Trojan horses

Josh Knight JOSH%YKTVMH.BITNET at WISCVM.ARPA
Tue Nov 12 10:53:56 AEST 1985


 > From: gwyn at brl-tgr.ARPA (Doug Gwyn <gwyn>)
 >
 > > > How can one be sure that there isn't some
 > > > magic code that allows one to listen in on ones neighbor - as is
 > > > well known, early releases of UNIX had just such a boobytrap carefully
 > > > hidden in the root password checking.
 > >
 > >       Oh? This sounds interesting, what was the nature of this
 > >       booby-trap? What was its intended use? Anyone know?
 >
 > Well known, eh?  Must have been in UNIX/WORLD :-)
 >
 > Maybe this is a reference to the bug that would allow one to log
 > in (as root) if precisely 100 '0's were typed for the password.
 >
Or maybe it is a reference to Ken Thompson's "Trojan horse", for which
see CACM Vol. 27, No. 8 (August 1984) pp. 761-763.

Of course, any opinions, expressed or implied are mine and not my
employers...

			Josh Knight
			IBM T.J. Watson Research Center
josh at yktvmh.BITNET,  josh.yktvmh.ibm-sj at csnet-relay.ARPA



More information about the Comp.unix.wizards mailing list