Top Banner
I I p ' ! I I I l _ ~ e . o . d lhiS l l TAP Magazine P.O. Box 20264 Louisville, KY 40250 SUBSCRIPTION INFO Send 1 25¢ stamp fo r each issue that you want to receive. EX: 1 stamp=l issue. 2 stamps= 2 TAPs. ETC .••• We do NOT accept fixed stamps.
4

TAP Magazine - Issue #98

Apr 06, 2018

Download

Documents

GBPPR
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: TAP Magazine - Issue #98

8/3/2019 TAP Magazine - Issue #98

http://slidepdf.com/reader/full/tap-magazine-issue-98 1/4

I

I

p

'!

II

I

l_

~ e . o . d lhiSl

l

TAP MagazineP.O. Box 20264

Louisvil le, KY 40250 ~ q

SUBSCRIPTION INFO

Send 1 25¢ stamp

fo r each issue thatyou want to receive.

EX: 1 stamp=l i s sue .2 stamps= 2 TAPs.

ETC . • • •

We do NOT accept fixedstamps.

Page 2: TAP Magazine - Issue #98

8/3/2019 TAP Magazine - Issue #98

http://slidepdf.com/reader/full/tap-magazine-issue-98 2/4

F1 t. do t\ fo M. ; J\S ~ 4 { i . ( Ke.y.

Ch.os co_,,,te.r Clull

6t h Chaos Communication Congress 1989·Open f r o n t i e r s : CoComed together '

By: Klaus Brunnstein

Followingtrends of the 5th

CCCcongress,

themes r e l a t i n gto computer secur i ty were l e s s dominanb. As CCC members andcongress, organizers age and t h e i r profess ioinal backgrounddominates (a s i gn i fi ca n t p a rt works in computing), th ep o l i t i c a l impact of computerisation becomes dominant, no tonly under a revised West/East German scenario. Even th epresentation o f comp. secur it y changes: invi ted speakers withsol id s c i e n t i f i c background l ec ture in t r ad i ti o n al s t y le ,some even with overhead f o l i o s from i n t e r n a t i o n a l conferences;even a s t a t e a t torney ( respons ible fo r th e case FRG vs .S .Wernery re hacking!) p a r t i c i p a t e d in a suprisingly f a i r andopen discussion on criminal law against hacking.

The 6t h annual c ongr es s o f Hamburg's Chaos Computer Club(CCC) was held on 27-29 December 1989 in Hamburg. Therecent p o l i t i c a l development in Germany also i n fl u en ce s t hehacker scene; only a f t e r a cont rovers ia l debate, th eorganizers denied a suggestion to move th e congress t o EastBerlin. Among th e about 300 v i s i t o r s , about 50 people werefrom East Germany were present . A few f o r ~ i g n v i s i t o r s camefrom France , Nether lands and USA. The congress was maledominated, with a growing female p a r t i c i p a t i o n (about 40).The other major German hacker groups ( fr om Bavaria, Cologne)were no t p r e s e n t ~

3

\

I

HC1 -PQI.

Wal\l\" ~ f \ O w Jno wJ to op t f\

'cJ i t t J Q C J ~ 5 ?

\. . _ - ~ -

HGW t o obtain access to MasterLock b ra nd l oc ks ( ty pe whichu ~ double edged s y m e t r i - - ~ L •

1 .) Obtainth e

key(buy, f in d, t ak e,

e t c . )

2. J F i l e down a l l ser ra t ions b e t w ~ e n th e k ~ h o l d ' l a s t

s e r r a t i o n . Do Not File t he L ast S er ra ti on ! (Seer U d i m ~ n t a r y drawing).

j . j This key wil l now f i t any double-sided MasterLock oft h a t s i z e . An e n t i r e col lect ion of d i f f e r e n t sizeal tered keys can be very useful .

Major themes were:- i n f o about computerisation and network i n f r a s t r u c t u r e .in East Germany-cooperation w it h E as t German computer freaks

-cooperation wi th eco -g roups- 'female computer handling'-KGB-hacker 'Hagbard'- Se cur it y i n open networks (2 invi ted speakers)-Hacker ethics and Harper's Hacker Confe rence (Cap 'n Crunch)-Free Flow of Information, Copyright _-UNIX discussions: several workshops, UUCP

-Virus Forum I I .

Use in good health!

GIZ

As ~ l w ~ y s with TAP magazine, ~ l th e information we peint

~ fo r INFOkMAT10NAL P U H P O S ~ S ONLY. It's yo thang ~ doh n ~ ~ you w ~ n t to do .

