and it's well past april fool's day ...
http://www-128.ibm.com/developerworks/l ... clnx2.html
Source code reviews
Ken Thompson, one of the original creators of UNIX, discusses in Reflections on trusting trust a number of steps he took that managed to render source code useless for revealing a security issue.
First, he patched the login command to contain a back door that would let him log into any UNIX system with a certain password.
He then patched the C compiler to detect whenever the login command was being compiled. The C compiler would automatically insert the back door into the login program, so there was no need to keep the back door in the source of the login command.
Then, he modified the C compiler to detect when the C compiler itself was compiled from source and to automatically add the login-detection-and-patching code as well as the C-compiler-detection-and-patching code.
The result was a system where the source code did not contain any trace of a backdoor.
interesting
Forum rules
Any posts concerning pirated software or offering to buy/sell/trade commercial software are subject to removal.
Any posts concerning pirated software or offering to buy/sell/trade commercial software are subject to removal.
- nekonoko
- Site Admin
- Posts: 8145
- Joined: Thu Jan 23, 2003 1:31 am
- Location: Pleasanton, California
- Contact:
Re: interesting
hamei wrote:Then, he modified the C compiler to detect when the C compiler itself was compiled from source and to automatically add the login-detection-and-patching code as well as the C-compiler-detection-and-patching code.
So the entire thing falls apart if you switch to another compiler. Obviously not an option back in the day when the entire UNIX tool chain pretty much came from him, but nowadays that would be rough to pull off

Twitter: @neko_no_ko
IRIX Release 4.0.5 IP12 Version 06151813 System V
Copyright 1987-1992 Silicon Graphics, Inc.
All Rights Reserved.
IRIX Release 4.0.5 IP12 Version 06151813 System V
Copyright 1987-1992 Silicon Graphics, Inc.
All Rights Reserved.
- VenomousPinecone
- Posts: 2180
- Joined: Mon Jun 20, 2005 2:10 pm
- Location: Groom Lake, NV
-
- Posts: 89
- Joined: Thu Oct 16, 2003 11:09 am
- Location: Boston, Massachusetts
VenomousPinecone wrote:So true, but I would imagine most production linux systems (what TFA was talking aboot) would only have gcc.
Actually, the hack described long predates Linux and gcc... these are the old, original Unix systems from pre-breakup AT&T which ran on PDP11's and the like, before 1984. gcc didn't exist until 1987, and Linus Torvalds started working on Linux in 1991.
The entire article by Thomson, "Reflections on Trusting Trust," is here:
http://www.acm.org/classics/sep95/
It's an entertaining read.
Re: interesting
actually exactly this trick, but also many others were more deeply described in book Real World Linux Security by bob toxen (this is not an ad 

- shyouko
- Posts: 262
- Joined: Tue Nov 16, 2004 7:01 am
- Location: Science & Technology Park, Hong Kong
- Contact:
Re: interesting
Um... Guess now I should learn how not to trust my brain.
After all, its origin is unknown!
After all, its origin is unknown!

Re: interesting
shyouko wrote:Um... Guess now I should learn how not to trust my brain.
Sounds like you need to see the Lain anime series again....

Who is online
Users browsing this forum: No registered users and 1 guest