Non-profit, member-based IT support for research & educational institutions


TechTalk Transcript

Judith Boettcher
Judith Boettcher
[JB]
Ken Horning
Ken Horning
[KH]
Mark Bruhn
Mark Bruhn
[MB]

Privacy, Security and Handling Academic Business
May 27, 1998
[Audio]

Topics covered include:


[Top of Page]

JB: Welcome to the CREN Expert Event Webcast for late spring 1998, and to this session with Mark Bruhn on Privacy, Security and Handling Academic Business. You are here because it is time to discuss the leading core technologies in your future.

This is Judith Boettcher of CREN, one of your hosts for today's session. Our co-host today is Ken Horning, who is filling in for our regular co-host, Greg Marks. Thanks for being here, Ken, and welcome. Thanks for filling in at just the last moment.

KH: It's my pleasure. It's a good thing I was fortunate enough to have done one previously, so it wasn't totally a new thing to me.

JB: That's right, you were all trained, right?

KH: Yes.

JB: Our guest expert today, as I mentioned, is Mark Bruhn from Indiana University. Mark is well-versed in network security and is currently in charge of Technology Policy Development in Education, in the Policy Office of the VP for Information Technology at Indiana University. That is a long title, isn't it, Mark? I never realized.

MB: Even longer with the "acting" part in there.

Topics

JB: Thanks for being here to talk about one of the really hot topics. Is there anything of particular interest that has happened recently about privacy and security issues on your campus?

MB: Well, I have to say, business has been really good, and mostly, that's bad. We're winding down now because the spring term is over here, but we still have some technology abuse and security cases pending in various agencies, the Dean of Students office and with the University Police Department. We even have a couple at the local prosecutor's office, in fact, related to outsiders sending illegal material via e-mail to a couple of internal users.

Other than that, this is the time of the year when people kind of relax a little bit. The students head home for break. The ones that are in summer school (since both sessions are a little bit shortened) they don't have much time to do much of anything else. So it is a little quieter here now.

JB: I just remembered, I saw in the paper this is the time of the year, like you say, that young people do weird things, and there was one place where the seniors played a practical joke and let loose a bunch of roaches into the school. Did you all see that one?

Anyway, Ken, would you like to remind everyone how we're going to be handling questions today for our session?

KH: Yes, thanks, Judith.

Before we launch into our discussion today, I'd like to remind everyone as to how we will handle your questions and feed them to Mark and get them into the archive RealAudio event that people can access later.

As opposed to previous expert events where we did try and take live telephone calls as well as e-mail questions, we're now doing it just via e-mail. We invite you to send your questions to Mark during the Webcast this afternoon via e-mail by addressing your e-mails to expert@cren.net. Mark will respond to many of your questions during this session, but as is usually the case, there's not time to respond and answer all the questions that have come in. But Mark will also be responding to those questions via the website, so you can check in the website later, and as well as finding this archived event, find additional questions and answers that may not have made it into this afternoon's session while we're live on the net.

Let me also remind you that if you or any of your information technology friends may have missed this afternoon's Webcast for some reason, they can pick up the archive session at the CREN website. That's https://www.cren.net, and the transcripts from the earlier Webcast series are also available up on the site.

JB: Thank you very much, Ken, and thanks, too, for remembering the e-mail that I almost forgot to remind you of. You're really good at thinking on your feet here.

MB: Pardon me if I interrupt, but at least one of you guys are also receiving those e-mails?

KH: Yes, I'm hoping to be the person who accesses the e-mails as soon as they come in and looks for an appropriate place to get them into the discussion.

MB: That'll be just fine because my laptop battery light is blinking in my eyeball as we speak, so I don't know how that's going to last.

KH: Let's hope the battery on your phone is better than that!

JB: That means that you'll be able to really concentrate on what you're saying, Mark, right?

Topics

Let's go ahead and start our session on this topic today. I find that it's a topic that more and more people are talking about. Let's perhaps mention that it's often the case when we're talking about privacy and security that we often find that it's really a trade-off between privacy and security. I find that I often give up some of my privacy in return for convenience and speed. And I often find myself giving information on the Web at a site so that site will remember who I am, for example. What comment do you have, Mark, about that particular aspect of our privacy and security systems?

