Changing tty drivers (was Re: Finding Passwords)

Jeff Beadles jeff at onion.pdx.com
Wed Oct 17 03:31:28 AEST 1990


In <24752 at adm.BRL.MIL> emsca!usb!poc at sun.com writes:
...
 >A simpler solution is this: any non-privileged process writing a BEL
 >(Ctrl-G) to the terminal has it duplicated in the tt output queue, i.e.
 >	write (1, "\007", 1);
 >has the effect of
 >	write (1, "\007\007", 2);
 >Privileged processes on the other hand do not suffer this modification.
 >Now include a (single) BEL in e.g. the 'Password: ' prompt, y voila!
 >(Maybe you want it optional e.g. only in response to a BREAK).
 >
 >This idea was used in the secure CAP operating system built at Cambridge
 >in the 70's. Credit goes (I think) to Chris Slinn.
 >
 >Patrick O'Callaghan	"The secret is to bang the rocks together, folks"
 >Departamento de Computacion, Universidad Simon Bolivar, Caracas, Venezuela

ACK!  This is really dumb!

What if the tty is in process of sending a binary file?  That would
automatically corrupt the file.  This would blast most any protocol (ie: uucp,
{x,y,z}modem, kermit, ...) out of the water.  (Well, they would continue
resending the block getting failures from the checksums...)

Now, if you say that if the tty could be put in "raw" mode, and this be
averted, then you've just found out how the "bad guy" could get past this
annoyance.

This is NOT an intelligent thing to do...

	-Jeff
-- 
Jeff Beadles	jeff at onion.pdx.com



More information about the Comp.unix.internals mailing list