How Allan Scherr Hacked Around the First Computer Password 89
New submitter MikeatWired writes "If you're like most people, you're annoyed by passwords. So who's to blame? Who invented the computer password? They probably arrived at MIT in the mid-1960s, when researchers built a massive time-sharing computer called CTSS. Technology changes. But, then again, it doesn't, writes Bob McMillan. Twenty-five years after the fact, Allan Scherr, a Ph.D. researcher at MIT in the early '60s, came clean about the earliest documented case of password theft. In the spring of 1962, Scherr was looking for a way to bump up his usage time on CTSS. He had been allotted four hours per week, but it wasn't nearly enough time to run the detailed performance simulations he'd designed for the new computer system. So he simply printed out all of the passwords stored on the system. 'There was a way to request files to be printed offline by submitting a punched card,' he remembered in a pamphlet (PDF) written last year to commemorate the invention of the CTSS. 'Late one Friday night, I submitted a request to print the password files and very early Saturday morning went to the file cabinet where printouts were placed and took the listing.' To spread the guilt around, Scherr then handed the passwords over to other users. One of them — J.C.R. Licklieder — promptly started logging into the account of the computer lab's director Robert Fano, and leaving 'taunting messages' behind."
More on CTSS (Score:5, Interesting)
CTSS is notable for a lot of things. Like having the first e-mail, and the first spam.
http://opinionator.blogs.nytimes.com/2011/06/19/did-my-brother-invent-e-mail-with-tom-van-vleck-part-one/
The first documented hacking occurred earlier, to make certain networking-esque programs work.
PRIVACY IS THEFT! (Score:2)
Or something like that.
Learn your history... (Score:5, Informative)
He took his question across the hall and in 5 minutes had the funding to start what became the ARPAnet. He was as close as the computer world gets to an expeditionary explorer.
In other words: He funded the startup of the Internet.
For a really great read get a copy of "Where Wizards Stay Up Late: The Origins Of The Internet". Besides learning about the incredible minds that built the foundations, you can read a number of entertaining anecdotes. (Like AT&Ts refusal to believe that it was possible long after it was working!!!)
Re: (Score:3)
In other words: He funded the startup of the Internet.
Well, he, my parents, and all the other American taxpayers at the time. But as government projects go, it does seem to have turned out rather well.
You might want to check this article out: (Score:1)
Re: (Score:2, Informative)
Warning! Your password is too short.
Re: (Score:2)
Is it true that if you type your password in a posting on /. it will be asterisked out?
Re: (Score:3)
yeah, it is, If I type in "God" it gets asterisked out for me, but when I log out it shows in clear text. It's an easy way to remember your password if you forget it! Just find one of your old posts that you typed your password into!
submitter maths fail (Score:2)
Twenty-five years after the fact?
Try fifty...
Re:submitter maths fail (Score:5, Informative)
I know I shouldn't tell someone with a 5-digit id to RTFA, but here I go anyway... FTFA:
Re:submitter maths fail (Score:5, Funny)
Uh, uh. But now the DHS knows what he did...
Re: (Score:2)
Re: (Score:2)
Allan Scherr: [holds up his doctorate] Ph.D immunity!
[DHS slowly rolls its head on its neck, takes aim, and fires - his bullet goes through Allan's wallet, and then his head]
DHS: It's just been revoked!
Re:submitter maths fail (Score:5, Insightful)
I know I shouldn't tell someone with a 5-digit id to RTFA, but here I go anyway... FTFA:
Okay, so to sum up:
Slashdot just posted a 25-year-old story.
Re: (Score:1)
I know I shouldn't tell someone with a 5-digit id to RTFA, but here I go anyway... FTFA:
Okay, so to sum up:
Slashdot just posted a 25-year-old story.
Actually, a 22-year-old story about an incident which took place 25 years previously. Something to tell your grandkids about.
Re: (Score:2)
You must be new around here . . . :)
hawk
Re: (Score:1)
I know I shouldn't tell someone with a 5-digit id to RTFA...
Yeah, you should. These younger users are often hard of reading...
Re: (Score:1)
Re: (Score:3)
If you think that's impressive, TFS also says that CTSS was built in the "mid-1960s", and Scherr stole the password file "in the early '60s", specifically "in the spring of 1962". Hacking into a system that hasn't been built yet is pretty impressive. I wasn't surprised when I checked the "editor" and saw that it was Timothy.
