[3133] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ? Trojan /usr/bin/false ?

daemon@ATHENA.MIT.EDU (Bernd Lehle)
Tue Aug 13 12:46:03 1996

Date: 	Tue, 13 Aug 1996 11:27:05 +0200
Reply-To: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
From: Bernd Lehle <Bernd.Lehle@RUS.Uni-Stuttgart.DE>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To:  <Pine.BSF.3.91.960725151216.3449A-100000@idiom.com> from "Jeremy
              Brinkley" at Jul 25, 96 03:14:18 pm

>
> Replacing the default shell with /usr/bin/false (or /bin/false or
> whatever) is a common simple security reccommendation.  Has anyone heard
> of somebody replacing /usr/bin/false with a Trojan version to gain access
> to the non-account accounts (adm, lp, bin, etc...)?
>

I have never heard that. But talking about true/false as login shells:
On IRIX (at least 5.3) /bin/true and /bin/false are shell scripts,
starting with #!/sbin/sh and containing nothing but "exit 0" or "exit 255".
(Besides some silly Copyright and Version Information from AT&T).
Is there a possibility that through obscure circumstances a user having
/bin/false or /bin/true as a login shell ends up with /sbin/sh ?



--
> Bernd Lehle - Stuttgart University Computer Center * A supercomputer <
>      Visualization / Security / Astrophysics       * is a machine    <
> lehle@rus.uni-stuttgart.de   Tel:+49-711-685-5531  * that runs an    <
>   http://www.tat.physik.uni-tuebingen.de/~lehle    * endless loop    <
>  pgp? -> finger bernd@visbl.rus.uni-stuttgart.de   * in 2 seconds    <

home help back first fref pref prev next nref lref last post