MB: Well, it's actually very simple. This is actually a simple answer to a pretty complicated situation, but simply put -- you just have to be careful. You have to know who you're dealing with on the other end.

I assume, perhaps wrongly, Judith -- I don't know -- that you wouldn't buy something from the trunk of someone's car at the mall. In the same way, you don't interact with some Internet site that you don't know anything about. If you belong to a CD club like BMG or Columbia or any number of those kind of things, you're pretty much aware of the relationship that you've had via mail. You know what they're going to do with the information for the most part, and you've built kind of a trust with that agency and know what they're going to do.

But if you go to a site that you don't know anything about, you need to know what it is that they're going to do with the information that you're going to provide. If it's a secure website -- that's easy to tell because of the little key or the little lock (depending on what you're using) on the bottom of your screen is going to be intact. And that will tell you that you're communicating with that site in a secure manner. The question that people have after that, though, is what happens to the information that those people collect -- that that site collects from you after it leaves that website, after you put it into that Web form?

That's something that you're going to have to be proactive in finding out. Maybe it says it on the webpage. If you can find their policy somewhere on the webpage, make sure that it says that they will only use the information that you provide for the purposes for which you're providing it. They won't sell it, they won't market it, they won't inundate you with unrelated material unless they give you an opportunity to ask for it.

You just have to be proactive about finding out what that site is all about. You want to ask them, if you get an opportunity -- and I guess I'm suggesting you make the opportunity -- what they do with the data. If you're going to give them your credit card number, if you're going to supply them with personal information about yourself, then ask them how they store that information in the background. If they take it off the secure Web server and they put it into a database that's open and visible for the network, that kind of defeats the purpose. So you should know.

Topics

Another thing that people worry about are these cookies. There's a lot of concern about the fact that you visit a website and that website virtually writes things to your desktop, to your PC drive. Well, that's okay, because it will be just exactly what you said. The next time you go to that site, you want conveniently for them to know who you are and what your interests are -- especially if you go there often.

If you do go to a music club page, for example, and you're a fan of jazz music, you supply that when you go into their site, and of course, they're going to tailor that site to meet your interests. And next time you don't want to have to say, "I'm interested in jazz again." It'd be really neat if you could go there and they know who you are, and that's okay, because this idea that someone can really invade your privacy via that mechanism isn't really true.

We, I'm sure, don't have time to go into it in detail now, but there's some really good information about cookies, naturally, on the Netscape website. People need to go there, read about what they are, read about how they work, and I think people will be more comfortable with them.

Topics

JB: Mark, maybe you could tie that back, then, to some of the questions and some of the areas that we want to evaluate websites on for trust and for privacy and for those kinds of issues. What does that mean, then, for our campuses and our campus websites then, when we start interacting with our students?

MB: Coincidentally, I met yesterday with various people, most importantly representatives of the Indiana University Treasurer's Office, related to departments wanting to -- and they are, some of them -- collecting credit card information for various things on their departmental websites. My task (I always seem to leave meetings with action items) from that meeting is to write a narrative of the circumstances under which it's okay for a department to do that, and then the Treasurer's Office will take that.

They will obviously review what I've said there, and that will become what they hand to departments when those department heads ask them if they can do that on the Web, or if there's a better way to do that on the Web and what-have-you. And the Treasurer's Office will then take that to themselves as a financial policy, so if a department does want to do that, there's going to be a list of things that they're going to have to take a look at: physical security, logical security, encrypting the traffic, placement of the database server, placement of the Web server, all of that stuff. They will have a list of things that they really need to consider.

That will also eventually get into the hands (because it is a University policy at that point, if it gets that far) of the internal audit department. So when the audit department schedules a review of a certain department or a departmental function, they will know that that's a University policy and one of the questions I assume that they'll ask that department is, "Are you collecting credit cards on the Web?" If they are, then the auditor will pull out that document and say, "Are you doing it this way?"

That's one of the ways that we're going to make sure that's done as safely as we can within the University environment. We're looking for other formal ways to do that, more -- I guess elaborate's not the right term, but we're going to try to put that in the hands of agencies that are there now, in place, and have experience in handling that kind of thing on the net.