Re: (Score:2)
Re: (Score:2)
what is a password? (Score:1)
In encryption is a keyphrase a password?
Regarding a bank account is your signature a password?
Is the file system address to a specific terminal a password?
I am so confuse.
Re:what is a password? (Score:5, Interesting)
it's a route, the way to connect to your phone. A password is more like a key, if you have one then you can get into your whatever.
Worst password/pin. A telephone system at a major event many years ago, each journalist was given a unique 4 digit pin, they enter it and get dialtone and dial. Took about 10 seconds for them to workout that they could just pump in 4 digit codes until they got dial tone and they were then using other peoples accounts. Or the Video store software that stored passwords in plain text in a file called PW.TXT.
Re: (Score:3)
....or the crippleware my high school used on Windows 98 to prevent unauthorized users from modifying anything. Except, it allowed the user to set the wallpaper from Internet Explorer, but not the display console.
Fun ensued when the students set the goatse man as the wallpaper and the teachers couldn't change it because they didn't have the password.
I quickly learned that the password was stored in plain text in the registry (that I could view, but not edit) and would change the wallpaper back to a blank b
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Because you had to set the wallpaper to something with Internet Explorer. They wanted the background to be a solid blue. Typically, I would set the wallpaper using Internet Explorer to remove the offending image and then set it to blue afterwords.
The blue screen background of happiness.
Re: (Score:2)
Sadly, when I was a tyke in HS, we were the last pre-internet generation.
However, hilarity *did* ensue when I showed the other gifted kids how to change the desktop pictures and system sounds on the native powermacs the school was using.
Never did I ever imagine the inventiveness that schoolkids could invoke from something as horrible as clarisworks.... never in a million years. It was like graphitti in a newyork subway. Every workstation in the school was vandalized in a different and unique way.
It wasn't
Re: (Score:1)
The gifted kids getting to spend extra (un-monitored) time in the computer lab was a great idea. We were the only ones that could make it work anyways.
With practically no one having a computer, much less a clue how to use it, the teachers needed input on how to incorporate them into a class, so they let us have our way with it, to figure out what a student could do with it. Which lessons were fun, any thoughts on what a 6th grade kid could put in a database. How come this won't save. We were middle schoo
Re: (Score:2)
Do you have a floppy drive in that safe too? If not, rush out to the shops now.
Re: (Score:1)
Not in the safe, but in my box o goodies. Too bad you couldn't buy a good one for the last 10 years or so. Mine is fairly new, but I've seen plenty of them die under very light use. Just don't build them the same when you don't run them for 6 hours straight installing the OS from 49 different disks:)
I did try reading them in my old DOS box, and they still worked! I copied them into my circle of backups so I have the data in more than one place now!
Cheers
Re: (Score:2)
Why is a password not a route (Score:2)
Re: (Score:1)
Re: (Score:1)
Yeah, a nerve among people who can't stand smug idiots.
Re: (Score:3)
Re:Rant (-5 insightful) (Score:5, Informative)
http://xkcd.com/301/ [xkcd.com]
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
That date seems about right...
I can't get off your lawn good sir, it seems your lawn's long gone, quite sure...
Re: (Score:2)
The cartoon on 1/27/12 was numbered 1009. This means that that cartoon was 708 cartoons ago. There are three xkcd cartoons a week, which puts it 236 weeks ago. That is about four years and 28 weeks ago, which would put it roughly July of 2007.
I wish he hadn't published this... (Score:5, Funny)
The next thing you know, cardpunches will be declared to be terrorist tools.
Re:I wish he hadn't published this... (Score:4, Funny)
A card punch launched from a trebuchet could do some serious damage. They are big and heavy.
Tell you what, though, the chad is an *outstanding* terrorist tool :) Going through the student keypunch room with a garbage bag, emptying all the chad bins, gets you enough annoying confetti to last a long time. Go through somebody's closet, and put chad in every pocket of everything he owns. Months later he will still be picking the stuff out. Sprinkle it liberally into the pages of various books. And 2 or 3 handfuls in the bed is always a winner.
