[RISKS] Risks Digest 24.05

From: RISKS List Owner (risko@private)
Date: Fri Sep 30 2005 - 16:00:03 PDT


RISKS-LIST: Risks-Forum Digest  Friday 30 September 2005  Volume 24 : Issue 05

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/24.05.html>
The current issue can be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Software hijacks jet airliner ... again? (Charles Wright)
Airbus, Whistleblower Dispute A380 Pressurization Controls (PGN)
Metra Rail accident in Chicago (Andy Steingruebl)
Katrina victims required to use Microsoft IE (Douglas W. Jones)
Travelers Continue to Struggle with Wrongful Watch List Matches 
  (EPIC FOIA Notes)
Scots Jail hi-tech door locking system broke (George Michaelson)
Risks of keyboard shortcuts (Andrew Koenig)
Designing "safe software"...: A 4-star article! (Michael Radow)
Sorcerer's Apprentice in the Driver's Seat?? (David Lesher)
Mea culpa: How we got it wrong on Calling-Number ID (Geoff Kuenning)
Open letter: Why "dot-xxx" is for Chumps (Lauren Weinstein)
Router worms and International Infrastructure (Gadi Evron)
Wolf Blitzer repeats Rudy in questioning governors (Fred Cohen)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Sat, 17 Sep 2005 11:26:11 +1000
From: "Charles Wright" <cw@private>
Subject: Software hijacks jet airliner ... again?

http://www.bleedingedge.com.au/blog/archives/2005/09/software_hijack.html

*The Australian* (17 Sep 2005) has a chilling story about the pilots of a
Malaysian Airlines 777 flying from Perth to Kuala Lumpur last month battling
to regain control after an "unknown computer error" caused the aircraft to
pitch violently, and brought it close to stalling.

An Australian Transport Safety Bureau report
(http://www.atsb.gov.au/aviation/occurs/occurs_detail.cfm?ID=767) released
yesterday reveals the pilot in command disconnected the autopilot and
lowered the plane's nose to prevent a stall, after incorrect data from a
supposedly fail-safe device caused the plane to pitch up and climb 3000ft,
cutting its indicated air speed from 500kmh to 292kmh, activating a stall
warning and a "stickshaker". [A stickshaker vibrates the aircraft's controls
to warn the piot when he is approaching stall speed ... which, you know,
means the plane is about to fall out of the air.]

The system refused to give up control, however. It increased the power on
the automatic throttle, forcing the pilot to counter by pushing the thrust
levers to the idle position. The aircraft immediately pitched up again, and
climbed 2000ft.

The pilot turned back to Perth under manual control. When he kicked in the
two autopilot systems, the plane banked to the right, and the nose pitched
down.

On its landing approach, at 3000ft, the flight display gave a low airspeed
warning and the auto-throttle increased thrust. The warning system also
indicated a dangerous windshear, but the crew landed the jet safely.

According to the report, "investigations are focusing on faulty acceleration
figures supplied by a device called the Air Data Inertial Reference
Unit". The ADIRU collates aircraft navigation and performance data from
other systems and passes the information to the primary flight computer.

What's potentially more disturbing, however - and neither the Transport
Safety Bureau nor The Australian appear to have picked this up - is that a
US FAA directive <a
(http://www.airweb.faa.gov/Regulatory_and_Guidance_Library%5CrgAD.nsf/0/A668AA4EB82ABE4E86256FFE00510CE8?OpenDocument)
in June this year highlighted other problems with the Boeing 777's ADIRU.

Boeing has told operators of the jet -- which by the way has the best safety
record of any aircraft (http://www.geocities.com/khlim777_my/ashowsafe1.htm)
-- to load a previous software version.

   [The article at
      http://www.avweb.com/eletter/archives/avflash/465-full.html
   was also noted by Mickey Coggins and Ian Chard.
      http://www.theaustralian.news.com.au
   was cited by Richard Weir.  PGN]

------------------------------

Date: Tue, 27 Sep 2005 11:13:19 PDT
From: "Peter G. Neumann" <neumann@private>
Subject: Airbus, Whistleblower Dispute A380 Pressurization Controls

James Paul (U.S. House Science Committee professional staffer) called my
attention to an item in the 27 Sep 2005 *Los Angeles Times*.  A
whistleblower alleges that the chips controlling cabin pressurization valves
in Airbus's new Flying Whale aren't behaving properly and may lead to
decompression incidents.

http://www.latimes.com/news/printedition/front/la-fi-whistleblower27sep27,1,2186118.story

------------------------------

Date: Tue, 20 Sep 2005 09:40:22 -0500
From: Andy Steingruebl <steingra@private>
Subject: Metra Rail accident in Chicago

As you are no doubt aware, there was a Metra Rail train accident in Chicago
this last weekend that caused the death of two people and injured
approximately 80.  The issue has gotten national news coverage, and lots of
local coverage.  The Metra spokeperson has been rather forthcoming in
analysing the situation.

