A Balancing Act? Openess and Security on Campus
MIT’s network manager and security strategist Jeff
about security on today’s campus networks.
Syllabus: How do you balance
the demand for today’s higher levels of security with the traditional
openness of the higher education computing environment?
Jeff Schiller: You’re making
an assumption that openness and security are on opposite ends of the spectrum
and that you have to choose between them. If you look at the security problems
we have today, they’re in fact not due to the openness of the network.
They’re due to the software that people run.
S: Do you mean the end-user software?
JS: Yes. I mean basically every
computer connected to the Internet. Put another way, you should not depend on
the network to provide protection for your computer.
S: What about the firewalls and
network security software?
JS: The firewall was never an
integral part of the Internet architecture. Firewalls developed because end-host
software wasn’t secure. A lot of software, particularly on PCs, was designed
in the days before networks. It was designed to run on personal computer hardware
that was not very sophisticated when the PC first appeared. So, putting protections
into end user software is difficult. Then add to that various marketing pressures
years security was simply not a priority. When you went to vendors, Microsoft
and others, and said, “You should be putting some time and effort into
making sure the software is not buggy as all-get-out,” the answer was,
“Well, we promised we’d ship by Friday, and you know, this is Internet
time. We’ve got to get this stuff out there—nobody cares about security
And so, with that kind of history, firewalls got developed because quite frankly,
the network managers were told to “do something,” and that’s
the kind of thing you can do. But don’t mistake that to mean that the
only way to have a secure network is to have a network that is restricted or
S: Do you really think it’s
possible to design a personal computer operating system to handle the security
issues that now require firewalls and other complex network security measures?
JS: Yes. You own a Macintosh.
How often d'es your computer crash?
S: Very rarely.
JS: The reason it d'esn’t
crash all that often is because system software developers took some time and
effort to make that the case. If they would take the time and effort to make
it be secure, it would be secure.
S: So what is keeping that from
JS: Some people have said that
the problem is we don’t have normal product liability laws with software.
Now, if you buy an automobile and pieces fall off as you’re driving out
of the parking lot, the onus is on the dealer to make good. If you buy a toaster
and it breaks, it’s the manufacturer’s problem to fix it. But you
buy software, and the license says, “We’re granting you a right
to use this software, but if it d'esn’t work, or if it destroys all of
your property or your career, we owe you nothing.”
S: So there are no strong warranties
JS: Well, they may say, “We
warrant that the CDs the software comes on are made of plastic and they won’t
physically crack in the first 30 days.”
JS:Now, the problem is that if
you decide to put liability upon software authors, you destroy open source—because
those people can’t tolerate any liability. So, if I were king, I would
rule that if you’re selling software then you bear a certain liability;
but if you’re giving it away in open source, then you don’t.
But, I fear that the commercial interests in this game, if they felt that Congress
was backing them into a situation where they would have to accept liability,
my guess is they would strenuously lobby that liability applies to everything,
including open source, in an attempt to kill off open source. So that’s
S: How would it work then, if
the commercial software authors were liable and the creators of open source
JS:Open source is a fundamentally
different thing. With open source, if there’s a problem I can fix it as
the consumer. Obviously I have to have the skills to do that, but I do have
the ability—the access—to do it. With closed source I don’t.
I’m literally at the mercy of the vendor to fix it.
Jeffrey Schiller is Network Manager at MIT and
has managed the MIT Campus Computer Network since its inception in 1984.
Prior to his work with the Network Group he maintained MIT’s Multics
timesharing system during the timeframe of the ArpaNet TCP/IP conversion.
Schiller is an author of MIT’s Kerberos Authentication system. From
1994 through 2003 he was the Internet Engineering Steering Group’s
(IESG) Area Director for Security, responsible for overseeing security-related
Working Groups of the Internet Engineering Task Force (IETF). He was responsible
for releasing a U.S. legal freeware version of the popular PGP encryption
Schiller is also responsible for the development and deployment of an
X.509-based Public Key Infrastructure (PKI) at MIT. He was the technical
lead for the Higher Education Certifying Authority operated by the Corporation
for Research and Educational Networking (CREN) from 1999 until 2003. Schiller
is a founding member of the Steering Group of the New England Academic
and Research Network (NEARnet). NEARnet, now part of Level3, is a major
nationwide Internet Service Provider.
S: But realistically, is that
happening? Do all the people who are running Linux boxes have better security,
or add in better security?
JS: I think Linux is much more
secure than a lot of the other stuff that’s out there, because so many
people look at the source code—not everyone looks at it, but enough people
do, so that problems get fixed earlier, rather than later.
