Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Networking IT

SF Not an Exception In Giving IT Too Much Control 245

CWmike writes "The city of San Francisco's IT department is certainly not the exception when it comes to allowing just one person to have unfettered rights to make password and configuration changes to networks and enterprise systems. In fact, it's a situation fairly common in many organizations — especially small to medium-size ones, IT managers and others cautioned in the wake of the recent Terry Childs incident."
This discussion has been archived. No new comments can be posted.

SF Not an Exception In Giving IT Too Much Control

Comments Filter:
  • by pwnies ( 1034518 ) * <j@jjcm.org> on Friday July 25, 2008 @02:46PM (#24339325) Homepage Journal
    I really think this type of thing is inevitable with this high level of a network admin. There comes a point where the complexity of the network you manage means that you simply can't report all the inner details and workings to a manager or overseer. Not only that, but with the speed that computers advance, hardware becomes obsolete within a decade, and new talent often times wont have knowledge/capabilities/will to deal with the older hardware that builds up in operations such as these.

    Sadly I think the only thing one can do with things this size, is appoint someone and pray he isn't chaotic evil.
  • by Harmonious Botch ( 921977 ) * on Friday July 25, 2008 @02:48PM (#24339351) Homepage Journal

    I forget who said that "an elephant is a mouse designed by a committee." Sure, you can get paranoid about network design and control, and give the job to a committee. But that is going to be really clumsy.

    The issue here really is not about size of the design team, it is about vetting the guy who does it. ( The guy who is in charge of the network for my business is someone who I really know and trust. He was best man at my wedding. )

  • by The Warlock ( 701535 ) on Friday July 25, 2008 @02:52PM (#24339391)

    No, that doesn't work. What if, instead of just refusing to divulge the password, Childs had shot himself in the head or gotten hit by a bus or something. He locked down his network so well that only through a password that was only in his head could anyone have admin access.

  • by mrroot ( 543673 ) on Friday July 25, 2008 @02:53PM (#24339415)
    When you have already laid off everyone and downsized your IT department to so few employees, its kind of hard to avoid having a single person with so much power.
  • Business Mad Libs (Score:3, Insightful)

    by bill_mcgonigle ( 4333 ) * on Friday July 25, 2008 @02:57PM (#24339469) Homepage Journal

    Yes, this is prevalent. Unfortunately, no, it has precious little to do with IT.

    This quote from TFA is quite true, but universally so. Let's play Business Mad Libs:

    "Single points of failure are always bad," said John Pescatore,
    an analyst at Gartner Inc. "There should never be one person who is
    the only person who knows ____ MISSION CRITICAL INFORMATION ____."
    Companies need to make sure there are at least two if not three people
    who share the knowledge of ____ BUSINESS PROCESS______. "As a minimum,
    require it to be documented and stored somewhere if personnel
    limitations say you can't have personnel with overlap," Pescatore said.

    Have fun playing the accounting, regulatory, legal, and R&D versions, just for warm-up.

    Now, if the business managers weren't smart enough to either know this applied to IT as well as their other divisions, or not smart enough to not recognize that that they needed outside advice on how to apply business rules to IT - well, you have to wonder how well the other parts of their businesses are running.

  • This is silly (Score:5, Insightful)

    by peipas ( 809350 ) on Friday July 25, 2008 @03:01PM (#24339541)

    Of course there will be people in IT who have power, and of course that power can be abused.

    Somebody at a television network has the power to broadcast rocking horse porn if they want to as well and there is no time machine to unrock that horse.

    The articles hypes up one person being able to abuse power as if it were unique to IT and suggests a remedy that more than one person should have this power, as if this had any bearing on anything, e.g. the ability for the abuser to simply revoke access to others. What, somebody else should be assigned the exclusive ability to revoke? Then that person is the potential abuser. This is silly.

  • What "incident"?? (Score:5, Insightful)

    by Jane Q. Public ( 1010737 ) on Friday July 25, 2008 @03:01PM (#24339551)
    Apparently, a bunch of idiot managers realized all of a sudden that they had GIVEN one person control over a major network, and tried to seize back control. Also apparently, he did not trust them to keep it running properly. (And also apparently, rightly so.)

    So where is the "incident"?? What did he do wrong?

