wiretapping techniques

David Collier-Brown daveb at geac.UUCP
Fri Jul 29 04:41:16 AEST 1988


>From article <16641 at brl-adm.ARPA>, by PAAAAAR%CALSTATE.BITNET at cunyvm.cuny.edu:
> In the first case  the logout procedure includes the establishment of
> part of the password for the next login. The machine that logs in
> stores a suitably disguised version ready for the next conversation.
...

  Another, more robust mechanism is the "trusted path". There is a
physical signal (usually a break) that the security kernel always
honors, placing the user in touch with known, trusted software to
start a logon sequence.
  A dedicated wire is even better, if you're on a workstation: you
press the magic button and the computer says "enter password to
login"

--dave (B2 on a desktop) c-b

-- 
 David Collier-Brown.  {mnetor yunexus utgpu}!geac!daveb
 Geac Computers Ltd.,  |  Computer science loses its
 350 Steelcase Road,   |  memory, if not its mind,
 Markham, Ontario.     |  every six months.



More information about the Comp.unix.questions mailing list