Finding Passwords
Stanley Friesen
sarima at tdatirv.UUCP
Tue Oct 9 09:31:15 AEST 1990
In article <22024:Oct606:35:1090 at kramden.acf.nyu.edu> brnstnd at kramden.acf.nyu.edu (Dan Bernstein) writes:
>In article <652 at puck.mrcu> paj at uk.co.gec-mrc (Paul Johnson) writes:
>> If you are worried about physical line security then use encryption.
>All that's necessary is that the concentrator and the computer accept some
>key sequence (such as break) to unconditionally mean ``I want to talk to
>someone I can trust, so gimme a proper prompt and shove any middlemen
>out of the way.'' That's it.
This does *not* deal with *physical* line security. A *physical* *tap*
on the line between the computer and the terminal cannot be bypassed by
simple software means. Just because you know that you are talking to
login (or whatever) does *not* mean nobody is listening passively on the
same com link! For physical line security encryption and physical access
restriction are the *only* two possible solutions.
--
---------------
uunet!tdatirv!sarima (Stanley Friesen)
More information about the Comp.unix.internals
mailing list