For mgetty users with non-trusted shell logins
l41484@alfa.ist.utl.pt (l41484@alfa.ist.utl.pt)
Wed, 27 Jan 1999 10:46:26 +0100
On 27 Jan 1999, Marc SCHAEFER wrote:
> l41484@alfa.ist.utl.pt wrote:
> > Well if we fiddle with the S2 register (by disabling the escape
> > characters) wouldn't we avoid people, entering into command command and
> > thus controlling the matter?
>
> The exploit doesn't depend on the escape sequence working. The
> documentation in doc/secure_tty.txt explains that disabling the
> escape sequence is the first step for *any* security. The escape
> sequence enabled could make part of the attack possible althrough
> the work-around ptylogin/rlogin is implemented.
Got it. I think, i now have a slight idea how this works.
> > Although it think, this would stop the called machine, from terminating
> > the call. (with +++ATH) This could be prevented, by not disabling the
>
> No, it doesn't :)
With +++ATH like i said. :-)
> > another possibility, would be fiddling with &D", S25 register and a DTR
> > transition to hangup?
&D2 nor &D" :-)
> I use this on my system (it's also a recommendation by Gert for
> reliability). It doesn't fix the problem. On the contrary, NOT making
> DTR drop hangup, might, in some cases, make the attack more difficult,
> however it has many other drawbacks.
> [ and yes, my /dev/ttyS0 is chmod 600 root.root when mgetty accepts a call,
> but this doesn't fix the problem
> ]
>
> In summary:
> - an entry which is bidirectionnally connected to a modem is sufficient
> for an attack.
Ok, i think i've got it. Will now return to my cave. :-)
--
Tiago Pascoal (l41484@alfa.ist.utl.pt) FAX : +351-1-7273394
Politicamente incorrecto, e membro (nao muito) proeminente da geracao rasca.