    By law he might have done "wrong" by not relinquishing the passwords immediately. But by the people of San Francisco, he may have saved them a lot of trouble and headaches. So, he was faced with a dilemma: obey the law, or do the right thing.

    Sad.
  • Re:God complex (Score:5, Insightful)

    by ShieldW0lf ( 601553 ) on Friday July 25, 2008 @03:03PM (#24339585) Journal

    The subject of the article is about one central admin having too much control over too many machines, and the risks that entails when they go bad.

    Which makes a person wonder... how much worse when billions of consumers are giving total control over all their machines to a centralized authority through Trusted Computing and Vista?

    I mean, what happens when Microsoft goes bad?

  • You say potato... (Score:3, Insightful)

    by mweather ( 1089505 ) on Friday July 25, 2008 @03:03PM (#24339591)
    You call it dangerous, I call it job security.
  • by ZonkerWilliam ( 953437 ) * on Friday July 25, 2008 @03:05PM (#24339623) Journal
    It's called Seperation of Duties [wikipedia.org].
  • by Anonymous Coward on Friday July 25, 2008 @03:08PM (#24339671)
    And you would be exactly right. You can't trust idiots (Managers) with the keys to a network. Next thing you know, stuff is all screwed up and you're working overtime to fix something no one will fess up to fucking up. Better to not give up the password.
  • by jackspenn ( 682188 ) on Friday July 25, 2008 @03:18PM (#24339817)
    Some people on /. think it is best to have one knowledgeable person with all the information so that confidential information is not leaked or changes made without the lead guy being aware.

    Others think of the bus rule, what happens if the guy who knows everything about mission critical infrastructure components gets hit by a bus?

    That is why I have taken a page from the Sith Lord Darth Bane and apply the rule of two. When I build a network I teach and train one apprentice. Then if they suck I fire them and hire a replacement, but if they are good, when I get bored and decided to move on, I feel confident they can take on a apprentice themselves.

    It is neat, clean and simple, better still it doesn't have the rules and complexity of Jedi type systems requiring me to check in docs to a source control system, report changes to managers what don't understand, have managers that don't understand sign-off on things they don't understand and avoid dumb rules like not being able to train techs that appear to old, etc.

    Yeh, if you ask me the Republic, I mean Network as a whole is best off with Sith types in charge versus bureaucratic Jedi types.
  • by 99luftballon ( 838486 ) on Friday July 25, 2008 @03:18PM (#24339823)
    The more I see on this case the more I think Childs is being set up as a scapegoat. The guy built the networking side from scratch and it seems management were happy with him running it with sole admin rights. Then a new admin comes in and he freaks out and gets overprotective. And a $5 million bail? Murderers don't get that much.
  • by Aphoxema ( 1088507 ) on Friday July 25, 2008 @03:28PM (#24339959) Journal

    Heheh... heh... it's kind of funny... you can't network people to work on a network.

  • by geogob ( 569250 ) on Friday July 25, 2008 @03:28PM (#24339965)
    While I was managing servers and network equipment for a small organization, I was for a very long period of time the only one to possess the low level access password for the equipment I managed. At the time, I was the only person responsible for all IT related affairs and I did not feel anyone else in the organization had the technical knowledge and integrity to posses these access.

    On the other hand, all these access and relevant documentation was sealed and under lock with the instruction only to be retrieved in the event something happened to me (accident, incapacitation, death, etc.).

    Not wanting to give out critical information to anyone is something (most of the time at least) responsible to do. Not assuring continuity or failing protecting the critical information to be lost through unforeseen circumstances, shows a serious lack of professionalism.
  • by ZonkerWilliam ( 953437 ) * on Friday July 25, 2008 @03:31PM (#24340011) Journal

    a) that doesn't work in ANY small and probably most medium sized businesses

    Small business,no, but then again most small business's, if they do have a network, is well small and not a big deal. I used to setup networks for small companies, most are ad hoc, no dedicated server types, where everyone has admin privileges. A medium size company should be able to do it. As long as you another IT person you can separate the duties amongst them. Hell, I'm one of just four InfoSec people and we share all responsibilities and admin rights.

