the meaning of ‘hack’

5

Click here to load reader

Upload: theagnostik

Post on 02-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Meaning of ‘Hack’

8/10/2019 The Meaning of ‘Hack’

http://slidepdf.com/reader/full/the-meaning-of-hack 1/5

Page 2: The Meaning of ‘Hack’

8/10/2019 The Meaning of ‘Hack’

http://slidepdf.com/reader/full/the-meaning-of-hack 2/5

14/6/2014 The Meaning of ‘Hack’

http://catb.org/jargon/html/meaning-of-hack.html

On November 20, 1982, MIT hacked the Harvard-Yale football game. Just after Harvard's

second touchdown against Yale, in the first quarter, a small black ball popped up out of the ground

at the 40-yard line, and grew bigger, and bigger, and bigger. The letters ‘MIT’ appeared all over 

the ball. As the players and officials stood around gawking, the ball grew to six feet in diameter and

then burst with a bang and a cloud of white smoke.

The Boston Globe later reported: “If you want to know the truth, MIT won The Game.”

The prank had taken weeks of careful planning by members of MIT's Delta Kappa Epsilon

fraternity. The device consisted of a weather balloon, a hydraulic ram powered by Freon gas to lift

it out of the ground, and a vacuum-cleaner motor to inflate it. They made eight separate expeditions

to Harvard Stadium between 1 and 5 AM, locating an unused 110-volt circuit in the stadium and

running buried wires from the stadium circuit to the 40-yard line, where they buried the balloon

device. When the time came to activate the device, two fraternity members had merely to flip a

circuit breaker and push a plug into an outlet.

This stunt had all the earmarks of a perfect hack: surprise, publicity, the ingenious use of 

technology, safety, and harmlessness. The use of manual control allowed the prank to be timed soas not to disrupt the game (it was set off between plays, so the outcome of the game would not be

unduly affected). The perpetrators had even thoughtfully attached a note to the balloon explaining

that the device was not dangerous and contained no explosives.

Harvard president Derek Bok commented: “They have an awful lot of clever people down there at

MIT, and they did it again.” President Paul E. Gray of MIT said: “There is absolutely no truth to the

rumor that I had anything to do with it, but I wish there were.”

The hacks above are verifiable history; they can be proved to have happened. Many other classic-hack stories

from MIT and elsewhere, though retold as history, have the characteristics of what Jan Brunvand has called‘urban folklore’ (see FOAF ). Perhaps the best known of these is the legend of the infamous trolley-car hack, an

alleged incident in which engineering students are said to have welded a trolley car to its tracks with thermite.

 Numerous versions of this have been recorded from the 1940s to the present, most set at MIT but at least one

very detailed version set at CMU.

Brian Leibowitz has researched MIT hacks both real and mythical extensively; the interested reader is referred to

his delightful pictorial compendium The Journal of the Institute for Hacks, Tomfoolery, and Pranks (MIT

Museum, 1990; ISBN 0-917027-03-5). The Institute has a World Wide Web page at

http://hacks.mit.edu/Hacks/Gallery.html. There is a sequel entitled Is This The Way To Baker House?. The

Caltech Alumni Association has published two similar books titled Legends of Caltech and More Legends of Caltech.

Here is a story about one of the classic computer hacks:

Back in the mid-1970s, several of the system support staff at Motorola discovered a relatively

simple way to crack system security on the Xerox CP-V timesharing system. Through a simple

 programming strategy, it was possible for a user program to trick the system into running a portion

of the program in ‘master mode’ (supervisor state), in which memory protection does not apply.

The program could then poke a large value into its ‘privilege level’ byte (normally write-protected)

Page 3: The Meaning of ‘Hack’

8/10/2019 The Meaning of ‘Hack’

http://slidepdf.com/reader/full/the-meaning-of-hack 3/5

14/6/2014 The Meaning of ‘Hack’

http://catb.org/jargon/html/meaning-of-hack.html

and could then proceed to bypass all levels of security within the file-management system, patch the

system monitor, and do numerous other interesting things. In short, the barn door was wide open.

Motorola quite properly reported this problem to Xerox via an official ‘level 1 SIDR’ (a bug report

with an intended urgency of ‘needs to be fixed yesterday’). Because the text of each SIDR was

entered into a database that could be viewed by quite a number of people, Motorola followed the

approved procedure: they simply reported the problem as ‘Security SIDR’, and attached all of the

necessary documentation, ways-to-reproduce, etc.

