Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security

Internet Access at your Local Libaries? 35

gettingOnline asks: "I work for a library that will soon offer public access to our network. You come in with your network ready portable computer, change your config to use DHCP, plug in, and you have T1 access to the net. Other libraries are offering this service already, and there's no doubt we will offer it, no matter what the security issues are. What I want to know from all of the network gurus out there is what we can do, short of creating a separate network, to minimize risk without limiting internet access."
This discussion has been archived. No new comments can be posted.

Internet Access at your Local Libaries?

Comments Filter:
  • At the school I went to, someone tried to send a death threat to the president, from what they thought was an anonymous connection.

    Accountability will protect you from all kinds of legal hassle.
    • The same thing happend at my high-school.

      The next day, 8am, the Secret Service showed up. They knew exactly which computer, what time, and which student.

      . So much for anonymous connections.
  • by photon317 ( 208409 ) on Thursday June 20, 2002 @04:21PM (#3738641)

    Any solution short of creating a seperate network is really asknig for trouble. It's notmuch trouble or money to segment your network into a "private" ethernet for the librarians' servers and workstations, and a "public" ethernet for random laptops. Fence it up with an OpenBSD or Linux router/firewall box with a few ethernet cards in it and you're done (Linux is more multi-purpose and easier for most - OpenBSD is considerably more rock-solid-secure for a firewall-only box, IMHO).
    • yeah, really the whole "Public Access Network" should be covered by a fFirewall, and good logs need be kept.

      i can hear the kiddies whining about privacy now. i know, i know. but come on fFolks. it's a public access point. You sort of expect to give up some privacy in that case. If you want anonymity, buy it yourself.
  • Lan Parties? (Score:4, Interesting)

    by BumbaCLot ( 472046 ) on Thursday June 20, 2002 @04:21PM (#3738643)
    Will you allow gamers to come in and set up lan games as well?
    Personally I would define the 'internet' as too broad to give access to, you would be better off running a proxy for limited 'www access', and creating logins for everyone based on their library card info/etc..
    • I would have to agree with this assessment - the library should set the lan up distinct from any other networks already in place and only allow access out via a proxy. Whether access to the proxy is based on the library card is a different issue. On one side I can see that accountability of use (using the library to set up a freemail account and send death threats from there) must be balanced with the fact that someone may be at the library precisely so they can access information that may be sensitive in their own home environment. Release of information clauses about the use of the proxy would have to be very tight for most people to feel comfortable using it (i.e., will release with a warrant).

      Of course, with the new cybersnooping laws looming everywhere in response to the massive armies of terrorist/cracker/Taliban that failed to appear, perhaps that's too much to ask for.
    • i saw this title and just thought, y'know, thats what this can easily become. one big invitation fFor the local gamers union to park themselves in the library.

      oh, not at fFirst. when the system is new, and the ports are bright and shiny, they will stand out in the middle of the room with a proud librarian hovering over them.

      but at some point, the new will wear off. and "that kid who comes in fFor a while" will become "a couple kids who waste the whole afternoon here." and the ports will get moved to a corner, thus encouraging the kids to spend the whole dern day there, while the librarian stews at the desk.

      ok, i got a little carried away.

      but like, what such a system really needs is a method of checks and balances. time limits fFor example. just as a book may be checked out, use of a port would be checked out on a library card.

      additionally, a set of clear rules would need to be installed. fFor example, NO PORN (you mooks). i know, covering this becomes very tricky. like what if the librarian decides any gay content is akin to porn? and we all know babysitter software doesnt work.
      • Public library internet access terminals are already occupied by the homeless downloading web porn. Their stink will drive away even the fattest, unshowered hardcore gamer.

        I'm making a joke, right? Been to a big downtown library lately?

  • No system will ever be secure, and there's not much you can do to stop someone who really wants to bring down your network. What I would recommend is some method of identifying usage based on library membership ID. Maybe If there are 30 desktops with network/ineternet access, the ethernet cables are run through a switch, or a large hub before entering the server room, etc... This way, any old librarian can take port number 23 and only connect it when a library member comes and scans/swipes/shows them their card. When they've shown their library card the librarian reaches over to the hub/switch/whatever, and plugs the ethernet labled #23 into port #23 and says, okay, you're the 3rd computer from the right in the second row. All the times could be logged. This is the only way I can think of allowing unrestricted internet access, which fi someone did send a death threat/whatever malicious, they could be traced from the router/switch/ip and whoever was allowed to use that computer would be responsible no if's and's or but's. This way no one would leave their seat or let a non-member use it for fear of them being blamed.

    of course it's not too hard to forge a library card. so i guess their s.o.l. :)
  • What I want to know from all of the network gurus out there is what we can do, short of creating a separate network, to minimize risk without limiting internet access

    What do you want to limit the risk of, exactly?