  • by Nymz ( 905908 ) on Friday July 25, 2008 @03:32PM (#24340025) Journal
    Everyone knows the name of Terry Childs, but how many people know the name of the manager(s) in charge, the ones responsible (or negligent) for letting this situation continue until it got to this point.

    "You asked for it, you got it." and you are spot on because if they don't correctly assess this current situation, and assign blame to the deserving names, then they are only 'asking for it' to happen again and again.
  • by Shados ( 741919 ) on Friday July 25, 2008 @03:36PM (#24340093)

    Thats because only the government related ones concern the public. This stuff happens all the time in the private sector. However, private companies can die, the government cannot (as much as some people around here would like it to)

  • by phorm ( 591458 ) on Friday July 25, 2008 @03:36PM (#24340103) Journal

    Seems to me that in many cases, the IT department may be rather grossly understaffed (either in terms of # of staff, or # of experienced staff).

    Many places I've worked end up with a Lord-of-all-IT situation simply because they haven't got anyone who can replace him* or back him up, or weren't willing to pay for backup/additional/experienced staff.

    * male gender used for convenience purposes.

  • by mlwmohawk ( 801821 ) on Friday July 25, 2008 @03:39PM (#24340143)

    One of my first jobs was a bank teller. Our passwords were sealed in an envelop, which we initialed, and locked in a vault which needed two keys to open.

    If the two officers needed my password, they'd open the vault, open the envelope, breaking my seal (letting me off the hook of responsibility).

    IT has to learn from banks.

  • Re:God complex (Score:5, Insightful)

    by smooth wombat ( 796938 ) on Friday July 25, 2008 @03:41PM (#24340165) Journal

    and the risks that entails when they go bad.

    It's not just when they go bad. What happens if they get run over by a bus or a stampede of wildebeests? If they are the only person to know the admin passwords, commands, etc, they are the single point of failure, regardless if they go bad or not.

    Just as we harp on backing up our files (um, yeah), we also need to harp on a backup for the admin. There should always be someone else, even if it's the mayor, who also has the list of admin passwords.

  • by Schraegstrichpunkt ( 931443 ) on Friday July 25, 2008 @03:45PM (#24340257) Homepage

    It really depends on who the "one person" is. Committees rarely design good crypto algorithms or protocols, for example. On the other hand, if you just pick the "one person" at random, you risk picking the wrong person.

    I guess it's sort of like picking a dictator. If you pick the right person, and hold that person accountable, they will get things done more efficiently than a committee. If you pick the wrong person, they will get the wrong things done more efficiently than a committee.

  • Re:God complex (Score:3, Insightful)

    by TRRosen ( 720617 ) on Friday July 25, 2008 @04:02PM (#24340487)
    Unfortunately this article is about one periphery admin that had control over only a few routers. The rest has been made up by the city and the media.
  • by Anonymous Coward on Friday July 25, 2008 @04:07PM (#24340549)

    Yes, we have the same thing here. But anyone of you (or us) can lock down the entire system the same way this guy did. There is no perfect solution. Anyone person who can change passwords can screw up either the entire company or their section of the company they have control over.

    In the end it comes down to requiring complete trust to the people running your network. Even if you had "audit" people like the military supposedly does from what I've read, you're still at least one step behind the person able to make the changes. Sure you'd get caught, but if you wanted to screw something up, you still could.

    Unless your system has in place a mechanism so that Jim creates accounts and Joe has to push OK to enable the account or Joe can change a password but Jim has to push OK to enable the actual change there is no getting around the ability of a network admin being able to screw the company, city, county, etc over. I have yet to see a system like that. Routers, Windows, Linux, et al don't support anything like that that I've seen. If the person can change passwords the change is immediate and isn't forced through some sort of red-tape.

  • by The Second Horseman ( 121958 ) on Friday July 25, 2008 @04:25PM (#24340779)

    Supposedly that's it, according to some of the articles. He thought a lot of the others were screw-ups, so he kept access to himself. Everyone seemed to know it, as well, right up to the top of the IT organization. A new security person was hired, and that person didn't like the situation (may have come up during some sort of review). They made a point of asking him for the passwords, which he interpreted as "hey, we want to screw up the network - you know, the one you feel really possessive about" and refused. Didn't seem to recognize the authority of whoever delivered the message (don't know if it was the new security person or not). They then sent the police after the apparent master criminal.

