virus, fix for 3000 part 05 of 05 (last)

Miq Millman miq at chromavac.SGI.COM
Wed Nov 9 05:47:00 AEST 1988


In article <1795 at sbcs.sunysb.edu>, root at sbcs.sunysb.edu (root) writes:
> 
> Just a comment on the distribution medium of your updated sendmail - what
> prevents one of the backbone sites from modifying your fixed sendmail so as
> to introduce a trojan horse?  I would recommend against this method
> of distribution, especially for a daemon that normally runs as "root".
> 
> 					Rick Spanbauer
> 					SUNY/Stony Brook

AS I mentioned to Mr. Spanbauer via email, there is nothing stopping it.
However the possiblity of someone at a backbone site doing the following:

	1) knowing EXACTLY when my message will come through his site in
	   advance
	2) knowing how many sections my post would be in advance
	3) having a virus ready and waiting for a post to be made to 
	   comp.sys.sgi that included binaries and being aware of 1 & 2
	4) doing all of the first three things just about the same time
	   a worm is floating around systems

is extremely rare.  And as I mentioned with the 4D version of sendmail, the
only real way to be safe is to remove your machine from all networks. 
--
BLAM! BLAM! BLAM!
"Oh thank you thank you thank you"  {hug}
    "Maam, you are emotionally distraught, I'll contact a rape crisis center"
Miq Millman -- miq at sgi.com or {sun,decwrl,pyramid,ucbvax}!sgi!miq
415 960 1980 x1041 work



More information about the Comp.sys.sgi mailing list