You are not logged in. Login Now
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   175-199   200-224 
 225-249   250-274   275-299   300-324   325-349   350-374   375-399   400-424   425-449 
 450-474   475-499   500-524   525-547       
 
Author Message
25 new of 547 responses total.
gelinas
response 225 of 547: Mark Unseen   May 14 00:34 UTC 2003

(The question is not, "Who would be interested in the data on the disks?" 
The question is, "Who would be interested in _their_ data on the disks being
released or revealed?"  We've too many users to get ALL of them to answer that
question negatively.)
lk
response 226 of 547: Mark Unseen   May 14 01:26 UTC 2003

The question I'd ask: is it easier to (potentially) crack root and see the
data on the disks or to actually recover the data once reasonable precautions
are taken to erase it.  The point being that no one should ever expect that
their data on a public access system is 100% secure.

Of course, if STeve or mdw are interested in the old machine, that would
solve the problem given that the scrubbed disks would be in safe hands (for
some time to come).
cross
response 227 of 547: Mark Unseen   May 14 02:01 UTC 2003

I agree with #226; no one on grex has any sort of guarantee about the
safety of their data.  Indeed, grex is planning on using a password system
on next grex that inherently compromises the data of all users if someone
has managed to crack root.  Going and getting the disks from someone in
Michigan after they've been scrubbed is a lot more work than just getting
the data off the disks now or after the transition to the next grex.

I sympathize with Joe's sentiment about wanting to keep user data secure,
not it's not going to be any less secure on a scrubbed disk as it is on
grex now or in the future.
i
response 228 of 547: Mark Unseen   May 14 02:03 UTC 2003

With a clean room for disecting disk drives, some millions of dollars worth
of exotic high-tech instruments, and skilled staff to match, it should be
presumed that supposedly-totally-erased data can be recovered from drives.

Anyone *that* interested in the data could get it far faster, sooner, and
cheaper in a host of other ways, starting with simple physical break-in.

Thus, it's reasonable to assume that any data on grex worthy of such
efforts has already been stolen, and giving the hypothetical hostiles an
extra copy is actually *good* tactics - they waste resources to read it.
other
response 229 of 547: Mark Unseen   May 14 02:17 UTC 2003

Well.  I guess I'M the one being anal about security this time.  It's a 
rotating responsibility.  Someone else take over, 'cause it looks like 
I'm done.
polytarp
response 230 of 547: Mark Unseen   May 14 02:40 UTC 2003

WE NEED TO STOP THE SUBVERSIVEs...   SQUIRRLEy-Group?
scg
response 231 of 547: Mark Unseen   May 14 04:58 UTC 2003

The first Grex is (or at least was the last time I saw it) in Marcus's
basement.  As of a couple years ago, when I was last in the Pumpkin, Grex 3
was still there.  I think Grex 2 may have been as well, but Grex 2 may have
been harvested for parts (2 and 3 were similar enough for some hardware to
be interchangable.
cross
response 232 of 547: Mark Unseen   May 14 13:08 UTC 2003

Regarding #229; There's nothing wrong with being anal; but if you're
going to be anal about one thing, it's best to be anal about everything
else, as well.  For instance, not just merging the existing contents of
/etc/shadow into a Kerberos KDC for use as keys....

Security is all about tradeoffs.  If people really wanted their data to
be secure, they'd encrypt it, put it on some sort of tramper-resistant
media, enclose that in a cube of lead with two foot walls, enclose that
in a block of concrete, booby trap it so that if anyone tries to open it,
they die, and dump it into the Mariana's trench; all in secret so that
nobody knew they'd done it.  Even then, it wouldn't be totally secure.

One has to do a risk analysis, and determine whether the cost of
protecting the data from prying eyes is worth the value of the data.
If it is; great, do whatever you need to to make sure no one gets access
to it.  If not, then take some reasonable precautions, but don't lose
sleep over it.  Data from grex definately falls in the latter category.
jep
response 233 of 547: Mark Unseen   May 14 14:47 UTC 2003

Oh, I'd say para 2 in ersp:232 describes "total security" in real-world 
terms.  There's no way to recover anything 7 miles into the ocean.

Leeron in resp:226 and the next several comments describe my opinion 
about the need for disk security.  Grex needs to reasonably match the 
security presently given to that data.  That's all anyone has any right 
to expect.  A good formatting of those drives ought to be easily 
sufficient to keep the data as secure as it is now.

My goodness, how difficult would it be for someone to break into the 
Pumpkin right now and steal tapes, hard drives, or even all of Grex?  
Where else are backups kept?  Any of those places could be breached by 
someone with such sophisticated specialized training as we probably all 
got from our parents when taught how to use a screwdriver.  It'd be a 
lot easier to steal the data (and cheaper, and much more reliable) than 
to recover data from a formatted hard disk.
cross
response 234 of 547: Mark Unseen   May 14 16:21 UTC 2003

Yes, but one might throw out one's back trying to steal the current
grex.
other
response 235 of 547: Mark Unseen   May 14 18:20 UTC 2003

re #233:  Out of curiosity, do you actually KNOW the location of the Pumpkin?

