of avenging angel to come carry off
the sinners, because you can't tell them from the house staff.

--
Thor Lancelot Simon t...@cloud9.net

Somewhere they're meeting on a pinhead, calling you an angel.

Bryant Durrell

unread,
Dec 27, 1994, 3:28:47 PM12/27/94
to
In article <3dpqpj$o...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>In article <durrellD...@netcom.com>,
>Bryant Durrell <dur...@netcom.com> wrote:
>>In article <3dpl1c$f...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>>>I have been told in email by a number of people the last few days that
>>>Netcom's root is *still* compromised. Hell, there's a goddamn mailing list
>>>out there on your security problems! Now I can't *prove* that you're
>>>compromised without breaking in myself and testing the theorem, but I do
>>>know where to look to see if the traces are still around.
>>
>><boggle>
>>
>>"I have in my hand a paper listing the names of 47 Americans..."
>>
>>I've been told that you fuck sheep for a living, Karl. For that
>>matter, I could create a mailing list concerning your sheep-fucking.
>>In fact, I just did. But I don't *believe* it. At this point, you're
>>getting into highly slimy behavior; if you have evidence that Netcom's
>>been cracked, you know where to go to present it. If you don't, you're
>>making unsupported innuendos concerning a competitor.
>
>I have no such evidence, and I said that I can't prove anything. I am not
>on the named mailing list, but I have been told of its existance and where
>it is. And no, I am not interested in being on it, or in hacking other
>systems, including Netcom. In fact, I deleted the mail sent to me
>regarding same.
>
>That doesn't change the fact that I *did* receive mail from one of the
>people purporting to have such information, or that they claimed that root
>was compromised. As I said, the veracity of that is unknown, but I did
>give the sender a couple of things to look at to verify whether or not
>there really was a problem.
>
>And yes, the mail making the claim did come from a Netcom account.

Come on, Karl. That's very weak, and you know it. Reporting
unsupported claims concerning system security is crying wolf. I have
customers who've told me awful terrible things about how bad your
service is, and I'm sure you have the same with respect to us, and I
know -- because I am a professional -- that this can probably be
chalked up to the inevitable malcontents and even in cases where it
can't, it is *not* our job to call down the wolves on our fellow
professionals. If you have evidence, let us know about it, and if
you don't, you have no reason to air imaginary dirty laundry on
Usenet. (Although I can't think of a better place to air it.)

>>If you have serious concerns, I strongly suggest you take it to private
>>email. Bruce, allow me to extend the same suggestion to you; I mean
>>this in a friendly way in both cases. Cause frankly, I don't think
>>public mud-battles do anyone involved any good.
>

>I've tried to talk to Netcom's NOC on multiple occasions, and frequently get
>either bad answers or no answers. My last request, for them to look up a
>sendmail ID of a forged message sent to some of our subscribers, drew TWO
>responses:

So? What's Bruce got to do with NOC? (I know, you don't know what
he has to do with NOC, you're assuming that a) he works in that
department and b) that department handles security issues. Sigh.)

>From netcom.com!durrell Tue Dec 27 12:23:04 1994
>Return-Path: <dur...@netcom.com>
>Received: by mercury.mcs.com (/\==/\ Smail3.1.28.1 #28.5)
> id <m0rMgY3...@mercury.mcs.com>; Tue, 27 Dec 94 12:23 CST
>Received: by netcom20.netcom.com (8.6.9/Netcom)
> id KAA26915; Tue, 27 Dec 1994 10:22:29 -0800
>Date: Tue, 27 Dec 1994 10:22:29 -0800
>From: dur...@netcom.com (Bryant Durrell)
>Message-Id: <1994122718...@netcom20.netcom.com>
>To: sheep-...@pft.com
>Subject: One-Time
>Status: OR
>
>Just to prove it. <wry grin>
>
>-- Bryant

>Is mail forgery a violation of your user agreement with Netcom?

Why, yes, it is. What's your point? If you check your log files,
you'll find it went through pft.com, and as per the second message I
sent to that list, I deleted it immediately thereafter. It was only
there to make a brief, sarcastic point.

Hm... pft.com didn't put in any Received: headers, did it? (He said,
after a quick check.) And I guess mercury.mcs.com doesn't list the
sending machine in its Received: header, judging from what you've
posted. So I can see where you might have made a misassumption. I
certainly appreciate the (unintended) bug report. <grin>

I'm going to take my own advice at this point. If you still feel that
it's appropriate to sling mud about a competitor in public, that's your
business, and I'm not going to convince you otherwise. I somehow
suspect this is the case, but that's life, isn't it? I have better
things to do.

Jeff Hayward

unread,
Dec 27, 1994, 3:26:06 PM12/27/94
to
In article <3dntsm$a...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>The fact that Netcom is now checking for "guessable" passwords means only
>one thing to me -- that the encrypted strings are NOT considered secure by
>the company. Why don't you just admit the truth and get on with life?

Alternatively, the strings are *now* secure, but weren't at some time
in the past, so they need to get rid of all the ones that were
possibly compromised before they secured things.

--
Jeff Hayward

Karl Denninger

unread,
Dec 27, 1994, 3:49:20 PM12/27/94
to
In article <sterlingD...@netcom.com>,
Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>In article <3dpl1c$f...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>
>>Deliver to me the following:
>> A notarized and signed statement from the President of the company
>> authorizing me to (1) break in if I can, and (2) format the disks
>> if I succeed. Include a standard shell login ID and password
>> valid for the next year.
>>
>>You like high stakes poker, eh? How's this Bruce?
>
>Pretty good, but no dice. I can authorize you an account and an attempt
>to get encrypted passwords, but not to "break root" or do anything as root.

And if I get the passwords via root?

>>Remember, if I get root via *any* means I win -- because I can then write a
>>10 line "C" program to get the passwords. "ypx" doesn't have to enter into
>>the equation here.
>
>Welp, sorry, that wasn't the deal. You said you could get the passwords
>via NIS security problems. Any who has root on a machine can get them.
>So your job is to live up to your word of getting the encrypted passwords...
>not get root. Two very different thinks, there.

Not really. If I get root then the game is over, Bruce, and you know it.
That's the ultimate goal, because with root I can make my own accounts. Or
do any one of a number of things, including making sure that you don't find
me later if I come back on.

>>Yeah, right. The most common "easily guessed" passwords will not be found
>>by a dictionary search.
>
>Then you're using the wrong dictionary.

Again, you're assuming I have encrypted strings to match against.

>>Besides, if your login program is reasonably
>>intelligent it takes steps to prevent this kind of "guess the password"
>>game.

>You are naive if you think this is both A) The only method for testing,


>and B) too slow/annoying/dangerous for crackers to use.

It is (B) -- too slow/annoying/dangerous for crackers to use. At least it
is here. The other means of testing here, such as "su" are also suitably
instrumented. If you try it from the net at large I know where you're
coming from, and if necessary will block the IP number(s) involved.

>>If my password is "biteme" that only helps you if you *know* what it is.
>>If you want to guess then you can go ahead, but no password checker in the
>>world is going to save you much. You're dealing with single-digit
>>percentage improvements here.
>
>One account is enough when you're talking an alt.2600 spam...

Yep. It sure is, and if you start with 30000 accounts you can hack a few
hundred and use one at a time. The odds of stopping *that* short of
changing everyone's password, once the shadow file is compromised, are zero.

>The details of system administration on a site you know nothing about
>should be beyond your scrutiny, Karl. There are reasons, just as I in turn
>accept there are reasons MCS is doing primary DNS for some NET99 customers.

Oh, but I do know that Netcom has been both the source and pathway for some
forged communications purporting to have come from me, which have been sent
to our users. And I do know that Netcom has responded to one such inquiry
as recently as this morning with an assertion that the message originated
here -- which, by the way, was with the header containing a Netcom
Message-ID *staring the NOC operator right in the face* at the time the
statement was made.

>>Doesn't matter. Hacked is hacked right?
>
>Wrong. Certain kinds of hacking may not mean that the encrypted passwords
>are currently compromised, which was your assertion. I am pleased that you
>are retracting that now.

Hacking which leaves you with root access typically leaves a 10 minute,
at most, window to gaining the encrypted password strings.

>>I have been told in email by a number of people the last few days that
>>Netcom's root is *still* compromised.
>
>Ooooh. And that constitutes proof?

Nope, as I said, I have no proof and in fact don't want it, which you
conveniently deleted.

>>Sorry, Bruce, but my professional opinion as a security analyst is that
>>NIS is NOT SUITABLE for serving passwords on any Internet connected site.
>>Period.
>
>Fine. This is your opinion. However, you stated as fact that this meant
>you could gain access via the encrypted fields either remotely, or if you
>had an account on the system, due to NIS security flaws. You didn't state
>this as "Hypothetically, given what I know of NIS, there probably *is* such
>a hole... NIS is really ugly and problematical like that" but rather as a
>definite fact. So now, either put your money where your mouth is, or admit
>that you know of no such security hole, and merely suspect them. Hell, I
>suspect them myself... I hate NIS. But your specfic accusations in this case
>are totally unfounded.

I am aware of a number of methods of compromising NIS to gain the password
list. There are also a number of patches to address some of these
concerns. Now, the question is which list of each do you know about and
have loaded?

>>Yep. We have had people's passwords sniffed, and have notified them. We
>>had people try the "write a .rhosts file" game on people's accounts that
>>they had unwittingly opened up to be world-writable. That one didn't work,
>>becuase we don't honor "+" in .rhosts files. So what? We lock down the
>>account, call the customer, tell them what happened, suggest strongly that
>>they change their password from a direct dial-in immediately, and take it
>>from there. Its called being responsive to our customer base.
>
>I think this is the right approach to take. I agree with you totally.

Good....

>Great! What I'm asking, tho, is what if your *stockholders* disagree...
>what if they say, "Karl, you can't admit to a breakin because the stock
>will go down and we'll lose money... all of our customers will flee to
>more secure competitors. I know, *you* think that's not the case and we
>are better off being honest, but *we* feel otherwise."? What do you do
>then? Do you go ahead and go against the stockholder wishes, or do you
>concede? What if in doing so you turn out you were wrong, and you *do*
>lose a large chunk of money over a security incident. Do you then resign?

Well, that would be interesting, considering that I'm somewhat difficult
to vote against here right now......

>I'm not trying to imply anything bad here. Just in the past, you seemed
>to indicate you would do what the stockholders wanted, even if the action
>was unpopular with some customers. Now you seem to be favoring the customers
>over the stockholders. I'm trying to determine if you really have a hard
>and fast rule, or if the lines get blurry at some point.

The lines get blurry only when they can. When you own the place there is
little blurring available.

>>Did what for Net99? More innuendo Bruce?
>
>Didn't you claim Net99 was a multi-peering, multiply-connected backbone
>when in fact it was only connected via MAE-East, and then quietly hushed
>up when people fouund that out? I know that Net99 has such a backbone as
>it's *goal* (it might even be there now; I haven't kept track) but certainly
>it was *not* such a backbone when you were making claims that it *was*...
>
>Bruce

Sorry, Bruce, but Net99 is not connected only at MAE-East, and in fact
that was *never* the case. Your "facts" are wrong.

Net99 came up multiply-peered and multiply connected on *DAY 1*. That's
a fact, Bruce, and in fact we have connectivity throughout the Net99
backbone even if the MAE equipment fails.

I know this for a fact because I'm the guy who sets up the router peering
on the Net99 core, and I know where we're attached, to who, and under what
set of pathings.

