Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.2 9/18/84; site brl-tgr.ARPA
Path: utzoo!linus!philabs!cmcl2!seismo!brl-tgr!tgr!JOSH%YKTVMH.BITNET@WISCVM.ARPA
From: JOSH%YKTVMH.BITNET@WISCVM.ARPA (Josh Knight)
Newsgroups: net.unix-wizards
Subject: Trojan horses
Message-ID: <3111@brl-tgr.ARPA>
Date: Mon, 11-Nov-85 19:53:56 EST
Article-I.D.: brl-tgr.3111
Posted: Mon Nov 11 19:53:56 1985
Date-Received: Wed, 13-Nov-85 04:29:57 EST
Sender: news@brl-tgr.ARPA
Lines: 25


 > From: gwyn@brl-tgr.ARPA (Doug Gwyn )
 >
 > > > How can one be sure that there isn't some
 > > > magic code that allows one to listen in on ones neighbor - as is
 > > > well known, early releases of UNIX had just such a boobytrap carefully
 > > > hidden in the root password checking.
 > >
 > >       Oh? This sounds interesting, what was the nature of this
 > >       booby-trap? What was its intended use? Anyone know?
 >
 > Well known, eh?  Must have been in UNIX/WORLD :-)
 >
 > Maybe this is a reference to the bug that would allow one to log
 > in (as root) if precisely 100 '0's were typed for the password.
 >
Or maybe it is a reference to Ken Thompson's "Trojan horse", for which
see CACM Vol. 27, No. 8 (August 1984) pp. 761-763.

Of course, any opinions, expressed or implied are mine and not my
employers...

			Josh Knight
			IBM T.J. Watson Research Center
josh@yktvmh.BITNET,  josh.yktvmh.ibm-sj@csnet-relay.ARPA