2

Several sessions were devoted to th e s t a t e and possibledevelopments of computers + communication (c+c) in EastGe rmany . Wi th i n s u f f i c i e n t computers and and outmodedtelephone net , CCC appealed to th e German public to donateunused equipment (C64, Apple I I , PCs) to eastern groups.As s u b s t i t u t e of th e i n s u f f i c i e n t telephone net , th e recentlyi n s t a l l e d 'packet, radio' should be used fo r computer com

mUhicat ion; pc-communicat ion with packet-radio was demons t r a t e d a t th e exhibi t ion. As a s t a r t of computerisation,CCC plans to hold another cong res s (Kaos Kommunikation Kongress)in East Berlin e ar ly i n 1990.

Page 3: TAP Magazine - Issue #98

8/3/2019 TAP Magazine - Issue #98

http://slidepdf.com/reader/full/tap-magazine-issue-98 3/4

' W . . , ~ , . , ..- ..

Blitzkri.g Bbe (TAP 885) •••••••••••••••••••• 502-499-8933The Eagle'. Ne.t (TAP .ub) ••••••••••••••• •• 502-491-4493led Phone Bb•••••••••••••••••••••••· . · · · · · · ·201-748-4005Anarchist Expr•••••••••••••••••••••••••·····21J-8Jl-1741**.You can se t in touch with the ataff at the top bbe.***

1

,l·

Dwe

ISBUK I

USJ:D ON

INS Tl 'k l l fnON / N S ~ I J C n . d

4 4

Z2-

, I

2 l.

I I

2- 2

Z Z.

S" sI I, ,I I,

•s: s:,I

I

I

I 25 ..

s

_ _ _ .,·,.,r_NO . ~ L I J

• ~ ~ . t t ~ . - . _ . - ... I_ L l INt . '" i l L .

POoST I : ! / ~ ~ e . ~ . ( ' U l ' / l f I € ~ . s , q L )

P I 9 N ~ t . . FRoNr , t 1 . : J . j ~ ( J ) . r l V ~ · v P )

P " N £ t . . ~ . t e o l V r ,t/.:u,;.,.,. ( t l N ~ e ~ \

P 0 4 T~ ~ . $ e . , . . , .

(/).tt.IV£· G/p)

P"N£L .F.eONr / l s ~ U t . ( W A L ' ~ · U P )

LJOI( 1 R l 9 c o # ~ ~ o

P £ , , ~ • 3/4- -1 4 PT F I 2.

PLV(J ,) 3/8- 18 PT F I I

P L 4 r £ R ~ £ O .. 864 I •

~ P . e J N t S , I £ £ E .. (.C - 04 Z/) · 1 7 ~ 2.

J.!A$lIeN. P L A W . ( 1 # ~ •• " ( ) ' K . 7 ~ 4 x . ~ 3 1 S

~ c . ~ . JlElL NIJ. 3/ 8 - I t . t 1 - / / "

eece» rwc c e, L.• VITo'" .. -SZ4Z I I

~ ~ 0 6 J N " I " ' 6 . L v " . IL$Co - TA&-.$I ,

~ / A / f I , . R c T I 9 / , v I A l 6 , . J l A I . ~ j · ~ -SlI4·/,1 4

D E . $ C . ~ / P T I O N

1

»r , q ~ ~ 4 " ' , ( W 4 L K · C / P )

. = - - o . , . e ~ , P ~ o T ~ C T o RI CIlIP. P o ~ r I l ~ . s l " f .I -5t=4L R.s.3e,.,.

R £ P t . I 4 ~ 4 . l 1 e N T P I 9 ~ r J

i - 7 ~ ~ O ' S · 3 I ~ C ~ E " ' ) F.N. .secoerrv I e:

( ~ : J AIL£. TNG P A N ~ L 70 7il6 t4J:r h ' N ~ lilt/if.., FIf/DH me! Jl:J.sr.(6 ) To IN.sr""" PANEL) ()$C ~ E . ..- ~ , -V'- __ -"l(;5 •

(8) R £ ~ , , ~ T N F o u ~ oJ/8-1/8'1 1-.J/4 #4k. N ~ A / ) 8 ~ ' T $" 'HI ) Fou/l S/8" r L A r J . l A . s N € ~ , . ~ o , . , 7N4 L:JA.I&. ...----......-----'1

(c ) NLIl';N l i I . F o , , ~ HDuNTINt i H O L £ ~ IN PD..'T M rN

THE 7 H ~ ~ A b £ / J I I O L E ~ IN 8 , q ~ e / I N / ) S £ t : u A ~ A,.srTo B , q . s ~ ( . / ~ / / t I " Tile !llIIlbI4JI9R£ Rcl'1'otll!l) IN (8).I/O) I/-I.$TI'/I.L 8 1 9 . s ~ Co".6(s ) I . ~ P P L I C A 6 L £ 1,/.$IAltS,