Karl Denninger

unread,
Dec 27, 1994, 11:01:56 PM12/27/94
to
In article <jharveyD...@netcom.com>,
Justin Harvey <jha...@netcom.com> wrote:
>In article <3dqia5$2...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>
>>Since the last time I mailed the postmaster and got told to talk to the
>>"NOC" account for all future requests, as that was an exploder that "went
>>to the right people".
>>
>>Including, obviously, ones who can't read the headers of the message
>>they're being asked to check out.
>
>I'll admit that I read the message too quickly yet does that make me
>incompetent? I'm sorry Mr. Denninger, but we're not all perfect. Stil
>should have sent it to the right person.
>
>---------------------------------------------------------------------------
>Justin B. Harvey jha...@netcom.com

The header in question was a whole half-dozen lines from your comment that
it wasn't your problem and that the message originated here. My point was
not that you made a mistake, it was that you didn't bother to *LOOK* before
placing blame in the *wrong place*.

I don't send messages to a provider's staff without reason; I darn well
know how busy people are, as I'm one of them. I certainly don't pick on
Netcom's staff without reason, especially considering that I have, in the
past, had trouble even drawing a response *of any kind* asking for what
I consider to be normal provider-type things (ie: customer wants to change
over without loss of service; you typically ask for DNS to be picked up
from the new provider until the NIC can get around to switching things and
zones time out. This is called professional courtesy, and has been harder
than hell to get you folks to do for us in the past.) This particular
incident was both serious enough to warrant immediate mail (forged email
appearing to come from me personally and alleging wrong-doing sent to
customers of ours) and needed to be traced from your end as that was
where the smoke led on this one.

You bounced the message back to me saying "not our problem", when in fact
it was. Fortunately someone else had already replied with the *correct*
log info, but that made even more curious -- why did you get a copy if
someone else had already taken care of it?

Thus, it obviously *did* get to the right person, did it not?

All providers are, to an extent, cooperative on the Internet even when
they're direct competitors. If you want to invite the Feds in to regulate
this entire game then start being uncooperative and you'll get your wish
right quick -- "restraint of trade" sounds nasty in a nascent industry like
this, and the first ones to feel the heat will be the national firms. Nobody
wants that -- it is not in your, or our, best interest to invite that kind
of intrusion.

Jan B. Schipmolder

unread,
Dec 27, 1994, 4:10:56 PM12/27/94
to
Karl Denninger (ka...@MCS.COM) wrote:
: In article <durrellD...@netcom.com>,

: Bryant Durrell <dur...@netcom.com> wrote:
: >In article <3dpl1c$f...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
etc
etc
etc
Do you guys have time for your work?
--
--
Jan B. Schipmolder
sc...@netcom.com

james small

unread,
Dec 27, 1994, 4:19:41 PM12/27/94
to
In article <sterlingD...@netcom.com> ster...@netcom.com (Bruce Sterling Woodcock) writes:
>
>In article <3dpl1c$f...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>In article <sterlingD...@netcom.com>,
>>Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>>>In article <3dntsm$a...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>>>In article <sterlingD...@netcom.com>,
>>>>Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>definite fact. So now, either put your money where your mouth is, or admit
>that you know of no such security hole, and merely suspect them. Hell, I
>


Gee, I remember Brucie saying something likes this to me when I stated that
some netcom systems were insecure a few months back.
Then I supplied sufficient proof.

Then they kicked me off . . . .


Go figure

Karl Denninger

unread,
Dec 27, 1994, 4:56:15 PM12/27/94
to
In article <durrellD...@netcom.com>,
Bryant Durrell <dur...@netcom.com> wrote:
>In article <3dpqpj$o...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>>In article <durrellD...@netcom.com>,
>>
>>I have no such evidence, and I said that I can't prove anything. I am not
>>on the named mailing list, but I have been told of its existance and where
>>it is. And no, I am not interested in being on it, or in hacking other
>>systems, including Netcom. In fact, I deleted the mail sent to me
>>regarding same.
>
>Come on, Karl. That's very weak, and you know it. Reporting
>unsupported claims concerning system security is crying wolf. I have
>customers who've told me awful terrible things about how bad your
>service is, and I'm sure you have the same with respect to us, and I
>know -- because I am a professional -- that this can probably be
>chalked up to the inevitable malcontents and even in cases where it
>can't, it is *not* our job to call down the wolves on our fellow
>professionals. If you have evidence, let us know about it, and if
>you don't, you have no reason to air imaginary dirty laundry on
>Usenet. (Although I can't think of a better place to air it.)

I suppose the *incredible* increase in volume of trouble coming from, or
passing through, Netcom in the last two to three weeks doesn't add an air
of credibility to this?

The alt.2600 spams and cancel wars? The forged email to me, and my users,
for posting in alt.2600 -- purportedly from Netcom, and some of it actually
traced to Netcom? The hacked accounts, which I assume really were hacked,
otherwise you'd have someone to hold up in public as the source of the spam,
natch. The forged email to our customers which was funneled through Netcom,
and the absolutely incompetent response from the NOC I received this morning?
The fact that I got *two* responses to the same inquiry from the NOC, with
two different answers, nearly 24 hours apart?

>>I've tried to talk to Netcom's NOC on multiple occasions, and frequently get
>>either bad answers or no answers. My last request, for them to look up a
>>sendmail ID of a forged message sent to some of our subscribers, drew TWO
>>responses:
>
>So? What's Bruce got to do with NOC? (I know, you don't know what
>he has to do with NOC, you're assuming that a) he works in that
>department and b) that department handles security issues. Sigh.)

Uh, one company, Bryant.... one company, one responsibility. If you come
to me with a request for a log lookup we will do what we can to provide
*competent* assitance. Not spout at the mouth without knowing what the
hell we are talking about, or worse, misrepresenting what is staring us
in the face!

>I'm going to take my own advice at this point. If you still feel that
>it's appropriate to sling mud about a competitor in public, that's your
>business, and I'm not going to convince you otherwise. I somehow
>suspect this is the case, but that's life, isn't it? I have better
>things to do.
>
>--
>Bryant Durrell dur...@netcom.com

I don't think someone being a competitor has anything to do with this at
all. Give up trying to frame this as a competitive issue; it isn't. It
has to do with Netcom being a pain in the neck right now, primarily due to
what appear, to me, to be serious internal issues within the systems there
and the *absolute* lack of communication coming from the company. That's
a corporate choice which Netcom is entitled to make, and one which we are
entitled to respond to.

I don't *have* a competitive opinion of Netcom. I've never had a Netcom
account, and to be honest, I don't have much use for one.

DFRussell

unread,
Dec 27, 1994, 2:23:53 PM12/27/94
to
This thread appears to be degenerating quite quickly... not that I object
to a good flame war :)

Thought: when you throw shit, even if you hit the person you're aiming at,
some of it sticks to your own hands...

Followup set.

--
Disclaimer: I don't speak for Martin Marietta or the EPA.
----------------------------------------------------------
dfru...@unixmail.rtpnc.epa.gov, Martin Marietta TSI,
P.O. Box 14365, MD-4501-1B, Research Triangle Park, NC 27709

Glenn Fleishman

unread,
Dec 28, 1994, 12:23:49 AM12/28/94
to
In article <3dqfbr$k...@news.cloud9.net>

t...@cloud9.net (Thor Lancelot Simon) writes:

> I love that line of BS they try to feed the world about keeping their security
> problems secret because they're accountable to their stockholders and afraid
> of scaring their users.

That's weird. They're just issuing a prospectus for their IPO now.
----
Glenn Fleishman * Point of Presence Company <http://www.popco.com>
"Trend Watch" columnist, Adobe Magazine
Moderator, Internet marketing list (finger in...@wolfe.popco.com)
For public key, finger p...@wolfe.popco.com

Thor Lancelot Simon

unread,
Dec 28, 1994, 12:36:46 AM12/28/94
to
In article <3dqsp5$b...@kaleka.seanet.com>,

Glenn Fleishman <gl...@popco.com> wrote:
>In article <3dqfbr$k...@news.cloud9.net>
>t...@cloud9.net (Thor Lancelot Simon) writes:
>
>> I love that line of BS they try to feed the world about keeping their security
>> problems secret because they're accountable to their stockholders and afraid
>> of scaring their users.
>
>That's weird. They're just issuing a prospectus for their IPO now.

No, they did their IPO several days -- maybe a week and change now --
ago. Stock went up for a few days after it hit the market, too.

Justin Harvey

unread,
Dec 27, 1994, 5:22:29 PM12/27/94
to
In article <3dpvt7$3...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>In article <jharveyD...@netcom.com>,
>Justin Harvey <jha...@netcom.com> wrote:
>>In article <3dpqpj$o...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>>In article <durrellD...@netcom.com>,
>>>I've tried to talk to Netcom's NOC on multiple occasions, and frequently get
>>>either bad answers or no answers. My last request, for them to look up a
>>>sendmail ID of a forged message sent to some of our subscribers, drew TWO
>>>responses:
>>>
>>>1) One correctly identifying the source of the message. We are now
>>> chasing this through the real source (which, not surprisingly, is
>>> nih.gov, a source of lots of trouble in the past).
>>>
>>>2) A second, sent this AM, claiming that the source was *MCSNET* even
>>> though the message ID was CLEARLY from Netcom's systems. The second
>>> response was from the generic "NOC" account and the sender was
>>> not identified clearly enough to be able to tell who it was.
>>
>>Wait a sec, why the HELL are you sending mail to NOC regarding forged messages?
>
>Because our SMTP daemon identified the source of the connection as Netcom,
>and therefore, Netcom knows the next hop (or it was the site which originated
>the message itself).
>
>Therefore, you contact the NOC asking them to look at the logs and determine
>where the message came from, and please tell you so you can chase the
>responsible party(s).

Since when does NETWORK operations keep track of mail logs or track down
security incidents dealing with other sites? It seems to be that you wrote
the wrong department.

>
>Hell is for those who believe in it. Frankly, I think its firmly rooted
>behind the technical support desk of a company in California :-)

I decline the offer to sling mud. Thanks anyway.

DaveHatunen

unread,
Dec 28, 1994, 12:50:21 AM12/28/94
to
In article <3dqsp5$b...@kaleka.seanet.com>,
Glenn Fleishman <gl...@popco.com> wrote:
>In article <3dqfbr$k...@news.cloud9.net>
>t...@cloud9.net (Thor Lancelot Simon) writes:
>
>> I love that line of BS they try to feed the world about keeping their security
>> problems secret because they're accountable to their stockholders and afraid
>> of scaring their users.
>
>That's weird. They're just issuing a prospectus for their IPO now.

Not quite. I bought some stock two weeks ago.

But they were privately held up till then, so they couldn't have used
their stockholders as an excuse.

--


********** DAVE HATUNEN (hat...@netcom.com) **********
* Daly City California: *
* where San Francisco meets The Peninsula *
* and the San Andreas Fault meets the Sea *
*******************************************************

Will Spencer

unread,
Dec 27, 1994, 8:19:35 PM12/27/94
to
Just to throw a short technical note into this otherwise fascinating
conversation, I would like to point out that you do not need the
encrypted password strings to crack passwords. The pwdauth() function
will access the strings for you (shadow or no shadow, NIS or no NIS).
Direct access to the encrypted strings is simply a luxury.

Thor Lancelot Simon

unread,
Dec 27, 1994, 8:38:56 PM12/27/94
to

Who does that make you, then? Stalin, Lenin, or perhaps Trotsky?

Oh, I've got it. You must be "Iron Feliks". You seem to have a similar
track record with respect to security.

Thor Lancelot Simon

unread,
Dec 27, 1994, 8:41:28 PM12/27/94
to
In article <D1Hn8...@seas.ucla.edu>,

Hey, didn't I just _say_ something about "Iron Feliks"?

