For mgetty users with non-trusted shell logins
Gert Doering (gert@greenie.muc.de)
Wed, 27 Jan 1999 16:56:37 +0100
Hi,
On Wed, Jan 27, 1999 at 07:16:56AM +0100, Marc SCHAEFER wrote:
> Gert Doering <gert@greenie.muc.de> wrote:
> > This means that terminal servers that present the modem transparently
> > via TCP/IP as a /dev/tty<something> ARE quite likely vulnerable. AIX
> > terminal servers come to my mind, they work just great with mgetty,
> > and hardly otherwise...
>
> Well, yes and no. No if when the modem hangups OR when the local system
> requests hangups the link between the TCP port and the modem is broken
> till next call.
Yes, it works only if the connection works /dev/ -> modem, even if no
incoming call is active.
> Do you know the details of the AIX/terminal server implementation ?
> Isn't it just the ``rlogin trick'' also and thus not vulnerable ?
No, the /dev/tty<x> is *hardwired* via a special device driver to
"terminal server <a>, port <b>". So you can use this for dialout, and
there is a mgetty listening on this /dev/tty<x> device for answer ->
I'm fairly sure it works.
gert
--
Gert Doering
Mobile communications ... right now writing from *AWAY* :-))
... mobile phone: +49 177 2160221 ... or mail me: gert@greenie.muc.de