• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Mad Dog 21/21: Something Wiki This Way Comes

    January 17, 2011 Hesh Wiener

    If Bradley Manning had become a quarterback like Peyton Manning or Eli Manning, Julian Assange might never have been accused of having a greater aversion to condoms than the Pope. Instead, Bradley Manning is in the brig, accused of pilfering classified material that ended up in the hands of Wikileaks, which one might want well washed before shaking. From Wikileaks, the fishy secrets ended up in the fish-wrappers produced by the New York Times, the Guardian, der Spiegel, and elsewhere. It’s all enough to make most any IT professional (even you) pay a little more attention to system security.

    Bradley Manning: Soldier said to be in the gay berets accused of providing classified data to Wikileaks.

    In the case of the stuff that got to Wikileaks by means that remain (and may always be) obscured, an outside view of the situation based on press accounts and guesswork might suggest that the vulnerabilities that were exploited were more a matter of policies than software. But that kind of explanation risks separating things that in practice are not so easy to separate. System policies are not just about rules and wishes, they are mainly about software and settings. So, when a shop tries to lock down its data, even in computing environments as potentially secure as those on an IBM i box, the effort may fall short.

    Time and again, here and elsewhere, users have been advised to do double-check a few basic things about their systems. The most common points made by security experts seem to be:

    • It takes some effort and, for most shops, some extra software, to properly manage users’ permissions. But it’s worth it. As recent events show, security isn’t just about keeping hackers out, it can be about restricting personnel, too. While end user enterprises and institutions usually don’t have to worry about the kinds of embarrassing revelations that occurred in the Wikileaks affair, no organization wants its private information to get into the hands of rivals or critics.
    • Systems software, middleware and application programs necessarily have points where they can connect to internal or external facilities. There are way more of these exit points than most systems personnel can track. There are software products to help you control these potential vulnerabilities. Use them.
    • When IBM or an ISV slips up and leaves a soft spot in software, somebody might take advantage of it. On a system like the OS/400 and i5/OS platforms that users may keep at an older software level for a long, long time (or forever), even when the flaw is corrected on newer packages running the newer OS like i 6.1 or i 7.1, all the vintage systems still in operation remain vulnerable. Some of the classic holes in OS/400 and i systems are well documented, though, so you might, if you study up, be able to reinforce your computer for as long as you prefer to live in legacy land.
    • Additionally, if the worst happens and somebody penetrates your system, you ought to be able to figure out what happened. Basically, this means getting your system to keep good journals and logs, and that means making sure you have the extra storage capacity and processing power to turn on all of the event recording technology that you need. If you think the price of some extra disk space (and the hassle of bigger backups) isn’t worth much, then you might actually be saying your career isn’t worth much.

    Am I preaching to the choir? Maybe. Security isn’t an easy sell, because if it’s done right there are no dramatic results to show to the suits. There are however, some things that IT personnel can do to bolster a case for investments in protection. Every system that provides Web serves will have logs, and the logs might be pretty dramatic. The data this site’s servers capture in the ordinary course of business show that hacker and robots persistently try to breach security; the hacking issue is almost inexplicable, because our servers exist so we can share our news and information with anyone who is interested. Go figure. But commercial companies are in a different situation. Intruders might be able to reach data that is private and confidential. And insiders bent on mischief? Forget about it.

    Last month, Wayne Evans published an essay here in which he hit the key issues in security planning. He put policies at the top of his list. “Policies” is a polite way of saying user management. While it can be awkward to set limits on user access, particularly if an IT shop has a history of running in a freewheeling manner, it really is a good idea. If Bradley Manning didn’t have access to so much data he might not have become a poster boy for American ineptitude and Julian Assange might not be starring in Attack of the Killer Groupies.

    Julian Assange: Wikileaks founder, hero to some, devil to others, and an interesting character to most everyone, particularly nerd groupies.

    Evans also said that there are too many ways for IBM i systems to connect with external systems that have to be watched or blocked. He made it clear that most user organizations find managing exit points just plain overwhelming. There are plenty of software products that bring management within the reach of typical user companies, and he provided a pretty good list of vendors. From the tone of the article it’s clear that Evans thinks most i shops don’t do a very good job of managing exit points (or managing other aspects of system security for that matter), and, unfortunately, he’s probably correct.

    Evans’ two-part essay lists other things he believes are common sources of risk at i installations, and his theme seems to be that user organizations just don’t do an adequate job of protecting their systems, even if they seem to be trying.

    But it might be wise to take Evans’ advice with a grain of salt. An ex-IBMer, Evans is not inclined to criticize Big Blue for failing to make life easier for users. Others, however, are not so kind to IBM.

    Several years ago, an Israeli programmer whose position is just about a dead opposite of Evans’ stance began to make himself known as a critic of IBM’s systems software. Shalom Carmel, who is hooked up with a technology company called Venera, set up a Web site called Hacking iSeries that is just what it says on the label. Carmel also wrote a book with that title about five years ago (sold by the site and by Amazon). The book and Web site explain some security flaws dating back to OS/400 and running forward to recent descendants. While Hacking iSeries is no longer fully up-to-date, neither are many i systems, so the material in the 258-page book and the examples on his download page may well apply to your shop.

    Basically, Carmel points out that, like other systems, IBM i can have potential weak points when it is hooked to the Internet. He provides not just general advice but also specific examples of ways a hacker can attack an i. (Some of these techniques also work on Unix systems that have a lot in common with IBM i when it comes to Internet services like FTP.) Carmel’s site notes that IBM cured some of its longstanding ills with OS/400 V5R2 and subsequent releases, but he also suggests that there are plenty of ways for troublemakers to go after a current i unless the system’s operators have done a pretty careful good job setting up their machines.

    Despite their dramatically different attitudes, Evans and Carmel share one key attitude: Both believe IBM i can be well protected from intrusion using features built into the operating system. But both also believe that an i box comes out of the box configured for easy setup and that a byproduct of this malleability is diminished security.

    All this leaves OS/400 and i users in a situation that at the very least demands an ability to review in detail a system’s history if something goes wrong. Basically, this means keeping an extensive collection of logs and journals and making sure they are protected from erasure, corruption and intrusion. Logs have three effects: They enable a user organization to perform extensive analysis of systems activities in the wake of any security breach. They allow an organization that is worried about ongoing activities to inspect and monitor systems. And the very presence of an intensive journaling setup can intimidate and discourage personnel from engaging in unauthorized activity. As Julian Assange probably would not choose to say, journaling can have a prophylactic effect.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    ASNA Splits from BluePhoenix JDA Focuses on ‘Slow and Erratic’ Product Forecasting with E3

    Leave a Reply Cancel reply

Volume 20, Number 2 -- January 17, 2011
THIS ISSUE SPONSORED BY:

ProData Computer Services
Help/Systems
Bug Busters Software Engineering
SkyView Partners
RJS Software Systems

Table of Contents

  • i5/OS and IBM i Support: How Long Does It Last?
  • Going Full Spiral, Not Coming Full Circle
  • Lotusphere Coming into View; Social Business Looms Big
  • Mad Dog 21/21: Something Wiki This Way Comes
  • IT Spending Curves Upward, Salaries Show Sign of Life
  • Reader Feedback on The Carrot: i5/OS V5R4 Gets Execution Stay Until May
  • U.S. Regains Top Global Patent Holder Title, IBM Leads the Pack
  • Humans $4,600, Watson $4,400 in
  • Rimini Street Says Third Party Support Biz Is Booming
  • Rising Spending Tide Finally Raises the SAP Boat

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle