18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Chapter 27] 27.2 Can You Trust Your Suppliers?<br />

Chapter 27<br />

Who Do You Trust?<br />

27.2 Can You Trust Your Suppliers?<br />

Your computer does something suspicious. You discover that the modification dates on your system<br />

software have changed. It appears that an attacker has broken in, or that some kind of virus is spreading.<br />

So what do you do? You save your files to backup tapes, format your hard disks, and reinstall your<br />

computer's operating system and programs from the original distribution media.<br />

Is this really the right plan? You can never know. Perhaps your problems were the result of a break-in.<br />

But sometimes, the worst is brought to you by the people who sold you your hardware and software in<br />

the first place.<br />

27.2.1 Hardware Bugs<br />

The fact that Intel Pentium processors had a floating-point problem that infrequently resulted in a<br />

significant loss of precision when performing some division operations was revealed to the public in<br />

1994. Not only had Intel officials known about this, but apparently they had decided not to tell their<br />

customers until after there was significant negative public reaction.<br />

Several vendors of disk drives have had problems with their products failing suddenly and<br />

catastrophically, sometimes within days of being placed in use. Other disk drives failed when they were<br />

used with <strong>UNIX</strong>, but not with the vendor's own proprietary operating system. The reason: <strong>UNIX</strong> did not<br />

run the necessary command to map out bad blocks on the media. Yet, these drives were widely bought<br />

for use with the <strong>UNIX</strong> operating system.<br />

Furthermore, there are many cases of effective self-destruct sequences in various kinds of terminals and<br />

computers. For example, Digital's original VT100 terminal had an escape sequence that switched the<br />

terminal from a 60Hz refresh rate to a 50Hz refresh rate, and another escape sequence that switched it<br />

back. By repeatedly sending the two escape sequences to a VT100 terminal, a malicious programmer<br />

could cause the terminal's flyback transformer to burn out - sometimes spectacularly!<br />

A similar sequence of instructions could be used to break the monochrome monitor on the original IBM<br />

PC video display.<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/ch27_02.htm (1 of 6) [2002-04-12 10:45:21]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!