One of those, as an example, is Cybercash -- that credit card information, in fact, will not reside on an Indiana University server. That will reside on that external agency's server, and then they will interact with the financial institutions and what-have you, and we won't have to do that. We'll just see the money come in the other end magically, I guess. So that's how that's going to work.

But a goal of the security office within the Vice President for IT's office here is to establish good templates, I guess -- good configurations, good top-ten ways to better the security on specific platforms. We've got some of that on the security office website right now, where you can go there if you -- I think LENIX is one that's up there because the guy that's putting this together just happens to be a LENIX user, so that's probably why it's there first. But they can go there and they can look. "Well, I have a LENIX box on my desk, and these are the things that I really need to pay attention to." And we want to do that for as many of the most common operating systems and hardware platforms as we can of those that we have within the University environment.

So we want to tell people the best way to be and help them get there. We're not going to be able to go into the field and do that for them. Obviously, we don't have the staffing to do that. In fact, we don't even have the expertise within the security and policy areas to do that. We have to rely (even ourselves) on technical staff -- technical gurus, experts around us within the computing department and within the office of the Vice President. We're going to help them do that as best we can.

KH: And we'd like to help our listeners this afternoon get their questions to Mark here on the virtual expert event sponsored by CREN. You can do that by sending an e-mail message to expert@cren.net. And we'll be looking for your e-mail and ready to feed your question into the discussion.

Topics

Mark, I'd like to ask something: Do we have any understanding of what percentage, if you will, of security breach attempts are just done by people who find joy in making the attempt (especially successfully), and the people who actually make those attempts with malicious use of the data in mind? I hearken back to about a year ago when you were here in Ann Arbor to tape your portion of the CREN virtual seminar, that the first time you came, you had to dash off and go back to Indiana because you had had a security breach that I think involved releasing some social security numbers in a public place.

MB: And I appreciate your reminding me of that incident. That's something I would much rather forget! Percentage, I don't think so.

KH: In that instance, do you think the intent of getting that data and releasing it or publishing it was done just to say, "Hey, look at me! I cracked this system and I did it!" Or were the perpetrators' intent to really make some sort of illegal use of those numbers?

MB: This particular incident is an interesting one, and let me just very quickly review what that was all about. One of our departments had created a faculty information database. It was going to be used in support of those faculty members putting together grant proposals. It had information about their interests, about their research areas, it had office address, office phone number in there. It had social security number in there. Various other pieces of information like that. It was inadvertently visible to the network. It was in a directory where it should not have been, behind a gateway that should not have allowed access outside of that department.

An individual that describes himself as a privacy expert, an Internet entrepreneur and a talk-show host -- how those three go together -- apparently the talk-show hosting was done by ham radio, which I'm not even sure is legal. In any case, and I'm going to try to stay away from --

JB: Multi-talented person, in any case!

MB: Yeah, in any case, I'm going to try and stay away from rendering my very best (inaudible) opinion about this person, but let me just say that what this person was doing, and is still doing, by the way, is doing Net searches using various search engines for strings like SSN = or Social Security Number of anything like that. And what he found was this file -- this faculty information database on one of our servers.

What he did subsequently, then, was he copied that data out of that location -- which was visible to the Internet, yes, but took a bit of doing to get to -- and published that list, I think in its entirety --I'm not sure at this point, I don't remember -- on his website, which obviously illuminated it much, much higher to the Internet community than it was before. And then he started sending notes to the University President. He sent notes to some of the faculty members in that list. He called some of those faculty members in that list at their office and at home. I asked him to take the list off. He's refused. He got a bunch of complaints. (I'm putting that lightly!) Complaints from faculty members here about his methods. Nobody questions his privacy motive, if that's all it was, because certainly we needed to know that that information was there that way, and we needed to have it removed. And obviously, that was the result of that incident.