When was the last time someone cracked root on Grex?  

What does it cost us to destroy the old disks?  What if a user who wants their
privacy doesn't know enough to know the real risks to the privacy of their
data inherent in placing it on Grex?  I'd say trashing the disks is less work
and more security than wiping them a few times, and eliminates the risk of
charges of carelessness with user data. (Whether that risk is real or
imagined.)

But I really don't care that much about it.  I don't keep my SSID and credit
numbers on Grex...  <shrug>
cross
response 236 of 547: Mark Unseen   May 14 18:52 UTC 2003

Regarding #235; No, I don't.  But I'm willing to bet that someone who's
going to go to the trouble of restoring user data off of the disks
(how are they going to locate them, anyway?) does.  When was the last
time someone broke root?  Well, how do you know that anyone other than
the person or persons who did so know?  Someone who cares enough about
Grex's data is likely to be able to find someone who could break in
without anyone knowing.  Besides, grex runs some insecure software.
The version of sendmail it runs is (last time I checked, anyway)
potentially vulnerable to some well-known holes.  If a user stored data
on grex without realizing that they had no expectation of the privacy
of that data; well, tough.  And besides, making a good faith effort
at protecting that data by scrubbing the disks is enough to avoid any
charges of negligence (which are purely hypothetical anyway).

Now, don't get me wrong.  If you want to destroy the disks; go for it.
But it's not necessary, and people should be educated about why that is.
tod
response 237 of 547: Mark Unseen   May 14 19:22 UTC 2003

This response has been erased.

aruba
response 238 of 547: Mark Unseen   May 14 20:28 UTC 2003

The SCSI disks arrived yesterday.  They have the right connectors.  Thanks
Leeron!  I'll be putting them in this week, and if I can, testing them with
Windows.
cross
response 239 of 547: Mark Unseen   May 14 22:39 UTC 2003

Aww....  At least test it with some variant of Unix.  :-0
aruba
response 240 of 547: Mark Unseen   May 15 01:39 UTC 2003

UNIX will get its chance, don't worry.
scott
response 241 of 547: Mark Unseen   May 15 02:38 UTC 2003

I've got plenty of Linux distros, Mark.
gelinas
response 242 of 547: Mark Unseen   May 15 03:20 UTC 2003

(I don't think the old disks would be vulnerable to targetted data recovery,
but they could cause unintended disclosure: someone put something they
really shouldn't have on the disk and then forgot about it.  If the disks
were sold to a user of grex, though, targetted data recovery becomes a
higher probability.  (Say, 30% instead of 15%, to pull some numbers from
the air.))
scg
response 243 of 547: Mark Unseen   May 15 05:02 UTC 2003

Being a pack rat, I'd be tempted to keep the data intact in case anybody
wants it for historical research in a hundred years, but that's just me.
cross
response 244 of 547: Mark Unseen   May 15 12:42 UTC 2003

Regarding #242; Joe, even if they scrub the entire disk?  Just curious.
gull
response 245 of 547: Mark Unseen   May 15 13:08 UTC 2003

I'd say the amount of time necessary to recover data from a scrubbed
Grex disk is going to be totally out of proportion to the value of any
data likely to be on those disks.  We're not talking about a situation
where you can just run 'undelete' and get it all back, this is an
expensive and time-consuming process.
jep
response 246 of 547: Mark Unseen   May 15 16:23 UTC 2003

re resp:234: I don't know the location of the Pumpkin, but don't 
imagine it would be difficult to find it out if I wanted to.  I might 
even send you an e-mail: 

   Hey, Eric!  Where is the Pumpkin?  Just curious.

Would you refuse to answer such a request?  If I sent it to 
staff@grex.org, shouldn't I expect to get an answer?  I don't think 
Grex is all *that* security conscious.
jhudson
response 247 of 547: Mark Unseen   May 15 21:39 UTC 2003

I can give you the street address if you wish.
cross
response 248 of 547: Mark Unseen   May 15 21:45 UTC 2003

Shh!  Don't *do* that!  The evil ones might go and steal grex.

At least it'll be easy to identify them at the hospital: they'll
have hernias.
aruba
response 249 of 547: Mark Unseen   May 15 23:09 UTC 2003

The address of the Pumpkin is not something Grex makes a point of
publishing.  For one thing, we don't want anyone to go to the Pumpkin (or
send mail there) if they need to contact someone about Grex.  For another
thing, well, I don't know what the other thing is.  But there's no real
reason for anyone but staff to go there. 

But, as several people have pointed out, I'm sure it wouldn't be hard to
find out if you wanted to.  I just typed the address into google and it
found someone who's listing Grex under that address.  Hmmm, we should
probably do something about that...
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   175-199   200-224 
 225-249   250-274   275-299   300-324   325-349   350-374   375-399   400-424   425-449 
 450-474   475-499   500-524   525-547       
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss