Crackers insert trojan horses at Eindhoven University
Crackers have compromised ftp.win.tue.nl, a major software distribution center in the Netherlands. So far "trojan horse" code has been found in two packages on the site, TCP Wrappers  and util-linux-2.9g . For now all code on ftp.win.tue.nl should be considered suspect.
TCP Wrappers is designed to tighten security on Unix-based machines. The compromised code, discovered on 1999-01-21, would give the perpetrators access to a root shell on any system on which it was installed and run. The owner of TCP Wrappers has moved its home site to another system. This distribution is PGP-signed, which means that anyone downloading it can verify that it is intact and unmodified, but does not guarantee that downloaders will do so. 52 downloads were recorded while the bogus distribution was in place. All of the downloading sites were warned of the trojan. Some of them may have been mirror sites that made the trojan available to yet more potential victims. CERT Advisory CA-99.01  was issued to publicize this crack.
After the TCP Wrappers compromise came to light, it was discovered that another distribution on ftp.win.tue.nl had been backdoored . In util-linux-2.9g the login utility had been modified to send usernames and hostnames to a Hotmail account.
The word back from them is that they will not close it. Theft of passwords and hacking does not violate their terms of service.
Portals plus pipes equals gates?
On 1999-01-19 @Home, the cable Internet provider, announced  it will acquire Excite for $6.7 billion in stock, which was almost double Excite's market capitalization at announcement. The deal eclipses AOL's purchase of Netscape for $4.2 billion though ballooning stock prices have inflated that deal to $6.2 billion so far, and no one knows where the values will be when it gets done.
I haven't paid much attention to the portal wars to date, but excite@home made me sit up and take notice. Think back to 1996, to when @Home was first being discussed breathlessly by George Gilder and like-minded techno-bunnies. Remember a cautionary thread warning that broadband Net access, if widespread, could bifurcate the Internet? (I don't remember who proposed this theory.) The media-rich experience pouring into the home over @Home's fat pipes and national backbone would bear little resemblance to the content we had known, this argument went. Subscribers hooked on its speed and flash would impatiently abandon all the content on the rest of the Net, constrained as it is by lossy peering exchange points and 56K network segments. They would happily sink into their carrier's lone embrace, clicking through its content providers' ads and buying from its partner merchants.
Fast-forward to 1999. Recall that AT&T recently bought the millions of customers and thousands of points-of-presence that IBM had built up as ibm.net. Recall that AT&T is close to completing its acquisition of Tele-Communications Incorporated, which holds a controlling stake in @Home, which will soon wear an Excite portal.
Consider Microsoft: its portal, its millions of members and thousands of POPs (msn.com), and its backbone (courtesy of UUnet).
Consider AOL: its portal (AOL + Netcenter), its millions of members and thousands of POPs, and (oops), no backbone. Let's see, who's available? Sprint, Qwest, even MCI Worldcom?
Consider Yahoo: today they're just a portal, no dial-in members and no pipes. With their market cap sailing above that of Sears, Yahoo could buy up some of the remaining national ISPs and engage AOL in a bidding war for one of the backbone companies.
Looks like the big guys have tacitly agreed on the formula for future Net success: portal + members + POPs + pipes. What's behind this thinking? Mark Anderson puts forward a plausible guess in last week's issue of his Strategic News Service  (subscription only, sample issues available): that these are not portals opening to the wonders of the Net, they are gates through which members pass into the closed communities of the portals' owners.
Security-vs.-privacy battle plays out in mere days
Early in the week of 18 January, rumors appeared claiming that Intel planned to embed a unique ID number in each Pentium III processor. By the time of Intel's announcement  of the feature on Thursday 21 January, Privacy organizations were in full cry over the scheme . In the original plan, the ID number would be sent by default to every visited Web site; Intel would provide software to disable it, but the ID would come back after each reboot. Incredibly, Intel denied that the ID feature carries any privacy implications whatsoever. Pressure on the company increased when US congressman Edward J. Markey sent a letter  spotlighting privacy questions.
Posters to the Cryptography list noted that a hardware-resident ID conveys no guarantee of security, since software must be invoked to use it.