But I think his purpose in that was --I guess I really need to be careful here. I don't think his motives were purely as a privacy advocate. I think there was more to it than that, and I'm not even going to go any further than that. If that was the case, then certainly all he had to do was call somebody here and tell us that that material was there and we really needed to get it off of there, and certainly we would have done that right away. But he did then take that and put it on his website. He made such a big deal about it. He wrote many, many different major media outlets and told them about it. It was in the local papers. It was in the regional papers. It was on the AP wire. There was a little piece about it on Dateline on network television. There was a little snippet of it in the USA Today newspaper. He did what he could to make sure everyone knew that he had found that thing.

JB: Which puts another light on the whole issue of privacy. If one makes an unwise decision or even placement of content on the Web, it can easily be blown out of proportion.

MB: Absolutely. We would much rather have just taken that off. And of course, it wasn't supposed to be there. I mean, that was the bottom line was that it was not supposed to be there, and we never said that we didn't have any fault in that. It was just the way that it was handled.

Topics

Now, to answer the global question, the overall question is the motives of the people that are attempting to access this kind of information or hack into systems. It varies very widely. You would think, within certain environments, there's not going to be much of anything useful there. They're going to try to break into that, and maybe once they discover that there's nothing useful there, nothing that they can actually use, they'll go away and they'll try something else.

The people that would be doing that for self-glorification will still do it and they will hold that pelt above their head and say, "Look, I broke into this institution." Those people don't do it for financial gain. They'll do it for personal ego gain, but there are those, then, of course, that search out things that they can make use of. If they find a bank of credit card numbers, then they want to use those. If they find ATM card numbers with their pin numbers, they want to use those. So really, you can't say that 80% of them are for ego building and 20% are for personal gain because it just depends on where you are.

KH: Which is why we have to treat each event seriously.

MB: Correct. You have to take that back, and a lot of times, when we do that, we are still not able to find out why that person did what they did because we cannot get that information from them.

Topics

JB: Perhaps, Mark, that takes us into an area that we did want to talk about today because of all of your expertise in it, and that is the whole issue of developing technology policy on our campuses. What kind of content, in fact, does go up on the Web? How do we, in fact, alert people to the sensitivity and the dangers that are there? Would you like to talk about how we get that kind of awareness out to the campus communities and how do you go about developing technology policy to address these issues?

MB: More and more, we are understanding that it's important that someone be around to do that full time, and I'm talking about policy development and education at a level within the institution, within the university that has some reasonable amount of influence.

The technology changes so rapidly, and the things that people can do (and will do, by the way) multiplies just as fast. Someone has to be around to evaluate the environment and the climate and coordinate the setting of the rules. And, of course, publicize and educate the community on the rules and standards of behavior, expectations, and so on. There's access eligibility questions. There's appropriate use questions. There's legal questions that come up all of the time. Someone's going to have to look at these things and make some determination about how they impact our users.

JB: Indiana University is a fairly large university, Mark, and you said that you were in charge of policy development. I think when you and I talked, you also mentioned that there's also a security office. Both of them are fairly high level within your campus. Would you like to mention a little bit about why that's important? And also, is there something that we can say about providing guidelines for smaller campuses in this area?

MB: Sure. It's generally the case that the people setting the policies shouldn't be directly involved in their implementation. It's kind of a separation-of-function thing. Basically, the fear would be -- and I'm making general statements here, obviously; the people that are involved may make this nonsense -- that the policy makers will take the easiest path if they then have to implement what they mandate. Does that make sense?

KH: Yes.

Topics

MB: For example, one of the things that we're struggling with here: No connection to the Indiana University network -- and this has not been stated this way yet -- no device can be connected, no person can connect to the Indiana University network without authenticating their identity.

That's a can of worms. That's a large can of worms, in fact. A security person knows that that's a large can of worms and very difficult to implement technically. But, if you step back from the implementation, if you step back from the technical difficulties, that's a very reasonable policy to have. That's a very safe thing to do.

So the example there would be, certainly, that if a security person is responsible for making that kind of statement or making that kind of policy, then they have to turn around and implement it. Well, they're going to maybe be dragged kicking and screaming toward making that policy statement to begin with. Whereas a policy person -- a separate policy person that's involved in setting policy does that at the institutional values-and-goals level and doesn't have anything to do with the technology involved.

