IT managers are surprised at the amount of time it is taking San Francisco to regain control of the city's FiberWAN network after a disgruntled network administrator allegedly locked access to it by resetting administrative passwords to its switches and routers.
With few details publicly released on what exactly happened, many are suggesting that the network lockout and the city's response to it point to a failure to implement and manage fundamental security controls.
Terry Childs, a network administrator at San Francisco's Department of Telecommunications and Information Services (DTIS) was arrested on 13 July for allegedly tampering with the network, which carries almost 60% of the city government's traffic. He is also alleged to have planted network devices that enabled illegal remote access to the FiberWAN network.
He was jailed last week on $5 million (£2.5 million) bond after refusing to divulge the passwords he had used to block access to the network.
Child, 43, pleaded not guilty to the charges against him at a hearing in San Francisco Superior Court last week. He is scheduled for a bail hearing tomorrow. If convicted on all charges, Childs faces a maximum of seven years in prison.
As of late Monday, the city's efforts to repair the network still remains a "work in progress" according to Ron Vinson, deputy director of the San Francisco Department of Telecommunications and Information Systems (DTIS). Despite around-the-clock efforts with vendors and staff the city is still only in the process of determining "what level of illegal access or what level of tampering" Childs was responsible for, Vinson said.
According to Vinson, the WAN is operating normally, but the city has not yet regained full administrative of all routers. What remains unclear also is whether IT officials have discovered all of the network devices that Childs is alleged to have illegally installed on the WAN, Vinson said.
He did not say what exactly the network devices were or what they did, but claimed that Childs had gone to great lengths to hide them from detection. "We have 60 plus departments that are clients of ours," Vinson said and the task now is to find out if Childs managed to install the devices at any of those departments, he said.
"That is why we need to do a system-wide analysis of where we are with access. We don't know what he had access to," Vinson said. He added that the focus right now is on damage containment. "We want to make sure we maintain full operability if [Childs] was to be released on Wednesday," and were to try to gain illegal access to the network, he said. "We want to make sure we are up and running."
Vinson however did not provide any details on what exactly Childs did or the extent to which he may have compromised the network. He said that the reasons for the slow recovery would become apparent once those details were publicly released.
Meanwhile, news of the city's continuing struggles, combined with a relative lack of publicly available details on what exactly happened, is fuelling questions and theories about what may have happened in some quarters.
"I am completely floored that it is taking so long to restore access to the equipment," said Jim Kirby, senior network engineer with Dataware Services. "Unless they have some crazy uptime requirement that prevents them from rebooting gear, it's hard to understand."
Find your next job with computerworld UK jobs