Because the train was speeding at the time of the accident and the accident
is similar to previous train accidents, there have been a lot of calls for
solutions:

 - Put a second person back in the train to help the engineer. There was a
   second person until 1995.

 - Implement automated train controls to brake the train in case of an
   engineer missing a signal.

The second option has received a lot of attention because Metra currently
has computer controls on several of its train lines, but the controls are
expensive.

This situation presents a great opportunity to get the issue of the
reliability of human and computer controls in the media.  As the ideas are
being widely discussed, its a perfect opportunity to discuss failure rates
for the different technologies, the humans, etc.

I'd contact Metra Rail myself, but I don't have the requisite engineering
background to act as a truly knowledgeable source.

Perhaps you or someone from RISKS (perhaps someone in the Chicago area) can
contact local news media and Metra to get this issue discussed in public as
it should be.

[Added note: I believe it was going about 60 and the speed limit for that
section of track was 10.  Recent news is the the engineer either missed the
signal, or the signal was green indicating he could keep his speed and not
slow down.  In either case since its a big news story.  AS]

------------------------------

Date: Thu, 22 Sep 2005 10:02:21 -0500
From: "Douglas W. Jones" <jones@private>
Subject: Katrina victims required to use Microsoft IE

  [In a USACM newsgroup, Barbara Simons noted that FEMA requires Katrina
  evacuees to use Microsoft IE 6.0 for access to its website: 
    http://www.groklaw.net/article.php?story=2005091305273070
  The following message by Doug Jones discusses that issue.  PGN]
  
The FEMA web portal violates a number of good web usage guidelines.  The
first page at http://fema.gov/ is fixed-width, not conforming to the user's
browser window.  Things get worse from there.

The web page http://www.disasteraid.fema.gov/ is a mess when viewed under
iCab, my preferred web browser, the browser spent what seemed an eternity
blinking from grey to white and back again before stabilizing with content.
When I clicked on Register for Assistance, it went back to blinking and kept
it up for so long that I gave up.

When I repeated the exercise under Safari, Clicking on Register for
Assistance, which takes me to
    https://www.disasteraid.fema.gov/famsVuWeb/integration
I got the following error message:
    500 Internal Server Error
    Servlet error: java.lang.ClassNotFoundException:
       _dynamic._templates._Template__body

When I tried it under IE, it got farther, letting me through an
automated test to distinguish humans from bots, but then it gave me
the message:

  Integrated Security Access and Control (ISAAC) Unavailable
    Your request cannot be processed because the ISAAC system is unavailable.
  Please try again later or contact the FEMA Helpline at the number 
    listed below.

So, it's clear to me that they've engineered a web system that is:
  a) Extraordinarily over-engineered to work under only one browser,
  b) Nonfunctional under that browser,

This, I conclude, is simply another example of FEMA incompetence.

------------------------------

Date: Tue, 27 Sep 2005 11:47:44 -0400
From: EPIC FOIA Notes <FOIA_Notes@private>
Subject: Travelers Continue to Struggle with Wrongful Watch List Matches

EPIC FOIA Notes #8: 
Travelers Continue to Struggle with Wrongful Watch List Matches

Documents obtained by EPIC from the Transportation Security Administration
under the Freedom of Information Act reveal nearly a hundred complaints from
airline passengers between November 2003 and May 2004.  The most common
complaint from passengers is that they have been wrongly placed on a
government watch list.  Numerous complaints show passengers' frustration
with the agency's failure to resolve their misidentification problems.

More information: http://www.epic.org/foia_notes/note8.html
FOIA_Notes mailing list FOIA_Notes@private
https://mailman.epic.org/cgi-bin/mailman/listinfo/foia_notes

------------------------------

Date: Tue, 20 Sep 2005 11:18:59 +1000
From: George Michaelson <ggm@private>
Subject: Scots Jail hi-tech door locking system broke

This one begs a few questions: How can the inmates have had over a *month*
of using the hackaround without other non-linked security systems (e.g.,a
video cameras) not noticing?