S: What are the major security
risks in the higher education environment that network users face from viruses
and worms, and, given all that you’ve just mentioned about end-user systems
being weak, what are the most reasonable protections?
JS: One of the things universities
have is legions of students with poorly managed computers that don’t have
patches installed, and those machines are likely to be compromised by any of
the worms that are running around the network right now. That’s one view
Another view is the risk to administrative data. Situations vary a little bit
from institution to institution, but one problem is that administrators use
the same type of poorly managed PCs that the students use. If they put sensitive
information on those desktops, it can be compromised. But exactly how at-risk
each institution is depends a lot on how it manages data and what its various
I would also go somewhat out on a limb and say that the more sophisticated
research-oriented universities are probably in deeper trouble.
S: Why would that be?
JS: Speaking as a network manager
at an institution with Nobel laureates, it’s harder for me to set policy
and make it stick. The more famous your faculty, the more they’re in charge.
And the more the faculty can do whatever they want, the more chaotic your network’s
going to be.
S:So how do you manage that—do
you have a firewall?
JS: People have often asked me,
“Could you firewall MIT?” And, you know, I don’t want to and
I think it’s the wrong thing. Even if I wanted to, my faculty would not
permit me. Or more to the point, the faculty would say, “Yes, sure,”
but as soon as they couldn’t do something on the network, they’d
say, “Take out the firewall” or “Put in an exception so I
can do what I want to.” Firewalls that are filled with holes because somebody
wants to do something quickly become useless.
|“The more famous your faculty, the
more they’re in charge. And the more
the faculty can do whatever they want,
the more chaotic your network’s going to be.”
S: If not a firewall, then what
is your strategy?
JS: There is one good technique,
and it’s the only one that’s effective. No firewall, no port blocking—none
of that will work. The solution is that you must install patches.
S:Patches for each and every
JS: If you own a PC, you must
install patches. You must pay attention. And, and if you’re running a
more modern version of Windows, things like automatic update can help. I’m
going to give Microsoft some credit there. They’ve tried to make the installation
of patches as painless as possible. But it’s still something that you
have to sign up for.
I might add, by the way, firewalls don’t protect you against these worms.
Because once a worm gets on the other side of the firewall, then the firewall’s
useless. For example, at one point the State Department’s visa processing
system got one of the worms. And you can guess there’s a big firewall
between that and the Internet. In fact, I’d be willing to bet that thing
is not even connected to the Internet. And yet one of the worms got through
to it. Probably by somebody taking a laptop, connecting it to the public Internet,
catching the worm, unplugging the laptop, coming to their office, plugging it
into the secure network and boom, now the secure network has the worm.
That’s why I say firewalls are not useful.
S: What about attacks specifically
directed at the network itself?
JS: Well, the only worms we’ve
seen that have “hurt the network” do so by creating so much traffic
that the network gets overloaded.
There have been occasional distributed denial of service attacks against network
infrastructure. About a year or two ago there was an attack against several
of the root servers. Since then the root, DNS servers have been hardened. They’re
actually a lot harder to attack now than they were then. It’s amazing
we have to learn these lessons one at a time. Now, there is a lot of attention
to protecting the infrastructure of the Internet itself against attack. I’m
less concerned about this than I was a year ago.
S:I wanted to ask about the state
of encryption technology—the safety of data going over the network.
JS: Encryption technology, and
sometimes ciphers are out there—the cipher du jour. People should either
be using what’s called triple DES, the data encryption standard applied
three times over in a subtle way, or AES, the Advanced Encryption Standard that
NIST sponsored that has been out a few years. Encryption is not the problem.
Getting it deployed into actual products is where the challenge remains, and
how to do that in a way that mere mortals can handle. There are places where
encryption has been so successful you don’t even know it’s there.
The classic example is HTTPS on the Web.
Go to any major eCommerce site—where you enter your credit card number,
that transaction is encrypted. And you don’t even have to put a lot of
effort into worrying about how that’s happening. You see the little lock
icon, and you’re good. So there’s an example of where encryption
has been very, very successful.
S: Where could it be used more
JS: A place where it’s not
been very successful, and where we could really use it in certain applications
has been e-mail. There have been several attempts to try to do encrypted e-mail.
The protocols are designed. There are many systems out there, but they’re
just a little too hard to use for the average person, so they don’t tend
to get used very much. We could really use some innovation to get encrypted
e-mail up and running.
S:What would be the most needed
or most useful applications of encryption on campus?