There's people out there right now that are jumping up and down, I'm sure, wanting to throw pencils at me for making that statement. But a lot of times, if you set a policy and a particular technology will not support what that policy requires, you should not be using that technology. Now they're picking up heavier things and wanting to throw them as well!

JB: Before, you were being optimistic, as if they were only going to do pencils!

MB: Yes, but you understand what I mean. The idea is that you don't choose technologies -- you choose technologies to implement the policies. You don't put your policies in place based on the technologies that you have available. And that's not popular everywhere, but that just happens to be my opinion.

It's the same kind of thing -- I guess it's analogous of someone approving check writing to the person that actually submits that batch or submits the job that's going to write that check. You don't want the person approving it to be the person that's putting it in because obviously, somewhere along there, a person with the inclination would have the opportunity to do bad things in that process. It's not exactly the same thing, but I guess you get the idea.

JB: Let us go back, perhaps, to that statement that you made that is something that the policy office, in fact, might mandate. And that would be that no one can connect to the campus backbone without authenticating themselves. Certainly, on one level, that sounds a little bit like, "No one can come into my house unless I've given them a key."

MB: I've heard that before. Exactly.

JB: So certainly, then, is that a policy that is now in place or going to be in place at IU?

MB: Well, we have at this point a list of recommendations that the Vice-President's going to have to evaluate, and that statement is in there. The fact that we are recommending that the policy be issued -- that use of any device on the network requires some form of authentication. In addition to that (or as a caveat to that, I guess), there are some instances where that authentication would be supplying a guest account or a public account or something like that. And in those cases, they're still authenticating. They're on a device that we know provides service where that's okay, and they can't do anything else. So they're still authenticating, but we know where they're doing that at, and we can find out where that thing happens.

JB: And there are fences and walls around that.

MB: Yes. It's a security bubble, I like to call it, around that particular function, and then they can't do anything else.

One of the major problems that we have is people using devices on the network that don't require them to supply any credentials at all, doing things -- sending hate mail or posting inappropriately to internal or external websites, that sort of thing. So we just want to know where that stuff is coming from. And we're not going to track that stuff. We're not going to keep that stuff around for three years.

What we want to be able to do is, if we get a complaint, then we're able to evaluate that and we know where that thing came from, and then we can hand that to another university agency to decide if a sanction should be levied and what that might be.

Topics

JB: Maybe we ought to look at one of these questions that we had thought would be a good one. That is, just what is the impact that you're finding and that we're finding generally on technology policy and security because of the explosion in Internet access by the overall general public?

MB: Let me put it this way. Many more settlers -- which is a really good thing, I think, but many more gunslingers. We get many, many more reports now about anonymous and inappropriate mail coming into our users from anonymous mailers, various ones that I'm not going to name here because anybody that's in this business knows exactly what I'm talking about. And also leaving our technology environment destined for those users elsewhere. I'm not saying it was real quiet before, mind you, but obviously, the more people that are using a particular medium -- that medium in this case called the Internet and the Web -- the more interaction problems occur.

A key point with this, and maybe an obvious one, is that locally we have (and I'm sure they wouldn't like to be referred to this way) but basically we have a captive audience here locally. If we get a complaint or if we identify someone using our technology resources inappropriately within our environment, we can target education toward that person or those persons. But if a person external to our environment, using an anonymous mailer or posting things to a website, is not a member of our community --the only thing that we can do is whine, basically, and complain to that service provider. Maybe they do something and maybe they don't.

Things come to mind. We get an unbelievable amount of mail coming into our environment that is pornographic in nature, obviously unsolicited electronic mail. Some of the people that get this here are just flabbergasted that they would be targeted for such a thing. They're not really targeted individually for it. There may be 4,000 other people within the environment that got the same message, but that doesn't make it any less significant for that one person. So we get those complaints.

