wiretapping techniques
David Collier-Brown
daveb at geac.UUCP
Fri Jul 29 04:41:16 AEST 1988
>From article <16641 at brl-adm.ARPA>, by PAAAAAR%CALSTATE.BITNET at cunyvm.cuny.edu:
> In the first case the logout procedure includes the establishment of
> part of the password for the next login. The machine that logs in
> stores a suitably disguised version ready for the next conversation.
...
Another, more robust mechanism is the "trusted path". There is a
physical signal (usually a break) that the security kernel always
honors, placing the user in touch with known, trusted software to
start a logon sequence.
A dedicated wire is even better, if you're on a workstation: you
press the magic button and the computer says "enter password to
login"
--dave (B2 on a desktop) c-b
--
David Collier-Brown. {mnetor yunexus utgpu}!geac!daveb
Geac Computers Ltd., | Computer science loses its
350 Steelcase Road, | memory, if not its mind,
Markham, Ontario. | every six months.
More information about the Comp.unix.questions
mailing list