Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 28 |
Nodes: | 6 (0 / 6) |
Uptime: | 47:31:13 |
Calls: | 422 |
Files: | 1,024 |
Messages: | 90,391 |
In article <vquhba$3817f$1@dont-email.me>,[...]
Janis Papanagnou <janis_papanagnou+ng@hotmail.com> wrote:
PS: On an old SunOS 4 SPARC system I was (without privileges) able to
even change the remote users system characteristics (like mouse speed),
but I suppose that must be considered a security issue on that platform.
I no longer recall how such things were controlled on SunOS 4,
but I imagine that you opened a device file and issued an ioctl
to control things like that. What this suggests to me is that
you were able to connect to some remote machine where the device
files in question were permitted so that you could open them and
issue those controls. Had they had more restrictive permissions
(say 0600 and owned by the logged-in user) then I suspect you
would not have been able to do that. But there were bugs in
SunOS 4, which came from a simpler time, so perhaps I'm wrong.
I do recall once crashing my boss's workstation by accident: his
name was Dave, and we found some audio clips in Sun audio format
of HAL from the movie "2001" saying, "I'm sorry, Dave, I can't
let you do that..." or "why don't you sit back, relax, and take
a stress pill..." and were having fun rsh'ing into his machine
and `cat`'ing them into `/dev/audio` there (so they played on
the builtin speaker, which of course was in his office. Note
that we could only do this because we had write access to the
audio device; we also had root access, so he couldn't depermit
it).
Anyway, we would do that, and get a file playing, and he'd kill
the process writing to the audio device, and the speech would
stop. So we kept escalating by trying newer, more creative ways
to buffer the audio data in the kernel before we he could kill
off the writing process. It seems we took this a little too far
though, as I tripped a bug in the audio driver (I think a NULL
op in the cdevsw used by some system call we were using that
wasn't implemented by the driver; the details are fuzzy now) and
it crashed his machine. I didn't realize this had happened, but
we all also ran little programs that `tail -f`'d the more
important log files consolidating important events from around
our network. So I saw his workstation rebooting and thought I'd
been so clever that the only way he could stop HAL was by
rebooting. Then I saw him log into my machine, which suddenly
rebooted. "Hey! What'd you do that for?!" I shouted across the
hall. "You did it to me!" he responded.
Of course, this was all in good fun, but we stopped trying to
prank each other with random audio files after that.