The fact of the matter is that we can educate our users as much as we can spend time doing it, but we have families now that are on the Internet. Within families, you have teenage children. Those teenage children are either -- how can I put this? Either experienced in the wrong way or not experienced at all. Now, I have to say that we've come across a lot that know what the environment is all about. They've been taught correctly, if you will. We touch upon those on occasion, but the majority of the ones we see, unfortunately, are the ones that either don't know what they're doing or have learned bad habits. So we come across those on occasion -- students or children of IU students, on occasion. Unfortunately, the parents will sometimes share those accounts with their children, and then we -- if something's done inappropriately with that account, who do we go after? We go after the account holder and we say, "Something happened with your account, and you know you're responsible." Once we get into it, they're very surprised to know that their son or daughter was up at 3:00 AM posting some abusive language to some site somewhere.

In addition to the anonymous e-mailers, many, many websites now allow for anonymous postings. We talked about a couple of these the last time that we gathered like this. We've gotten involved in a couple of others recently where users post things about other users at IU and, of course, the users here take offense. Or IU users post things about someone else and they take offense at what was said about them -- even to the point where legal action was threatened.

The newspapers a lot of times have discussion groups about local sports teams or racing or whatever it might be. That's an opportunity for some of these gunslingers, if you will, to post things inappropriately to those sites. And then, of course, they turn around and complain that one of our users was involved.

Topics

JB: Mark, what about in terms of protecting us from some of those kinds of things? How do you go about providing gating functions on campuses so that you can, in fact, provide for this authentication? Do you have rules in your public labs, for example?

MB: Well, yes and no. We don't allow mail to be sent from our public labs directly. They have to go through our central PO servers, our central mail relay servers. So we know where those originate, and we know they have to go through those servers. They can't send mail directly from those devices, for one thing. Now generally, in our PO machines or central mail relay servers, we don't allow mail relay. That is, someone external to IU can't send a piece of mail through our central mail relay servers to someone else outside of IU. Does that make sense?

JB: Yes.

MB: We do let people external to send to internal folks, of course. We let internal folks send to external folks. The problem that we get is when we have an internal person at home, dialed into their ISP, for example (their Internet Service Provider), sending mail to an acquaintance somewhere else not at IU and they've got their laptop set to go through IU. That obviously causes a problem because that becomes external to external.

One of the things that we can't do is block mail from sites that are notorious for sending in bulk mail -- unsolicited mail, UCE, UBE, Spam, whatever you want to call it. Because a lot of times, we're going to lose legitimate mail from those sites. For example, there's no way that we can block mail from AOL.com. That is just not going to work. We can't block mail from Hotmail.com or Juno.com or AT &T; or Worldnet.com, or Netcom.com. We can't block mail from those major service providers because our users have legitimate reasons for interacting with users of those services.

So what we have to do is we have to be very specific. We have to get down to more qualification. For example, there wouldn't be any reason for someone dialing into the AT &T; modem pool to access the AT &T; service to use that modem pool to send mail to our site. So we can identify that address and we can block mail from that address. We're not blocking mail from AT &T; because that's the way they should be sending it anyway. So we do that. If we recognize a particular address is inundating us with junk mail, unsolicited mail, we filter that address out. If we get a site that is -- I don't know how you would say it. If it's a very small site, if we don't see much of any other kinds of mail from a particular full site, and all we get from that site is unsolicited bulk mail, we'll block the whole site.

KH: And it's a domain called Get Rich Quick.com.

MB:. Well, you know, except for sometimes that doesn't work either. You've got to really analyze the headers. And this is an important thing, because you can send complaints and nastygrams to the wrong service provider. You really need to analyze the headers, because they can use whatever name they want. You just have to make sure that you've identified the right Internet address in that way. So you've got to know how to read the headers to make sure that you're not flaming the wrong provider for allowing their users to do something like that.

And I have no idea whether I answered your question, Judith, so you can remind me.

KH: Before you do, Judith, let me remind our listeners that we are well past the halfway point in our broadcast. We have about a little less than 10 minutes left, but still time for you to send your questions in for Mark. And address your e-mail to expert@cren.net.

JB: Thanks for the reminder, Ken. We've got all kinds of questions that we want to ask Mark, but we would also like to incorporate a few more from our listeners.

Topics

Mark, what about this question here? We've talked a little bit about the public labs and what you do or don't do there. Is there something that campuses should do in dealing with the local ISPs? Is there a way that the campus community and the local ISPs can work together to help with security strategies?

