Skip to content or view mobile version

Home | Mobile | Editorial | Mission | Privacy | About | Contact | Help | Security | Support

A network of individuals, independent and alternative media activists and organisations, offering grassroots, non-corporate, non-commercial coverage of important social and political issues.

Oxford Uni Network Hacked

ciderpunx | 16.07.2004 15:19 | Technology | Oxford

2 student journalists have managed to break into the University's computer network.

Two first year students at Oxford Uni have managed to break into the computer network, while investigating it's level of security for a Student Magazine.

Patrick Foster and Roger Waite were able to retrieve email passwords, listen in on MSN Messenger conversations, and even view live CCTV camera footage.

After they contacted the University, the authorities, rather than thanking them for revealing potentially dangerous flaws in their IT setup, reacted in typically draconian fashion, summoning them to a Court of Summary Jurisdiction, where they could be fined up to £500 and suspended from the university (known as rustication). The case was also referred to Thames Valley Police. If they had not contacted the university authorities, it's unlikely that their activities would ever have been exposed.

If people who test networks responsibly are treated in this way, the University can never expect to improve it's security - those with more malicious intentions are hardly likely to own up to their activities!

Students have the right (not least in the light of the Data Protection Act) to have private information kept secure - the University have failed them. Students should encrypt all information held on the "swiss cheese security" university computer system using a known safe copy of gpg -  http://www.gnupg.org/ (pgp for M$ windoze users  http://www.pgpi.org/products/pgp/versions/freeware/winxp/8.0/ )

Here are the links:
 http://www.oxfordstudent.com/2004-05-27/news/1
 http://www.oxfordstudent.com/2004-05-27/editorial/1
 http://slashdot.org/article.pl?sid=04/07/16/021200&mode=thread&tid=126&tid=146&tid=172&tid=99
 http://www.guardian.co.uk/online/news/0,12597,1261609,00.html
 http://news.bbc.co.uk/1/hi/education/3897755.stm

ciderpunx

Comments

Hide the following 9 comments

MS weakness

16.07.2004 15:48

Once again we see an example of the appaling weakness of all Microsoft products. The ability to enter secure areas on MS Exchange is well known and documented on the various websites used by hackers.

I presume nobody who views Indy-media would dream of using Windows or Explorer but we should all ensure our friends and families are not using them either.

Linux, Solaris, Unix, Prabal are all far more secure. The Pegasus e-mail package is also excellent and free !

Journo


pegasus

16.07.2004 16:27

Hi Journo

> The Pegasus e-mail package is also excellent and free !

doesn't pegasus only run on windows ;-)

You do bring up a serious point though. Though, Unices like Solaris are very able, the source code is still in the hands and under the control of a single corporation (and not a particularly nice one in Sun's case). I tend to prefer 'free' software like GNU/Linux.

Free software gives ppl the right to run, study, improve and share programs whereas proprietary software specifically tries to stop people from excercising these rights.

AFAIK the security breach was done by sniffing packets on an unswitched network, so it was more of a hardware than a software issue, although one could still argue that M$N should be done over TLS/SSL which would have meant the packets were encrypted.

Long Live the Penguin!

cat /dev/null > /bin/win32


Education

16.07.2004 19:56

The "hack" was simply done using a network sniffer. Admittedly using a switched network would have increased security slightly, though this would do nothing to prevent anyone outside the network from snooping external unencrypted traffic (eg. msn) anyway. The only way that passwords to university email accounts could've been obtained is if users were using unencrypted POP3/IMAP/http access.

SSL encrypted versions of all these methods of access to email accounts were supported, though obviously most people just use the defaults, and probably would no matter how many times you tell them. The original article was sensationalist, but if the university had any sense rather than than trying to punish them they should concentrate on educating everyone on (lack of) computer security.

sas


Responsible behavior

17.07.2004 12:49

"Responsible behavior"? I don't think so. You do that by walking into OUCS and breaking in there and then and doing it very publicly. They should have followed Phil and Toby's example at Fairford. Would you like your email/banking/indymedia passwords made public? Covert action is normally irresponsible. Nevertheless, it's true that the reaction was draconian. Whey-ho! St George (Linux) may bring down the M$ dragon at least in Oxford. Cambridge will be harder to break, I fear, cos M$ is one of their bigger donors. Not so influential in Oxford maybe.

