The
Systems Librarian
Defending Your ILS Against Security
Threats
by Marshall Breeding
I've said it many times, in workshops,
to co-workers, in some of the presentations I've given at conferences on security: "It's
a very dangerous world," and it's getting more dangerous all the time. As shown
in other features and columns in this issue of CIL, security concerns
pervade almost all aspects of computing in the current landscape. This column
will focus primarily on issues related to keeping your library's integrated
library system (ILS) well-protected, though many of the concepts apply to other
types of systems.
In the ocean of potential cybervictims, libraries are
small fish, but that doesn't necessarily mean that we
have no cause for alarm. Hackers prefer to target high-profile
sitesgovernmentagencies, military, e-commerce,
and political foes. They might be motivated by achieving
economic gain, making political statements, or just proving
their prowess as hackers and pointing out the stupidity
of the victims. I've seen many postings in the hackers'
realm reflecting the attitude that if anyone is inept
enough to leave obvious vulnerabilities in their computer
systems, they deserve to be hacked. Ignorance is no excuse
when it comes to computer security. It's also fair to
say that a strong anti-Microsoft sentiment pervades hacker
communities. In the last few years, computers running
any of Microsoft's operating systems find themselves
the victims of a constant onslaught of attacks.
When Hackers Attack
Fortunately, breaking into a library computer doesn't
bring the hacker the same level of glamour or prestige
as some of the other potential targets around. As best
as I can tell, the hacking community generally regards
libraries quite favorably. All in all, libraries experience
a fairly low rate of downtime and disruption due to security
breaches and subsequent system compromises. Things could
be a lot worse.
Unfortunately, the hacking community also perceives
library computers as "easy marks." Libraries often don't
have full-time systems administrators and security specialists.
So, while a library machine may not be the ultimate destination
targeted by a hacker, it may be a convenient intermediate
stage in a broader plan of attack. A typical strategy
for breaking into a system involves capturing access
to a series of other computers throughout the world to
make it difficult to trace the attack to its source.
I recall a security incident at my own library a number
of years ago that serves as an example of the stepping-stone
attack strategy. Hackers managed to break into one of
our servers, placing many gigabytes worth of illicit
softwarecalled "warez"and making it available
for the entire world. For a brief period of time, we
observed hundreds of simultaneous FTP sessions from hackers
all over the world. Our investigation of this break-in
revealed that the computer used to attack our system
was in Greece. But this computer itself turned out to
be hijacked. The initiator of the attack, as best we
could determine, resided in Belgrade, Yugoslavia. As
we learned, the stepping stones of a security attack
can span the globe.
Dynix Was Put on Alert
So while we're seldom prime targets, we aren't totally
bypassed either. One of the popular hacking magazines
recently printed an article pointing out some of the
lax practices and security vulnerabilities found in some
installations of Dynixone of the most common library
automation systems ("Breaking Down the Dynix Door," 2600:
The Hacker Quarterly 19:3, Fall 2002, pp. 4748).
The author goes by iCe799, consistent with hackers not
wanting to use their real names. The article describes
the author's observation that at least some implementations
of the Dynix ILS lacked even the most basic security
precautions. He provides a basic recipe for discovering
servers that run Dynix and identifying ones with lax
security, and what exploits might be successful in gaining
access.
The author cautions the hacker community not to do
bad things with this information. "Some of the various
systems I have been looking through contain very interesting
personal information. Information that should not be
used for malicious purposes. I would advise anyone finding
that these methods work alert the system administrator
immediately." (But don't count on receiving kind treatment
from hackersit's imperative to operate systems
in a way that's not vulnerable to such attacks.)
iCe799 notes some of the information thatfrom
his own experiencecan be revealed from patron records
in the system: names, birthdays, addresses, driver's
license numbers, e-mail addresses, past overdue items,
current overdue items, fines owned, refunds owed, and
notes. It's easy to figure out which records identify
minors both through the birthday field and through the
presence of information about a guardian and the school
attended. Clearly, a typical library automation system
holds very sensitive information about patrons that must
be protected from unauthorized access, regardless of
the effort necessary.
Dynix (formerly epixtech), the company that produces
and supports the Dynix ILS, was notified by an attentive
customer about the article the day it was posted (it
ran online and in print). The company promptly issued
a general security warning to its customers running Dynix,
reminding them to follow the fundamental security precautions
necessary to avoid system compromise: Use firewalls,
disable unnecessary network services, do regular backups,
and practice rigorous account and password management.
A day later, the company issued a warning outlining the
specific vulnerabilities described in the article. This
warning gave clear instructions regarding the security
vulnerabilities publicized in the article that, if followed,
would effectively foil hackers attempting to use these
methods for intrusion. Further, Dynix issued a security
pack to the Dynix ILS that included a number of security-related
enhancements. The vendor asserts that it's not aware
that any of its customers' systems were compromised as
a result of this article. While it's always possible
that there were some minor intrusions that went undetected,
after some investigating, I have also found no reports
of major Dynix systems compromises. I think that everyone
involvedthe company and its customer librariesnow
has a higher level of security awareness than before.
I exchanged e-mail with the individual who wrote the
article in 2600. One of my main questions was
whether he continued to find Dynix systems with the same
security weaknesses after the article was published.