My sister the artist still laments the passing of card punches. Back in the days of card punches she was into paper mache, and the chad makes excellent paper mache, and is zero labor. Just chuck a few handfuls into the paste and get to work.
Re: (Score:2)
Reminds me of an old IBM joke (Score:2)
Re: (Score:2)
I once saw the cab of a pickup entirely stuffed full of them....
Re: (Score:2)
... and not many people know that (Score:2)
Re: (Score:2)
but that just shows up as *******
So... (Score:1)
"Taunting Messages"... so he was anonymous and did it for the lulz?
Spreading the guilt (Score:4, Funny)
Back in high school our band performed at EPCOT, and that night, to keep all the kids in their hotel rooms, the chaperones put tape on each door. If a student left their room, then the tape on the outside of the door would be broken loose and they would get in trouble. However there was a fatal flaw. Late that night when we were sneaking around the hotel, we simply removed the tape from a dozen other rooms.
Re: (Score:2)
An excellent example of how when we pay attention to the obvious, someone else has a different in
First keylogger? (Score:5, Interesting)
I'm sure not the first time it happened, but while in college in the mid '80s, the computer lab was set up with 68k-based evaluation boards to use for embedded systems programming assignments. The boards had two serial ports, one to the ASCII terminal and another to the Sun server. The boards normally operated in a transparent pass-through mode when they weren't being used, and a hot-key was used to access the board directly.
We realized that we could easily install code to look for "login:" and "password:" coming from the server and catch the replies and save them in memory. We'd check back towards the end of the day and harvest the results. We were on very good terms with the head of the CS department, so when we told him about our little exploit and proved it with his password, he was more amused than anything else.
We didn't keep or use any of the passwords, but thinking back on it, it could have been quite lucrative to sell them to a certain group of CS students who were quite prone to cheating. Those were the ones that you could put their assignment printouts together (I worked as a TA for a while) and hold them up to the light to see they were identical except for the variable names. One of them also set fire to the pile of final assignments that had been left on the floor outside a professor's office in a 100+ year old building, figuring if nobody's assignment got turned in, the professor couldn't grade them (yeah, too dumb to realize all those programs were still on the server). That was a very narrowly avoided tragedy. Ah, memories.
Re: (Score:1)
Re: (Score:1)
By 1970, the FBI was arresting hackers (Score:3, Interesting)
When I was attending a small techical college which had government contracts, one student got passwords to several research accounts and used them for homework and for the primitive games of the time. He started with guessing simple ones and shoulder surfing. After a couple of catch-and-release sequences, he seemed to self-destruct. He started running CPU and memory intensive do-nothing programs to deliberately tie up the computer. He was finally arrested, expelled, tried, convicted, and jailed.
He was sure proud he could do it. He was sure resentful that computer time wasn't free.
Re: (Score:2)
the login 2 step (Score:2)
A while back I was curious about the origin of the customary way of logging in by first entering a user ID/name, then entering in your password. Where was this first done? Why that order? Why not ask for the password first, or ask for only the password? Maybe it used to be done differently? I knew of Multics, and thought there might be older OSes. A bit of searching turned up CTSS, and the source code. I looked at enough of the CTSS source to see that it did the login 2 step we all know.
What I'm no
Re: (Score:2)
The problem with using only passwords to log in is that you then have to prevent users from having the same password. This can lead to serious security implications as discussed in this article [thedailywtf.com].
Re: (Score:2)
This is not a technically hard problem. The way they did it in that story you linked was terrible. Perhaps the simplest way to solve it is to have the system generate part or all of every password, instead of letting (or making?) users create their own passwords. Naturally, the system is programmed to make sure its part is unique.
However, that solution might not be so good from a social point of view. I thought a half and half approach might work. The user makes their own password, however weak, and
And thus... (Score:2)
To spread the guilt around, Scherr then handed the passwords over to other users. One of them — J.C.R. Licklieder — promptly started logging into the account of the computer lab's director Robert Fano, and leaving 'taunting messages' behind."
And thus, the first trolling was born.
J.C.R. Licklieder?!? (Score:2)
Um, no. J.C.R. Licklider [memex.org].
I think the submitter copied the typo in the title of this blog [wordpress.com]. But really! It's not like he's some unknown guy.