:-)

David Lesher

unread,
Dec 27, 1994, 9:29:15 AM12/27/94
to
ster...@netcom.com (Bruce Sterling Woodcock) writes:


>This actually does bring up a good question. Whether or not we would say
>something if we did have a breakin isn't up to me. But I ask you, Karl...
>if root was compromised on some of your systems, or security of passwords

>breached in some way, *would* you tell your customers? What if doing so
>meant you would lose money? What if your stockholders told you not to
>tell them, because *they* didn't want to lose money? You said before you
>do what's best for them, and what if that meant sacrificing honesty?


Another factor enters here. The first of this series of
incidents occurred while the IPO was hatching.

The SEC looks askew at concealing relevant information, _especially_
negative information, from potential stockholders. Of such are born
stockholder suits & SEC investigations.

The rules a privately held firm & a public company must live by
are far different.

Karl Denninger

unread,
Dec 27, 1994, 9:22:27 PM12/27/94
to
In article <3dqef7$h...@rainbow.rmii.com>, Will Spencer <wi...@rmii.com> wrote:
>Just to throw a short technical note into this otherwise fascinating
>conversation, I would like to point out that you do not need the
>encrypted password strings to crack passwords. The pwdauth() function
>will access the strings for you (shadow or no shadow, NIS or no NIS).
>Direct access to the encrypted strings is simply a luxury.

This doesn't work on "enlightened" operating systems (like ours :-)) that
require you to already HAVE root for that function to return the strings.

Karl Denninger

unread,
Dec 27, 1994, 9:25:09 PM12/27/94
to
In article <jharveyD...@netcom.com>,
Justin Harvey <jha...@netcom.com> wrote:
>In article <3dpvt7$3...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>In article <jharveyD...@netcom.com>,
>>Justin Harvey <jha...@netcom.com> wrote:
>>>
>>>Wait a sec, why the HELL are you sending mail to NOC regarding forged messages?
>>
>>Because our SMTP daemon identified the source of the connection as Netcom,
>>and therefore, Netcom knows the next hop (or it was the site which originated
>>the message itself).
>>
>>Therefore, you contact the NOC asking them to look at the logs and determine
>>where the message came from, and please tell you so you can chase the
>>responsible party(s).
>
>Since when does NETWORK operations keep track of mail logs or track down
>security incidents dealing with other sites? It seems to be that you wrote
>the wrong department.

Since the last time I mailed the postmaster and got told to talk to the


"NOC" account for all future requests, as that was an exploder that "went
to the right people".

Including, obviously, ones who can't read the headers of the message
they're being asked to check out.

-

Justin Harvey

unread,
Dec 27, 1994, 9:45:15 PM12/27/94
to

I'll admit that I read the message too quickly yet does that make me


incompetent? I'm sorry Mr. Denninger, but we're not all perfect. Stil
should have sent it to the right person.


---------------------------------------------------------------------------
Justin B. Harvey jha...@netcom.com

"Wookin pa 'nub in aw da wong paces"
IN: Letters to Cleo, Offspring, Star Trek II, Elysium, Matt's groovy tape.
OUT: Colds, Ex-Girlfriends, Togos/Raviolis/RocknTacos, working for Netkom.
---------------------------------------------------------------------------

bill nelson

unread,
Dec 28, 1994, 5:27:40 AM12/28/94
to
gl...@popco.com (Glenn Fleishman) writes:
:
: > I love that line of BS they try to feed the world about keeping their security
: > problems secret because they're accountable to their stockholders and afraid
: > of scaring their users.
:
: That's weird. They're just issuing a prospectus for their IPO now.

Well, if they are indeed so unresponsive, maybe they should be cut off by
their feed sites. I believe those are decwrl and kwandl.kwi.com.

Let them explain THAT to their stockholders.

Bill

Bruce Sterling Woodcock

unread,
Dec 27, 1994, 10:20:26 AM12/27/94
to
In article <wb8fozD1...@netcom.com> wb8...@netcom.com (David Lesher) writes:
>ster...@netcom.com (Bruce Sterling Woodcock) writes:
>
>>This actually does bring up a good question. Whether or not we would say
>>something if we did have a breakin isn't up to me. But I ask you, Karl...
>>if root was compromised on some of your systems, or security of passwords
>>breached in some way, *would* you tell your customers? What if doing so
>>meant you would lose money? What if your stockholders told you not to
>>tell them, because *they* didn't want to lose money? You said before you
>>do what's best for them, and what if that meant sacrificing honesty?
>
>Another factor enters here. The first of this series of
>incidents occurred while the IPO was hatching.

I don't know what series of incidents you are referring to... we aren't
talking about any specific series of incidents as far as I'm aware. I'm
asking Karl what he would do as CEO of his company if root were compromised.

>The SEC looks askew at concealing relevant information, _especially_
>negative information, from potential stockholders. Of such are born
>stockholder suits & SEC investigations.
>
>The rules a privately held firm & a public company must live by
>are far different.

True. But that only goes so far. I don't think Netcom revealed *everything*
about it's operation to the SEC, and there may have been things important
left out. How about a list of known hackers on the system? Surely Netcom
suspects some, and they are dangerous to keep around, but on the other hand,
Netcom may not want to violate their privacy. Another possibility is that
there is some accounting data that indicates that a certain percentage of
netcom users are from Seattle. And I, as a investor, might *hate* Seattle,
and knowing that Netcom caters to so much swine it might mean I wouldn't
want to invest in their company. Etc.

It's hard for the SEC to draw a good line between relevant financial data,
and those details they find not relevant. But at some point they do draw
that line.

In any case, I don't want to get sidetracked on IPO issues, because that's
really not relevant, and I'm not trying to argue an IPO information case.
I'm asked Karl a question about his position, in his normal everyday
business.

Barry Margolin

unread,
Dec 27, 1994, 11:17:20 PM12/27/94
to
In article <sterlingD...@netcom.com> ster...@netcom.com (Bruce Sterling Woodcock) writes:
>Great! What I'm asking, tho, is what if your *stockholders* disagree...
>what if they say, "Karl, you can't admit to a breakin because the stock
>will go down and we'll lose money... all of our customers will flee to
>more secure competitors.

Just remind them of the Intel Pentium incident. Intel got very little
flack over the fact that the bug existed. All the flames were over the
delay in making it public (i.e. they didn't say anything until it was
disclosed by an independent party) and their subsequent handling (claiming
that the bug isn't serious, and their initial reticence over trade-ins).
--

Barry Margolin
BBN Internet Services Corp.
bar...@near.net or bar...@netcom.com

Barry Margolin

unread,
Dec 27, 1994, 11:21:39 PM12/27/94
to
In article <3dpukg$1...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>I am aware of a number of methods of compromising NIS to gain the password
>list.

But these are only useful if the passwords are available via NIS. As far
as I can tell, netcom's use of shadow passwords takes the encrypted
passwords out of the NIS map and moves them into root-only files that are
replicated on every netcom user login system.

Karl Denninger

unread,
Dec 27, 1994, 11:46:09 PM12/27/94
to
In article <barmarD1...@netcom.com>,

Barry Margolin <bar...@netcom.com> wrote:
>In article <3dpukg$1...@Mercury.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>>I am aware of a number of methods of compromising NIS to gain the password
>>list.
>
>But these are only useful if the passwords are available via NIS. As far
>as I can tell, netcom's use of shadow passwords takes the encrypted
>passwords out of the NIS map and moves them into root-only files that are
>replicated on every netcom user login system.

Then they are not serving passwords over NIS. That's not what others have
indicated here. I don't have a Netcom account, so I can't verify this.

Kevin Martinez

unread,
Dec 27, 1994, 11:55:35 PM12/27/94
to ster...@netcom.com
ster...@netcom.com (Bruce Sterling Woodcock) writes:

[almost endless quote cascade deleted]

>Pretty good, but no dice. I can authorize you an account and an attempt
>to get encrypted passwords, but not to "break root" or do anything as root.
>Also, the President doesn't authorize this... I do. It's nice to work in
>a progressive company. :)

This "progressive company" is also a publicly held progressive company. A
publicly held business has a fiduciary responsibility to the
shareholders, not the customers. This fiduciary responsibility includes
maximizing profits at a reasonable risk level for those shareholders.
However, these profits are to be found in the customers wallets. To keep
the shareholders happy, the customers must be happy. I like to think
going public means you've sold your soul in little chunks to millions of
little devils.

Netcom has a large customer base with thousands of accounts. The
traditional tools of system management have some flaws when it comes to
system security (3l33t RDIST scripts anyone?) but I see no easy
alternative to using them. Static database files take a large effort to
keep current on systems with POPs spread all over the country. Errors in
maintaining a labor-intensive database of users, passwords, hosts, etc,
can cause the account holders (customers) some dissatisfaction. This can
cause reduced profits as they elect to give their wallets to another
service provider. This can lead to unhappy shareholders.

If there are pertinent suggestions on improving the systems and profits
at Netcom, I'm sure the Netcom employees will love to hear about them. If
they are not, the shareholders may want to hear about these suggestions
anyway.

Bruce went on to say:

>I'm not trying to imply anything bad here. Just in the past, you seemed
>to indicate you would do what the stockholders wanted, even if the action
>was unpopular with some customers. Now you seem to be favoring the customers
>over the stockholders. I'm trying to determine if you really have a hard
>and fast rule, or if the lines get blurry at some point.

If you cross the shareholders, there is a day of reckoning called the
Annual Meeting. If you cross the customers, there is a day of judgement
each quarter when the quarterly results are announced and the
shareholders realize that you've crossed them as well. This is a fine
line to balance and many talented executives fail in their balancing
efforts. The lines are indeed blurry.....

But:
As a shareholder in a certain recently-gone-public networking and service
provider company, I feel odd reading about these Troubles in netnews,
especially in at.2600!! I can't say I have ever seen the like. Is this
good or bad? Only time and profit margins will tell.

And now back to the previously scheduled Karl and Bruce discussion of NIS
and finer points of sysadmining.....
--
------------------------------------------------------------------------
Kevin Martinez Warning: Intel Inside
l...@rahul.net I owe all my success to Roly Poly Fish Heads!
------------------------------------------------------------------------

Will Spencer

unread,
Dec 28, 1994, 6:32:25 AM12/28/94
to
Karl:

Have you tested this yourself? Compile and run this code snippet
to test this for certain. Don't confuse pwdauth() with getpwent().
(Apologies for talking to you like you are an idiot)

#define MAXLOGIN 8
#define MAXPASS 8

main()
{

char login[MAXLOGIN];
char password[MAXPASS];

printf("login: ");
scanf("%s", login);

printf("password: ");
scanf("%s", password);


if (pwdauth(login,password) == 0 )
printf("Correct!\n");
else printf("Wrong!\n");

Karl Denninger

unread,
Dec 28, 1994, 12:54:36 AM12/28/94
to
In article <3dqr47$d...@hustle.rahul.net>,

Kevin Martinez <l...@rahul.net> wrote:
>ster...@netcom.com (Bruce Sterling Woodcock) writes:
>
>[almost endless quote cascade deleted]
>
>>Pretty good, but no dice. I can authorize you an account and an attempt
>>to get encrypted passwords, but not to "break root" or do anything as root.
>>Also, the President doesn't authorize this... I do. It's nice to work in
>>a progressive company. :)
>
>This "progressive company" is also a publicly held progressive company. A
>publicly held business has a fiduciary responsibility to the
>shareholders, not the customers. This fiduciary responsibility includes
>maximizing profits at a reasonable risk level for those shareholders.
>However, these profits are to be found in the customers wallets. To keep
>the shareholders happy, the customers must be happy. I like to think
>going public means you've sold your soul in little chunks to millions of
>little devils.

Yep. One of the problems with being involved in a public company as an
employee, natch.

