For mgetty users with non-trusted shell logins
Gert Doering (gert@greenie.muc.de)
Wed, 27 Jan 1999 22:41:02 +0100
Hi,
On Wed, Jan 27, 1999 at 06:01:10PM +0100, l41484@alfa.ist.utl.pt wrote:
> > > Do you know the details of the AIX/terminal server implementation ?
> > > Isn't it just the ``rlogin trick'' also and thus not vulnerable ?
> >
> > No, the /dev/tty<x> is *hardwired* via a special device driver to
> > "terminal server <a>, port <b>". So you can use this for dialout, and
> > there is a mgetty listening on this /dev/tty<x> device for answer ->
> > I'm fairly sure it works.
>
> What are the priveleges for the devices when NO connection is established?
root.uucp/660 (there is a mgetty running), but that does NOT help per
se.
I cannot go into more details without explaining the whole thing, but
the problem is that when a user logs in (and out), the device belongs
to *him*, and that's the real problem that ptylogin/rlogin works around
(there, the user owns the pty, and might do bad things with that, but
won't get access to the real tty).
gert
--
Gert Doering
Mobile communications ... right now writing from *AWAY* :-))
... mobile phone: +49 177 2160221 ... or mail me: gert@greenie.muc.de