This suggests that an integrated solution has replaced multiple discrete
lines of protection, with predictable outcomes.  George

 http://news.scotsman.com/scotland.cfm?id=1965122005

Prison officers have been forced to abandon a new security system and return
to the use of keys after the cutting-edge technology repeatedly failed.  The
system, which is thought to have cost over £3 million, used fingerprint
recognition to activate the locking system at the high-security Glenochil
Prison near Tullibody, Clackmannanshire.  ...  For more than a month, the
420 inmates - including some murderers and other high-risk inmates - had
been able to wander around the high-security jail. Staff claim that the
unlimited access to all parts of the prison had allowed some prisoners to
settle old scores with rivals.

George Michaelson, APNIC, PO Box 2131 Milton, QLD 4064 Australia
http://www.apnic.net   ggm@private   +61 7 3858 3150  

------------------------------

Date: Wed, 28 Sep 2005 10:44:32 -0400
From: "Andrew Koenig" <ark@private>
Subject: Risks of keyboard shortcuts

Background: Microsoft Windows can support only 10 USB MIDI devices.  This
may sound like a lot until you realize that when you move a device to a
different USB port, it counts as a new device.  The list of devices is
stored in the registry, using keys named "midi", "midi1", ... "midi9".  I
was running regedit to try to understand the degree to which these keys had
become filled, and to delete some of the duplicates.

I turned away from the keyboard for a moment.  When I turned back, on the
screen was a dialog box saying "Do you want to permanently delete this key
and all of its components?  Yes/No", and one of my five-month-old kittens
was ambling away from the keyboard.

I'm not usually a fan of such dialog boxes, but this time I'll make an
exception--especially as regedit does not have an undo function.  Yes, I
know about system restore points, but still...

------------------------------

Date: Thu, 15 Sep 2005 19:36:33 -0700 (PDT)
From: Michael Radow <mikeradow@private>
Subject: Designing "safe software"...: A 4-star article!

  David Kalinsky, Architecture of safety-critical systems
  September issue of "Embedded Systems Programming" magazine
  http://www.embedded.com//showArticle.jhtml?articleID=169600396
  "compressed" URL http://runurl.com/x.php?b0

------------------------------

Date: Sat, 17 Sep 2005 09:51:21 -0400 (EDT)
From: "David Lesher" <wb8foz@private>
Subject: Sorcerer's Apprentice in the Driver's Seat??

  The driver of a runaway [21 ton] truck that locked at 60 mph for 140 miles
  on highways in northern France and Belgium is planning to sue the truck
  manufacturer.  The crisis happened Monday when the driver, who refused to
  give his name, used his mobile phone to raise the alarm when he realized
  he could not brake or change gears.  ... {no good scheme to stop it;
  finally skidded out} ...  Iveco, the truck manufacturer, sent technicians
  to examine the vehicle. The driver denies he was at fault and he was
  taking legal action.  [UPI item, abstracted]

A slew of Risks, here. First the obvious, did it go down as reported; i.e.,
the driver really had no way to stop it? (Or had he been to see
<http://us.imdb.com/title/tt0111257/> recently.)

If so, why? Diesel vehicles usually have an emergency shutoff that blocks
the air intake. Was it NOT manually operable, or did it fail as well? And
were the brakes out, or insufficient to overcome the engine power?

It will be interesting to see the followup analysis.

------------------------------

Date: 25 Sep 2005 23:37:03 -0700
From: Geoff Kuenning <geoff@private>
Subject: Mea culpa: How we got it wrong on Calling-Number ID

Back in the early 90's, U.S. phone companies began rolling out the service
known as "Caller ID" (really Calling Number ID, or CNID).  Early adopters
were very pleased with the feature; it helped them to avoid telemarketers
and occasionally to dodge inconvenient friends.

Then a few privacy advocates noticed that there was a dark side: if
you called a local business, it could capture your number with CNID
and add you to a telemarketing list.  Suddenly CNID changed from a
beneficial service to a nefarious plot.

An anti-CNID campaign ensued, culminating in California's decision to
require telephone companies to offer free CNID blocking as a condition of
rolling out the service.  At the same time, privacy advocates (including me
and many other RISKS subscribers) publicized the downsides of CNID:
unintentionally revealing your (possibly unlisted) phone number, confusing
the concept of calling number with the identity of the calling person, etc.
The campaign was successful: when CNID was rolled out, something like 50% of
Californians chose to block their number by default.

