VIRUS-L Digest Thursday, 17 Oct 1991 Volume 4 : Issue 193
Today's Topics:
Re: Experiences with hardware protection (Thunderbyte)
Re: Hardware and Software; Re: Forget Turing...
Several subjects (PC)
Virus Proof Machine ?
Re: Manners
Re: Hardware, hardware...
Anti-virus patent - that date sounds familiar
Computer "Anamolies" in books
re: More hardware!
virus(15xx) (PC)
Quesions on Stoned virus (PC)
Need Protection (PC)
VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed. Contributions should be relevant, concise,
polite, etc. Please sign submissions with your real name. Send
contributions to
[email protected] (that's equivalent to
VIRUS-L at LEHIIBM1 for you BITNET folks). Information on accessing
anti-virus, documentation, and back-issue archives is distributed
periodically on the list. Administrative mail (comments, suggestions,
and so forth) should be sent to me at:
[email protected].
Ken van Wyk
----------------------------------------------------------------------
Date: Wed, 16 Oct 91 09:56:59 +0000
>From: Fridrik Skulason <
[email protected]>
Subject: Re: Experiences with hardware protection (Thunderbyte)
>I got produkt information about a hardware virus protector called
>'Thunderbyte' which intercepts all mysterious writings to the disk, e.g.
>absolute ( not through dos ), writing to exe/com files etc.
Thunderbyte was reviewed in the Sept '91 Virus Bulletin. It was
tested against 183 infected programs. It did stop 114 of them, and in
25 additional cases it detected an attempt to write to the disk. The
rest (44 infected files) could be run without activating the card.
In some of those cases the virus did not attempt to do anything harmful,
so there was nothing for Thunderbyte to detect.
- -frisk
------------------------------
Date: Wed, 16 Oct 91 09:56:56 +0000
>From:
[email protected] (Lars J|dal)
Subject: Re: Hardware and Software; Re: Forget Turing...
It seems to me that this Turing talk is going along two *different*
threads:
1) Can computers (in principle) distinguish between a virus and a
"normal" program?
2) Can computers be build to be safe from virus infection?
This is two different subjects! So the proof by someone-I-don't-know
that 1) is undecidable on a Turing machine should only (or rather at
most) discourage people designing programs to detect viruses, not people
trying to design a system which cannot be infected.
Right?
+--------------------------------------------------------------------------+
| Lars J|dal | (put your favourite quotation here) |
|
[email protected] | |
|--------------------------------------------------------------------------|
| Computer Science Department - Aarhus University - Aarhus - Denmark |
+--------------------------------------------------------------------------+
------------------------------
Date: Wed, 16 Oct 91 10:14:49 +0000
>From: Fridrik Skulason <
[email protected]>
Subject: Several subjects (PC)
DR-DOS 6.0
I have been studying the DR-DOS 6.0 password protection a bit, and
it seems to protect against most file viruses most of the time. There
are viruses which are able to bypass it, and if you ever remove the
write-protection (for example when updating a file) you are vulnerable
to any "infect-on-copy" type virus.
Virus families
I am trying to compile a list of PC virus families, in an effort to
reduce the naming confusion. There are some problems in defining
just what a virus family is. For example, it is not 100% clear if
the following groups of viruses should be considered to belong to
the same family or not.
1) Jerusalem, Fu Manchu, Plastique and Slow
2) Vacsina and Yankee
3) W13, Vienna, Ghostballs, V2P2
4) Cascade and JoJo
Any thoughts on this subject ?
F-PROT 2.01 delay
The release of version 2.01 has been delayed by a week, so I can add
60 (or so) new viruses from Poland.
My E-mail address
My E-mail address has changed - it is now
[email protected], but
mail sent to
[email protected] should still reach me.
- -frisk
------------------------------
Date: Wed, 16 Oct 91 11:29:15 +0100
>From: Chris Stops <
[email protected]>
Subject: Virus Proof Machine ?
Hello Netters!
I have read with interest the discussion over the last few
weeks on hardware vs. software protection, OS/2 viruses and other
preventative measures. So I thought it was about time I threw in my own
half penny worth of thoughts...
For me, the ultimate protection (if there is such a thing) is a new type
of PC-like machine, which I will now describe...
