BSD tty security, part 4: What You Can Look Forward To

Neil Rickert rickert at mp.cs.niu.edu
Wed May 1 09:12:35 AEST 1991


In article <1991Apr30.224740.17040 at pcserver2.naitc.com> kdenning at pcserver2.naitc.com (Karl Denninger) writes:
>
>The most obvious attempts, taking over "unused" ptys slave ends, result in
>the system skipping them when assignment time comes around.  This prevents
>
>The RS/6000 dynamically creates ptys, and thus doesn't suffer from the
>problem at all.

 And what exactly is there to stop somebody running a daemon which grabs
access to a pty immediately after it has been assigned, or immediately
after it has been dynamically created, but before public write access has
been turned off.


-- 
=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=
  Neil W. Rickert, Computer Science               <rickert at cs.niu.edu>
  Northern Illinois Univ.
  DeKalb, IL 60115                                   +1-815-753-6940



More information about the Comp.unix.wizards mailing list