home *** CD-ROM | disk | FTP | other *** search
- Path: lab.ultra.nyu.edu!kenner
- From: kenner@lab.ultra.nyu.edu (Richard Kenner)
- Newsgroups: comp.lang.ada,comp.lang.c,comp.lang.c++
- Subject: Re: More cowardly forgeries from "schonberg.cs.nyu.edu"
- Date: 8 Feb 1996 12:07:56 GMT
- Organization: New York University Ultracomputer Research Lab
- Message-ID: <4fcp2s$a2v@cmcl2.NYU.EDU>
- References: <4f6rv9$kfk@nova.dimensional.com> <4f7i2v$fl5@cmcl2.NYU.EDU> <31193d8a.362785177@news.dimensional.com>
- NNTP-Posting-Host: lab.ultra.nyu.edu
-
- In article <31193d8a.362785177@news.dimensional.com> cjames@melchizedek.cec-services.com writes:
- >Item 1: Path from recent article at schonberg@cs.nyu.edu NYU by Dr
- >Robert Dewar, Professor at NYU, as an example:
- >
- >Item 2: Path from recent forgery from schonberg.cs.nyu.edu:
-
- As I said, those two headers differ in a way that shows the message
- didn't originate at schonberg.cs.nyu.edu, but if I say what that way
- is, the next forgery will get them correct.
-
- >Furthermore, there are a number of "joe.ZZZ@schonberg.cs.nyu.edu"
- >accounts; try fingering them and one gets real names ...
-
- So? That machine is part of a large NIS domain. What you can't see
- is which of those are mail aliases and which are valid usernames but
- can't log into that machine.
-
- >I believe NYU is responsible for the forgeries, which have been
- >reported multiple times to Mr Franceschini who has passed them to
- >NYU's computer security guy Tim O'Connor,
-
- I've passed the latest forgery on to the Systems group at NYU myself,
- but, as I said, tracing them is not likely to be possible.
-
- >| All you'd know anyway is where it came
- >| from, not who did it.
- >
- >But that's good enough for me, because that's where the money is.
-
- Really? Suppose you found they were injected into the spool at uunet
- (or some other backbone site) by some unknown person. What then?
-