Fast forward approximately a decade.  I recently switched local phone
providers (finally freeing myself from the clutches of Verizon, neé GTE,
after a 25-year quest) and got rid of my CNID blocking in the process.
Rather than advocating against CNID, I've now changed my tune and am trying
to convince my blocked friends to unblock.

What happened?  The answer is simply that I was wrong about the evils of
CNID, and wrong about the (perceived lack of) benefits.  That error arose
primarily from an inability to correctly predict the future.  In particular,
the following forces have reduced the evils and increased the benefits:

1. The predicted data collection by small businesses never happened.  It
   wasn't worth the effort.  Businesses didn't get much benefit from knowing
   that somebody at 555-1234 had called to inquire about mattress prices;
   their telemarketing money was better spent on buying phone lists that
   included names and demographic data.

2. Larger businesses had 800 numbers that included Automatic Number
   Identification (ANI), which wasn't bothered by caller ID blocking anyway,
   so the people with lots of funds were never stopped from telemarketing.

3. The unforeseen Federal Do-Not-Call List has become an effective defense
   against telemarketing, so revealing your telephone number isn't much of a
   problem anyway.

4. The rise of cellphones means that we are starting to see a true
   one-to-one association between phone numbers and people, so CNID is
   becoming the caller ID it was once billed as being.

5. Most cellphone plans include CNID as part of the package, and some local
   plans are also offering it as a no-cost option, increasing the number of
   people who depend on CNID working.

6. A new generation of CNID signaling allows short text information to be
   transmitted along with the calling number, so that the recipient can
   identify the caller even if they have never seen the number before.

In addition, in 20-20 hindsight many of our criticisms seem overstated.  For
example, we argued that since CNID doesn't identify the individual, you
never really knew who was calling.  That's true enough, but do my family and
friends care whether it is I or my wife calling to arrange a visit?  We
argued that a stranded teenager calling from a pay phone might have his call
rejected, but would a parent with a teen out on a date really turn down
calls from an unknown number?

I think the lesson here is that we need to remember to be humble, and to
avoid crying wolf about the RISKS we perceive.  Overall, CNID's benefits far
outweigh its drawbacks, and we have done society a disservice by encouraging
people to block it.  We were right to point out the potential weaknesses and
incorrect marketing claims, but we erred in encouraging so many people to
unnecessarily block their phone numbers, inconveniencing their friends and
family while gaining almost no real benefit.

Geoff Kuenning   geoff@private   http://www.cs.hmc.edu/~geoff/

------------------------------

Date: Mon, 19 Sep 2005 09:55:28 -0700
From: Lauren Weinstein <pfir@private>
Subject: Open letter: Why "dot-xxx" is for Chumps

This is an open letter addressed to that segment of the Internet community
where the *real* money is made -- the "adult entertainment" industry.  For
that matter, the operators of the ubiquitous non-commercial
sexually-oriented Web sites can join in as well.

I have some free advice that may save you a great deal of grief.

Now, in all honesty, I don't have any particular love for your operations or
your products.  I'm not a prude (well, not much of one, anyway), but by
continuing to push the envelope you folks have engendered a great deal of
negative reaction that's approaching a fever pitch.

That reaction is what I'm really concerned about, since it's likely to
splatter collateral damage broadly across a wide range of free speech and
civil liberties arenas.

So, in my desire to protect them, I'll try to protect you as well.

My advice?  Don't fall into the "dot-xxx" trap that's being set for you by
ICANN.

As you no doubt are aware, ICANN appears to be preparing for the deployment
-- despite broad protests across the political spectrum and a couple of
delays -- of a "dot-xxx" top-level domain (TLD).

I've explained elsewhere ( http://www.pfir.org/ip-exexex ) and (
http://www.pfir.org/ip-exexex-01 ), why dot-xxx is an absolutely atrocious
idea.

ICANN claims that participation in the domain will be voluntary, and that
will indeed be the case -- at first.

But as I discussed back in a 2001 PFIR position paper on "domain
ghettoization" ( http://www.pfir.org/statements/ghetto-domains ), such
efforts are a slippery slope likely leading to widespread filtering and
censoring by ISPs, governments, plus a broad range of other entities,
affecting a *lot more* than merely pornographic materials.  A glance at the
current Supreme Court situation is not particularly encouraging in this
regard.