The CP-V people at Xerox sat on their thumbs; they either didn't realize the severity of the

 problem, or didn't assign the necessary operating-system-staff resources to develop and distribute

an official patch.

Months passed. The Motorola guys pestered their Xerox field-support rep, to no avail. Finally they

decided to take direct action, to demonstrate to Xerox management just how easily the system

could be cracked and just how thoroughly the security safeguards could be subverted.

They dug around in the operating-system listings and devised a thoroughly devilish set of patches.

These patches were then incorporated into a pair of programs called ‘Robin Hood’ and ‘Friar 

Tuck’. Robin Hood and Friar Tuck were designed to run as ‘ghost jobs’ (daemons, in Unix

terminology); they would use the existing loophole to subvert system security, install the necessary

 patches, and then keep an eye on one another's statuses in order to keep the system operator (in

effect, the superuser) from aborting them.

One fine day, the system operator on the main CP-V software development system in El Segundo

was surprised by a number of unusual phenomena. These included the following:

Tape drives would rewind and dismount their tapes in the middle of a job.

Disk drives would seek back and forth so rapidly that they would attempt to walk across the

floor (see walking drives).

The card-punch output device would occasionally start up of itself and punch a ‘lace card’

(card with all positions punched). These would usually jam in the punch.

The console would print snide and insulting messages from Robin Hood to Friar Tuck, or 

vice versa.

The Xerox card reader had two output stackers; it could be instructed to stack into A, stack into B, or stack into A (unless a card was unreadable, in which case the bad card was

 placed into stacker B). One of the patches installed by the ghosts added some code to the

card-reader driver... after reading a card, it would flip over to the opposite stacker. As a

result, card decks would divide themselves in half when they were read, leaving the operator 

to recollate them manually.

 Naturally, the operator called in the operating-system developers. They found the bandit ghost jobs

running, and killed them... and were once again surprised. When Robin Hood was gunned, the

following sequence of events took place:

Page 4: The Meaning of ‘Hack’

8/10/2019 The Meaning of ‘Hack’

http://slidepdf.com/reader/full/the-meaning-of-hack 4/5

Page 5: The Meaning of ‘Hack’

8/10/2019 The Meaning of ‘Hack’

http://slidepdf.com/reader/full/the-meaning-of-hack 5/5

14/6/2014 The Meaning of ‘Hack’

http://catb.org/jargon/html/meaning-of-hack.html

PING 10.0.3.1 (10.0.3.1): 56 data bytes

64 bytes from 10.0.3.1: icmp_seq=0 ttl=255 time=6165731.1 ms

64 bytes from 10.0.3.1: icmp_seq=4 ttl=255 time=3211900.8 ms

64 bytes from 10.0.3.1: icmp_seq=2 ttl=255 time=5124922.8 ms

64 bytes from 10.0.3.1: icmp_seq=1 ttl=255 time=6388671.9 ms

 — 10.0.3.1 ping statistics — 

9 packets transmitted, 4 packets received, 55% packet loss

round-trip min/avg/max = 3211900.8/5222806.6/6388671.9 ms

vegard@gyversalen:~$ exit

Script done on Sat Apr 28 14:14:28 2001

A web page documenting the event, with pictures, is at http://www.blug.linux.no/rfc1149/. In the finest Internet

tradition, all software involved was open-source; the custom parts are available for download from the site.

While all acknowledged the magnitude of this achievement, some debate ensued over whether BLUG's

implementation was properly conformant to the RFC. It seems they had not used the duct tape specified in 1149

to attach messages to pigeon legs, but instead employed other methods less objectionable to the pigeons. The

debate was properly resolved when it was pointed out that the duct-tape specification was not prefixed by a

MUST, and was thus a recommendation rather than a requirement.

The perpetrators finished their preliminary writeup in this wise: “Now, we're waiting for someone to write other 

implementations, so that we can do interoperability tests, and maybe we finally can get the RFC into the

standards track... ”.

The logical next step should be an implementation of RFC2549.

Prev  Up   Next

Appendix A. Hacker FolkloreHome

 TV Typewriters: A Tale of Hackish

Ingenuity