    Also, while they couldn't make configuration changes (that's what "locked out" meant apparently), the network continued to run, even without his intervention. So he might've been a doofus about this issue, and for all I know a total jerk with no people skills, but it sounds like (crazy access issue aside) he knew his job pretty well.

    I suspect the new security person (who for all we know is more of a policy person than a technical person) handled it badly on their end as well, and may have gone for a club (formal meetings, demands) when a lunch conversation might've done the trick. The guy shouldn't have held onto exclusive access, but it sounds like the security person didn't handle it well. Apparently, that individual now fears for their safety, which I suspect is either an overreaction or a further attempt to demonize Childs to make it seem like whatever actions taken are justified.

  • Re:God complex (Score:5, Insightful)

    by JCSoRocks ( 1142053 ) on Friday July 25, 2008 @04:31PM (#24340879)
    I use the bus example pretty regularly. It's the same reason that I expect documentation for everything. Is writing documentation fun? no. Is it necessary? Perhaps not... but does it save days, or possibly weeks from being wasted? Yes.

    As far as I'm concerned... passwords are just the beginning. Configurations and such can also be a nightmare to replicate when they're undocumented. Ever stepped into a project where they only guy working on it is gone and you have to figure out how to setup your machine / development environment just to get it to run? It's awful. All of the "don't install that patch, it ruins everything" or "you have to install these components in this order so that they don't interfere with one another" is gone and you have a horrific puzzle before you.
  • by Fulcrum of Evil ( 560260 ) on Friday July 25, 2008 @04:39PM (#24341033)
    I would. I've read enough of the backstory to believe that, paranoid as he was, Childs was the only one competent to deal with the network, or at best one of a few. Regardless, would you give up the goods to a wet behind the ears 'security consultant' who just got there a month ago? Given the idiocy in the department and the fact that he'd be the one to clean things up, I'd say no.
  • by AeroIllini ( 726211 ) <aeroillini@NOSpam.gmail.com> on Friday July 25, 2008 @04:41PM (#24341081)

    The problem was not that he was the only one with access, although that is an issue in small IT departments. No, the problem was that he had enough access to change all the other administrators' passwords. Lots of people had access to the systems, and there were probably procedures in place to name a successor in the event that Childs was fired or hit by a bus. Instead, Childs changed everyone else's password and locked them out.

    The only way to protect against that type of an attack is to make the Administrator-level access much more fine-grained. One admin should not be able to change other admins' passwords. In practice, that might take the form of a global login server (with appropriate backups) that is not under the control of the admins, or maybe a good SELinux-style setup. The idea is to never have a "global root" role, but instead break it down into "config root" (for admins) and "access root" (for people who administer user accounts and such).

    This is obviously much harder in smaller setups who might not have the personnel to split things up that way.

  • by Anonymous Coward on Friday July 25, 2008 @04:50PM (#24341245)

    What you're forgetting is that he *offered* the passwords, since the day he was arrested - just to somebody he trusted. I'll bet if he were dealing with you, I, or most of the low numbers on /., Childs would have felt confident turning it over to us after a few minutes of talk to assess our sanity. But since you've done a few configs, I'm sure you can think of one or two people you've met in the workplace who shouldn't be trusted with car keys, let alone passwords.

    It isn't just him being overprotective, either. He is still a citizen of S.F., and if it were me, I'd avoid having the whole thing crash and incite riots and anarchy until I got someplace farther away where it couldn't bother me. Like, say, the Bahamas.

  • by darkmeridian ( 119044 ) <william.chuangNO@SPAMgmail.com> on Friday July 25, 2008 @04:54PM (#24341307) Homepage

    It's about having the guy who knows everything to document it all.

    I used to be that guy who knew the entire project. I thought it was crucial for me to know everything, so I remembered everything. All the minutiae, I knew back and forth. No single person on the team had that breadth of knowledge. Thus, I was working all the time.

    Then I started to document everything in memos. I sent them around. I recorded everything. It took a whole bunch of time, but it was the best investment ever. I could delegate my work more effectively. There was a paper trail of everything, great records.

    Don't be that guy!