ICANN apparently doesn't view their dot-xxx plan as a trap.  They seem to
consider themselves courageous by pushing on with that TLD despite the broad
public and private consensus that it's a terrible concept.  Unfortunately,
this is the sort of "forge ahead over the cliff" behavior that we've come to
expect from ICANN as an organization.

So if dot-xxx arrives, my strong recommendation is that *you ignore it*.
Pretend that it doesn't exist.  Allow it to be an empty database.  Joining
that domain won't provide you with any cover -- what you'll actually be
doing is painting a giant bulls-eye on yourselves -- and on a vast array of
worthy and important groups and materials that have nothing whatever to do
with adult entertainment.

Dot-xxx is for chumps.

By the way, I originally considered titling this entry with a domain-related
variation on the old "Suppose They Gave a War and Nobody Came" line, but
while the situation with dot-xxx is indeed dangerous -- and an example of so
much that's wrong with Internet Governance in general and ICANN in
particular -- this matter is anything but a dirty joke.

Lauren Weinstein, lauren@private  http://www.pfir.org/lauren 1-818-225-2800
Moderator, PRIVACY Forum - http://www.vortex.com   http://daythink.vortex.com

------------------------------

Date: Fri, 30 Sep 2005 23:29:29 +0200
From: Gadi Evron <ge@private>
Subject: Router worms and International Infrastructure

Michael.Dillon@private wrote:
> Reading through the original Russian posting here
> http://www.securitylab.ru/news/240415.php&direction=re&template=General&cp1=
> It seems that someone has built an IOS worm that
> follows an EIGRP vector from router to router.

A while back I emailed the following text to a closed mailing list. I figure
now that quite a few cats are out of the bag it is time to get more public
attention to these issues, as the Bad Guys will very soon start doing just
that.

Ciscogate by itself ALONE, and now even just a story about worms for Routers
is enough for us to be CLEAR that worms will start coming out.  We do learn
from history.

So.. as much as people don't like to talk much on the issues involving the
so-called "cooler" stuff that can be done with routers, now is the time to
start.

Here is one possible and simple vector of attack that I see happening in
the future. It goes down-hill from there.

I wrote this after the release of "the three vulnerabilities", a few months
back. Now we know one wasn't even just a DDoS, and that changes the picture
a bit.

Begin quoted text ----->>>

More on router worms - let's take down the Internet with three public POCs
and some open spybot source code.

  - - -

People, I have given this some more thought.

Let's forget for a second the fact that these vulnerabilities are dangerous
on their own (although it's a DoS), and consider what a worm, could cause.

If the worm used the vulnerability, it would shoot itself in the leg as when
network is down, it can't spread.

Now, imagine if a VX-er will use an ancient trick and release the worm,
waiting for it to propagate for 2 or 3 days. Then, after that seeding time
when the say.. not very successful worm infected only about 30K machines
around the world, each infected host will send out 3 "One Packet Killers" as
I like to call them to the world.

Even if the packet won't pass one router, that one router, along with
thousands of others, will die.

Further, the latest vulnerabilities are not just for Cisco, there is a "One
Packer Killer" for Juniper as well.

So, say this isn't a 0-day. Tier-1 and tier-2 ISP's are patched (great
mechanism to pass through as these won't filter the packet out if it is
headed somewhere else), how many of the rest will be up to date?

Let's give the Internet a lot of credit and say.. 60% (yeah right).

That leaves us with 30% of the Internet dead, and that's really a bad
scenario as someone I know would say.

Make each infected system send the one packet spoofed (potentially, not
necessarily these vulnerabilities) and it's hell. Make them send it every
day, once! And the net will keep dying every day for a while.

As a friend suggested, maybe even fragment the packet, and have it
re-assembled at the destination, far-away routers (not sure if that will
work).

These are all basic, actually very basic, techniques, and with the source to
exploits and worms freely available....  We keep seeing network equipment
vulnerabilities coming out, and it is a lot "cooler" to bring down an ISP
with one packet rather than with 1,000,000,000,000,000.

I am sure the guys at Cisco gave this some thought, but I don't believe this
is getting enough attention generally, and especially not with AV-ers. It
should.

This may seem like I am hyping the situation, which is well-known. Still
well-known or not, secret or not, it's time we prepared better in a broader
scale.

How?

     Gadi.

----->>> End quoted text.

I would really like to hear some thoughts from the NANOG community on
threats such as the one described above. Let us not get into an argument
about 0-days and consider how many routers are actually patched the
first... day.. week, month? after a vulnerability is released.