>Netcom has a large customer base with thousands of accounts. The
>traditional tools of system management have some flaws when it comes to
>system security (3l33t RDIST scripts anyone?) but I see no easy
>alternative to using them. Static database files take a large effort to
>keep current on systems with POPs spread all over the country. Errors in
>maintaining a labor-intensive database of users, passwords, hosts, etc,
>can cause the account holders (customers) some dissatisfaction. This can
>cause reduced profits as they elect to give their wallets to another
>service provider. This can lead to unhappy shareholders.

The traditional tools have alternatives. You build your own tools and
security systems.

MCSNet has done this, for good reason -- we do not like the flaws in the
traditional methods. Therefore, we did our own tools, our own security
system, and our own accounting system.

Of course, you must have source to major parts of the operating system, or
rip out major chunks of the supplied software that comes with some machines,
to make this work. In some cases it can't be easily done at all, and that
may affect your choice of hardware and platform. It is no mistake and no
happenstance that we went the way we did for OS and hardware environment.

BTW, MCSNet is engineered for 60,000 user accounts, even though we have only
a fraction of that online now. The reason for that decision should be
obvious; the idea of changing basic tools at, oh, the 10,000 user level
frightens most people a *lot*. It ain't going to happen *here*.

>If there are pertinent suggestions on improving the systems and profits
>at Netcom, I'm sure the Netcom employees will love to hear about them. If
>they are not, the shareholders may want to hear about these suggestions
>anyway.

The devil you choose in both hardware and software sometimes comes with
baggage. Nothing you can do about that one, so my advice is to choose that
devil carefully. You have to sleep with him, like it or not, and that damn
tail can get REALLY pointy at 3:00 AM!

>>I'm not trying to imply anything bad here. Just in the past, you seemed
>>to indicate you would do what the stockholders wanted, even if the action
>>was unpopular with some customers. Now you seem to be favoring the customers
>>over the stockholders. I'm trying to determine if you really have a hard
>>and fast rule, or if the lines get blurry at some point.
>
>If you cross the shareholders, there is a day of reckoning called the
>Annual Meeting. If you cross the customers, there is a day of judgement
>each quarter when the quarterly results are announced and the
>shareholders realize that you've crossed them as well. This is a fine
>line to balance and many talented executives fail in their balancing
>efforts. The lines are indeed blurry.....

Yep.

>But:
>As a shareholder in a certain recently-gone-public networking and service
>provider company, I feel odd reading about these Troubles in netnews,
>especially in at.2600!! I can't say I have ever seen the like. Is this
>good or bad? Only time and profit margins will tell.

IPOs are damn tricky things. I'm *not* a stockholder, nor do I have any
interest in having either a long or short position here. Having been
involved in a company that went public (VideOcart, if anyone cares) I'm
quite aware of what happens to these firms and how much of it is not under
anyone's control. Basically, from my point of view, the market is just
legalized gambling ;-)

>And now back to the previously scheduled Karl and Bruce discussion of NIS
>and finer points of sysadmining.....

:-)

Karl Denninger

unread,
Dec 28, 1994, 4:12:50 PM12/28/94
to
In article <durrellD...@netcom.com>,
Bryant Durrell <dur...@netcom.com> wrote:
>In article <3dqnvk$a...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>>You bounced the message back to me saying "not our problem", when in fact
>>it was. Fortunately someone else had already replied with the *correct*
>>log info, but that made even more curious -- why did you get a copy if
>>someone else had already taken care of it?
>
>Karl, did you by any chance (yeah, I know the answer) mail it to
>more than one address?
>
>--
>Bryant Durrell http://pft.com/~durrell dur...@netcom.com

I don't believe so, no.

--

Bryant Durrell

unread,
Dec 28, 1994, 10:54:27 AM12/28/94
to
In article <3dqnvk$a...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>You bounced the message back to me saying "not our problem", when in fact
>it was. Fortunately someone else had already replied with the *correct*
>log info, but that made even more curious -- why did you get a copy if
>someone else had already taken care of it?

Karl, did you by any chance (yeah, I know the answer) mail it to
more than one address?

------------------------------------------------------------------------------
"Man is ready to die for an idea, provided that idea
is not quite clear to him." -- Paul Eldridge

Whoever

unread,
Dec 28, 1994, 11:40:35 AM12/28/94
to
gl...@popco.com (Glenn Fleishman) writes:
>:
>: > I love that line of BS they try to feed the world about keeping their
>: > security

:>>problems secret because they're accountable to their stockholders and afraid
:>> of scaring their users.
:
:>That's weird. They're just issuing a prospectus for their IPO now.

bi...@hpcvaac.cv.hp.com (bill nelson) writes:
>
>Well, if they are indeed so unresponsive, maybe they should be cut off by
>their feed sites. I believe those are decwrl and kwandl.kwi.com.
>
>Let them explain THAT to their stockholders.

Thank you for posting this! SEC rules regarding S-1 and S-18 filings
(the normal IPO) require full disclosure of material facts. Failure
to disclose is a criminal offense. And I just got through calling
the SEC to make sure they are aware of the material fact.

Have a Happy New Year, my dear friends at Netcom!!! I do so hope
you've enjoyed the postings on alt.2600 as much as *_I_* have!

David W. Tamkin

unread,
Dec 28, 1994, 11:46:47 AM12/28/94
to
hat...@netcom.com (Dave Hatunen) wrote in <hatunenD...@netcom.com>:

| In article <3dqsp5$b...@kaleka.seanet.com>,
| Glenn Fleishman <gl...@popco.com> wrote:

| >That's weird. They're just issuing a prospectus for their IPO now.

| Not quite. I bought some stock two weeks ago.

| But they were privately held up till then, so they couldn't have used
| their stockholders as an excuse.

You mean they couldn't have gotten away with using their stockholders as
an excuse while they were still private; based on my experiences as a Netcom
customer in the past, I wouldn't put it past them to try to use nonexistent
investors as an excuse if they thought they could get away with it.

Now that they have gone public I'm sure that placing the interests of the
investment community over those of the customer base will be a convenient
crutch whenever they have to rationalize any sort of corner cutting or
cheapness.

I have only two words for Netcom: "your area".

DaveHatunen

unread,
Dec 28, 1994, 12:24:10 PM12/28/94
to
In article <3ds4pn$d...@gagme.wwa.com>,

David W. Tamkin <dat...@gagme.wwa.com> wrote:
>hat...@netcom.com (Dave Hatunen) wrote in <hatunenD...@netcom.com>:
>
>| In article <3dqsp5$b...@kaleka.seanet.com>,
>| Glenn Fleishman <gl...@popco.com> wrote:
>
>| >That's weird. They're just issuing a prospectus for their IPO now.
>
>| Not quite. I bought some stock two weeks ago.
>
>| But they were privately held up till then, so they couldn't have used
>| their stockholders as an excuse.
>
>You mean they couldn't have gotten away with using their stockholders as
>an excuse while they were still private; based on my experiences as a Netcom
>customer in the past, I wouldn't put it past them to try to use nonexistent
>investors as an excuse if they thought they could get away with it.

Nothing like inventing a complaint when your original complaint is
proved invalid, eh?

>Now that they have gone public I'm sure that placing the interests of the
>investment community over those of the customer base will be a convenient
>crutch whenever they have to rationalize any sort of corner cutting or
>cheapness.

One of the nice things about owning some of the stock is that you can
take these things somewhat philosophically. That's one of the reasons I
bought Pacific Gas and Electric, too. Raisee the rates? OK by me.

Bruce Sterling Woodcock

unread,
Dec 28, 1994, 3:12:12 PM12/28/94
to
In article <3ds4e3$p...@illuminati.io.com> afr...@jpl.com.edu (Whoever) writes:

>gl...@popco.com (Glenn Fleishman) writes:
>>Well, if they are indeed so unresponsive, maybe they should be cut off by
>>their feed sites. I believe those are decwrl and kwandl.kwi.com.
>>
>>Let them explain THAT to their stockholders.
>
>Thank you for posting this! SEC rules regarding S-1 and S-18 filings
>(the normal IPO) require full disclosure of material facts. Failure
>to disclose is a criminal offense. And I just got through calling
>the SEC to make sure they are aware of the material fact.
>
>Have a Happy New Year, my dear friends at Netcom!!! I do so hope
>you've enjoyed the postings on alt.2600 as much as *_I_* have!

Oh boy. I'm worried.

David W. Tamkin

unread,
Dec 28, 1994, 11:31:27 PM12/28/94
to
hat...@netcom.com (DaveHatunen) wrote in <hatunenD...@netcom.com>:

| In article <3ds4pn$d...@gagme.wwa.com>,
| David W. Tamkin <dat...@gagme.wwa.com> wrote:

| >hat...@netcom.com (Dave Hatunen) wrote in <hatunenD...@netcom.com>:

| >| But they were privately held up till then, so they couldn't have used


| >| their stockholders as an excuse.

| >You mean they couldn't have gotten away with using their stockholders as
| >an excuse while they were still private; based on my experiences as a Netcom
| >customer in the past, I wouldn't put it past them to try to use nonexistent
| >investors as an excuse if they thought they could get away with it.

| Nothing like inventing a complaint when your original complaint is
| proved invalid, eh?

My original complaint? My post two above this one in the tree was my first
in this thread, Mr. Hatunen, so how could I have had a chance to replace a
previous complaint?

In truth, in my unpleasant time as a Netcom customer, at no time did Netcom
management use pleasing the stockholders as a rationalization for their ac-
tions. In fact, they rarely gave reasons for anything but just simply did
something or did nothing. If they posted to netcom.announce, the post de-
clared their decision without including the reasons in the cases I remember.
In all fairness, it usually wasn't necessary to include the reasons.

My point is this: Netcom in many ways and on many occasions showed utter
contempt for customers. If pressed for a reason for something, I'm sure
they would not have hesitated to tell a ridiculous lie when they were
privately held and wouldn't hesitate either now that they're public.

I do, in fact, remember one case where exactly that happened. Customers
questioned an absurd policy, and Netcom replied with a weak excuse at first;
when some customers suggested a compromise that would give both sides what
they wanted, Netcom proffered an utter lie as its reason for still saying no.

Karl Denninger

unread,
Dec 28, 1994, 4:15:07 PM12/28/94
to
In article <3dric9$7...@rainbow.rmii.com>, Will Spencer <wi...@rmii.com> wrote:
>Karl:
>
>Have you tested this yourself? Compile and run this code snippet
>to test this for certain. Don't confuse pwdauth() with getpwent().
>(Apologies for talking to you like you are an idiot)
>
>
>#define MAXLOGIN 8
>#define MAXPASS 8
>
>main()
>{
>
>char login[MAXLOGIN];
>char password[MAXPASS];
>
>printf("login: ");
>scanf("%s", login);
>
>printf("password: ");
>scanf("%s", password);
>
>
>if (pwdauth(login,password) == 0 )
> printf("Correct!\n");
> else printf("Wrong!\n");
>}

Cluster:/var/tmp> cc -s -o x x.c
x.o: Undefined symbol _pwdauth referenced from text segment

Does that answer your question? :-)

DaveHatunen

unread,
Dec 28, 1994, 11:57:37 PM12/28/94
to
In article <3dte2v$d...@gagme.wwa.com>,

David W. Tamkin <dat...@gagme.wwa.com> wrote:
>hat...@netcom.com (DaveHatunen) wrote in <hatunenD...@netcom.com>:

[...]