  • Re:God complex (Score:3, Insightful)

    by wealthychef ( 584778 ) * on Friday July 25, 2008 @05:02PM (#24341433)
    This is all a red herring. Any administrator has sufficient privs to block out all other admins should he/she want to. So even if you give the password to five people, it doesn't help, unless I'm missing something.
  • Re:God complex (Score:4, Insightful)

    by Vancorps ( 746090 ) on Friday July 25, 2008 @05:05PM (#24341469)

    I came into the same philosophy as you a few years ago when I was in the position where I took over a network that was completely undocumented. Now I have Visio diagrams and written explanations of almost everything including a complete inventory of what I have on what network at each site.

    I started it with the idea of the bus principle but I've come to rely on it myself as I'm the only admin and so I often have parts of the network I don't touch for a year at a time. This means I forget how things are put together so I refer back to my own documentation. Works every time.

  • by why-is-it ( 318134 ) on Friday July 25, 2008 @05:53PM (#24342165) Homepage Journal

    While more people should have had access to the network were it ever really needed, sometimes the only really efficient way to take care of a really intricate and dedicated task is to have one person do it all.

    I do not agree, but even if what you say is true, that just goes to show that efficiency isn't everything!

    In the enterprise space, it simply isn't possible to have one person design, implement and operate a non-trivial environment. There aren't enough hours in the day to do all that is required, and I (for one) would like to have a bit of free time - even if all I do with it is sit in front of my playstation.

    If the work is so complicated and the deadlines so tight that only one person can pull it off, the project is a disaster waiting to happen. Truly competent technical staff would be the first to escalate that situation to management, rather than indulge their inner megalomaniac and try to do it all solo.

    I think we nerds tend to focus on the really cool technology so much that we fail to see the big picture. When you step back a moment, and put it all into perspective, it does not matter if I work 7x24x365 to complete a really complex project on my own. It _really_ does not matter if the design is incredibly elegant, the implementation flawless, and the cut-over into production goes as smooth as silk if one mis-step in front of a speeding bus renders the whole thing an unsupported mess the first time it breaks.

    While some might mourn my passing, the lack of documentation and shared knowledge and experience will have reduced all of my heroic efforts to a complete and utter waste of time.

    My obligation to my employer isn't to hoard knowledge and information to myself - it is to share that knowledge and information with the other members of my department. If I bring everyone else up to speed, I can have a few week-ends to myself because even the most junior member of the team can step up and help resolve problems if the knowledge base and procedures are thorough and well-documented.

    Coming from that perspective, I am unable to find much sympathy for Childs or his former employer. Both have demonstrated extraordinarily poor judgment and are paying the consequences for their lack of professionalism.

    (I have to say though, I'm not sure Childs deserves to be in jail, or face such an absurdly high bail amount.)

    maybe he really was trying to document his system for others but management got in the way of anything productive. That's what management's for, right?

    We nerds tend to interpret "productive" differently than management does. I'm sure most would agree that sitting in front of the keyboard actually doing UNIX-related work qualifies as productive. Management might place a higher priority on documentation, or training other team members as equally if not more productive tasks.

    I work in a large enterprise environment and most of my time is not spent at the command line. Most of it is spend communicating with other departments, with my own department, with project teams I have been assigned to, with various levels of management, and with vendors. While I would not have thought so at the beginning of my career, I now see that effective communication skills (which includes listening to others) plays a greater role in being successful at my job than what I do at the command line.

  • by Anonymous Coward on Friday July 25, 2008 @06:17PM (#24342455)

    This is a ridiculous defense. If his superiors demand that he release the passwords, and unless there's some protocol explicitely in place requiring him to only release the passwords to specific individuals, he is obliged to do as he is told. Whatever his justifications, he is not permitted to deny his superiors this data. It isn't his call to make.

    Not if he believed that he would be putting the public welfare at risk. It's a legitimate defense. In addition, he's not in the military so all the hoohah about protocols is just bunk. Once he was fired, his obligation to the city was terminated. Only if there were some stipulation in his employment contract spelling out a requirement to return all city owned property upon the end his employment would there be legal standing to take action. Passwords could fall under that requirement, however, it would be a civil matter and not a criminal one. The clown of a prosecutor in this case, has, like many other prosecutors in this country, taken an overly broad interpretation of a vaguely written law and misapplied it as a state sanctioned method of forceful coercion.

