home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.security.misc
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!cs.utexas.edu!newsfeed.rice.edu!exlogcorp!mcdowell
- From: mcdowell@exlog.com (Steve McDowell)
- Subject: Re: early Trojan Horse
- Message-ID: <1992Nov19.194057.19996@exlog.com>
- Organization: EXLOG, Inc.
- References: <1992Nov18.202710.9652@mcs.kent.edu> <956@dsbc.icl.co.uk>
- Date: Thu, 19 Nov 92 19:40:57 GMT
- Lines: 25
-
-
- In message <956@dsbc.icl.co.uk> kev@dsbc.icl.co.uk (Kevin Walsh) writes:
- >In article <1992Nov18.202710.9652@mcs.kent.edu> keithf@Nimitz.mcs.kent.edu (Keith Fuller) writes:
- >
- >> I heard that early UNIX systems came with a Trojan Horse.
- >> As I remember, the C compiler would compile one of the utilities
- >> in a way that would give a knowledgable person entry into any UNIX
- >> system.
- >
- > As I remember it, cc used to recognize a peice of code as being
- > from the login program. When you compiled login, the resulting
- > executable would have a back door login in it.
-
- Well, I don't know if that was ever implemented and I'd be very surprised if it
- ever made it out of the lab if it was.
-
- This means of attack was discussed by Dennis Ritchie in an early papaer (mid-70's)
- on UNIX security as an option that's available to would-be-crackers with source code.
- If I remember correctly, the paper was distributed with the Version 7 manual set.
-
- --
- Steve McDowell . . . . o o o o o Opinions are
- Exlog, Inc. _____ o mine, not my
- mcdowell@exlog.com _____==== ]OO|_n_n__][. employers..
- [_________]_|__|________)<
-