    • well, thats a fFair enough question.

      when you allow someone onto your network, it's like letting them lounge in your living room. they could very easily take paperweights and drop things on the carpet. or to be a bit more precise in this case at hand, a person may be inclined to alter official library records. this is something which could be done easy enough anyway, but with a person bringing their own laptop to the location, fFilled with whatever may be held therein, you are really opening the door fFor viruses and crackers.
      • My point was it was not clear from the question what ELSE was going to be on this library network. The way it was described, it was just going to be an internet connection with a LAN that anyone can connect into using DHCP to get online. If that's the case, nothing needs to be done. Just post a sign telling everyone that they need to make sure their machines are secured, or they risk having an intruder connect to their machine. Recommend ZoneAlarm or something similar.

        In fact, I believe the newer linksys routers can actually be enabled so that they check new systems to make sure they have zonealarm installed... maybe you could use that.
  • by kootch ( 81702 ) on Thursday June 20, 2002 @04:31PM (#3738702) Homepage
    why not add a tiny bit of restrictiveness to the system just to prevent people from acting stupid and believing that they are untraceable.

    I've seen systems that when you try your first connection using DHCP, you need to input a username and password... often used in new highrise apt complexes that come with broadband.

    make the user put in their library card name and number. hell, it's very little information for providing them with broadband access, right?

    but I think this might also help when budget time rolls around and the state/county/etc asks you to justify your cost. you then show them usage stats and show how it is a desired service.

    I also see lots of other marketing benefits, but it'll take too long to go into them.
  • by linuxwrangler ( 582055 ) on Thursday June 20, 2002 @04:43PM (#3738819)
    You need to outline the various risks and have the administration determine a policy. That both gives you a basis for your technological decisions and it covers your a**. Start by determining the purpose of allowing access - is it just for web research or do you want to provide other access as well?

    Some potential problems:

    Unlimited and unlogged access?? What a great place for spammers, crackers and such to get net access.

    Everyone on the same subnet (w/o router restrictions)?? Everyone with open Windoze shares will be vulnerable while logged in.

    Log all access?? You may run afoul of privacy concerns and laws.

    If you only intend to provide http(s) and ftp you might consider putting users behing a Squid proxy to improve speed and help limit access (not a substitute for firewalling, though).

    I would in any case make sure that the IP (or even entire connection) you use is separate from your administrative connection so if something bad happens (you provided full access and got blacklisted for spam for instance), your administrative functions will not be impaired.
  • firewall [firewallguide.com]. I'm sure that would be one of the first few things you want to do in your library. Also check out this site [practicallynetworked.com] for a lot more info on which hardware to choose, how to set it up, etc.
  • Several people have mentioned accountability. It creats more problems then it solves. 2 scenarios:

    A) Johnny (a minor) and his parents sign an user agreement saying he will do what he is supposed to, etc, etc. He accesses his favorite BSDM site from the library. His parents sue the library. Case is voided, bc Johnny, ergo his parents, violated the library's EULA.

    B) Johnny walks in and uses the Wayback machine to get past the firewall that was set up. Johnny's parents sure bc Johnny used the library to 'harm himself' the library then has to pay Johnnies parents, etc.

    Accountability is not the answer. PERCIEVED accountability is. Don't monitor anyone, but if they are found to be doing something innapropriate for their age, or illegal, then they lose their right to use the network. Defining innapropriate is a chore, but we gotta love that phrase: "contemporary community standards"

  • Uh (Score:1, Informative)

    by Anonymous Coward
    First of all, why is it even a question as to whether or not you should create a separate network for the public terminals? Why on earth would you have the libary's machines on the same network as the public machines? At the very least, assuming you're using a NAT setup, you should have a firewall keeping 192.168.1.* (public) from touching 192.168.2.* (private).

    Your firewall should also only allow outbound port 80, 443, and maybe 22, unless you want people to be able to send mail, in which case you'll also be allowing them to send spam, and you'll be risking having your libary's IPs blackholed. Personally for this type of setup I wouldn't allow port 25. If they really need to check mail they can use hotmail or one of the other myriad webmail systems. Web, SSH, and https are really the only reasonably safe services to allow.
  • The best way to maintain security in this type of situation is to create logically separate networks. This doesn't mean that you have to buy completely new network equipment and never have the two networks touch.

    What you need is a firewall with multiple interfaces. You could go commercial and buy something like a Watchguard Firebox [watchguard.com] or set up a cheap linux box and use a pre-packaged linux firewall like IPCop [ipcop.org] or SmoothWall [smoothwall.org] where you just boot off a cd and install/configure a Linux firewall.

    What you end up setting up is a DMZ. You would have a "Trusted" interface that could be your private library network, a DMZ interface that could be your public access network, and an external interface that is your connection to the Internet.

    You could set up the IPs as 192.168.0.0/24 for the trusted, 192.168.100/24 for the DMZ, and use your external ip segment for the external. You still can use all of the same network hardware that you have in place.

    Hope this helps.

  • My opinion (Score:3, Informative)

    by Snafoo ( 38566 ) on Thursday June 20, 2002 @05:56PM (#3739542) Homepage
    Well, first of all: You should segment your network, with an old Linux box as gateway.

    Whether or not you'd consider this a 'separate network' is really up to you. However, it may be that you can't do this, for technical or political (or economical) reasons. Having worked as a network admin for a small library, I understand that there a well-considered hesitance to embrace yet another chunk of technology that only one employee (and, at that,a highly mobile and long-term-unpredictable one) understands. Essentially, you want something that's drop-dead stupid to administer, so that (if, for any reason, you leave) some poor high-school schmuck who just happens to be the kid of one of the librarians stands at least even odds of being able to get it going again.

    So instead, you could do something like only assign IPs within a certain 'redlisted' range, such that the important computers on the network can run some cheap-ass firewall freeware to block from those IPs. Such a solution doesn't protect everyone, but it's really fast and easy.

    Alternately, you could always buy one of those $60 firewall/routers between the rest of the library's computers and the Internet, and then put the newcomers outside said firewall. Such boxes are easy to administer, and come with nice glossy manuals. Set it up like this:

    [T1]
    |
    |
    [Hub for Anonymous Users]
    |
    [Firewall/Router]
    |
    {all the other computers}

    However, in this scenario, you'll need to make sure that the firewall appliance is (a) able to handle a simple 100BaseTX connection (not just, say, PPPoE) and has sufficiently full NAT support that dhcpd could still be heard from behind it. (Either this last, or ensure that dhcpd is upstream, near (or on) the T1 gateway).
    This option also has the downside of forcing NAT upon all the rest of the library's computers, which (depending on how things are set up) could be a big pain in the ass, or break your network altogether. Caveat Emptor.
    • That T1 is going to have to terminate somewhere. Unless you've got a high speed serial interface on your Linux box or your Linksys SOHO router, you're going to have to have a "real" router in place, such as a Cisco or Nortel device. If that's the case, then see if you have a budget for Cisco's firewall feature-set and an extra ethernet interface. You'll have stateful inspection and NAT at your disposal, and you can have two Ethernet interfaces for your DMZs. Just be sure to make a copy of the config so that the part-time high school kid can restore the router if there's ever a problem for after you move on to another job.
  • Comment removed (Score:3, Interesting)

    by account_deleted ( 4530225 ) on Thursday June 20, 2002 @06:38PM (#3739894)
    Comment removed based on user account deletion
  • without limiting internet access

    To all the slashdotters who keep talking about proxies and firewalls:

    This person wants to give out unfettered internet access without endangering the libraries local network. They obviously don't care about whether little johnny looks at pron or somebody uses it for spam or whatnot. It is not the duty of the library to protect people from the internet or vice-versa. That is all.


  • Have it give ONLY port 80 traffic. Put the box between the internet connection and the public switch/hub

    OR, just get a little firewall/internet appliance.

    If you do it the linux way, you can get your company to buy the latest boxed 'pro' linux distro for you, along with a book
  • by 1101z ( 11793 )
    Use PPPoE if you are not tring to setup anonymous network access. But ether way have to put public access ethernet access on its own network maybe it could share with the network for your public access computers, but they should be on there own network from the libraries internal computers. Tell the Librarians it would be like letting anyone in the public come in and use there private desks whenever they wanted.
    Use a linux box running PPPoE(PPP over Ehternet) that way you can track who was using what ip at what time. www.roaringpenguin.com [roaringpenguin.com] has a commerial solution if you want to go that way, but you can do all the stuff your self.

    • Use PPPoE if you are not tring to setup anonymous network access.

      That seems like a pretty user-hostile approach. Most of the people (those not running OSX or XP) would have to install big bad software just to talk to the network. Who wants to do that, and who wants to put people through it, when there are so many other better solutions available?

  • You can quickly do this with any Cisco Catalyst series switch.

    A single Catalyst 2924XL with say half its ports tosed into a different VLAN than your regular network , and your router understanding the new addresses is all you need.

    For DHCP, just set the Catalyst to relay the DHCP request to the server. You will have to add an apropriet range to serve of course.

    Very simple, and in most cases do not have to spend any additional money as most places will already have either Cisco or Nortel switches that are capable of running a VLAN.

    If you need to purchase one, Cisco Catalyst 2924XL switches can be had for at most $2000 which is inside most libraries budgets.
  • If bandwidth is very limited, make sure people understand that their connection will be cut off if they use up more than fair share of the bandwidth.

    There are all sorts of Internet throttling software solutions out there you might want to check into. With some you can put weighted percentages/priorities on certain types of traffic.

    Be sure to segment the network properly. Put everything important on a separate subnet. In fact, even better if you can PHYSICALLY segment it completely! Maybe buy a separate DSL line to be used for these library visitors (something I'd really push for). Then create a separate LAN that is not connected to anything important on the other side.
  • You may want to limit by Ethernet Addresses, so unrecognized ethernet cards will not be accepted. Of course, this is not 100% foolproof, but it will give most wannabe hackers a major headache.

    FreeBSD can do this, you can find it here [bsdshell.net]. It's part of the high uptime project.

    Futhermore, I would suggest a firewall setup which blocks about anything but HTTP and possibly FTP. A proxy server may be your best option for this.

    Good luck!

Never ask two questions in a business letter. The reply will discuss the one you are least interested, and say nothing about the other.

Working...