The machine is based, for arguments sake, on an 80386 running in
protected mode, for which I will assume there are no 'back doors' (such
as undocumented instructions) by which the protected mode can be
breached.
(Side note : In fact, the 80286 had a back door, the LOADALL
instruction. This loaded ALL of the processor's registers, including the
internal ones associated with the protection. However, LOADALL filled
the registers with values read from a memory block at absolute location
800h, so this back-door can be closed simply by making sure that the
memory at 800h is in a high priority region).
The entire operating system (i.e. BIOS, IO.SYS and MSDOS.SYS, but not
the external commands) is held in ROM (or EPROM, or something similar.
Upgradeable ROMs were recently discussed). Again, I will assume there
are no 'back doors' such as undocumented operating system calls by which
an application may increase its privilage level.
When the machine is switched on, the processor starts executing code
from ROM. It sets up any required operating system data areas in the RAM
including, for example, the interrupt vector table (or 'interrupt gates'
to be more precise). Most importantly, the operating system sets up
protected mode before ANY code is loaded from a disk and executed. The
protection is such that the code of the operating system kernel and the
interrupt gates are at the highest priority and cannot be read or
written by any application. Also, all of the hardware I/O ports are
similarly protected. Thus, no one can write a boot type virus to sneak
in before protection of the operating system is established; No virus
can hide in the operating system code itself; No virus attached to an
application can hook into the operating system and become resident; And
no virus can go down to the hardware. The only way into the operating
system is via a well defined interrupt gate.
Of course, viruses don't have to become resident to do their dirty work.
They can act 'on the fly' just before an infected program is run. In
this case, the operating system limits the operations which can be
carried out on executable files. For example, executable files may be
created (so compilers still work) or may be executed (of course!). But
they cannot be opened for read access. Nor can their executable status
be altered to look like a data file (e.g. in DOS terms, *.EXE becomes
*.DAT, the 'DATA' file is processed, then *.DAT is renamed back to
*.EXE). If we still allow executable files to be deleted, then about the
only sort of virus left is an overwriting virus, which deletes an
application and then creates a copy of itself using the name of the
application. But since the applications will no longer run, it should be
obvious that something is wrong with the machine.
To allow copying of executables (e.g. from floppy to HD) there would need
to be a new operating system call for copying files, becuase, of course,
no application (e.g. COPY) can read the source file!
Now of couse, there will be some users who want/need read/write access
to their executable files. In this case, we could have a three position
switch inside the machine, mapped into a protected I/O location. It
functions as follows...
Position A All attempts to read an executable file are stopped.
Maybe a box could flash up to warn the user. The machine
would be shipped with the switch in this position, so
non-technical users are safe.
Position B All attempts to read an executable file result in a
dialogue box on the screen. The user may allow or stop
the access, and this would be useful for semi-technical
users. The user would be suspicious if 'KINKY.EXE' tried
to read 'WP.EXE', but not if an updating program tried to
change an executable.
Position C All attempts to read an executable file are allowed.
Users do this at their own peril!
In fact, earlier I mentioned an overwriting virus that could operate if
deletion of executables was allowed. Maybe this could also be controlled
by a similar switch.
Similar protections could be put on batch files, if required, although a
batch file virus would be easier to spot.
Now that the operating system is so well protected, we have a problem.
Not only can no virus modify it, but no extensions can be added either,
for example, new device drivers. The virus proof way around this is that
new drivers are supplied on ROMs which can be plugged into the machine,
and patched into the O/S during initialisation. A slightly less secure
approach is that drivers are loaded off a disk. They execute at a
priority below that of the main kernal, but above that of the
applications software. Then, the only way a virus could spread is for a
disk device driver to spot another disk device driver while accessing a
disk, and then infect it. But I think that the effect of such a virus
would be negligable.
Any comments anyone? Is a totally ROMed version of the machine virus
proof? Is there a hole somewhere? I have a gut feeling that any holes
would eventually map down to a hole in the processors protected mode.
After all, surely the idea of a protected mode is that you can build a
protected system?
This protected system also has another advantage: Manufactures can use
their own hardware and O/S software (as long as it is compatible at the
application interface) since no application can contain system dependent
code! So we get more open systems!
