ISOLATED NETWORK MEETING
February 19, 1999
10:00-11:30 am
3085 ENG II
In attendance:
Matt Bishop (MB), Keith Herold (KH), David O’Brien (DOB), Brian Cameron
(BC), Ricardo Anguiano (RA)
TOPICS
Demeter Problems
Isolated Network Configuration/Architecture
Vulnerabilities Database
Vulnerabilities Paper
-
Demeter Problems
-
Demeter needs to be repatched. Save configuration files, NFS Exports, Host
files
-
Isolated Network Configuration/Architecture
-
Would like to acquire two of the Dell PCs
-
1 Dell to run Linux Redhat
-
1 Dell to Tom Tang wants to run firewall, plug in second ethernet card,
turn off services, leave clients up and try to break in.
-
Schematic Diagram
-
Wish List
-
BeOS
-
Plan 9
-
Home Directories
-
All relevant people have permanent home directories on Zeus and external
disk
-
Home directories on other machines that are temporary (subject to reinstallation)
-
DD – disk dump
-
Need instructions and documentation for each machine for quick reinstallation
after an attack.
-
Try to get Suns and HPs configured for next week
-
Vulnerabilities Database
-
Version fields were deleted
-
Major modification – attack description the same as detection
-
Vulnerabilities Paper
-
MB Modified paper to reflect DOB’s suggestions
-
Need to work on hard links vs. symbolic links
-
Symbolic link – race condition
-
Hard link – no race condition
-
Shortcuts on NT
-
Whether a shortcut to a shortcut to a program will go directly to the target
program or not.