    He'ss a prima donna with a god complex. He's no hero. He may be the best network admin in history, but I wouldn't hire him in a million years, and I have a feeling there are a lot of guys out there that won't. I expect that his career is probably over, because his name's all over the place, and who the fuck would want some lunatic who won't release passwords to superiors, save for the one he trusts?

    You'd be an idiot not hire him. He fucking designed a top-notch network that is so secure that even engineers from Cisco couldn't get access into it. That's pretty damn impressive. I think he'd really shine if you stick him with some other engineers that match his skill-level and competence and where he wouldn't have sole responsibility for running the network. Working with municipal morons was probably depressing as hell. Hell, I bet he could win on an insanity defense.

  • Re:God complex (Score:3, Insightful)

    by Vancorps ( 746090 ) on Friday July 25, 2008 @07:17PM (#24343247)

    Yeah, I imagine he was aware of a lot more than most other people as admins usually are. I know that I have much more information about the company and how it operates along with its goals than I necessarily need to do my job but it's the nature of trust.

    You have to be able to trust your admin so you should treat them accordingly. That is the first mistake of most employers these days. They treat everyone like dirt including the people that can burn them really badly because they don't understand how much their company relies on IT. I know the company I work used to come to an abrupt halt when there was an outage. Since then I've removed the single points of failure, the only thing left is me. They forget that redundant systems get kind of complex though and they assume anyone out of college can do it for 30k so they fight me for 70k.

  • Re:God complex (Score:1, Insightful)

    by Anonymous Coward on Friday July 25, 2008 @10:15PM (#24344825)
    Now you just need to make sure that the CFO (or Managing Director) isn't the only one with combination to that safe.
  • by Anonymous Coward on Friday July 25, 2008 @10:31PM (#24344935)

    I ran into exactly the same situation as Terry Childs in my short time (about two years) working for a municiple organization.

    The difference, however, was being more aware of how stupid people are. For one thing... never lock your boss out of the system. Since there were so few IT policies in place prior to me getting there, it gave me quite a bit of leverage (at least early on) toward getting ones in place.

    The first thing I did was change the top-level account password. The password I changed it to was completely meaningless gibberish, which was written down onto a piece of paper and placed into a sealed envelope, which was entrusted into the care of the CIO-equivalent position. I told him it was for emergency use only, and it needed to be treated as the most important piece of information he had... which it was, in the practical point of view. In my time there, it was never used.

    Afterward, there was a lot of whining and moaning about people who wanted access... so I got to work on logging. All changes were logged, so accountability was in place (at least, as good as it could be. I kinda made it seem like far more than it was), and all specified people were given special administrator accounts (I detest elevating access on a person's everyday use account). From what I recall, none of those people ever used the accounts they had whined so hard to get, because they knew their activities would be logged (although honestly, not logged as much as I explained to them, but that was for everyone's good).

    The problem with many of these people was that they viewed the network as a toy which they could play around with to learn... whereas myself and the qualified staff viewed it as a crucially important business asset which needed to work no matter what. So scaring the tinkers by making them know they would be held accountable for any stupidity on their part made them content to only mess up their own work PCs, rather than the network.

    It's amazing what a great deterant accountability is!

    After reading the REAL story of Terry Childs, it was hard not to feel sympathy for him. Municiple organizations don't really take many things seriously, and don't have many people who have worked in "real", private sector, IT jobs. Many are either right out of college, transfers from other (non-technical) departments, etc, people who don't really view IT as their career, or do but have no experience working in an enterprise IT environment.

    The things he was doing are typically managed by an entire department... and that's often the case in public sector IT. I would LIKE their departments to be run the same as a normal enterprise IT shop... but when you have to deal with politics, where's just no political will to do so. Governmental IT is viewed as an expense rather than an asset, and generally an expense which they try to spend as little on as possible. The idiotic conservative "SMALLER GUBMENT!!!" lunacy doesn't help either, since all it does is guarantee nothing can ever be done in a proper way.

    So while I can sympathize with him... he could have been more politically aware. The people who were asking for access, had they thought they could get fired for screwing something up, likely would have never used that access. They only wanted it because they didn't have it.

Saliva causes cancer, but only if swallowed in small amounts over a long period of time. -- George Carlin

Working...