Police raid knocks Swiss site off the air
The National Music Publishers' Association, acting on behalf of several US music publishers, filed a criminal complaint against the International Lyrics Server . A local attorney general ordered a raid on the site's owner, technical consultant, and ISP, seizing equipment and databases . The NMPA acted through its licensing subsidiary The Harry Fox Agency  against the popular site, operated on a not-for-profit basis by Net consultant Pascal de Vries. The site accepted advertising to offset ISP charges of over $14,000 per month to serve a million hits a day. De Vries contends that he posted no copyrighted material; he says the site functioned like a bulletin board on which its readers discussed and posted song lyrics. The ISP that hosted the lyrics server may be vulnerable because Switzerland has not yet updated its laws to shield ISPs as common carriers. Yesterday Wired filed a story  reporting that de deVries has spoken to the head of NMPA and is hopeful they can work out a settlement allowing him to put the lyrics server back online.
Using the Internet as a massively parallel computer
See also TBTF for 2000-03-31, 1999-08-30, 07-19, 01-26, 1998-03-02, 1997-10-27, 09-08, 09-01, 06-23, 01-29, 1996-12-02
RSA contest won while RSA conference is still in session
Less than 24 hours after RSA's new DES Challenge III was announced, the secret key was discovered  by Deep Crack, the purpose-built machine that took the prize last time around . Deep Crack had been assembled at the RSA Data Security conference where the new challenge was launched. This time the EFF's crypto cracker had assistance from over 100,000 machines organized by distributed.net, which was the winner last February . At peak this partnership was checking 220 billion keys per second; Deep Crack accounted for 80 billion of those.
DES I 96 days 04/97 by Rocke Verser DES II 41 days 02/98 by Distributed.net  DES II-2 2.3 days 07/98 by EFF Deep Crack  (=4.5 days to 50% of the keyspace) DES III 0.9 days 01/99 by Deep Crack / Distributed.net (=2.0 days to 50%) http://www.eff.org/pub/Privacy/Crypto_misc/DESCracker/HTML/...
Cryptography export policy
See also TBTF for 2000-02-06, 1999-10-05, 08-30, 08-23, 08-16, 07-26, 05-22, 05-08, 04-21, 03-01, 01-26, more...
Will allow internal use of 128-bit software, for now
As reported here in a Tasty Bit of the Day, France has relaxed its policy on the use of cryptography by its citizens . (Look about halfway down this page for a section beginning "(c) Le troisieme chantier legislatif concerne la cryptologie." The following seven paragraphs, fed to the Babelfish , come out like this . Here is a human-crafted translation  that was posted to the Cryptography list.) The new French rules allow the use of 128-bit crypto until a new law is finalized, a process that could take several months. Before the new rules were announced the French economy and finance minister, Domenique Strauss-Kahn, was quoted as saying that the French were at the mercy of "large ears" who did not care about personal privacy, possibly a veiled reference to United States spy agencies widely believed to eavesdrop on a significant fraction of the telephone and Internet traffic in Europe.
France has been many years behind the rest of Europe in its embrace of the Internet, having invested heavily in the 1980s in the now somewhat quaint Minitel technology. Allowing its citizens to use cryptography to protect credit-card transactions is the rock-bottom first step at the nation needs to take in order to participate with the rest of the world in Internet commerce.
Thanks to ted byfield <tbyfield at panix dot com>, who sent me the first heads-up on this story.
Berkeley session will update the Magaziner Report
A conference  coming up in March will interest those of you involved in the legal and policy aspects of E-commerce. Co-sponsored by the Berkeley Center for Law and Technology, the two-day session will feature speakers such as Peter Swire, Pamela Samuelson, Hal Varian, and Lawrence Lessig addressing issues of intellectual property, security, privacy protection, and the proper role of governments in the Net's future. The motivation for the gathering is the second anniversary of the Magaziner Report, which ages ago in Net time sketched out a policy framework for governments confronting the growth of a new commercial medium. The conference will be held March 5 and 6 on the UC Berkeley campus, and you can get further details here .
See also TBTF for 2000-03-31, 1999-08-30, 06-14, 02-15, 01-26, 01-13, 1998-12-15, 08-31, 05-18, 05-11, 04-27, more...
Tired: software patents; Wired: business model patents
Patents on Internet business models had already begun to cast a worrying shadow over new Net businesses  before the Supreme Court this month blessed the concept . Priceline.com, claimer of one of the newfangled patents, is being challenged  not on the principle of the thing but on a conflict of filing dates. A little-remarked case recently heard in an Indianapolis court, however, may supply the first test of whether business-model patents are enforceable. Computer consulting firm Charles E. Hill & Associates has charged CompuServe with violating its 1996 patent  describing a process for remotely updating electronic catalogs. A so-called Markman hearing, in which a judge rules on whether the defendant has infringed the patent, was concluded earlier this month; after briefs are filed later this week the judge will take the case under advisement. If the judge rules in Hill's favor the case will go before a jury trial for damages. Compuserve has not challenged the validity of the patent itself, but could still do so.