R E V f £ ~ . : 5 E P . e o C ~ b l , / J i ! ! G F ~ O I ' 1 " I f ~ ~ I N - i r A I I C r U J ~ 4 .L I . $ T 4 / 'pOST 1 I ~ $ & I 1 I J I . . " I ( L J ~ / V t ! -1./1')

;0 •

/ N ~ T A " L I 9 T I ( ) ' " I I t I ~ T I l ~ C T I D I ' i . $ /O£AlTICI'9L 70 7iI£ ( . . / ~ T 40.t . / ~ r 43 Po.sr / I ~ £ " J j , v ( ( ) N l t l E ~ ~ I f 4 - )! l v ~ r / / ' i . A r l i : u " / N ~ r J ! u c . r / ~ l t I . . s IDENTICAL T o ] i , ~ ll .3Y 4 0

5 ~ l .IIT4$T I ~ ~ , , £ OF 13£" . . s ' f ~ r ~ n ~ A C : " l c . c ! ~.secT Sa8-4SZ-/0(J F o COHP",e.Tc / ~ r ~ U c . T l o N . . : S

I (.. 7i.SOOl,-3

1 I L· 7 ' S 0 0 6 - ,

8 I L-7"soo6-Z

I c - 7 b S O O ~ - ~

S It. - 7 . 5 0 0 z . - l .

/4-

II

/3

17

It

/8

/ ,

21

/0

21.

IS

= ~ ~ ~ : ~ . : ~ . = ; ~ ~ ~ : ; : ~ = : I : : = : I : : : : ; . , : ~ ~ : I ; ; : . . : : : : . . , O.. I I

TO a DIlCIMAL PLAcaa * M AHCI' - - *TO • DIlClIllAL PLACa *

rL:

/ . v ~ " " ' L " " ' G j O.e . e ~ " t J " " " ' c s ,~ ~ " , , . PAW€L /I.s.s£,.,. 1:)* P()$T

v

lM.SrAI.I. A r ~ O N I N ~ 7 ) ! ~ C ~E N r ~ I 9 N ~ 4 ' # o u ~ FGit P . t . J ~ ~ /I"b 7 i t 4 P ~ . w e J I t ~ , ' N ~ 1 9 ~ ~

P ~ . t l l b ~ b II r TOp A ~ 80 rr.,., ( ) I ' P D ~ ' " ' ; , ~ ( ) " ~ J I ~ 4 b

I / N " 4 ~ t ; ~ t w ~ / ) C N r ~ I 1 t A I c . ~ . R,., R£II"f''''tI''' P , q . v ~ , ON

r l J ~ F ~ t M l r a TN 6 P ~ , P ~ t J " ' ' ' 6 ~ A C ~ C $ ~ 10 /Jv € , £ ~ .Ovr t , ; r tJoJ( /I",,, , P ~ o r E . c r o FaA;! ~ ~ I 1 I N , f r l N ~ lNe

P O f , , / ~ ~ / I N / ) n l . ~ P I M N £ ...sUVlC£ C ~ H ~ ~ < i 1i; TN£ PO.$rAN/) FtJ4 / 1 ( N , 1 N r ~ " , ~ ~ ()pr't:J/#/;fl., . L I t ; N T C ~ I l I I T ~ D L (N ,T

/ I N / ) C / l ( J c v ~ r 8 e C A ~ £ ~ .{ .I .$T 4 0 PO.sT ~ S . $ E . " " 8 L ' " ( J . I , q L K . ( / / ~(A ) R t ! ~ ~ ~ 4 Two . . s i i C . V N ~ r"l 5<'N£1AJ.$ ( /TEIf /,.) r ~ o ' 1 ~

, e " ~ O A / T PAN#.( / I N / ) R£HOfl£ ,t:]qN£L ~ . F O " t H J ~ :(I) 8 ~ " c ~ ~ N . G n f 1 I 9 ~ N . . 3 T RlfiNT . 5 / ~ £ OP , P o ~ r l / l

V,ettltbFl?o'1 r l l ~ ~ ~ t ' H t:

( 2 ) ~ ! K 4 ' &rIlIlANDs ON ( ) p P r J ~ / n r . .5lb4 O,e Pi9111E.L.