He maintained that a large number of Dynix systems remain
vulnerable, and that some have been compromised.
In my view, Dynix's ILS is no more vulnerable to attack
than any other. There are over 2,300 installations of
Dynix worldwide. I'm sure that only a very small percentage
of these had the security issues noted in the article.
None of the vulnerabilities described in the 2600 article
reflected problems with the design of Dynix itself, but
rather involved lax practices in the systems administration
of the underlying UNIX operating system. In the hands
of a good systems administrator, any of the major library
automation systems on the market today can be well-hardened
against the threats of hackers.
Another issue that comes up frequently involves the
relative security of Windows operating systems versus
UNIX. While Windows has been the prime target for the
latest onslaught of virus and worm attacks, I'm not convinced
that the operating system itself is any less secure than
the various forms of UNIX. Given equal attention by a
competent systems administrator, a Windows-based server
(2000, XP, .NET, NT) can be thoroughly secured. Most
problems occur when organizations deploy Windows servers
without an adequate level of technical administration.
Both UNIX and Windows are complex and powerful operating
systems that need constant attention or they will lapse
into vulnerability. Good security demands vigilance and
involves a complex set of tasks. Realizing that any set
of guidelines will be incomplete, I offer the following
tips that, if followed, should protect your ILS reasonably
well.
Marshall's Top 10 ILS Server Security Tips
1. Keep the operating system up-to-date. Take
advantage of any automatic notification or updating service
offered by the operating system's developer. Apply OS
upgrades and security-related patches as soon as you
possibly can. The last few worms that spread through
the world exploited vulnerabilities for which patches
had been available for at least 6 months. We may not
be so lucky the text timethe attack may come days
and not months after the security lapse has been identified
and patched.
2. Keep the application software up-to-date. Libraries
must give careful consideration to when upgrades can
be installed. Academic libraries, for example, generally
don't want to install upgrades that bring changes to
the way that the system works in the middle of a semester.
Nevertheless, strive not to run software that is too
far out-of-date. Any patches related to security vulnerabilities
should be installed promptly. Make sure that your vendor
understands your concern for good security.
3. Turn off all network services you don't
absolutely need. When installing the operating
system, it's often the case that many network services
that you will not need for the task at hand just load
automatically. You can easily check to see what network
ports have been activated on your server by using a
port scanning utility. Gibson Research Corp. offers
a free service called ShieldsUP from http://grc.com that
will test the security of a Windows-based system.
4. Use industrial-strength passwords.A
good password will not include any word in the
dictionary (including foreign languages), a proper noun,
or a keyboard pattern (e.g., qwerty), and will include
one or more non-alphanumeric characters. Granted, such
passwords are tough to remember, but that's the cost
of keeping your system safe. Require that all staff members
(not just the system administrators) who have accounts
usestrong passwords. Make sure that they do not write
passwords down in public view. If they mustbe
written down, make sure their owners keep them in safe
locations.
5. Change passwords frequently. Even good
passwords can find their way into the wrong hands. Enforce
mandatory password expiration so that any compromised
passwords will be of limited value. Changing passwords
every 90 days is a good guideline.
6. Restrict file system permissions.Carefully
review what accounts have access to each drive, volume,
and directory. Be especially mindful of the account associated
with your Web server and of other anonymous accounts
that users can access. Provide privileges to create and
modify files in a directory only when absolutely necessary.
7. Review system accounts frequently.Disable
or remove any accounts not needed.Disable any user accounts
immediately after an employee leaves the organization.
Monitor the system for any suspicious accountsthis
is often the first indicator of the security intrusion.
8. Install machine-specific firewall software. Often
called personal firewalls, this type of utility monitors
all incoming and outgoing network traffic, blocking all
unauthorized activity. For UNIX, TCP Wrappers continues
to be popular; for Windows-based systems, consider something
like ZoneAlarm (http://www.zonelabs.com).
9. Avoid running mail clients or Web browsers
on servers. These two applications provide the
means for viruses and worms to find their way onto
servers. While necessary for end-user computers, they
don't belong on servers to the same extent.Many server
components must be installed through a Web interface,
making it necessary to install a Web browser on the
server. Connecting only to trusted sites will reduce
the risk.
10. Maintain a thorough backup regimen. Even
well-maintained servers can fall victim to an attack,
or they might experience data loss through human error
or hardware failure. Good backup practices will allow
you to restore your system to working order with little
or no loss of data.
It's often said that the only way to guarantee the
security of a computer would be to keep it unplugged
from any network. This is not exactly a practical option,
especially in libraries where our main role involves
providing access to information. We have to balance the
risk factors against the accessibility and availability
of information.As long as we give security issues a reasonable
priority and maintain constant vigilance, we in libraries
should be able to accomplish that balance, fulfilling
our key mission with reasonable safety from the threats
that exist in our dangerous world.
Marshall Breeding is the library technology
officer at Vanderbilt University in Nashville, Tenn., and
a consultant, speaker, and writer in the field of library
automation. His e-mail address is breeding@library.vanderbilt.edu.
You can also reachhim through his Web site at http://staffweb.library.vanderbilt.edu/breeding.
|