IT support


cat /dev/null > /bin/win32

18.07.2004 15:06

shouldn't that be:

cat /bin/win32 > /dev/null

(or maybe "cat /dev/null > /bin/win32", is a deep rooted philosophical statment, i.e. that windows is a bigger, deeper black hole than /dev/null, nothing escapes not even the darkness of /dev/null escapes, no-one escapes, no-one hears your screams? . . . thats deep man, very deep. /bin/win32 it is).

and people, dont forget BSD (OpenBSD) its also a free OS (and so is GNU/Hurd).

manic depressive


hack? bollocks

18.07.2004 17:21

using a packet sniffer to reveal passwords and other unencrypted data on a LAN is hardly hacking. any fool can download a packet sniffer. this doesn't reveal a weakness in micro$oft (not that there arn't any), packet sniffing works equally well on data flying around bewteen computers regardless of the operating system. yes, the uni could use encrypted links for some stuff, as could everyone.

what did any of this reveal? only the sensationalist way of writting by the orginal poster..

ben


re: cat /dev/null > /bin/win32

19.07.2004 11:24

> shouldn't that be:
>
> cat /bin/win32 > /dev/null

... not for my preffered behaviour - i.e. overwrite the contents of /bin/win32 with the contents of /dev/null e.g.:

$ echo test > a
$ cat a > /dev/null
$ cat a
test
$ cat /dev/null > a
$ cat a
$

> and people, dont forget BSD (OpenBSD) its also a free OS (and so is GNU/Hurd).

yay! I have freeBSD on the laptop next to me, with an uptime of 89 days (it used to crash at least daily when it was installed with win95).

One caveat though, the BSD licence is different as it doesn't include derivative works, so you can nick their code, and then include it in a proprietary product.

For example the developers of winnt used code based on code from the BSD tcp/ip stack, which they *bought* from a Scottish company called Spider - see  http://www.kuro5hin.org/?op=displaystory;sid=2001/6/19/05641/7357 , and
Proudly Serving My Corporate Masters (!!) by Adam Barr -  http://www.proudlyserving.com/.

srm -f /bin/win32


re: re: cat /dev/null > /bin/win32

19.07.2004 16:51

bloody hell! i didn't know M$ stooped that low!

i wish i could install BSD on my laptop :( i have to use Linux, and sometimes it sucks! Why, oh Why do people *still* make distro specific makefiles (especially for hardware!! isn't it hard enough to make kernel objects without worrying about where to install them?)and why is kernel 2.6 not backwards compatiable with 2.4? whats the deal with that!! why!!! why! why dont 2.4 kernel modules work with 2.6?! why!! why wont they work! why!!?!!!

. . .this would never happen under BSD-style communism ;(

manic depressive


Computers

19.07.2004 18:30

Wow!

I like computers. They are great.
More to the point, I am great. I know so much that I can't even help myself from spewing jargon into unrelated conversation. It's almost as if I want people to know how good I am. It's almost as if I need their love.

I can't believe any of us came here to air our stupid views!


Upcoming Coverage
View and post events
Upcoming Events UK
24th October, London: 2015 London Anarchist Bookfair
2nd - 8th November: Wrexham, Wales, UK & Everywhere: Week of Action Against the North Wales Prison & the Prison Industrial Complex. Cymraeg: Wythnos o Weithredu yn Erbyn Carchar Gogledd Cymru

Ongoing UK
Every Tuesday 6pm-8pm, Yorkshire: Demo/vigil at NSA/NRO Menwith Hill US Spy Base More info: CAAB.

