Coding barrier lets hackers browse

Click to follow
The Independent Online
THE ABILITY of companies to protect themselves against hackers who prowl the Internet computer network is being hampered by government regulations that bar the introduction of new security-coding, or encrypting, software.

In the United States, companies such as AT&T, Citibank and Lehman Brothers and governmental organisations such as the National Aeronautics and Space Administration have been moving quickly to install a 'user authentification' package called Cygnus Network Security (CNS).

But Internet users in the UK have been denied this opportunity by both the British and US governments. John Leach, an IT expert at Zergo, the computer security firm, says that the US regards encrypting software as unexportable military equipment while the British government views such software as 'a worrying means of avoiding government surveillance'.

Alarm bells rang last month when it was revealed that thousands of passwords had been stolen from Internet, a web that links some three million home and business computers round the world. Rob Whitcher, an expert in computer security at IBM in the UK, said that the Computer Emergency Response Team (CERT), the US agency responsible for Internet security, was warning that companies whose internal networks were linked to Internet could be powerless to prevent access by an outsider with the password.

CNS was developed by Cygnus Support, a Californian computer company, to prevent such security breaches. It hides users' passwords in encrypted messages, making hacking virtually impossible.

CNS is based on another security package, Kerberos, developed by the Massachusetts Institute of Technology, but is more popular commercially because it is easier to install and use. CNS uses a third party, known as the 'authorisation server', to verify the identity of any user who tries to gain access to external computers. It does this by issuing temporary encrypted tickets that the user then sends over the Internet system to the client computer. The client computer in turn asks the key distribution centre to authenticate identity.

'The response has been amazing,' said Simon Elphick, a sales manager at Cygnus Support. 'We have been swamped with calls from businesses, universities and government institutions concerned that their internal security is at risk.'

However, the US departments of commerce and defence, citing prohibitions in the Munitions Act, will not allow the export of such encrypting devices. 'Just as one can't sell weapons abroad, so one can't export encryption machines,' Mr Leach explained.

'Everyone, bar the government, thinks the law is wrong,' observed David Henkel-Wallace, co-founder of Cygnus Support. 'Our encoder is clearly not a munition. It should be available internationally, through Internet.'

MIT tried to overcome the problem by developing an exportable version of Kerberos called 'Bones', which has no encrypter. But without encryption, thieves can still find the password. Adding encryption to Bones after export is complicated, as the programme does not have the necessary 'hooks' - special gaps in the programming where one is prompted to insert the encrypting commands.

Mr Elphick said that it was possible that both CNS and Kerberos were being exported illegally. CNS is hidden on the Internet in a private directory that changes its name every day. Users can gain access to the file name only if they fax a request to Cygnus from within the US. 'Of course, there is nothing to stop these companies passing on the directory name to sister companies abroad, but at least we won't be liable,' Mr Elphick said.

It is even easier to export Kerberos illegally. To find its hidden directory, one has first to read its Read Me file, which explicitly states that firms cannot use Kerberos outside the US. However, no proof of US residence is then needed to enter the file.

(Photograph omitted)