[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

244.0. "PHONE revisited" by GAOV08::MAGIC (Conor Moran) Tue May 20 1986 12:09

Hi all - 

	This should really be entered as a reply to topic #36 (Hacking
	the phone protocol) but then who reads stuff that far back ??
	
	I'm new to DEC (in fact I still have a year to do at college)
	so hacking is very dear to my heart.  Naturally at college we
	didn't have any access to VMS sources or manuals but we did our
	best. We did quite a lot of hacking on the PHONE but as we didn't
	know (much) about servers or network objects and the like, all
	hacks to phone were done via the individual mailboxes PHN$USERNAME
	etc. and didn't work across the net. What I would like to know is..


	1) Is it possible to access the mbx of a user on a different 
	   node with only TMPMBX priv ?

	2) Is Phone-tapping possible via the net objects ? (We were 
	   successful in writing hacks to listen in on conversations
	   on a single node by using QIO's to intercept and re-xmit chars
	   being sent between the mailboxes without the individuals
	   concerned knowing about it.)
 
<CFM>
T.RTitleUserPersonal
Name
DateLines
244.1Note #215.4 Tells All!VAXUUM::DYERIceberg or volcano?Wed May 21 1986 09:283
	    I see you've already noticed Topic #215.  What more do
	you need?
			<_Jym_>
244.2Does it ?GAOV08::MAGICConor MoranWed May 21 1986 16:3518
< Note 244.1 by VAXUUM::DYER "Iceberg or volcano?" >
                          -< Note #215.4 Tells All! >-

	    I see you've already noticed Topic #215.  What more do
	you need?
			<_Jym_>

	Re .1 : 
	True, that summary of the protocol is quite informative. However,
	I wonder does it tell the full story ? I know for a fact that 
	there is a code to send text directly into the input buffer of
	somebody using PHONE so that it appears as if they themselves
	had typed it. Using this code, it was possible to get the person
	to execute any phone command (Help, Fac, Dial etc.). One hack
	used this to do the same as CONNECT.COM in #36 but with a much
	wider range of commands. 

<CFM>
244.3more serious possibilities ...OFFPLS::DUPONT2Wed Jun 04 1986 17:2215
	It seems to me that the PHONE protocol in its current form makes it
possible to imbed ESCAPE SEQUENCES in the message being sent, a la BOTHER.COM
or SEND_MESSAGE.COM from earlier notes.  

	This opens up serious cracking possibilities, as well as harmless fun,
since it permits the classic escape sequence hacks to be used to re-program 
another users terminal (such as to force answerback, etc.).

	Assuming that there are other fascist paranoid sysops out there 
(besides me) who worry about such things, has anyone come up with a
good way to put some measure of control on this, without actually removing 
PHONE access ?   How about tracing the source of the messages, for
a posteriori crackdown ?   Anyone know of plans by the developers to make
the PHONE and MAIL protoocols more secure and more difficult to obtain
documentation for ?
244.4Possible solutions ?GAOV08::MAGICConor MoranThu Jun 05 1986 08:2119
	It seems to me that the problem with both PHONE and MAIL is
	that when a user sends a message, the username has to be sent
	along with it. It is this fact that makes the hacks in topics 
	36 and 39 possible. In both cases it is a modified username 
	which does the damage. What would be needed therefore is for
	the PHONE and MAIL servers to

	   a) Find out for themselves who is sending the message

	   b) Remove ALL escape/control sequences, not just in the 
	      actual text, but in the from/to/subject fields in MAIL
	      and also in any broadcasts.

	   c) The logical names used by PHONE should not be in the 
	      system logical name table. Instead they should be
	      somewhere ONLY a prived image can put/access them.

<CFM>
244.5The nature of the beastTUNDRA::HARRIMANMon Jul 28 1986 15:1928
    
    re .4
    
    As any of you old TOPS-20 hackers may remember (You there, Jym?)
    even a the completely different ways that TOPS-20 did mail and the
    equivalent of PHONE were hackable.
    
    MAIL (actually MS or MM) on TOPS-20 was "served" by MAILER (probably
    still is...) and we had hacks that would do essentially the same
    thing to fool it via IPC (InterProcess Communication) that we were
    sending it mail. Also we could fool MS just by making a bogus message
    in the right format (shades of the present wave of VMSMAIL hacks).
    
    This is unfortunate but cannot be avoided except by radical changes
    to the way the mailer and PHONE work. You can't just say "well change
    the protocol so any user can't hack at it". The real "problem" is
    that the overhead associated with having every single MAIL link
    check back to it's caller, or every single phone packet get traced
    back over the network would be really bad for the network. 
    
    Even though it's bad for security, there are much worse things that
    can be done thru DECnet, and besides it's only the hackers who do
    that stuff anyway!
    
    Regards to all you hackers
    
    /pjh
    
244.6Fool me once...GALLO::RASPUZZIMichael RaspuzziMon Jul 28 1986 18:0720
    
    re .5:
    
    TOPS-20 MS is now served by MX and no longer by MAILER. MX (Mail
    eXchange) handles all incomging and outgoing mail. Even though
    the communication for local mail is through IPCF, you cannot
    hack anything without privs and masquarade where the message
    came from. This is true because ORION (the PID manager and IPCF
    message guy) takes care of letting MX know where this IPCF message
    is coming from. Unless you can masquarade as ORION (only one can
    run at a time on the system) than you cannot fake MX into believing
    you are someone else. Of course, network mail is different (good
    old mail-11 protocol can be hacked as we have seen).
    
    If you have privs, you can do some ENQ/DEQ magic and append a phony
    message to someone's mail file and twiddle the last writer word
    in the FDB to make it look like the mail came from someone else.
    The key word here is PRIVS (as in WHEEL or OPERATOR).
    
    Mike
244.7[RE .5]: I'm HereVAXUUM::DYERWage PeaceWed Jul 30 1986 16:310