Every Tuesday, UK & worldwide: Counter Terror Tuesdays. Call the US Embassy nearest to you to protest Obama's Terror Tuesdays. More info here

Every day, London: Vigil for Julian Assange outside Ecuadorian Embassy

Parliament Sq Protest: see topic page
Ongoing Global
Rossport, Ireland: see topic page
Israel-Palestine: Israel Indymedia | Palestine Indymedia
Oaxaca: Chiapas Indymedia
Regions
All Regions
Birmingham
Cambridge
Liverpool
London
Oxford
Sheffield
South Coast
Wales
World
Other Local IMCs
Bristol/South West
Nottingham
Scotland
Social Media
You can follow @ukindymedia on indy.im and Twitter. We are working on a Twitter policy. We do not use Facebook, and advise you not to either.
Support Us
We need help paying the bills for hosting this site, please consider supporting us financially.
Other Media Projects
Schnews
Dissident Island Radio
Corporate Watch
Media Lens
VisionOnTV
Earth First! Action Update
Earth First! Action Reports
Topics
All Topics
Afghanistan
Analysis
Animal Liberation
Anti-Nuclear
Anti-militarism
Anti-racism
Bio-technology
Climate Chaos
Culture
Ecology
Education
Energy Crisis
Fracking
Free Spaces
Gender
Globalisation
Health
History
Indymedia
Iraq
Migration
Ocean Defence
Other Press
Palestine
Policing
Public sector cuts
Repression
Social Struggles
Technology
Terror War
Workers' Movements
Zapatista
Major Reports
NATO 2014
G8 2013
Workfare
2011 Census Resistance
Occupy Everywhere
August Riots
Dale Farm
J30 Strike
Flotilla to Gaza
Mayday 2010
Tar Sands
G20 London Summit
University Occupations for Gaza
Guantanamo
Indymedia Server Seizure
COP15 Climate Summit 2009
Carmel Agrexco
G8 Japan 2008
SHAC
Stop Sequani
Stop RWB
Climate Camp 2008
Oaxaca Uprising
Rossport Solidarity
Smash EDO
SOCPA
Past Major Reports
Encrypted Page
You are viewing this page using an encrypted connection. If you bookmark this page or send its address in an email you might want to use the un-encrypted address of this page.
If you recieved a warning about an untrusted root certificate please install the CAcert root certificate, for more information see the security page.

Global IMC Network


www.indymedia.org

Projects
print
radio
satellite tv
video

Africa

Europe
antwerpen
armenia
athens
austria
barcelona
belarus
belgium
belgrade
brussels
bulgaria
calabria
croatia
cyprus
emilia-romagna
estrecho / madiaq
galiza
germany
grenoble
hungary
ireland
istanbul
italy
la plana
liege
liguria
lille
linksunten
lombardia
madrid
malta
marseille
nantes
napoli
netherlands
northern england
nottingham imc
paris/île-de-france
patras
piemonte
poland
portugal
roma
romania
russia
sardegna
scotland
sverige
switzerland
torun
toscana
ukraine
united kingdom
valencia

Latin America
argentina
bolivia
chiapas
chile
chile sur
cmi brasil
cmi sucre
colombia
ecuador
mexico
peru
puerto rico
qollasuyu
rosario
santiago
tijuana
uruguay
valparaiso
venezuela

Oceania
aotearoa
brisbane
burma
darwin
jakarta
manila
melbourne
perth
qc
sydney

South Asia
india


United States
arizona
arkansas
asheville
atlanta
Austin
binghamton
boston
buffalo
chicago
cleveland
colorado
columbus
dc
hawaii
houston
hudson mohawk
kansas city
la
madison
maine
miami
michigan
milwaukee
minneapolis/st. paul
new hampshire
new jersey
new mexico
new orleans
north carolina
north texas
nyc
oklahoma
philadelphia
pittsburgh
portland
richmond
rochester
rogue valley
saint louis
san diego
san francisco
san francisco bay area
santa barbara
santa cruz, ca
sarasota
seattle
tampa bay
united states
urbana-champaign
vermont
western mass
worcester

West Asia
Armenia
Beirut
Israel
Palestine

Topics
biotech

Process
fbi/legal updates
mailing lists
process & imc docs
tech