You are not logged in. Login Now
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   175-187   
 
Author Message
25 new of 187 responses total.
mary
response 75 of 187: Mark Unseen   May 14 19:38 UTC 1997

I agree with you Valerie in that those who are tenacious and
can afford to wait for a login prompt won't be penalized
by the queue.  And it is much fairer for the majority of
telnet users.
arianna
response 76 of 187: Mark Unseen   May 15 00:28 UTC 1997

Something weird happened to me tonight whe I logged in:  the login prompt came
up, I typed in my login, then the password prompt, and I typed in my password
-- but just after the MOTD and my little "you have new mail" message came up,
the login prompt came up *again*, so I logged in again.  I kind of expected
to be logged in twice, but I wasn't...  Hm.
senna
response 77 of 187: Mark Unseen   May 15 02:40 UTC 1997

By far.  Remember, you can call up a list of who is waiting, but they wont'
be logged in yet so all you'll get is IP addresses.  I remember the first time
I discovered the queue and the line was some 200 people long.. or that's the
numger I got.  I assumed it was a mistake.  

For the ambitious multitasker, the telnet queue not only saves you trouble
of multiple telnets, but it allows you to run netscape or other internet
programs while you're waiting.
mcnally
response 78 of 187: Mark Unseen   May 15 05:25 UTC 1997

 re #76:  that happened to me recently, too..
mdw
response 79 of 187: Mark Unseen   May 15 09:17 UTC 1997

Re #76 - problems right after the "you have new mail" message are
generally due to problems starting up the shell.  In this case, arianna
has a 200K core file from tcsh, which seems to have died early on from a
segmentation fault.  That definitely means a bug in tcsh.  Strangely
enough, mcnally has the same shell.
dpc
response 80 of 187: Mark Unseen   May 15 14:57 UTC 1997

The load average is *over 20* right now and the system is s-l-o-w.
Any idea why?
valerie
response 81 of 187: Mark Unseen   May 15 15:39 UTC 1997

This response has been erased.

arianna
response 82 of 187: Mark Unseen   May 15 16:43 UTC 1997

Hm... maybe this would correlate with my other problem with my shell -- Even
tho' I've changed my .login to specify that my kill key is ^X, it still thinks
that it's ^U, and it also thinks that ^X is my reprint key.....  It's a very
confoozeledf shell..
dang
response 83 of 187: Mark Unseen   May 15 20:45 UTC 1997

I've never had any trouble with tcsh... Can we get a new version of it?  I'll
take a look.
scg
response 84 of 187: Mark Unseen   May 16 03:19 UTC 1997

I had the problem arianna describes once a few months ago, I think.  I also
use tcsh.
senna
response 85 of 187: Mark Unseen   May 16 20:00 UTC 1997

Why is it that every time I leave pine, I get another You Have New Mail
message shortly afterward, regardless of whether or not its true?
mcnally
response 86 of 187: Mark Unseen   May 16 20:22 UTC 1997

  My guess is that your shell (or comsat, or biff, or whatever it is that's
  reporting your new mail..) is merely checking the modification date on
  the mail spool file to see if it's been changed and deducing new mail from
  that.  Since pine modifies that file and writes it when it exits, maybe
  that's what's happening?

  (Although that'd be a stupid way to check for new mail..  The "right"
  way is to check the "Status:" headers on the messages to see if they've
  been read or not..)
tsty
response 87 of 187: Mark Unseen   May 17 03:59 UTC 1997

possilby senna, your replies and/or newly sent email included
either yourself as a recipient directly or as a cc:
  
that would deliver newmail to your spool *after* you had opened pine.
kaplan
response 88 of 187: Mark Unseen   May 17 12:15 UTC 1997

User ariel0 wrote me to ask a aboutlosing her connection to grex:

as i get booted it gets locked up then suddenly it says connection closed by
foreign host non socket to socket operation occured

Anyone know what a non socket to socket operation is?
i
response 89 of 187: Mark Unseen   May 17 15:02 UTC 1997

The shell crash & re-login problem would make me nervous about faked login
programs (password snachers, whatever).  How secure is grex against that 
sort of mischief?
dang
response 90 of 187: Mark Unseen   May 17 18:00 UTC 1997

It would require root to change the login program.  So, Grex is as secure
against that as it is against root breakin.  If someone had root, they could
just change anyone's password anyway, so changing login is not the most
destructive thing they could do.  (However, it tcsh is seg faulting, then it's
unlikely that it's a login snooper.)
scg
response 91 of 187: Mark Unseen   May 17 19:59 UTC 1997

The goal of having people type their passwords into such a program, rather
than just changing passwords, would presumably be that people tend to use the
same password in more than one place, so that might help break into other
systems.  That's why it's a bad idea to use the same password in multiple
places.

As others have said, though, if tcsh is seg faulting, it doesn't sound
like somebody breaking in.
i
response 92 of 187: Mark Unseen   May 18 14:20 UTC 1997

Maybe I didn't make it clear, maybe I'm way out of date.  The scheme I'm
thinking of starts with some wanna-be cracker named, say Adolf.  Adolf
writes (or downloads, or whatever) a little program that clears the
terminal screen, then writes to it the same strings that the real login
program would ("Welcome to Grex .... grex.cyberspace.org login:").  Some
other user named, say Victim, come along to use the terminal.  Victim
naturally assumes that he's seeing the login screen, enters his user name
and password, and Adolf's program stores both for future use.  Adolf's
program typically would try to die in an unsuspicious way at that point
(complain of wrong password & hope Victim assumes that it was his own 
typing error, fake a shell crash, whatever) and let the real login program
come up on the terminal.  Victim then logs in normally, and probably 
suspects nothing.  

With dial-in lines instead of physical access terminals, Adolf's program
has a tougher time of it - it has to make it through the security bottleneck
surrounding hanging up the modem and waiting for an incoming call.  But
opportunity also increases greatly - modem problems and line noise are
good, unsuspicious ways to die, and there's a much better chance that the
Victim dialing in will be root.

Adolf does not need root access to launch this type of attack on a UNIX 
system that isn't carefully designed to prevent this type of attack.  Adolf
may have no ambition higher than cracking Grex (bad enough from our point of
view!).  I agree that tcsh crashing does not represent this type of attack -
it merely brought it to mind.

mcnally
response 93 of 187: Mark Unseen   May 18 18:42 UTC 1997

  Actually "Adolf" does need either root priveleges or a substantial
  misconfiguration by those who have said priveleges to get his program
  run by getty when a dial-up user first connects..
arianna
response 94 of 187: Mark Unseen   May 18 19:41 UTC 1997

eep!
dang
response 95 of 187: Mark Unseen   May 18 20:10 UTC 1997

And in the case of Grex, Adolf needs root privilages in order to set up his
little snooper.
valerie
response 96 of 187: Mark Unseen   May 19 03:00 UTC 1997

This response has been erased.

senna
response 97 of 187: Mark Unseen   May 19 05:01 UTC 1997

If an unauthorized person has root, we're in deep you-know-what.  
arabella
response 98 of 187: Mark Unseen   May 20 09:41 UTC 1997

How is it possible that I'm the only one logged in right now?
Wow.

creole
response 99 of 187: Mark Unseen   May 20 11:49 UTC 1997

Is that a system problem?
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   175-187   
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss