- Top 10 Recession-Proof IT Jobs
- 7 Hot IT Jobs That Will Land You a Higher Salary
- Link Building Strategies and Tips for 2014
- Top 10 Accessories for Your iPad Air
Network World - The Internet will mark an infamous anniversary on Sunday, when the Morris worm turns 20.
Considered the first major attack on the 'Net, the Morris worm served as a wake-up call to the Internet engineering community about the risk of software bugs, and it set the stage for network security to become a valid area of research and development. (Watch a slideshow of the 10 worst moments in network security history.)
"It was a really big deal," says Eric Allman, a computer programmer who in 1981 authored sendmail, open source Internet e-mail software, while he was a student at the University of California at Berkeley. Today, Allman serves as chief science officer at Sendmail, a company that sells commercial-grade versions of the software.
"The biggest implication of the Morris worm was that the Internet was very small … and it was considered a friendly place, a clubhouse," Allman says. "This [attack] made it clear that there were some people in that clubhouse who didn't have the best interests of the world in mind … This made it clear we had to think about security."
Despite the high-profile nature of the worm, some experts say its importance was not fully appreciated at the time.
"The really interesting lesson of the Morris Worm is how little long-term impact it had," says Steve Bellovin, a professor in the Department of Computer Science at Columbia University who was developing an early firewall at Bell Labs when the attack occurred. "It showed people who cared how dangerous buggy software could be, but nobody else really paid that much attention to network security afterwards. It wasn't until the mid-1990s that it became an issue again."
The Morris worm was written by Cornell University student Robert Tappan Morris, who was later convicted of computer fraud for the incident. Today, Morris is a respected associate professor of computer science at MIT. Launched around 6 p.m. on Nov. 2, 1988, the Morris worm disabled approximately 10% of all Internet-connected systems, which were estimated at more than 60,000 machines.
The Morris worm was a self-replicating program that exploited known weaknesses in common utilities including sendmail, which is e-mail routing software, and Finger, a tool that showed which users were logged on to the network.
The Morris worm was able to break into Sun 3 systems and Digital VAX computers running BSD Unix. The fast-spreading worm kept copying itself and infecting computers multiple times, causing many systems to fail.
"At first, we had no idea who sent the worm," Allman says. "It was quite clear it was intentional, but we had no clue who it was or why it was sent. There was a sense of panic at the time, which was unfortunate but very understandable."
The attack disrupted Internet connectivity for several days, prompting some organizations including the U.S. Department of Defense to unplug their Internet gateways to prevent infection.
"People disconnected from the network because they were afraid of what might happen," Allman says. "One of the ironies is that disconnecting from the 'Net also broke down our major communications channel. That's why it took longer to get everyone back up."