| Forum Home | ||||
| PC World Chat | ||||
| Thread ID: 94835 | 2008-11-14 00:38:00 | Woah... | ubergeek85 (131) | PC World Chat |
| Post ID | Timestamp | Content | User | ||
| 720126 | 2008-11-14 01:42:00 | Just read the appropriate policy (www.cpit.ac.nz) now. There's no 'shoot-the-messenger' stuff, which is good... 2.2a: Use only those facilities for which they have authorisation, whether these facilities are at CPIT or at any other location accessible through a network. 2.2f: Not subvert, or attempt to subvert, any user identification and/or authentication scheme on any system. 2.1g: Not use privileges as a member of the CPIT’s computing community, or cause harm to any individual or to any software or hardware system (internal or external to CPIT). Examples of harmful activities, in addition to those noted elsewhere in this Code, include, but are not limited to: <snip> * compromising security Hate to break it to you, but any of those three points could cover your activities. I hope your admins are nice. |
Erayd (23) | ||
| 720127 | 2008-11-14 01:46:00 | Ooh, the version I read was pinned to the wall. I guess they updated it. | ubergeek85 (131) | ||
| 720128 | 2008-11-14 01:54:00 | 2.2a: Use only those facilities for which they have authorisation, whether these facilities are at CPIT or at any other location accessible through a network. 2.2f: Not subvert, or attempt to subvert, any user identification and/or authentication scheme on any system. 2.1g: Not use privileges as a member of the CPITs computing community, or cause harm to any individual or to any software or hardware system (internal or external to CPIT). Examples of harmful activities, in addition to those noted elsewhere in this Code, include, but are not limited to: <snip> * compromising security Hate to break it to you, but any of those three points could cover your activities. I hope your admins are nice. It could be argued that "facilities" in point 2.2a relates to physical buildings, despite the "or at any other location accessible through a network" By finding a security hole, I don't believe that could be interpreted as subverting, or attempting "to subvert, any user identification and/or authentication scheme on any system." I imagine Geekster is logged into the CPIT network as himself (and is therefore identifiable and already authenticated)... And by not carrying out what he described in the OP, he avoids problems with 2.1g. He hasn't compromised security - the admins have, probably via an oversight. If the campus does take action, there will be legal avenues to follow. But it would be a very petty admin to overreact to a report of a potential breech... |
johcar (6283) | ||
| 720129 | 2008-11-14 01:54:00 | I'd still alter it. How could you not? |
Metla (12) | ||
| 720130 | 2008-11-14 02:02:00 | I'd still alter it. How could you not? Exactly. |
rob_on_guitar (4196) | ||
| 720131 | 2008-11-14 02:09:00 | It could be argued that "facilities" in point 2.2a relates to physical buildings, despite the "or at any other location accessible through a network" By finding a security hole, I don't believe that could be interpreted as subverting, or attempting "to subvert, any user identification and/or authentication scheme on any system." I imagine Geekster is logged into the CPIT network as himself (and is therefore identifiable and already authenticated)... And by not carrying out what he described in the OP, he avoids problems with 2.1g. He hasn't compromised security - the admins have, probably via an oversight. If the campus does take action, there will be legal avenues to follow. But it would be a very petty admin to overreact to a report of a potential breech... I'm not saying that those policies are clear-cut, but they don't need to be. If his admins are petty enough (which they hopefully aren't), just about anything will do. And the law is on the side of the admins - regardless of what the policy document says, it doesn't grant him administrative authority, and changing the MOTD is clearly an administrative task. This would make it unlawful access. It's far better to be overcautious than get burned by not being cautious enough. I have seen something exactly like this happen twice before - thankfully I wasn't the poor sod who got burned. |
Erayd (23) | ||
| 720132 | 2008-11-14 02:16:00 | I'd still alter it. So would I. Its not damaging. The IT people should be able to lock this sort of thing down without being told. |
pctek (84) | ||
| 720133 | 2008-11-14 02:18:00 | Yeah, and anyway, I can alter it, but not modify the text. They'd be hard-pressed to find something wrong with that. | ubergeek85 (131) | ||
| 720134 | 2008-11-14 02:48:00 | Is the 5 minutes of fame, or whatever bragging rights worth the risk of: - being kicked out of your school - having a black mark against your name (are you thinking of a career in IT?) Schools take breach of access seriously, so do employers. Don't start down the path of something you may regret, sure changing the login message of a system is minor, but is shows poor judgement and potential for worse breaches. |
dyewitness (9398) | ||
| 720135 | 2008-11-14 03:41:00 | **** there are a lot of lamers in this thread. Change the message to "CPIT sucks dick for crack" or similar. |
roddy_boy (4115) | ||
| 1 2 3 4 | |||||