Of course, my machine would probably be incompatible with Mess-DOS. But
then, isn't it about time we establised a new microcomputer standard
based on at least 32 bits of data and address?
Chris.
------------------------------
Date: 16 Oct 91 10:27:45 +0000
>From:
[email protected] (Henk de Groot)
Subject: Re: Manners
[email protected] (Fred Waller) writes:
>The thread is lost to me but someone wrote not long ago:
> > This whole thread is rediculus.
> > -------..... -------.....--------
> > I hope this will stop this stupid converstion.
> The subject of hardware protection is not ridiculous nor is the
> series of articles on it a "stupid conversation". If a given
> subject is of no interest to someone, s/he can always skip it.
> Or marshall argument, if not agreeable.
I was the one who wrote it. It was about the write-protection on floppy. You
deliberately left out the article that was between the lines, explaining why
it was rediculous and the coverstion stupid.
I wrote that the write protect tab on a floppy will not prevent virus spread,
at best slows it down. Every infection via floppy went trought the cycle
write virus to floppy -> read virus from floppy.
The write protect tab has to be removed in the first stage and therefor
doesn't help. The virus can only spread if the floppy is written on an
infected system, but that is true for every spread of a virus via floppy.
The only advantage of a write-protect tab I am able to see is that you prevent
the spread of a floppy to all your other floppy's. As soon as you have to
write to one of your floppies houever the virus will copied with it.
I hope you understand wat I'm saying: The virus will continue to spread, even
if you use a write protect tab. This is so because whatever you do, once you
will have to write to your floppy and remove the tab (unless you have only
static data on your floppy's, in which case I wonder what you are doing with
your floppy's anyway).
Presenting the write-protect tab as the ultimate solution gives a false
sence of security. You only slow down the process of spreading but does not
stop the spread.
> However, qualifying someone else's postings as "ridiculous" or
> the articles as "stupid conversation" is not likely to cause the
> targeted author(s) to stop writing or to change their mind. In
> fact, it's almost guaranteed to have the opposite effect.
True if I only wrote these two lines without explanation. I explained it
and made it clear why. Unless you are able to point out something is
incorrectly in my posting, I think the argument stands and makes the
converstion indeed stupid.
> Mature persons do not reject contradiction; they handle it.
> Inability to face contradiction is a sign of immaturity.
Mature persons will react on the original contents and not lift out the
conclusions only.
> Fred Waller
>
[email protected]
Henk.
- --
/ / Henk de Groot | Department: PG 9000i - System Services
/---/ __ __ / V2/A12-A13 | Internet :
[email protected]
/ / (-_ / / /( Tel: +31 55 432099 | == PHILIPS INFORMATION SYSTEMS ==
Disclaimer: I only speak for myself, not for my employer!
------------------------------
Date: 16 Oct 91 11:03:16 +0000
>From:
[email protected] (Henk de Groot)
Subject: Re: Hardware, hardware...
[email protected] (Y. Radai) writes:
> Henk De Groot writes:
>> If you claim that a virus can not go
>>resident on your system than that implies that your system is clean.
>>If your system is clean you can not infect a floppy, protected or not!
>I am not going to get involved in the hardware issue per se; I only
>wish to take exception to the above statement of yours. Haven't you
>heard of [several direct-action viruses]
You are right, the virus doesn't have to go TSR. The original article
however talked about a virus going TSR. The reaction was that this was
not possible because the system was not infected yet. I replied that
if you have a virus-free system you don't have to use a
write-protected floppy either, you will not infect the floppy if your
system is clean.
>phrases such as "rediculus" and "this stupid converstion" [sic].
Read the thread, understand what is said and you will either have
comments on my contribution (if I overlooked something) or conclude
that useing a write-protect tab leads to nowhere.
Kind Regards,
Henk.
- --
/ / Henk de Groot | Department: PG 9000i - System Services
/---/ __ __ / V2/A12-A13 | Internet :
[email protected]
/ / (-_ / / /( Tel: +31 55 432099 | == PHILIPS INFORMATION SYSTEMS ==
Disclaimer: I only speak for myself, not for my employer!