>In truth, in my unpleasant time as a Netcom customer, at no time did Netcom
>management use pleasing the stockholders as a rationalization for their ac-
>tions. In fact, they rarely gave reasons for anything but just simply did
>something or did nothing. If they posted to netcom.announce, the post de-
>clared their decision without including the reasons in the cases I remember.
>In all fairness, it usually wasn't necessary to include the reasons.
>
>My point is this: Netcom in many ways and on many occasions showed utter
>contempt for customers. If pressed for a reason for something, I'm sure
>they would not have hesitated to tell a ridiculous lie when they were
>privately held and wouldn't hesitate either now that they're public.
>
>I do, in fact, remember one case where exactly that happened. Customers
>questioned an absurd policy, and Netcom replied with a weak excuse at first;
>when some customers suggested a compromise that would give both sides what
>they wanted, Netcom proffered an utter lie as its reason for still saying no.

Fascinating. I've had to contact them several times over the last
couple of years, both by email and telephone, and I've been satisfied
with the service I've gotten.

I wonder if it has anything to do with our own personalities when
contacting them.

Considering that your statements are actionable, I think they show some
forbearance (unlike some big commercial services, which shall remain
nameless for the same reasons).

You are apparently a venomous person.

John Sanger

unread,
Dec 28, 1994, 5:49:48 PM12/28/94
to
In article <durrellD...@netcom.com> dur...@netcom.com (Bryant Durrell) writes:
>In article <3dqnvk$a...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>>You bounced the message back to me saying "not our problem", when in fact
>>it was. Fortunately someone else had already replied with the *correct*
>>log info, but that made even more curious -- why did you get a copy if
>>someone else had already taken care of it?
>
>Karl, did you by any chance (yeah, I know the answer) mail it to
>more than one address?
>
>--
Now Bryant, you know that KD has never ever made a mistake.

;^)

--
Ciao!
John S. 8^{)> "Netcom Toadie no. 2"
tedd...@netcom.com
__


John Sanger

unread,
Dec 28, 1994, 6:04:47 PM12/28/94
to
In article <hatunenD...@netcom.com> hat...@netcom.com (DaveHatunen) writes:
>In article <3ds4pn$d...@gagme.wwa.com>,
>David W. Tamkin <dat...@gagme.wwa.com> wrote:
>>hat...@netcom.com (Dave Hatunen) wrote in <hatunenD...@netcom.com>:
>>
>>| In article <3dqsp5$b...@kaleka.seanet.com>,
>>| Glenn Fleishman <gl...@popco.com> wrote:
>>
>>| >That's weird. They're just issuing a prospectus for their IPO now.
>>
>>| Not quite. I bought some stock two weeks ago.
>>
>>| But they were privately held up till then, so they couldn't have used
>>| their stockholders as an excuse.
>>
>>You mean they couldn't have gotten away with using their stockholders as
>>an excuse while they were still private; based on my experiences as a Netcom
>>customer in the past, I wouldn't put it past them to try to use nonexistent
>>investors as an excuse if they thought they could get away with it.
>
>Nothing like inventing a complaint when your original complaint is
>proved invalid, eh?
>
Excuse me! But Netcom was a corporation for years before the public
offering of stock. To be a corporation they had to have at least 3 stock
holders, same same as investors, nes paux!


--
Ciao!
John S. 8^{)>

tedd...@netcom.com
__


DaveHatunen

unread,
Dec 28, 1994, 6:23:17 PM12/28/94
to
In article <teddyburD...@netcom.com>,
John Sanger <tedd...@netcom.com> wrote:

[...]

>Excuse me! But Netcom was a corporation for years before the public
>offering of stock. To be a corporation they had to have at least 3 stock
>holders, same same as investors, nes paux!

So you're saying it was a closely held corporation? I was under the
impression it was a proprietorship or partnership.

In any case, that doesn't matter to the original context of this
thread.

Peter Childress

unread,
Dec 29, 1994, 1:49:36 AM12/29/94
to
Bryant Durrell (dur...@netcom.com) wrote:

<some of Bryant's post bobbited for brevity>

: If you have serious concerns, I strongly suggest you take it to private
: email. Bruce, allow me to extend the same suggestion to you; I mean
: this in a friendly way in both cases. Cause frankly, I don't think
: public mud-battles do anyone involved any good.

: --
: Bryant Durrell dur...@netcom.com

Beg to disagree, Bryant, with all due respect to all parties. I, for one,
am getting a lot of insight from this thread, and would like to see it
continue publicly. Fewer flames and more substance would be nice, of
course, but even so, I'm finding things of value. I'd also like to see
the challenge and counter challenge accepted. If Karl can hack netcom,
then netcom can improve its security, to its own benefit (and ours, if it
has indeed been compromised). If Karl cannot crack netcom, then we'll all
feel better about it. Either way, the net community wins, and netcom
doesn't lose. Afterwards, we can take both Karl and Bruce out to the
parking lot and let them go at each other with baseball bats. But I'd
like to see them use their considerable skills and expertise to lay the
questions about netcom security to rest first. MHO.

-Pete

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: Posting here is like talking about bullshit with cattlemen. ::
:: What I want to know is, "Where's the beef?" ::
::::::::::::: Pete Childress -- chld...@crl.com ::::::::::::::::

Will Spencer

unread,
Dec 28, 1994, 8:00:05 PM12/28/94
to

Karl:

Pretty much clears it up right there.

I concede, I concede. :-)

Will

Barry Margolin

unread,
Dec 28, 1994, 8:59:56 PM12/28/94
to
In article <3dqqih$g...@Venus.mcs.com> ka...@MCS.COM (Karl Denninger) writes:
>In article <barmarD1...@netcom.com>,
>Barry Margolin <bar...@netcom.com> wrote:
>>as I can tell, netcom's use of shadow passwords takes the encrypted
>>passwords out of the NIS map and moves them into root-only files that are
>>replicated on every netcom user login system.

>Then they are not serving passwords over NIS. That's not what others have
>indicated here. I don't have a Netcom account, so I can't verify this.

Perhaps they were confused or just using imprecise terminology. Netcom
*does* have an NIS passwd map. But since they use shadow passwords, it
doesn't contain any encrypted passwords. And when I tried "ypcat
passwd.adjunct" it said that there was no such map. People often refer to
the passwd map or /etc/passwd as the "password file" even when it doesn't
actually have any passwords in it.

Dave Van Allen

unread,
Dec 28, 1994, 10:33:50 PM12/28/94
to
John Sanger (tedd...@netcom.com) wrote:
:>>
:>Excuse me! But Netcom was a corporation for years before the public

:>offering of stock. To be a corporation they had to have at least 3 stock
:>holders, same same as investors, nes paux!

In no state that I know of, does incorporating an entity require
"3 stockholders" -- the quote implies a quantity of three people.

One person can (and often does) assume the responsibilities of
the President, Secretary and Treasurer; the three required
chaired-positions.

Please correct me if I'm wrong.

Happy holidays!
--

*Dave Van Allen - You Tools/FASTNET - da...@youtools.COM - (610) 954-5910
-=-=-=- FASTNET(tm) PA/NJ/DE Internet 800-967-2233 -=-=-=-

Message has been deleted

Karl Denninger

unread,
Dec 29, 1994, 1:06:41 PM12/29/94
to
In article <hatunenD...@netcom.com>,

DaveHatunen <hat...@netcom.com> wrote:
>In article <3dte2v$d...@gagme.wwa.com>,
>David W. Tamkin <dat...@gagme.wwa.com> wrote:
>>hat...@netcom.com (DaveHatunen) wrote in <hatunenD...@netcom.com>:
>
>>In truth, in my unpleasant time as a Netcom customer, at no time did Netcom
>>management use pleasing the stockholders as a rationalization for their ac-
>>tions. In fact, they rarely gave reasons for anything but just simply did
>>something or did nothing. If they posted to netcom.announce, the post de-
>>clared their decision without including the reasons in the cases I remember.
>>In all fairness, it usually wasn't necessary to include the reasons.
>>
>>My point is this: Netcom in many ways and on many occasions showed utter
>>contempt for customers. If pressed for a reason for something, I'm sure
>>they would not have hesitated to tell a ridiculous lie when they were
>>privately held and wouldn't hesitate either now that they're public.
>>
>>I do, in fact, remember one case where exactly that happened. Customers
>>questioned an absurd policy, and Netcom replied with a weak excuse at first;
>>when some customers suggested a compromise that would give both sides what
>>they wanted, Netcom proffered an utter lie as its reason for still saying no.
>
>Fascinating. I've had to contact them several times over the last
>couple of years, both by email and telephone, and I've been satisfied
>with the service I've gotten.
>
>I wonder if it has anything to do with our own personalities when
>contacting them.
>
>Considering that your statements are actionable, I think they show some
>forbearance (unlike some big commercial services, which shall remain
>nameless for the same reasons).
>
>You are apparently a venomous person.
>
>
> ********** DAVE HATUNEN (hat...@netcom.com) **********
> * Daly City California: *
> * where San Francisco meets The Peninsula *
> * and the San Andreas Fault meets the Sea *
> *******************************************************

I doubt that David's statements are actionable; they reflect his opinion and
experience, which he is quite entitled to speak about. That's one of the
problems with pissing people off.

As for attitude, I'll say that David has been a subscriber on MCSNet for a
long, long time, far before MCS was primarily an Internet provider company
(we used to be primarily a hardware and consulting house that did Internet
on the side.) I believe the record goes back to sometime in 1990, which on
the net is an eternity.

I have found David to have interesting requirements at times, but NEVER
could I say that he has had a bad attitude or personality.

Karl Denninger

unread,
Dec 29, 1994, 3:48:17 PM12/29/94
to
In article <lewizD1...@netcom.com>,
Lewis De Payne <le...@netcom.com> wrote:
>Karl Denninger stopped to think, then wrote:
>:
>: I doubt that David's statements are actionable; they reflect his opinion

>: and experience, which he is quite entitled to speak about. That's one of
>: the problems with pissing people off.
>
>This is very true - David's statements were quite tame and reasonable,
>in fact. As a fromer customer, he's certainly qualified to have an
>opinion - and that opinion is likely to be based on fact.
>
>: As for attitude, I'll say that David has been a subscriber on MCSNet for

>: a long, long time, far before MCS was primarily an Internet provider
>: company (we used to be primarily a hardware and consulting house that
>: did Internet on the side.) I believe the record goes back to sometime
>: in 1990, which on the net is an eternity.
>
>That may be true - but can you tame down the posts of j...@mcs.com?

Can and will are two different things, Lewis.

>: I have found David to have interesting requirements at times, but


>: NEVER could I say that he has had a bad attitude or personality.
>

>He (and his comment) seemed reasonable to me. However, j...@mcs.com
>just will not stop, even when "we" take a break in hopes of him losing
>interest. Is there anything you can do about that?

MCSNet is not in the business of exercising prior restraint, unless you
can *demonstrate* illegal activity, a violation of our user agreement, or
produce a court order. In the first two cases we can and have terminated
user accounts, and in the third we comply with the law as required.

Expressing personal opinion isn't illegal (yet) (or actionable), even if one
or more people believe it is irrational or unfounded.

Bryant Durrell

unread,
Dec 29, 1994, 3:20:56 PM12/29/94
to
In article <3dv0gg$1...@hollywood.cinenet.net>,
Kevin A. Smith <ksm...@hollywood.cinenet.net> wrote:
>Didn't read last month's wired, eh? Didn't have the same guy hack your
>system, eh? We all know that Netcom was compromised.

Sorry. I don't get my information on the current state of my systems
from flashy glossy periodicals.

--
Bryant Durrell http://pft.com/~durrell dur...@netcom.com
------------------------------------------------------------------------------

HABIT, n. A shackle for the free. -- Ambrose Bierce

Kevin A. Smith

unread,
Dec 29, 1994, 1:52:00 PM12/29/94
to
Bryant Durrell (dur...@netcom.com) wrote:
: In article <3dpl1c$f...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
: >I have been told in email by a number of people the last few days that
: >Netcom's root is *still* compromised. Hell, there's a goddamn mailing list
: >out there on your security problems! Now I can't *prove* that you're
: >compromised without breaking in myself and testing the theorem, but I do
: >know where to look to see if the traces are still around.

