Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 9 Feb 1997 12:28:02 +0100
From:      j@uriah.heep.sax.de (J Wunsch)
To:        hackers@freebsd.org
Subject:   Re: should permissions of /usr/bin/login be changed to 0100 ???
Message-ID:  <Mutt.19970209122802.j@uriah.heep.sax.de>
In-Reply-To: <19970208135454.ZJ37734@klemm.gtn.com>; from Andreas Klemm on Feb 8, 1997 13:54:54 %2B0100
References:  <19970208135454.ZJ37734@klemm.gtn.com>

next in thread | previous in thread | raw e-mail | index | archive | help
As Andreas Klemm wrote:

>         While an almost universal "feature", most people remain unaware that
> an intruder can log into a system, then log in again by running the "login"
> command from a shell. Because the second login is from the local host, the
> utmp entry will not show a remote login host anymore.

But still, it will have to reuse the same tty, and it required a
previous login.  So sure, you are able to track him in wtmp (unless
he's going to hack wtmp, but you're lost in this case anyway).

I sometimes love to have this feature.  E.g., i log in via modem,
setup or fixup a PPP account, and then exec login to the PPP account.
Doing this all from inside the `term' command of PPP allows me to try
the PPP session directly.  I'm not sure whether exec su -l pppaccount
will also work here.

-- 
cheers, J"org

joerg_wunsch@uriah.heep.sax.de -- http://www.sax.de/~joerg/ -- NIC: JW11-RIPE
Never trust an operating system you don't have sources for. ;-)



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Mutt.19970209122802.j>