{"id":431,"date":"2008-08-01T13:46:02","date_gmt":"2008-08-01T13:46:02","guid":{"rendered":"http:\/\/www.bluoz.com\/blog\/?p=431"},"modified":"2008-08-01T13:46:02","modified_gmt":"2008-08-01T13:46:02","slug":"Terry-Childs-for-the-non-technical","status":"publish","type":"post","link":"https:\/\/www.bluoz.com\/blog\/2008\/08\/01\/Terry-Childs-for-the-non-technical\/","title":{"rendered":"Terry Childs for the non technical"},"content":{"rendered":"<p>two more articles that could be potentially very important to San Francisco in the future. In some of the comments, people are already asking this be sent to SF City officials and the Board of Supes<\/p>\n<p><em>This case will set precedents, if it ever gets to trial. It would be a sad day indeed if network admins could be arrested for using &#8216;no service password-recovery&#8217;. Actually, it could get worse &#8212; if his security measures are the very petard that he&#8217;s hoisted upon, then the ramifications for security professionals everywhere may be severe.<\/em> from <a href=\"http:\/\/weblog.infoworld.com\/venezia\/archives\/018012.html\">The Deep End<\/a><\/p>\n<p>and more important, how this case is <a href=\"http:\/\/weblog.infoworld.com\/venezia\/archives\/017993.html\">starting to go horribly wrong<\/a> note &#8211; this article is posted almost in it&#8217;s entirety, which is something I rarely do, but this is very important to understand, and almost no-one in the press has gotten this right yet<\/p>\n<p><a href=\"http:\/\/weblog.infoworld.com\/venezia\/archives\/017993.html\">A primer on the Terry Childs case for the non technical &#8211; Paul Venezia<\/a><\/p>\n<p><em>Since I continue to read, see, and hear news stories on the Childs case that depart from reality, I figured I&#8217;d put together this handy primer for anyone non-techical who wants to really understand the case. This may or may not apply to many mainstream journalists. I hope it does. Also, please forgive me for the car analogies I&#8217;m about to use.<\/p>\n<p>\u2022 The &#8220;network&#8221; as used to describe this case is defined as the hardware used to connect computers to other computers. It is not, and never was, intended to be construed as any form of data, applications, resources, or anything other than the actual hardware.<\/p>\n<p>\u2022 Essentially what Childs&#8217; did was build a car, give the city the keys to start the engine and drive the car normally, but he locked the hood so nobody else could work on the car.<\/p>\n<p>\u2022 At no time since Childs&#8217; arrest has the network been unavailable, offline, down, or anything approaching unusable. The caveat to this is the fact that when the DA placed functional VPN usernames and passwords into the public record, all VPN access had to be shut down and reconfigured.<\/p>\n<p>\u2022 The passwords that Childs gave to Newsom were to be used to access the hardware comprising the network. They were not his email passwords, passwords to unlock and city databases, or anything of the sort. They were passwords that could be used to log into routers and switches to make changes. Nothing more, nothing less.<\/p>\n<p>\u2022 The passwords released by the DA&#8217;s office were not the passwords they were trying to get from Childs. The passwords they released to the public were for another part of the network entirely, one that provided external access to the network for city employees. In essence, by publishing this list, the city opened the deadbolt on the door to the network, but left the handle locked.<\/p>\n<p>\u2022 Modems plugged into routers and switches in various places on a large network are not scandalous, they&#8217;re common. They&#8217;re also generally mandatory on large networks. These modems are used to provide instant emergency access to remote locations to reduce or eliminate network downtime.<\/p>\n<p>\u2022 Do not confuse a modem with a router. Sadly, these terms are used interchangeably in consumer electronics, but not in this case. The term modem here means an analog phone modem, not a DSL or cable modem (unless specifically noted), and router means a device used to route packets through a network.<\/p>\n<p>\u2022 &#8220;Sniffers&#8221; on a large network are basically mandatory. The fact that Childs&#8217; had one is not a surprise, and is not immediate cause for concern. Cisco has manufactured and sold devices designed to be used in core network equipment for just this purpose for many years. Sniffers are put in place to detect intrusions or other problems on the network.<\/p>\n<p>\u2022 The routers and switches that comprise a network are essentially fixed-purpose computers. They have a CPU, RAM, and storage (similar to a hard drive). Like a PC, they have an operating system and a configuration that instructs the device on how to function within the network. When changes are made to this configuration, they are made to the running config, not the stored config. The changes are applied instantly, but unless the running configuration is saved to disk, the changes will be lost if the device is powered off. For instance, if you open a saved Word document, and make changes to it, then shut down the computer without saving the document, the changes will be lost.<\/p>\n<p>(NB: This always bothered me about Doogie Howser. He&#8217;d type all this stuff into his computer, then just shut it off. Same goes for the end of Stand By Me)<\/p>\n<p>\u2022 Requiring specific points of access for administrative functions of a network is not a bad thing. It&#8217;s generally a security requirement. For instance, to make changes to a network, you must use a specific IP address, perhaps within a specific building.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>two more articles that could be potentially very important to San Francisco in the future. In some of the comments, people are already asking this &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[8],"tags":[25],"class_list":["post-431","post","type-post","status-publish","format-standard","hentry","category-8-SF-politics","tag-sf-politics"],"_links":{"self":[{"href":"https:\/\/www.bluoz.com\/blog\/wp-json\/wp\/v2\/posts\/431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bluoz.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bluoz.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bluoz.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bluoz.com\/blog\/wp-json\/wp\/v2\/comments?post=431"}],"version-history":[{"count":0,"href":"https:\/\/www.bluoz.com\/blog\/wp-json\/wp\/v2\/posts\/431\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.bluoz.com\/blog\/wp-json\/wp\/v2\/media?parent=431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bluoz.com\/blog\/wp-json\/wp\/v2\/categories?post=431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bluoz.com\/blog\/wp-json\/wp\/v2\/tags?post=431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}