Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.2 9/18/84; site brl-tgr.ARPA Path: utzoo!linus!philabs!cmcl2!seismo!brl-tgr!tgr!JOSH%YKTVMH.BITNET@WISCVM.ARPA From: JOSH%YKTVMH.BITNET@WISCVM.ARPA (Josh Knight) Newsgroups: net.unix-wizards Subject: Trojan horses Message-ID: <3111@brl-tgr.ARPA> Date: Mon, 11-Nov-85 19:53:56 EST Article-I.D.: brl-tgr.3111 Posted: Mon Nov 11 19:53:56 1985 Date-Received: Wed, 13-Nov-85 04:29:57 EST Sender: news@brl-tgr.ARPA Lines: 25 > From: gwyn@brl-tgr.ARPA (Doug Gwyn) > > > > How can one be sure that there isn't some > > > magic code that allows one to listen in on ones neighbor - as is > > > well known, early releases of UNIX had just such a boobytrap carefully > > > hidden in the root password checking. > > > > Oh? This sounds interesting, what was the nature of this > > booby-trap? What was its intended use? Anyone know? > > Well known, eh? Must have been in UNIX/WORLD :-) > > Maybe this is a reference to the bug that would allow one to log > in (as root) if precisely 100 '0's were typed for the password. > Or maybe it is a reference to Ken Thompson's "Trojan horse", for which see CACM Vol. 27, No. 8 (August 1984) pp. 761-763. Of course, any opinions, expressed or implied are mine and not my employers... Josh Knight IBM T.J. Watson Research Center josh@yktvmh.BITNET, josh.yktvmh.ibm-sj@csnet-relay.ARPA