We just shut down P2P.
Information Resources has received an Information Bulletin from the
U.S.
Department of Homeland Security regarding the security risks of
peer-to-peer (P2P) file sharing programs. The following contains
highlights from the bulletin along with information about new P2P
restrictions for the Tarleton State University network.
OVERVIEW
P2P file sharing programs provide Internet users with the ability to
share files on their computers with millions of other Internet users.
Common P2P use includes song and movie file sharing, gaming and
instant
messaging. P2P file sharing software makes it possible for people to
accidentally share personal files or sensitive data. These programs
also
allow easier access to computer systems for theft of sensitive
documents
and unauthorized use of network resources. There have been incidents
where P2P programs have exposed sensitive federal government
documents.
P2P file sharing software potentially compromises computer systems.
The
use of this software creates vulnerabilities through which malicious
code (viruses, worms, Trojans, bots) or other illegal material can be
introduced.
The use of P2P file sharing can result in network intrusions.
CONCLUSION
Few, if any, university owned computers have an operational reason for
running P2P file sharing software. These applications represent a
network vulnerability that cannot be afforded without a strong
justification.
NETWORK RESTRICTIONS
Beginning June 6, 2005, Tarleton State University will restrict P2P
file
sharing activity for all university owned computers, 24/7. P2P
activity
will be permitted for student owned computers in the residence
halls and
for dial-up users between midnight and 7:00 a.m.
These restrictions will not prevent the use of Internet based radio
stations, Windows Media Player, Real Player, or Quicktime streaming
video.
The file sharing features of instant messaging programs such as Yahoo
and AOL instant messenger will not function, but text messaging
will not
be affected.
LIST OF SOFTWARE
The following is a non-exhaustive list of P2P file sharing software
that
will stop functioning under these new network restrictions. If you
have
downloaded and installed one or more of the products listed, you
should
uninstall the product. If you do not recognize any of the following
items, then you probably will not be affected by the P2P file sharing
restriction.
Aimster
AudioGalaxy
BearShare
BitTorrent
Blubster
eDonkey
Gnotella
Gnucleus
Grokster
iMesh
Kazaa
LimeWire
Morpheus
WinMX