Date: Sun, 9 Feb 1997 12:28:02 +0100 From: j@uriah.heep.sax.de (J Wunsch) To: hackers@freebsd.org Subject: Re: should permissions of /usr/bin/login be changed to 0100 ??? Message-ID: <Mutt.19970209122802.j@uriah.heep.sax.de> In-Reply-To: <19970208135454.ZJ37734@klemm.gtn.com>; from Andreas Klemm on Feb 8, 1997 13:54:54 %2B0100 References: <19970208135454.ZJ37734@klemm.gtn.com>
next in thread | previous in thread | raw e-mail | index | archive | help
As Andreas Klemm wrote: > While an almost universal "feature", most people remain unaware that > an intruder can log into a system, then log in again by running the "login" > command from a shell. Because the second login is from the local host, the > utmp entry will not show a remote login host anymore. But still, it will have to reuse the same tty, and it required a previous login. So sure, you are able to track him in wtmp (unless he's going to hack wtmp, but you're lost in this case anyway). I sometimes love to have this feature. E.g., i log in via modem, setup or fixup a PPP account, and then exec login to the PPP account. Doing this all from inside the `term' command of PPP allows me to try the PPP session directly. I'm not sure whether exec su -l pppaccount will also work here. -- cheers, J"org joerg_wunsch@uriah.heep.sax.de -- http://www.sax.de/~joerg/ -- NIC: JW11-RIPE Never trust an operating system you don't have sources for. ;-)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Mutt.19970209122802.j>