BSD tty security, part 4: What You Can Look Forward To
Neil Rickert
rickert at mp.cs.niu.edu
Wed May 1 09:12:35 AEST 1991
In article <1991Apr30.224740.17040 at pcserver2.naitc.com> kdenning at pcserver2.naitc.com (Karl Denninger) writes:
>
>The most obvious attempts, taking over "unused" ptys slave ends, result in
>the system skipping them when assignment time comes around. This prevents
>
>The RS/6000 dynamically creates ptys, and thus doesn't suffer from the
>problem at all.
And what exactly is there to stop somebody running a daemon which grabs
access to a pty immediately after it has been assigned, or immediately
after it has been dynamically created, but before public write access has
been turned off.
--
=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=
Neil W. Rickert, Computer Science <rickert at cs.niu.edu>
Northern Illinois Univ.
DeKalb, IL 60115 +1-815-753-6940
More information about the Comp.unix.wizards
mailing list