: <boggle>

: "I have in my hand a paper listing the names of 47 Americans..."

: I've been told that you fuck sheep for a living, Karl. For that
: matter, I could create a mailing list concerning your sheep-fucking.
: In fact, I just did. But I don't *believe* it. At this point, you're
: getting into highly slimy behavior; if you have evidence that Netcom's
: been cracked, you know where to go to present it. If you don't, you're

Didn't read last month's wired, eh? Didn't have the same guy hack your
system, eh? We all know that Netcom was compromised.

Some of us just aren't allowed to admit it.

: making unsupported innuendos concerning a competitor.

: If you have serious concerns, I strongly suggest you take it to private
: email. Bruce, allow me to extend the same suggestion to you; I mean
: this in a friendly way in both cases. Cause frankly, I don't think
: public mud-battles do anyone involved any good.

Kevin Smith
System Administrator
Boss Film Digital Studios
ksm...@hollywood.cinenet.net

DaveHatunen

unread,
Dec 29, 1994, 4:07:01 PM12/29/94
to
In article <lewizD1...@netcom.com>,
Lewis De Payne <le...@netcom.com> wrote:
>Karl Denninger stopped to think, then wrote:
>:
>: I doubt that David's statements are actionable; they reflect his opinion

>: and experience, which he is quite entitled to speak about. That's one of
>: the problems with pissing people off.
>
>This is very true - David's statements were quite tame and reasonable,
>in fact. As a fromer customer, he's certainly qualified to have an
>opinion - and that opinion is likely to be based on fact.

Publishing an accusation that a person or business is lying is
actionable. The fact that most businesses, most of the time, don't take
action does not alter the basic fact.

[...]


--

Karl Denninger

unread,
Dec 29, 1994, 4:28:10 PM12/29/94
to
In article <hatunenD...@netcom.com>,
DaveHatunen <hat...@netcom.com> wrote:
>In article <lewizD1...@netcom.com>,
>Lewis De Payne <le...@netcom.com> wrote:
>>Karl Denninger stopped to think, then wrote:
>>:
>>: I doubt that David's statements are actionable; they reflect his opinion
>>: and experience, which he is quite entitled to speak about. That's one of
>>: the problems with pissing people off.
>>
>>This is very true - David's statements were quite tame and reasonable,
>>in fact. As a fromer customer, he's certainly qualified to have an
>>opinion - and that opinion is likely to be based on fact.
>
>Publishing an accusation that a person or business is lying is
>actionable. The fact that most businesses, most of the time, don't take
>action does not alter the basic fact.

That's not what I read.

What David said is that he believed they would lie. He also printed an
example from his experience where, in his opinion, they did.

That's not actionable. It is very clearly stated as his opinion.

Lewis De Payne

unread,
Dec 29, 1994, 2:11:15 PM12/29/94
to
Karl Denninger stopped to think, then wrote:
:
: I doubt that David's statements are actionable; they reflect his opinion

: and experience, which he is quite entitled to speak about. That's one of
: the problems with pissing people off.

This is very true - David's statements were quite tame and reasonable,


in fact. As a fromer customer, he's certainly qualified to have an
opinion - and that opinion is likely to be based on fact.

: As for attitude, I'll say that David has been a subscriber on MCSNet for


: a long, long time, far before MCS was primarily an Internet provider
: company (we used to be primarily a hardware and consulting house that
: did Internet on the side.) I believe the record goes back to sometime
: in 1990, which on the net is an eternity.

That may be true - but can you tame down the posts of j...@mcs.com?

: I have found David to have interesting requirements at times, but


: NEVER could I say that he has had a bad attitude or personality.

He (and his comment) seemed reasonable to me. However, j...@mcs.com


just will not stop, even when "we" take a break in hopes of him losing
interest. Is there anything you can do about that?

--
"Mum's the word" - Justin Petersen || cc: Kennie G. McGuire, SA, FBI, LA CA
"Did you use SAS?" - Terry Atchley || Kathleen "Hottub" Carson, SA, FBI
"I am not a crook" - Richard Nixon || Behave - or I'll tell Janet Reno!

Brett Frankenberger

unread,
Dec 29, 1994, 4:41:08 PM12/29/94
to
In article <durrellD...@netcom.com>,
Bryant Durrell <dur...@netcom.com> wrote:
>In article <3dv0gg$1...@hollywood.cinenet.net>,
>Kevin A. Smith <ksm...@hollywood.cinenet.net> wrote:
>>Didn't read last month's wired, eh? Didn't have the same guy hack your
>>system, eh? We all know that Netcom was compromised.
>
>Sorry. I don't get my information on the current state of my systems
>from flashy glossy periodicals.

Yes, but you work there. All we get (as customers) are vague
statements that imply the privilege was not compromised (without saying
that it wasn't compromised) -- since most of those with IQs in excess
of 100 know that privilege had ot be compromised to accomplish what was
done, we essentially have no information.

If the stuff in, as you call it, flashy glossy periodicals, then deny
it, or at least provide the correct version of what happened.
--

- Brett (bre...@netcom.com)

------------------------------------------------------------------------------
... Coming soon to a | Brett Frankenberger
.sig near you ... a Humorous Quote ... | bre...@netcom.com

Steve Sullivan

unread,
Dec 29, 1994, 4:57:24 PM12/29/94
to
<snip>

>Publishing an accusation that a person or business is lying is
>actionable. The fact that most businesses, most of the time, don't take
>action does not alter the basic fact.

You are full of shit. If a company lies there is nothing protecting
people from publishing this fact. You talk about basic facts but are in
need of some facts!!

DaveHatunen

unread,
Dec 29, 1994, 7:27:46 PM12/29/94
to
In article <3dv9la$q...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>In article <hatunenD...@netcom.com>,
>DaveHatunen <hat...@netcom.com> wrote:
>>In article <lewizD1...@netcom.com>,
>>Lewis De Payne <le...@netcom.com> wrote:
>>>Karl Denninger stopped to think, then wrote:
>>>:
>>>: I doubt that David's statements are actionable; they reflect his opinion
>>>: and experience, which he is quite entitled to speak about. That's one of
>>>: the problems with pissing people off.
>>>
>>>This is very true - David's statements were quite tame and reasonable,
>>>in fact. As a fromer customer, he's certainly qualified to have an
>>>opinion - and that opinion is likely to be based on fact.
>>
>>Publishing an accusation that a person or business is lying is
>>actionable. The fact that most businesses, most of the time, don't take
>>action does not alter the basic fact.
>
>That's not what I read.
>
>What David said is that he believed they would lie. He also printed an
>example from his experience where, in his opinion, they did.
>
>That's not actionable. It is very clearly stated as his opinion.

From a previous post by Mr Tamkin:

-I do, in fact, remember one case where exactly that happened.
-Customers questioned an absurd policy, and Netcom replied with a weak
-excuse at first; when some customers suggested a compromise that would
-give both sides what they wanted, Netcom proffered an utter lie as its
-reason for still saying no.

james small

unread,
Dec 29, 1994, 6:08:25 PM12/29/94
to
In article <durrellD...@netcom.com> dur...@netcom.com (Bryant Durrell) writes:
>In article <3dv0gg$1...@hollywood.cinenet.net>,
>Kevin A. Smith <ksm...@hollywood.cinenet.net> wrote:
>>Didn't read last month's wired, eh? Didn't have the same guy hack your
>>system, eh? We all know that Netcom was compromised.
>
>Sorry. I don't get my information on the current state of my systems
>from flashy glossy periodicals.


Didn't you used to have an account on ranma.netcom.com?

showmount -e ranma.netcom.com

<giggle>


Netcom is secure. Trust us we know better, bahahahahah


Mike Golobay

unread,
Dec 29, 1994, 8:38:19 PM12/29/94
to
In article <sterling...@netcom.com>,

Bruce Sterling Woodcock <ster...@netcom.com> wrote:
>In article <3ds4e3$p...@illuminati.io.com> afr...@jpl.com.edu (Whoever) writes:
>>gl...@popco.com (Glenn Fleishman) writes:
>>>Well, if they are indeed so unresponsive, maybe they should be cut off by
>>>their feed sites. I believe those are decwrl and kwandl.kwi.com.
>>>
>>>Let them explain THAT to their stockholders.
>>
>>Thank you for posting this! SEC rules regarding S-1 and S-18 filings
>>(the normal IPO) require full disclosure of material facts. Failure
>>to disclose is a criminal offense. And I just got through calling
>>the SEC to make sure they are aware of the material fact.
>>
>>Have a Happy New Year, my dear friends at Netcom!!! I do so hope
>>you've enjoyed the postings on alt.2600 as much as *_I_* have!
>
>Oh boy. I'm worried.
>
Bruce, you stuffed shirt tyrant, if you'd keep your ass busy untangling
the messes you've made for Netcom rather than posting snide remarks here
you might be able to help Netcom get its reputation back.

Now I know what you were doing for the week *I* was waiting to hear why
my account suddenly ceased to function.


--
==============================================================================
Mike Golobay ('its a Bear thing')
da...@metronet.com B4 c+d g++ k- s- mp
------------------------------------------------------------------------------
Worst Internet Provider Of The Year -----> NETCOM <-----
Got a horror story about this company? Let me know... I'm collecting them !
==============================================================================

Bruce Sterling Woodcock

unread,
Dec 29, 1994, 8:14:24 PM12/29/94
to
In article <D1LHM...@seas.ucla.edu> jsm...@gecko.saic.com (james small) writes:
>Didn't you used to have an account on ranma.netcom.com?
>
>showmount -e ranma.netcom.com
>
><giggle>
>
>
>Netcom is secure. Trust us we know better, bahahahahah

Hmmm. It just hangs for me. I think you must be hallucinating.

Kevin Martinez

unread,
Dec 29, 1994, 8:58:38 PM12/29/94
to
jsm...@gecko.saic.com (james small) writes:

>Didn't you used to have an account on ranma.netcom.com?

>showmount -e ranma.netcom.com
><giggle>
>Netcom is secure. Trust us we know better, bahahahahah

I don't get it...

I did this:
bash# rpcinfo -p ranma.netcom.com
rpcinfo: can't contact portmapper: RPC: Remote system error - Connection
timed out
bash# finger @ranma.netcom.com
[ranma.netcom.com]
finger: connect: No route to host

and noticed this in my console:

Dec 29 17:18:51 ICMP_Dest_Unreachable[Host] < 163.179.207.2
[gwx.netcom.net] > 199.35.110.5 [ranma.netcom.com] sp=22533 dp=20224
[finger] seq=0xe377bb23 sz=36(+20)
someone's trying to identd you!!!

Doesn't look like there's any NFS activity and whoever is at
ranma.netcom.com seems to be on the ball.
--
------------------------------------------------------------------------
Kevin Martinez Warning: Intel Inside
l...@rahul.net I owe all my success to Roly Poly Fish Heads!
------------------------------------------------------------------------

james small

unread,
Dec 29, 1994, 9:49:12 PM12/29/94
to
In article <sterlingD...@netcom.com> ster...@netcom.com (Bruce Sterling Woodcock) writes:
>
>In article <D1LHM...@seas.ucla.edu> jsm...@gecko.saic.com (james small) writes:
>>Didn't you used to have an account on ranma.netcom.com?
>>
>>showmount -e ranma.netcom.com
>>
>><giggle>
>>
>>
>>Netcom is secure. Trust us we know better, bahahahahah
>
>Hmmm. It just hangs for me. I think you must be hallucinating.
>

Going to try to deny that it worked about 6 months ago? If so, then you're
a bigger fucking liar than I immagined

ranma.netcom.com:/usr/support/customers-suck.au

Karl Denninger

unread,
Dec 30, 1994, 3:19:28 AM12/30/94
to
In article <hatunenD...@netcom.com>,
DaveHatunen <hat...@netcom.com> wrote:
>In article <3e00d2$4...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>
>[...]
>
>>Its not actionable if it is the truth. I don't know the specific incident
>>in question, but I bet David does.
>
>It's actionable. Truth is a defense to the action.

