Passwords and salts
Jonathan I. Kamens
jik at athena.mit.edu
Mon Jan 15 14:03:47 AEST 1990
In article <943 at targon.UUCP>, andre at targon.UUCP (andre) writes:
> In article <1990Jan8.232650.6615 at i88.isc.com> daveb at i88.isc.com (Dave Burton)
> writes:
> >That is not being responsible - you have no way of verifying this truth of
> >this statement. Besides, I may be the sysadm from my posting machine, but
> >use the program on another which I'm not.
>
> Oh yes you can! If you want to check this, just ask the person in question
> to re-mail the request as root from his machine and then mail the sources
> to the same root. This way even if he succeeds in faking a uucp header, his
> administrator will catch him.
Excuse me, but how does mailing the code to root on one machine prevent the
recipient of the code from copying the code to another machine and compiling
and executing it there?
Jonathan Kamens USnail:
MIT Project Athena 11 Ashford Terrace
jik at Athena.MIT.EDU Allston, MA 02134
Office: 617-253-8495 Home: 617-782-0710
More information about the Comp.unix.questions
mailing list