Privacy Issues

This draft is under construction. Comments welcome

An account on a networked unix machine is quite different from an isolated, non-networked personal computer. There are a few issues of which all users should be aware.

File protection

Each file and each directory can have permissions set to specify who may read, who may write (or modify) and who may execute (in the case of a program) or search (in the case of a directory).

Commands to know:

Quick reference:

Suggestions:

Information available to local users

The following information may be available to users with an account on the system: Commands to know:

Information available to outsiders

Some information about you and your activities is available to anyone on the internet. This can be useful. If you want some information about you to be public if you are "fingered" put it in a file "~/.plan" and/or "~/.project" in your home directory. N.B. This doesn't work if the top level directory is protected.

In addition, it is possible that virtually any network activity you initiate could be logged by remote computers. It may be logged by originating host only or by host AND user. This includes all transfers by WWW, anonymous FTP and e-mail servers. It certainly includes telnet and regular FTP connections; it could included finger requests, name lookup requests, anything. While most servers treat transaction information confidentially, as do libraries, they are under no obligation to do so.

Commands to know:

Information available to system administrators

A very limited number of individuals responsible for system maintenance have "root" or system-level access. Anyone acting as "root" has in principle access to almost anything on the system, including the contents of protected files, unless the files are encrypted.

As a matter of strict policy, our system administrators never examine the contents of any file without the express permission of the owner at the time it is inspected. There are a few technical exceptions:

Bad Guys

All of the above referred to legitimate users. Unfortunately the Internet, like any community, has its share of criminals, vandals and jerks.

If they get in the door at all, expect that they will get hold of root privileges and then some. They may destroy data or lock users out or just booby trap the system software and come back later.

At the very least, a confirmed break-in may require disconnecting every machine in the group for one or more days until all software can be reinstalled from scratch and all files can be checked for trap doors. This happened not long ago at SLAC.

Keeping the bad guys out depends on EVERYONE. This can't be overemphasized enough.

Passwords

The first line of defense is your password. Choose it well. You might want to read this about passwords and how to select them.

Packet sniffers

A powerful tool in network "cracking" is the use of "packet sniffers." Information sent over the network is bundled up in little packets, addressed to the destination machine, and sent out over a big party line called Ethernet. Every machine that shares a wire along the route of the packet can read it. They're not supposed to if it isn't addressed to them, of course. But that is what packet sniffing programs do. They read, for example, the password you type when you telnet to Brown over the Internet from a remote site. They read everything going between an X terminal and its host.

This means that if one machine in the department is broken into and a packet sniffer is installed secretly, everything from every computer (on the same subnet) is potentially vulnerable to being read.