MB: Well, both we and the local ISP are interesting situations because we don't consider ourselves an Internet service provider. We provide computing and network services to members of our community for the purposes that they are here. So you're not connecting to Indiana University only to have Internet access. You're doing that because you are involved in research or in learning or in instruction or whatever it might be.

But we do have information about the users of our resources, and there is a reasonable expectation on their part that we're not going to use that information inappropriately. In other words, we're not going to sell it and we're not going to hand it over willy-nilly to whoever asked us for it.

The ISP's are in a similar situation because the people that are connecting to their services are either paying for that service or they are using that service and that ISP is reaping the benefit because of advertising that that user sees. In either case, it's a business for them. They need to make sure that the users are comfortable with that service.

The point I'm getting to is that having a free exchange of user information between Indiana University or whatever university and a local ISP is an iffy proposition because we're not going to be willing to share perhaps the information that they want about a particular user. They are not willing to share. And our motives may be different, but they're not willing to share information about their particular users. Obviously, they carry some liability in the privacy area, but they're trying to maintain a business. They're trying to make money. If they become known to willy-nilly release information about their users to other outfits, then obviously someone's going to go somewhere else.

There's plenty of other service providers. So establishing a relationship between the public institution like IU and a local ISP is an interesting one. The response that we generally get from those, by the way, is, "Well, we'd really like to help you out, but we've got to protect the privacy of our users. Absolutely, we'll give you the information that you're asking for if you hand us a court order." We've gotten that response many, many times. And in a couple of situations, in fact, we said, "Okay, we're going to do that," and we've got a couple of those, as I said earlier, down in the Monroe County Prosecutor's Office.

JB: And these are instances, just to clarify the situation here, Mark, where there have been inappropriate messages coming from the local ISP's into the campus community, is that correct?

MB: Correct. And in these two particular situations, "inappropriate" is way too light a term.

JB: My mother taught me not to use some of those other terms.

MB: Obviously, if we're going to go downtown and start talking to judges about forcing these outfits to supply information, we're looking at some pretty serious stuff. Some of the things, we kind of weigh what it's going to take us to do it, and we talk to the individual hereabouts that's involved. If they want to pursue it, then we'll help them. But if they're wishy-washy, we're wishy-washy, then we'll just write it off as experience and press on.

So that's kind of iffy. But we have had conversations with managers of our local ISP's, and they understand that we are here and we understand that they are there, and they understand that our users are not all happiness and light and do all the right things. We understand that theirs are not, either. But the relationship is tenuous at best because they've got to protect their interests, and certainly we've got to protect ours.

JB: Particularly as the numbers and the communities that are using these new technologies continue to increase, I think our challenges are going to continue as well.

MB: You can't wander around on the Internet any more without bumping into somebody. If they're bad, that will spill out. If it's good, that will spill out.

Topics

KH: Mark, we do have an e-mail question from Fred Hurst, who is the Executive Director of Florida Public Post-Secondary Distance Learnings Institute down in Ft. Myers, Florida. He asks, "Many distance learning Web clients cannot function behind a firewall. What strategies may be used to protect institutional data while allowing legitimate uses of the new technology?"

MB: That is one of the reasons why firewalling is a very difficult thing to strategize about and implement, because that's not the only situation where that's going to cause a problem.

We have implemented hereabouts very limited firewalling techniques. We don't have a machine that we can point at and say, "That's our firewall." We do TCP wrappers on services that have to be provided in and amongst and between the networks within their institution, and obviously they have to map those out. They have to then determine what services must be protected at what level, and they have to place firewalls appropriately.

Having a firewall at one point on your security perimeter (if I can use my Air Force-remembered jargon) -- one firewall limiting access to and from your network probably is not going to work. A corporation that has very limited interaction with the outside world may be able to do that very nicely, but our institutions that have much, much more communication with like institutions -- with other governmental institutions, with other laboratories, you name it -- that situation is probably not going to work.

However, what you need to do is define specific security parameters. If you have an administrative computing complex, for example, if you have one or two machines that support the business of the university, including student records and student registration and those sorts of things, then put a perimeter around those and make sure that those are firewalled. Most times, there's no reason for anyone outside of the university or the institutional environment to access that information, so don't allow it. Just put a perimeter up there.