(J ) PULL lOp ,qN6 BDrr1>1'1 O F P I9 N 4 ' -SU1t1LT'IIJ£OI.AS''y

7 O ~ I f I R / ) Rit#NT . . 5 1 ~ ~ 0, Po"" r.(4 ) WHEN THE L O ~ ~ ~ N ~ rL .AN'i£ ~ TNe L ~ F ' T . . 5 l b E . at:

PI9Nt!t... C L E I 9 ~ 5 THe P O ~ T ) P l v o r 7J.1e LEFr...5/L>E

/;4.1,11'1 F ~ ( ) " THE PO.$T.

~ ~ ~ ~ <~ '

t:?~ K i l l 1 ' I ~" < , '191~ / / ~ @

~ ~ = t ~ ~~

/c·

• T , c " ' b . " I f ~ 1 (. : 5 £ " T ~ Y · K'.S -Z084Z I L4(), /..4/ f' 4.3 !b.sT A . s . . s e . I ' t I J " ~ ~

~

I 1 o I l l ~ r l , t / ( , . f ~ ~ E ' - I ~ F o IOAt C ; . t c ~ , r & l " ~ t ~

~ £lee"'-rUT

lJ / ' "v , . ~ « R ( { , e o u " ' l > ~ ' : : : I I o " ' 1 !1"'b I'o ... t : J J / ~ £ € N r ~ " N c

o-

4 5

Page 4: TAP Magazine - Issue #98

8/3/2019 TAP Magazine - Issue #98

http://slidepdf.com/reader/full/tap-magazine-issue-98 4/4

Representatives of th e East German cit izen movement, esp.from'New Forum' discussed possible devolpments. Many part ic ipants(most or iented towards th e l e f t wing of th e pol i t ical spectrum)adviced th e East Germans no t wil l ingly to follow West Germanc+c industry and public author i t ies (Telakom) to i ns t a l lt r ad i t iona l technology; as an example, ISDN i s widely c r i t i cized because it neg le c ts d at a protection laws.

Following discussions on CCC congress 88 , several projectsof eco log i ca l da ta processing and communicai ton s tar ted(e .g . data c o ll e ct io n i n th e enviroment of industry and nuclearpower plants) . CCC and some eco-groups plan to ins ta l l aninformation center on a ship during th e EEe's North Sea

conference (March 1990). A special session and workshop wasalso devoted to female computer-handling; a group of male(3 0) an d female (20) part ic ipants discussed th e role anda t t i tudes of women in education and profession; s io i l a rdiscussions in nat ional and in terna t ional conferences (e .g .IFfP TC-9) may point to revised design p r in c ip l es ( e .g .reduced complexity, possible p laus ib i l i ty control) .

Only a minor par t of th e congress was devoted to t rad it ionalhacker themes. Suprisingly, CCC d id n ot follow it's t rad

i t ion to ex t ens ive ly d i scuss hacker expe r ience s o f th e l a s tyear. The KGB hack (b road ly published in March , 1989) was*no theme*; instead, a session was devoted to th e memory ofKarl Koch al ias 'Captain Hagbard' , on e of Clif f Stol l ' s'Wily Hackers ' (CACM 5/1988) who, after having informed th epublic author i t ies as one of 2 chief witnesses in th e case,

committed suiciqe. 3 personal f r iends (without any in te r es tin c ompu ti ng ) a nd PENGO (the o th er c hi ef wi tne ss ) de sc r ib edHagba rd 's s ad l i f e story, fu l l of family probl ems and

addictions (drug, hacking). The role of th e media as wellas CCC's r ol e ( pa rt of which had strongly denied any contactto t he c ra cke rs ) was controversially 'd i s c u s s e d .

Btw: th e t r i a l agains t 3KGB hackers will begin on Ja n 11 , 1990.

A whole 4 hour session was devoted to ' S ec u ri ty i n opennetworks' , with Dr. Raubo ld ( d ir ec to r i n GMD, t he n at io n alresearch i ns t i tu t e fo r c omput er s a nd communi ca ti on ) a nd Dr.Pfitzmann (Kar l sruhe , Facu l ty fo r Informatics) introducingin to technologies of encryption (DES, RSA) and o f s ec ur ecommunication in open networks; th e 20 par t icipants whichstayed unt i l th e end were mainly s tu de nt s o f Informatics

and programmers .

'Cap'n Crunch' reported about t he r ec en t elec tronic conference which was sponsered by Ha rpe r' s; t he resu lts wil l bepublished in this magazine e ar ly i n 1 99 0 (Ed - Ma rc h) (surveydocument in English available on reques t) . He moreoverdemonstrated, v ia AT+T operator switched connection, PicturePhone.