------------------------------
Date: Wed, 16 Oct 91 09:37:00 -0500
>From: Ken De Cruyenaere 204-474-8340 <
[email protected]>
Subject: Anti-virus patent - that date sounds familiar
>"David.M.Chess" <
[email protected]>
>
>I've just run across an interesting U.S. patent. It's number
>4,975,950, granted to Stephen A. Lentz, entitled "System and Method of
>Protecting Integrity of Computer Data and Software". The filing date
>is November 3, 1988.
^^^^^^^^^^^^^^^^
That is the day after RTM launched the infamous internet worm.
Coincidence ?
(I have just finished reading CYBERPUNK, so was able to confirm
the date in part 3 of the (interesting) book: RTM)
- ---------------------------------------------------------------------
Ken De Cruyenaere - Computer Security Coordinator - Computer Services
University of Manitoba - Winnipeg, Manitoba, Canada, R3T 2N2
Bitnet:
[email protected] Voice:(204)474-8340 FAX:(204)275-5420
------------------------------
Date: Wed, 16 Oct 91 10:58:28 -0400
>From: padgett%
[email protected] (A. Padgett Peterson)
Subject: Computer "Anamolies" in books
While "Shockwave Rider", "When Harlie was 1", and "The Adolesence of P1"
were all works treating self aware computers and worms, the earliest
reference I know of computers (programs) taking over other computers
goes back to Heinlein's "The Moon is a Harsh Mistress" published in the
early sixties (from memory). "Adam Selene" was the non-de-guerre used
by the program/computer/AI (never really described), but it did spread
through the local communications network.
Padgett
ps Just bought a marvelous program for making my laptop's VGA screen
MUCH easier to read - "Laptop Ultravision" from Personics
(508)897-1519 (plug).
------------------------------
Date: 16 Oct 91 13:00:57 -0400
>From: "David.M.Chess" <
[email protected]>
Subject: re: More hardware!
>From:
[email protected] (Fred Waller)
> In fact, if we could just
>stop ONE virus, the old Stoned, we would have prevented the great
>majority of viral infections in the USA! But the Stoned continues
>on its merry way, and software antiviruses have not been able to
>stop its advance.
But hardware antiviruses haven't stopped its advance, either! That
is, there are both hardware and software solutions that can completely
protect any given machine against the Stoned. And they've both failed
(in the global sense) for the same reason: not enough people are using
them.
My suspicion (and, again, I'd love to be proven wrong in actual
practice) is that software hasn't done more than it has primarily
because it isn't widely-enough installed, *not* primarily because it's
software rather than hardware...
DC
P.S. The 1813 (Jerusalem) is still up there near the Stoned;
I think we'd have to stop both of them before we could
claim to have the great majority! *8)
------------------------------
Date: Wed, 16 Oct 91 18:02:19 +0000
>From:
[email protected] (Kelvin Lee)
Subject: virus(15xx) (PC)
My floppy disk was infected by a virus called [15xx]. The disk only
contains a self-extracted exe file. I've already cleaned the disk,
however now whenever I try to run the file, I've got a message saying
out of memory. So, is there any utility that I can use to fix this
problem? Thank you for your help.
------------------------------
Date: 16 Oct 91 18:45:12 +0000
>From:
[email protected] ( )
Subject: Quesions on Stoned virus (PC)
Could someone please answer a basic question about the Stoned virus...
Given an uninfected system and an infected floppy containing ONLY data
files, no executables, not a bootable disk...what actions by the user
can cause the PC to become infected? I know that trying to boot from
this infected disk can do it, but what about copying files, looking at
the directory, etc?
[email protected]
------------------------------
Date: Wed, 16 Oct 91 15:58:18 -0400
>From: RICH BASILE <R3RB%
[email protected]>
Subject: Need Protection (PC)
Would the powers to be please inform me on how to get a hold on the newest
versions of Mcafee and F-PROT. Here at the Universtiy of Akron, we still
use Mcafee 3.5V63, and we only have F-PROT 1.16.
RICHARD BASILE
UNIVERSITY OF AKRON
MICROCOMPUTER SYSTEMS SUPPORT
------------------------------
End of VIRUS-L Digest [Volume 4 Issue 193]
******************************************
Downloaded From P-80 International Information Systems 304-744-2253