BSD tty security, part 4: What You Can Look Forward To

Paul Pomes - UofIllinois CSO paul at uxc.cso.uiuc.edu
Tue May 7 01:40:14 AEST 1991


 From: jdarcy at seqp4.ORG (Jeff d'Arcy)

>That's a very nice piece of name-dropping there, but the fact remains that we
>mere mortals have no evidence of your claims.  I have no reason to think this
>program will work on either of the systems I've worked on and, since I can't
>get a copy of the program without major headaches (despite the fact that I'm a
>professional kernel developer in as good a position as anyone to fix the bugs
>on both platforms), I just won't bother.  Maybe I would if I had time, but I'm
>plenty busy without having to take any Bernstein bullshit.

 From: ian at pharaoh.UUCP (Ian Crocker)

>Further to my previous post I thought of a machine I hadn't tried it on and 
>sure enough it worked.  Complete control of the root terminal from an
>unprivileged userid.  Seems this manufacturer is lagging behind the others -
>no prizes for guessing who it is!

Sequoia Systems?  After all, they're too busy to check.

/pbp
--
Paul Pomes, Computing Services Office
University of Illinois - Urbana



More information about the Comp.unix.wizards mailing list