Virus Forum II (1989) was intended to show th e devolopmentssince Forum I (1985) where CCC made v i ru s es publ ic ly knownin FRG. Ralf Burger ( au th or o f a Virus Book, where hepublished also vi rus code including a MVS/370 virus) , WauHolland (CCC's founding father) , Juergen Wieckmann (edi torof Chaos Computer Book) and K.Brunnstein discussed t rends ofviruses. Meanwhile, more than 80 viruses are known on INTEL80xxx-systems, and more than 70 on several 68.000-systmes as

AMIGA, Atar i and MacIntosh. Viruses are found to grow from' famil ies ' , th e descendants of which are ever more di f f i cu l t

to analyse and produce growing damages.6

-

,J

WHile th e pa r t i c i panc s ca,yreeu in th e t hrea t a s se s smen t , t her e

W i l ~ s i qn i f Lcan t d i saqreement; about th e couscqucnccs . j j U l ' g ~ ! "i!ryueJ t h ~ t e v ~ c y b o d y CdO pro9raUl ..1 VirU::ii publi(.;ation orV l r u ~ COuc d o ~ ~ no t cont r ibute t o th e virus thcc'-lt. UrUllU-

s t eLn a r qued strongly aqa i ns t , tha t many young p roq rauunerslearn to program viruses Ul.:linly from ~ u b l i ~ h c d code which t h ~ ycnanqe s l ightly to produce there own virus; even i f theyproyraOl it viru::i fo r l c ~ r n i n 9 pucpo::acs, they l oos e contculwhen i t s p r c a d ~ via t h friends ' diskettes . Virus lJublicationas pare of vi rus d i ~ t r i b u t i o n presents severe t h r ~ a c s co d a t ~proceas rnq in economy , public serv rces and priva te l i t e .IFIP G e n ~ r a l ASSembly

Another controversy raised when Burger to ld th e a U d i e ~ c e :'My ant iv irus finds every virus ' ; u n f o r t u ~ a t e l y , .h e d ~ noca c c ~ p c a bet from th e a u d i ~ n c e to p rove h1s p r o m ~ s e . B ~ r ~ ~ ra ls o s aj d, tha t he needs only o n e . h o ~ r . t o d ~ t ~ c c and ellmlnate any anomaly; th i s differed s ~ 9 n ~ f ~ c a n t l y from th e 250

hours which according to B r u n n s t e ~ n are needed to analyse ,and class ify a complex vi rus and to produce t h proper antl-

virus.

Some part ic ipants from th e audience dif ferentiated b e t w e e n ~che good us e of viruses and bad use. I t could Le Good Usc ofviruses .a ga i n s t inacceptable a c ~ i v i t i e s , such a s n uc le arweapons or s t at e a c t iv i t ie s such as census. Following suchideas, Wau Holland said that th e existence of viruses g i v ~ sa chance to analyse whether they are ' social ly acceptable '.

' J ' h ~ I elec tronic newspaper', which reports th e maqor di scus-sions of CCC'U9, was s ignif icantly more p r o f e s s i a n ~ l l y o r g ~ n i s ~ dtdhn las t year; i t was produced by th e team of CHASTLISTI,eec ' s newly (lYH9) founded elec tronic n e w s p a p ~ r , as editionno.4. Due to th e minoi foreign par t icipation , most d o c u m e n ~ sare German, with only two documents ar e wr it te n i n English(Capt.Crunch's repor t on th e Harper Hacker Conference, 41ud

th e l F IP Gener al Assembly' s resolution on l e ga l a c ti v iL i c5agains t viruses ) . There may be an English translacion ofth e CCC newspaper in some time (?early February); I wil l senda s hor t no ti ce to PGN when th i s i s available. People i n c e r ~ s t e din th e German version (1794 Lines, 97kBytes) or th e Englishdocuments (135 Lines, BkBytes) can request ic from t he a ut ho r.

Conclusion: cc c and i t s constituency is on th e *way to

professionalism*. On th is way, ce c may l oos e conc ro l and evenconLact to rea l hacker groups, which they previously hold incases such as Btx and NASA hack; in the KGB case, CCC

~ v i d e n t l y had neither information no r cont rol of t h crackers.On th e other hand, CCC's p ropaga tion o f UNIX enlarges th ethrea ts inherent in UUCP and th e UNIXes.

~ l ~ u s Brunnstein U n i v e r s i ~ y of Hamburg, FRG :J a n u a r y 3, l ~ ~ O

*•• ~ d i t o r · s note- While typinq th is data in , I have sliyht!y

~ d i l ~ d i t . Correcting ~ n p o ~ ~ i b l y aduing ~ o m e m i s t d k ~ st h ~ t t he a ut ho r mighc have maJe. This ar t i c l e W d ~ t ~ k ~ n(com H i ~ k ~ ~ . 5 ~ .

7