Subject: Re: *** FingerD ***
To: Evil Pete <shipley@merde.dis.org>
From: Robert Shady <rls@zeus.id.net>
List: current-users
Date: 03/01/1994 06:59:40
>>> For a less extreme example (which may therefore be more or less convincing),
>>> suppose I take my NetBSD system, boot it to single user mode, add user id's
>>> constructed as "user000" through "user999", and then write a tedious shell
>>> script using sudo or some similar program to run finger as each uid.
>>Okay, this is possibly, but why would someone do this? I suppose if your
>>intent was to deceive the remote system, you can almost always do this no
>>matter what they try to use for authenticatoin.
> true, what if you
> finger @destination@other_host
> Also what if the remote host has a bogus identd or has a
> .noident file?
So what? I wasn't trying to come up with a fool-proof way of detecting who
fingered the system. It was only meant to give the sa more of an idea who
it was.
-- Rob Shady --
rls@id.net
------------------------------------------------------------------------------