Hill has no Web presence. I spoke to Don Knevel of Barnes & Thornburg, the lawyer representing Hill, and he said none of the public information from this trial has been posted on the Web. If the ruling is appealed, however, the outcome of the appeal should in due course appear on this page .
Multiple-PC homes are the tip of the iceberg for future networks
A two-day seminar on home networking convened by the Yankee Group looked ahead to a market that isn't here yet, but might start to emerge in 1999 . Multiple-PC households are beginning to see networking solutions for sharing files, printers, and Net connections over telephone wiring, electrical circuits, or wireless. Earlier this month networking giant Cisco announced plans to supply this market, and Intel was not far behind . Intel's offering is based on phone wiring, as befits a member of the Home Phoneline Networking Alliance . Other phoneline-based systems were previewed at last November's Comdex by Epigram and Tut Systems. Startups Proxim and ShareWave offer wireless solutions for the home; these tend to cost about twice what the wired ones do.
Getting home PCs and peripherals to talk together more easily is a small battle to the larger war of defining standards for a vastly enlarged global network . Sun's Jini  is the latest high-profile entry into the fray. Two camps have emerged: computer-cen- tric (Microsoft, HP, IBM, and Lucent) vs. appliance-centric (Sun, Sony, and Philips). (There is a typo in the final paragraph of ; for Sun read Sony.)
Net publishing pioneer tells all
John Labovitz started his listing  of online magazines in 1993. Last summer the impending 5th anniversary of his e-zine list, which had moved from Usenet to the Web, prompted Art Bin magazine to invite Labovitz to write about the list's history. The result  is a savory brew of Net lore, memoir, and the background of publishing on the Net.
Year 2000 straws in the wind
See also TBTF for 2000-02-06, 1999-12-16, 08-23, 01-26, 01-13, 1998-11-11, 10-12, 07-27, 05-25, 05-11, 04-20
Last summer Microsoft crooked a finger at Lotus cc:Mail customers with a series of ads asking, "It's 1900, do you know where your messages are?" It seems that cc:Mail's large installed base was wrestling with hard choices as Lotus fixed their Y2K problems in that product line, such as whether to submit to the pain of upgrading to a new version. Microsoft probably intended for fed-up Lotus customers to switch to MS Exchange; they certainly weren't publicizing the fact that their own legacy mail system, MS Mail, had serious Y2K problems of its own. Now the company has posted documents outlining the need for Microsoft Mail users to download and install service packs, and the large customer base of that legacy product gets to wrestle with the same upgrade problems that faced their Lotus-using brothers-in-arms, only a year later and closer to the immovable deadline. The analysts aren't treating Microsoft kindly over this one. Read the details here . Thanks to TBTF Irregular Steve Rothman <srothman at ma dot ultranet dot com> for the tip.
Report of a very Confucian incentive is a joke
The following too-good-to-be-true story has been widely reported  (including by this august rag, as a Tasty Bit of the Day):
TBTF's Web host, Imagiware, Inc., has become a sponsor. You'll notice a pointer to their hosting service  at the bottom of TBTF's main page and also on the new FAQ and Details page . The proprietors at Imagiware deliver a level of service that is extremely rare in the Web era. They answer the phone themselves and fix whatever your problem is, pronto. If you're looking for Web hosting I recommend Imagiware without reservation. Tell them TBTF sent you.
I've accepted a position as director of the Electronic Business Strategies service for The Hurwitz Group , a technology analyst and consulting firm in the Boston area. For a look at the Hurwitz slant on E-business, visit the premiere edition of our new online magazine; access is free through 29 January. Sign up as a guest user  (you must have cookies enabled) and follow the link to Electronic Business Monthly.
My hope and plan is to keep TBTF coming to you as usual.
TBTF home and archive at http://tbtf.com/ . To subscribe send the the message "subscribe" to email@example.com. TBTF is Copyright 1994-1999 by Keith Dawson, <dawson dot tbtf at gmail dot com>. Commercial use pro- hibited. For non-commercial purposes please forward, post, and link as you see fit. _______________________________________________ Keith Dawson dawson dot tbtf at gmail dot com Layer of ash separates morning and evening milk.