Acceptable use policy --------------------- This policy governs use of ISAAC machines for security research. You will be given privileged access to shared-use machines on a relatively isolated subnet, for the purposes of security research only. You may not use these machines for any other use. This is a shared resource. Act responsibly. You must use ssh to log in to these machines. Give Ian your ssh public key (~/.ssh/identity.pub); generate one if you do not already have one. Do not use insecure mechanisms to log in. You are authorized to use ONLY the following machines: seesaw.isaac.cs.berkeley.edu, IP address 169.229.3.130 Anything not in the above list is strictly off limits. You may use tcpdump or other network sniffers ONLY to monitor traffic on networks attached to the above machines (e.g. ONLY on the 6-bit 169.229.3.128/26 subnet). The following are specifically prohibited: -- Attacks on any machines other than those you are allowed to access, as above. -- Disruption of service for other users. -- Use of ISAAC machines for anything other than security research. -- Insecure login to these machines (e.g. via telnet, ftp, rlogin, rsh, etc.). -- Snooping on other users. -- Modifying or tampering with other users' data. -- Installation of trojan horses, back doors, etc. -- Sharing of passwords, accounts, or access with any other users. In addition, anything not specifically authorized is prohibited. You must also obey department, UCB, and UC policies, as well as any applicable Berkeley, California, or US laws. Be aware that many other users may also have privileged access, and your data could be intercepted at any time by any of them. Also, Dave and Ian reserve the right to monitor any and all access to ISAAC machines, and also to squish you at any time. In other words, you have absolutely no privacy on these machines. Please sign this form only if you have understood the above rules and agree to abide by them. Name: Date: Signature: