home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.hackers
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!sol.ctr.columbia.edu!eff!ibmpcug!kate.ibmpcug.co.uk!dylan
- From: dylan@ibmpcug.co.uk (Matthew Farwell)
- Subject: Re: Debugging program on mailing machine
- Organization: The IBM PC User Group, UK.
- Date: Mon, 27 Jul 1992 08:20:52 GMT
- Approved: I had root on my potplant once, you know
- Message-ID: <1992Jul27.082052.10221@ibmpcug.co.uk>
- References: <1992Jul25.012355.11106@ctr.columbia.edu> <6NQHY31@taronga.com> <1992Jul27.043409.13221@ctr.columbia.edu>
- Lines: 46
-
- In article <1992Jul27.043409.13221@ctr.columbia.edu> kibirev@csa.bu.edu (oleg kibirev) writes:
- >In article <6NQHY31@taronga.com> peter@taronga.com (Peter da Silva) writes:
- >>In article <1992Jul25.012355.11106@ctr.columbia.edu> kibirev@csa.bu.edu (oleg kibirev) writes:
- >>>As I already mentioned in some ObHack, I am writing a program to allow access
- >>>to Internet host (shell, maybe even line editor like ed(1)) via e-mail only
- >>Wow. You're showing anyone who can read the mail spool on half a dozen systems
- >>how to execute any arbitrary program on your account, with your password in
- >>plaintext no less!
- >Wow. Mr. Peter da Silva is flaming every article in alt.hackers,
- >alt.hackers.malicious, comp.unix.wizards and probably more without
- >ever posting his own hack. Or suggesting a better alternative to what
- >he flames. I suggest an addition to FAQ: no flame without ObHack.
- >
- >I think, consulting crypt(1) and uuencode(1) should enlighten someone
- >how to avoid sending text password.
-
- And how do you propose to decrypt it, using crypt(1)?
-
- > There are also other methods. For
- >example, you can use a random number generator with large period and
- >initial salt known by both sender and recipitant to provide unique
- >indentification for each message (server can compensate for lost mail
- >by looking a few numbers ahead).
-
- So if I get a copy of your message I'll know instantly a fairly small
- range of numbers to try.
-
- > Oops, sorry, I don't think improving
- >system security is the best subject for this group...
- >
- >Btw, how does one read /var/spool/mqueue without becoming root first?
-
- Good grief, if you think email is secure, you have some sad ideas about
- security. I don't need to be root on your mail to be able to read your
- mail. I suggest you read your mail headers more closely. Notice all of
- those Received: lines. If your mail goes through my site, then I can
- look at it. This was the reasoning behind this statement:
-
- >In article <6NQHY31@taronga.com> peter@taronga.com (Peter da Silva) writes:
- >>Wow. You're showing anyone who can read the mail spool on half a dozen systems
- >>how to execute any arbitrary program on your account
-
- Dylan.
- --
- It is no coincidence that in no known language does the phrase 'As
- pretty as an Airport' appear -- Douglas Adams
-