Topics

JB: Mark, you mentioned a term somewhat new to me. You called it "put a TC wrapper around a server?"

MB: TCP wrapper. What that does is it's an IP address filter on the machine. It's a specific hosting service restriction. So on a UNIX host, for example, you can limit the source IP addresses for which FTP is available or TelNet access or whatever other services that you want to do. (I just got to the very edge of my knowledge in that area, by the way.)

JB: But in terms of particularly the situation with distance learning does create challenges that are difficult because most distance learning students, for example, many of them would have IP addresses from all the places that you mentioned earlier today. The AT &T;, WorldNet and AOL and all the rest of that. Is there any way to -- given that kind of client population, what are some strategies that you might recommend for ensuring security and protection of data?

MB: You have to use other authentication mechanisms. You can't use network topology and you can't use filtering to take care of that because of what you just said. Not only might a particular student be accessing the class materials on a Web at a particular site from AT & T connectivity, two days later, they might be accessing the same material as they wander around Canada from some other ISP.

So you can't say to a student, "Okay, where are you going to be coming from? That's the only place where you're going to be doing that from." Sometimes you can do that, because if IU Bloomington is producing materials and providing classes for students at IU Purdue/Fort Wayne, then you know that's where they're going to be and you can use that kind of technology. If not, you're going to have to make sure that you use other authentication mechanisms -- a secure user name and password, depending on the materials. If it's fairly sensitive proprietary materials, that may not be enough. You may have to issue them some token, some password. You may want to use something like Kerberos to make sure that the password traverses the network encrypted. You just have to take additional steps outside of network topology to take care of that problem.

JB: To summarize what you were saying, then, one way is to look at your network topology and the second way is to look at these levels of software authentication.

MB: Yeah, in fact, we use a password token to generate a one-time password, and we deploy that on systems that support and applications that maintain sensitive information about people or about the institution. You can't get to those without that card.

So you can be in Hawaii on vacation, and if you're a payroll clerk, maybe you're the only payroll clerk or grades recording clerk in that department. You don't want that stuff floating around across half the world, so we want that data encrypted and we want those people to be using that card. That does two things. It protects the information and it also strongly authenticates the identity of the person accessing it. Then you can drop away some of the other network topology concerns.

JB: I think when you've got a population as varied as some of our distance learning institutions will have, those will probably be a preferred strategy.

MB: And let me finish off that answer by saying that we have not addressed that here -- the distance learning question, specifically -- here at IU.

JB: Ken, do you have anything else? I've lost track of my time here a little bit.

KH: No, we're running a little bit over. I think it is time to wrap it up.

JB: I want to thank everyone who joined us, and Ken, I'd like to thank you as well for jumping in at the last moment for Greg Marks. Let me just say again to remind everyone to take a look at the website and all the references and URL's that Mark has recommended. And Mark, you had mentioned just before we started the particular place that might be good for novices to start. Would you mind saying that one more time, and then we'll do the final close.

MB: From an appropriate policy and usage standpoint, Cornell has some very good information, and that's listed in the reference list. If you're talking about appropriate use, that would be the place to start. They have a Policy and Law Center. They do seminars. Good place to start right there.

JB: Right, very good. Also, we will be taking follow-up questions. Again, send them to expert@cren.net. We will be posting them also on the Web.

Also, put the next two expert even Webcasts on your calendar. The schedule is only a click away from the CREN homepage. Our next session is one week from today, on Wednesday, June 3 at 4:00. Our guest expert at that time will be Ken Klingenstein, and he will be taking questions on the area of Middleware, Authentication, Authorization and Directory Issues.

Also, CREN is pleased to announce the upcoming release of a new virtual seminar called "Creating Internet2." This seminar will be available in two formats, both on the Web and on CD.

Again, thanks to everyone who made this possible today: the board of CREN; our expert, Mark Bruhn; Ken Horning; Brian Vaughn at UM Online for encoding; and all of you. You were here because it's time. 'Bye, Mark.

MB: See you.

JB: 'Bye, Ken.

KH: 'Bye, Judith.

JB: 'Bye, all.

Topics