If you said you think I am an asshole that is actionable. But I can't
get a plugged nickel out of it.

You can sue anyone for anything at any time, therefore, walking down the
street is actionable by some definitions. Its also silly to think of
things in this fashion.

If you sue someone for libel and you *know* the allegation you're suing
over is true, that can be big trouble. Courts can impose sanctions for
frivolous or malicious filings, and occasionally do so to spite someone
trying this kind of game.

Truth is as close to an absolute defense to a libel action as it gets; you
cannot defame someone (and a corporation is a virtual someone) if your
statements are factual.

Lewis De Payne

unread,
Dec 30, 1994, 3:51:33 AM12/30/94
to
DaveHatunen stopped to think, then wrote:

: Lewis De Payne <le...@netcom.com> wrote:
: >Karl Denninger stopped to think, then wrote:
: >:
: >: I doubt that David's statements are actionable; they reflect his opinion
: >: and experience, which he is quite entitled to speak about. That's one of
: >: the problems with pissing people off.
: >
: >This is very true - David's statements were quite tame and reasonable,
: >in fact. As a fromer customer, he's certainly qualified to have an
: >opinion - and that opinion is likely to be based on fact.
:
: Publishing an accusation that a person or business is lying is
: actionable. The fact that most businesses, most of the time, don't
: take action does not alter the basic fact.

Anything is "actionable" David... why don't you communicate something
of value instead of such sweepingly broad generalities. Perhaps if
you concentrated on the practical aspects of the subject at hand, you
might be able to speak intelligently. I was married to an attorney
for eight years and was her office partner - don't feed me your crap.

jma...@netcom.com

unread,
Dec 29, 1994, 10:37:41 PM12/29/94
to
In article <brettfD1...@netcom.com>,

Brett Frankenberger <bre...@netcom.com> wrote:
>In article <durrellD...@netcom.com>,
>Bryant Durrell <dur...@netcom.com> wrote:
>>In article <3dv0gg$1...@hollywood.cinenet.net>,
>>Kevin A. Smith <ksm...@hollywood.cinenet.net> wrote:
>>>Didn't read last month's wired, eh? Didn't have the same guy hack your
>>>system, eh? We all know that Netcom was compromised.
>>
>>Sorry. I don't get my information on the current state of my systems
>>from flashy glossy periodicals.
>
>Yes, but you work there. All we get (as customers) are vague
>statements that imply the privilege was not compromised (without saying
>that it wasn't compromised) -- since most of those with IQs in excess
>of 100 know that privilege had ot be compromised to accomplish what was
>done, we essentially have no information.
>


Sometimes the lack of information is useful information itself. I note
that the CERT Advisory CA-94:15.NFS.Vulnerabilities (dated 12/19/94 by
CERT) is not in /usr/spool/news/comp/security/announce on netcom.

The impact mentioned in this advisory is consistent with the degree of
privilege needed for some of the recent oddities that a few people
have reported.

It is kind of interesting to try to fit the various pieces of information
together to understand what happened earlier this month. This whole episode
(or episodes) makes me appreciate the firewall my boxes live behind at work.

jmario
--

Karl Denninger

unread,
Dec 29, 1994, 10:56:18 PM12/29/94
to
In article <hatunenD...@netcom.com>,
DaveHatunen <hat...@netcom.com> wrote:
>In article <3dv9la$q...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>>In article <hatunenD...@netcom.com>,
>>DaveHatunen <hat...@netcom.com> wrote:
>>>
>>>Publishing an accusation that a person or business is lying is
>>>actionable. The fact that most businesses, most of the time, don't take
>>>action does not alter the basic fact.
>>
>>That's not what I read.
>>
>>What David said is that he believed they would lie. He also printed an
>>example from his experience where, in his opinion, they did.
>>
>>That's not actionable. It is very clearly stated as his opinion.
>
>From a previous post by Mr Tamkin:
>
>-I do, in fact, remember one case where exactly that happened.
>-Customers questioned an absurd policy, and Netcom replied with a weak
>-excuse at first; when some customers suggested a compromise that would
>-give both sides what they wanted, Netcom proffered an utter lie as its
>-reason for still saying no.

Its not actionable if it is the truth. I don't know the specific incident


in question, but I bet David does.

--

George Herbert

unread,
Dec 30, 1994, 1:45:15 AM12/30/94
to
In article <durrellD...@netcom.com>,

dur...@netcom.com (Bryant Durrell) writes:
>In article <3dv0gg$1...@hollywood.cinenet.net>,
>Kevin A. Smith <ksm...@hollywood.cinenet.net> wrote:
>>Didn't read last month's wired, eh? Didn't have the same guy hack your
>>system, eh? We all know that Netcom was compromised.
>
>Sorry. I don't get my information on the current state of my systems
>from flashy glossy periodicals.

You should at least read 'em. Every now and then some actual information
slips by and gets printed.

Hacker vs Admins is an ongoing battle at any site. Any Admin who says
that their site for sure is secure right now either is not connected
to the net or is grossly overconfident. I've been an admin at both
commercial (provider) and educational sites, and corresponded with
a number of my coworkers around the net, and all the competent ones
know that you get breakins and sometimes you get root breakins.
It just happens. If you're very concerned about that, you have
good people looking for and fixing holes and dealing with incidents,
and you go out and do custom things to make standard attacks fail,
and so on and so on. While I'm sure there are some bozos at Netcom,
they also have competent staff. I don't think they're any worse
at handling security issues than industry average.

I've been in a position of having to not say anything about an
ongoing attack, because a solution wasn't quite ready yet (but was
very much in progress). Sometimes you just can't tell the truth
in public, or say anything at all, without making a problem worse.

Do I think Netcom should run NIS? No, I've watched people snarf the
whole contents of YP from C2 NIS systems before. Heck, NFS, which
_everyone_ uses, has some similar holes. But there is no perfect solution.
Karl's rewriting core elements of the OS and system libraries might
cut it, but it is sorta extreme. Lots of people think Kerberos is
a better solution, but it has some flaws too. No matter what they
do, they have to balance security and other operational concerns.
The site isn't perfectly secure as long as it's networked. Since an
internet providers job is to be networked, you accept a certain amount
of security problems and live with the consequences. You have to keep
the system running for the users, not just secure.

| george william herbert | UNIX/Internet Consultant Usenet Old-Fogie |
| KD6WUQ gher...@crl.com | Part-time Aerospace Engineer & Moderator of |
===== ftp://ftp.crl.com/users/ro/gwh/home.html ===== sci.space.{tech,science}

DaveHatunen

unread,
Dec 29, 1994, 11:41:58 PM12/29/94
to
In article <3e00d2$4...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:

[...]

>Its not actionable if it is the truth. I don't know the specific incident
>in question, but I bet David does.

It's actionable. Truth is a defense to the action.


Michael Stone

unread,
Dec 30, 1994, 12:16:29 AM12/30/94
to
james small (jsm...@gecko.saic.com) wrote:

: In article <durrellD...@netcom.com> dur...@netcom.com (Bryant Durrell) writes:
: >In article <3dv0gg$1...@hollywood.cinenet.net>,
: >Kevin A. Smith <ksm...@hollywood.cinenet.net> wrote:
: >>Didn't read last month's wired, eh? Didn't have the same guy hack your
: >>system, eh? We all know that Netcom was compromised.
: >
: >Sorry. I don't get my information on the current state of my systems
: >from flashy glossy periodicals.

Personally, I have stopped reading periodicals with 3 point brown-on-black
typefaces.

DaveHatunen

unread,
Dec 30, 1994, 10:27:21 AM12/30/94
to
In article <3e0fqg$4...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
>In article <hatunenD...@netcom.com>,

[...]

>If you said you think I am an asshole that is actionable. But I can't
>get a plugged nickel out of it.

Not completely true. If you are trying to get a big public relations
contract with some firm, and I go to that firm and say you shouldn't
get the contract because you act like an asshole, and that's not good
for someone in PR, you could possible sue and win.

>You can sue anyone for anything at any time, therefore, walking down the
>street is actionable by some definitions. Its also silly to think of
>things in this fashion.

"Actionable" is understood to mean that filing such a suit would not be
considered frivolous by the courts, and that a motion for dismissal
would probably fail.

>If you sue someone for libel and you *know* the allegation you're suing
>over is true, that can be big trouble. Courts can impose sanctions for
>frivolous or malicious filings, and occasionally do so to spite someone
>trying this kind of game.

Quite true. But what is "true" from a legal standpoint is not alwasy so
clear. Where the defamatory utterance can be show to have caused, or
have the potential to cause, damages it would be rare for a court to
impose sanctions. But the recent case involving Uri Geller's suit
against Randi is certainly an example of the plaintiff getting the
shorts for filing a suit, sicne Geller was orered to pay defendants'
costs.

>Truth is as close to an absolute defense to a libel action as it gets; you
>cannot defame someone (and a corporation is a virtual someone) if your
>statements are factual.

The problem her is that defamation is one of those rare situations
where the legal burden of proof pretty much passes to the defendant.
The defendant must prove the truth of his/her defamatory statement. If
I call a person a bastard, I can use the existence of a marriage
certificate for his mother and father dated a year after his birth as
evidence of that truth. But proving that a company deliberately lied to
you during some interaction is not so easy.

The problem for the plaintiff is that in many cases the value of the
judgement to be obtained can far exceed the legal costs. In another
case of Geller v Randi -- in Japan where the defense against defamation
is much harder to mount, since truth is not necessarily a defense --
Geller managed to get a judgement amounting to a token few yen, like
10 yen or something. (Geller likes to trumpet this as a great victory,
even though Randi didn't even show up to defend himself.)

DaveHatunen

unread,
Dec 30, 1994, 10:32:59 AM12/30/94
to
In article <lewizD1...@netcom.com>,

Lewis De Payne <le...@netcom.com> wrote:

>Anything is "actionable" David... why don't you communicate something
>of value instead of such sweepingly broad generalities. Perhaps if
>you concentrated on the practical aspects of the subject at hand, you
>might be able to speak intelligently. I was married to an attorney
>for eight years and was her office partner - don't feed me your crap.

And I went to law school. But I guess your qualifications are better
than mine. Marriage is always such an education.

"Actionable" is a vague sort of non-legal term which usually means that
there is something more than a non-frivolous lawsuit involved. That
there is a "cause of action". Publicly claiming that a company lied to
you during your dealings with that company is less than frivolous.

Publicly claiming that the company is run by a bunch of buttheads
wouldn't be actionable.

David W. Tamkin

unread,
Dec 30, 1994, 1:00:14 PM12/30/94
to
hat...@netcom.com (DaveHatunen) wrote in <hatunenD...@netcom.com>:

| From a previous post by Mr Tamkin:

That's _Mr._ Tamkin, Mr. Hatunen; my family left Britain four generations
before me. We're Americans now and not embarrassed to use a punctuation
mark just because its name upset the Victorians.

| -I do, in fact, remember one case where exactly that happened.
| -Customers questioned an absurd policy, and Netcom replied with a weak
| -excuse at first; when some customers suggested a compromise that would
| -give both sides what they wanted, Netcom proffered an utter lie as its
| -reason for still saying no.

Yes, I posted that -- or at least it's close enough that I'll accept your
word that it's a direct cut-and-paste.