Also, let us consider the ever decreasing vulnerability-2-exploit time of
development.

I don't want the above to sound as FUD. My point is not to yell "death of
the Internet" but rather to get some people moving on what I believe to be a
threat, and considering it on a broader scale is LONG over-due.

The cat is out of the bag, as as much as I avoided using "potentially" and
"possibly" above to pass my point.. this is just one possible scenario and I
believe we need to start getting prepared to better defending the Internet
as an International Infrastructure.

As I am sure that this will be an interesting discussion, I am also sure
this will eventually derail to a pointless argument over an un-related
matter, here on NANOG.  I'd appreciate if people who are interested would
also email me off-list so that we can see how we can perhaps proceed with
some activity.

My blog: http://blogs.securiteam.com/?author=6

------------------------------

Date: Sun, 18 Sep 2005 09:30:59 -0700
From: Fred Cohen <dr.cohen@private>
Subject: Wolf Blitzer repeats Rudy in questioning governors (Re: RISKS-24.04)

This morning I watched as Wolf Blitzer on CNN questioned governors about
preparedness, and the single frequency question came up again - in that
form. It just shows how the power of ideas can take on its own
life. Fortunately the mayors of Miami and Boston were more clued in than
Rudy. Florida indicated that the he believed that the problem was solved
there without referring to a single frequency in his response. Boston
indicated the use of a system by Raytheon that allows interconnections
between different frequency bands for specific emergency communications
requirements. Hopefully Wolf will start to ask the right question after he
finds out that the notion he is spreading is flawed.

Thanks also to the many people who have responded to me personally with
their views -- all reasoned views -- are as always welcomed.

Security Posture <securityposture.com>, Fred Cohen & Associates <all.net> 
572 Leona Drive, Livermore, CA 94550 1-925-454-0171, University of New Haven

------------------------------

Date: 29 Dec 2004 (LAST-MODIFIED)
From: RISKS-request@private
Subject: Abridged info on RISKS (comp.risks)

 The RISKS Forum is a MODERATED digest.  Its Usenet equivalent is comp.risks.
=> SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
 if possible and convenient for you.   Mailman can let you subscribe directly:
   http://lists.csl.sri.com/mailman/listinfo/risks
 Alternatively, to subscribe or unsubscribe via e-mail to mailman your
 FROM: address, send a message to
   risks-request@private
 containing only the one-word text subscribe or unsubscribe.  You may
 also specify a different receiving address: subscribe address= ... .
 You may short-circuit that process by sending directly to either
   risks-subscribe@private or risks-unsubscribe@private
 depending on which action is to be taken.

 Subscription and unsubscription requests require that you reply to a
 confirmation message sent to the subscribing mail address.  Instructions
 are included in the confirmation message.  Each issue of RISKS that you
 receive contains information on how to post, unsubscribe, etc.

   INFO     [for unabridged version of RISKS information]
 .UK users should contact <Lindsay.Marshall@private>.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative
 address from which you NEVER send mail!
=> The INFO file (submissions, default disclaimers, archive sites,
 copyright policy, PRIVACY digests, etc.) is also obtainable from
   <http://www.CSL.sri.com/risksinfo.html>
 The full info file may appear now and then in future issues.  *** All
 contributors are assumed to have read the full info file for guidelines. ***
=> SUBMISSIONS: to risks@private with meaningful SUBJECT: line.
 *** NOTE: Including the string "notsp" at the beginning or end of the subject
 *** line will be very helpful in separating real contributions from spam.
 *** This attention-string may change, so watch this space now and then.
=> ARCHIVES: ftp://ftp.sri.com/risks [subdirectory i for earlier volume i]
 <http://www.risks.org> redirects you to Lindsay Marshall's Newcastle archive
 http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue.
   Lindsay has also added to the Newcastle catless site a palmtop version
   of the most recent RISKS issue and a WAP version that works for many but
   not all telephones: http://catless.ncl.ac.uk/w/r
 <http://the.wiretapped.net/security/info/textfiles/risks-digest/> .
==> PGN's comprehensive historical Illustrative Risks summary of one liners:
    <http://www.csl.sri.com/illustrative.html> for browsing,
    <http://www.csl.sri.com/illustrative.pdf> or .ps for printing

------------------------------

End of RISKS-FORUM Digest 24.05
************************



This archive was generated by hypermail 2.1.3 : Fri Sep 30 2005 - 16:53:17 PDT