JS:Any time you’re going
to send sensitive information over the network you want to encrypt it. For example,
at MIT our students and their advisors can look at grades online. We made sure
that they use a Web-based application with HTTPS so that we are covered with
And in fact, a real benefit in the education space is that the more things
you can offer as Web services, the easier it is to provide security.
S: So it seems like institutions
that have Web-based portals could certainly take advantage of HTTPS.
JS: If the portal software supports
secure connections, yes, they can. Now, there’s a subtlety here. Just
because you encrypt the information going over the network d'es not mean that
you can run insecure software on the servers.
Because of the widespread use of encryption on the Web, we don’t have
people stealing credit card numbers by intercepting Web traffic and decrypting
it, because that’s too hard. Instead, they break into the actual servers
and steal thousands of credit card numbers—or lots of other data—at
So the important thing to remember about putting sensitive information on the
Web is that you have to make sure the Web server software you’re using
is secure and up to the task. I don’t want to say, “Oh, use the
portal; you’re fine,” because I suspect that there’s probably
a lot of portal software out there that’s not particularly secure.
S:Are there any other weaknesses
to keep in mind, particularly when accessing data on the Web?
JS: This gets into engineering
implementations. The devil is in the details. Let me give you an example. There’s
a Web site out there—I won’t identify them—that offers survey
services. You can set up surveys and revisit them to see the data collected
or to edit them. But if you look closely at the actual URL in the little bar
at the top of your browser, you will see some long number.
A few of us wanted to know, “Well, wonder what happens if we go into
that title bar there where the URL is and just add one to that number?”
And we did so, and all of a sudden we were looking
at somebody else’s survey, and seeing their answers. The devil is in the
S: What’s being done on
campuses to protect student privacy and to comply with FERPA?
JS: Well, FERPA covers what we’re
supposed to do, but it d'es not specify the level of protection you have to
provide. It basically just says you’re supposed to protect student records
and not willingly give them away to the wrong people. But it d'esn’t really
go into what the standard is and how much protection should be offered. I’m
sure the protection is different at different schools.
The biggest threat to student records is how your administration is set up.
Universities are at risk if they let administrators with insecure machines download
sensitive data and leave it on their hard drive. Some worm could come along
and actually mail it out.
I mean, a lot of people, when you talk about security for administrative data,
they’ll immediately say, “Well, you know, our registrar’s
database is protected this way, that way, and the other way.” And you
say, “Well, that’s all well and good, but where d'es that data go?”
In fact, there’s an interesting conundrum here though it’s not as
bad as the one I talked about before. This one’s about human nature.
You will have a situation where the administration will protect the data, and
they’ll say, “Well, we’re going to only allow authorized representatives
of the registrar’s office to get to the registrar’s data.”
Kind of makes sense, right? And then a researcher comes along and says, “Well,
in order to do my research, I need this much information about these students.”
And what would happen is, rather than giving the researcher access to the actual
database where the data resides, someone will extract the data for the researcher
and e-mail it to them on a spreadsheet. Chances are, it sits on the hard drive
of the researcher and probably sits on the hard drive of the person who did
the work for the researcher. So, in an attempt to restrict who can get at the
data we wind up with the data getting splattered everywhere.
|“There’s a need
for security but that d'esn’t mean we
sacrifice openess to get it”
S: So education is a part of
JS: Education is a part of this,
both for the people who own personal computers and work with the data and for
the people running these systems. If somebody is eventually going to get the
data [legitimately], maybe you would like to grant them access in the place
where the data resides and simply say to them, “Don’t keep copies
of this on your hard drive.”
But if they can’t get to the data themselves they’re much, much
more likely to keep a copy on their hard drives, once you e-mail them a copy.
Because they think it will be very hard to get another copy.
So who’s going to educate
JS: Well, it’s a slow process.
I think when a school gets burned they tend to have a lot of running around
in-house and they try to figure out how it happened, and then everybody gets
security-conscious for a year or so
before they go back to their old
habits. One of the fundamental problems is that security is very hard. And what
makes it hard is that it’s a negative deliverable. You really don’t
know when you have it. You only find out belatedly when you’ve lost it.
S: So getting back to the original
question about openness versus the need for high security
JS: I don’t think it’s
either-or. There’s a need for security but that d'esn’t mean we
sacrifice openness to get it.
S: So would you say that you
need a balance of both?
JS: Yes, you need a balance of
[Editor’s note: Jeff Schiller will give a keynote at
the Syllabus2004 summer conference, to be held
in San Francisco, July 18-22.]