What precisely is actionably defamatory there? I called the policy "absurd,"
the first reply "weak," and the grounds for rejecting the compromise (which
would have fully satisfied the reason Netcom gave in that weak excuse) "an
utter lie."

If Mr. Hatunen thinks my calling the policy "absurd" or the first reply
"weak" is actionable, then I would say he is just going way overboard with
finding excuses to sue. So I'll give him the benefit of the doubt -- a
concept with which he appears unfamiliar -- and assume he's lit on the least
silly of the three.

So the "actionable" thing I did here was to say that Netcom told a lie. I
didn't even say what the lie was. Very hard of them to prove that (1) no
Netcom staffer ever lied to me or ever lied to another customer in a way
that I found out or (2) that they suffered at all because some dissatisfied
ex-customer said seven months after canceling that they had lied to him about
something. Note also that I have sought no compensation or damages from them
for the statement they made that I deem a lie.

Mr. Hatunen has frequently displayed his unwavering loyalty to Netcom; his
rise to their aid and his assumption that they needed his help are both
consistent with his past postings.

Yes, I feel (opinion) Netcom might lie again because (claim of fact) they did
lie to me at least once. The business world is full of dishonesty, and I
nowise called Netcom worse than the typical business operation in spraying
small amounts of fertilizer. If saying that they're no angels constitutes
grounds for suit in Mr. Hatunen's view, he's reached a new apogee in his
defenses of Netcom.

Even if you do not resort to deceit, turning down a deal where you get what
you said you want for no monetary cost and only the tiniest amount of extra
effort on your part is strange: it means that either (1) there's something
else you want that you won't admit or (2) you can't stand the idea that the
other party is also getting what he or she wants or (3) you're unwilling to
lift a finger to do anything for the other party, though they happen to be
the customer base that keeps you in business.

For the record, that incident brought me nearer to cancellation but it was
not what put me over the top.

I thank Mr. Denninger and Mr. de Payne for their support.

DaveHatunen

unread,
Dec 30, 1994, 1:21:26 PM12/30/94
to
In article <3e1hre$3...@gagme.wwa.com>,

David W. Tamkin <dat...@gagme.wwa.com> wrote:
>hat...@netcom.com (DaveHatunen) wrote in <hatunenD...@netcom.com>:
>
>| From a previous post by Mr Tamkin:
>
>That's _Mr._ Tamkin, Mr. Hatunen; my family left Britain four generations
>before me. We're Americans now and not embarrassed to use a punctuation
>mark just because its name upset the Victorians.

Waste of time, ink and/or bandwidth.

>| -I do, in fact, remember one case where exactly that happened.
>| -Customers questioned an absurd policy, and Netcom replied with a weak
>| -excuse at first; when some customers suggested a compromise that would
>| -give both sides what they wanted, Netcom proffered an utter lie as its
>| -reason for still saying no.

[...]

>So the "actionable" thing I did here was to say that Netcom told a lie. I
>didn't even say what the lie was. Very hard of them to prove that (1) no
>Netcom staffer ever lied to me or ever lied to another customer in a way
>that I found out or (2) that they suffered at all because some dissatisfied
>ex-customer said seven months after canceling that they had lied to him about
>something. Note also that I have sought no compensation or damages from them
>for the statement they made that I deem a lie.

They don't have to prove no one lied to you. You claimed they lied to
you. In a defamation suit, the burden woould fall on you to show they
did, indeed, lie. If you find this characteristic of defamation suits
absurd, please don't blame it on me.

>Mr. Hatunen has frequently displayed his unwavering loyalty to Netcom; his
>rise to their aid and his assumption that they needed his help are both
>consistent with his past postings.

I fail to see what my personal opinions about Netcom have to do with
the nature of defamation in general.

>Yes, I feel (opinion) Netcom might lie again because (claim of fact) they did
>lie to me at least once. The business world is full of dishonesty, and I
>nowise called Netcom worse than the typical business operation in spraying
>small amounts of fertilizer. If saying that they're no angels constitutes
>grounds for suit in Mr. Hatunen's view, he's reached a new apogee in his
>defenses of Netcom.

Hey. All I did was say that you had published an actionable statement.
Webster's Ninth New Collegiate Dictionary says

ac-tion-able ... : subject to or affording ground for an action or suit
at law.

My claim is that publicly accusing a person or corporatation of
dishonesty by saying they "proffered an utter lie" is such grounds.

Bryant Durrell

unread,
Dec 30, 1994, 4:07:21 PM12/30/94
to
In article <3e0a9r$o...@crl6.crl.com>, George Herbert <gher...@crl.com> wrote:
>In article <durrellD...@netcom.com>,
>dur...@netcom.com (Bryant Durrell) writes:
>>In article <3dv0gg$1...@hollywood.cinenet.net>,
>>Kevin A. Smith <ksm...@hollywood.cinenet.net> wrote:
>>>Didn't read last month's wired, eh? Didn't have the same guy hack your
>>>system, eh? We all know that Netcom was compromised.
>>
>>Sorry. I don't get my information on the current state of my systems
>>from flashy glossy periodicals.
>
>You should at least read 'em. Every now and then some actual information
>slips by and gets printed.

Oh, I read them. In fact, I suspect Kevin really meant 2600, which
had a nice little blurb on the rahul incident, a quote from an
unnamed Netcom sysadmin, and a report of rumors of credit card
compromise. 2600 is a must read for sysadmins, IMHO. And I
appreciate that Emmanuel says "rumor" when he means rumor. I'm
just being vaguely snide at people who say "we all know" because
of my general cynical nature. Isn't there a Mark Twain quote about
that statement?

[Other comments deleted, but agreed with.]

--
Bryant Durrell http://pft.com/~durrell dur...@netcom.com
------------------------------------------------------------------------------

"Crash programs fail because they are based on the theory that, with nine
women pregnant, you can get a baby a month." -- Wernher von Braun

Mike Scher

unread,
Dec 30, 1994, 4:56:24 PM12/30/94
to
DaveHatunen (hat...@netcom.com) wrote:

: In article <3dv9la$q...@mercury.mcs.com>, Karl Denninger <ka...@MCS.COM> wrote:
: >In article <hatunenD...@netcom.com>,
: >DaveHatunen <hat...@netcom.com> wrote:
: >>In article <lewizD1...@netcom.com>,
: >>Publishing an accusation that a person or business is lying is

: >>actionable. The fact that most businesses, most of the time, don't take
: >>action does not alter the basic fact.
: >
: >That's not what I read.
: >
: >What David said is that he believed they would lie. He also printed an
: >example from his experience where, in his opinion, they did.
: >
: >That's not actionable. It is very clearly stated as his opinion.


So we're dealing with a question of "actionable??" Sorry to tell you
this, Dave, ut in libel, anything is "actionable" if one side is willing to
assert and thinks it can prove that the other has published a falsity
that has harmed its public opinion.

Ergo, any undesirable assertion about a person or company, that makes it
look bad, IF UNTRUE, is actionable. Opinions, of course one is entitled
to (and in essence they're always 'true').

: From a previous post by Mr Tamkin:

: -I do, in fact, remember one case where exactly that happened.
: -Customers questioned an absurd policy, and Netcom replied with a weak
: -excuse at first; when some customers suggested a compromise that would
: -give both sides what they wanted, Netcom proffered an utter lie as its
: -reason for still saying no.

Now, it's telling Netcom did not take action:

1. They didn't consider it harmful enough to be worth their time.
or
2. They did not feel they could prove Mr. Tamkin had libelled them, perhaps
because they did lie.
or
3. Netcom is in fact a forgiving company, willing to let such things pass.

Whatever the case, the statement is, on its face, as "actionable" as
anything undesirable posted about a company or individual, barring
further information.

-Mike
--
Michael Brian Scher | TEZCAT.COM Staff and In-House Counsel
str...@xochi.tezcat.com | Wicker Park's own connectivity provider
http://tezcat.com/~strange/ | "The Good Guys" Info:(312) 850-0181
I'm a legal anthropologist; what's an illegal anthropologist?

David W. Tamkin

unread,
Dec 30, 1994, 5:15:29 PM12/30/94
to
hat...@netcom.com (DaveHatunen) wrote in <hatunenD...@netcom.com>:

| Hey. All I did was say that you had published an actionable statement.

Just a tiny little comment, was it? So why did you bother making it? Why
do you keep repeating it whenever others disagree? Just a throwaway, a toss-
off, an aside? But it seems so important to you. However, when someone calls
for a lawsuit, it isn't such a little thing to the party who would be the
defendant. That's why *I* have responded.

| Waste of time, ink and/or bandwidth.

Ah; your positions are valuable and edifying, but everyone else's are wastes
of time, ink, and bandwidth -- especially ink. Now I understand.

So Netcom has a right to sue me. Do you think they should? Do you think
they should sue others who have said actionably defamatory (by your stan-
dards) things against them, or is there some reason you singled me out? And
since you know everything about law, are you positive it's actionable defama-
tion to say a corporate representative did something that is perfectly legal
but just not very nice? Fibbing to make a dissatisfied customer -- who was
not I, by the way -- shut up is something businesses do all the time. It's
not nice, but it's legal. Is it actionable to call someone tricky or sly?

Bryant Durrell posted that Netcom is *considering* *phasing in* a procedure
that would satisfy the complaints about the policy that Netcom (from behind
the support ID) defended on netcom.general a year ago with what I called a
lie. Why it needs deliberation or a gradual introduction I can't fathom; I
once worked for an on-line service which also did most of its customer sup-
port on line; at first the policy was the same one that Netcom users dis-
liked. Without any outcry from customers -- perhaps a few private complaints
I didn't hear, or maybe he thought of it on his own before any customers ob-
jected -- the president laid down a new rule to do exactly the thing Netcom
refused to do. It didn't take a lot of debating because there were no cons;
it didn't take any phasing in other than the time for staff on shift to hear
it and staff not on shift to arrive and read their email.

William Smithers

unread,
Dec 30, 1994, 7:09:19 PM12/30/94
to
In article <hatunenD...@netcom.com>,
DaveHatunen <hat...@netcom.com> wrote:
>
>There was originally a context for my comment, which seems to have been
>lost in the parsiflage.
>[SNIP]
>
>I said, along with everyone else, that it was highly unlikely that
>Netcom would do a damn thing about it. So why the venom?
>
===========================================================================

No one lost sight of the context -- or the intent -- of your statement.

You intended to frighten and intimidate a person who announced that
NetCom had lied to him.

Instead, you got a slight dose of your own medicine -- which you richly
deserved.

-- Bill Smithers

===========================================================================

DaveHatunen

unread,
Dec 30, 1994, 5:56:56 PM12/30/94
to
In article <3e20q1$d...@gagme.wwa.com>,

David W. Tamkin <dat...@gagme.wwa.com> wrote:
>hat...@netcom.com (DaveHatunen) wrote in <hatunenD...@netcom.com>:
>
>| Hey. All I did was say that you had published an actionable statement.
>
>Just a tiny little comment, was it? So why did you bother making it? Why
>do you keep repeating it whenever others disagree? Just a throwaway, a toss-
>off, an aside? But it seems so important to you. However, when someone calls
>for a lawsuit, it isn't such a little thing to the party who would be the
>defendant. That's why *I* have responded.

There was originally a context for my comment, which seems to have been
lost in the parsiflage.

In view of the fact that I have nothing whatsoever to do with whether
Netcom might follow through on such an action, I am puzzled as to why
you couldn't just ignore me. I am, in the final analysis, a very
unimportant person. Yet you feel compelled to spend paragraphs on _me_,
not the legal point involved.

I said, along with everyone else, that it was highly unlikely that
Netcom would do a damn thing about it. So why the venom?

Your vendetta against Netcom says more about you than it does about
Netcom.

It is loading more messages.
0 new messages