and it's well past april fool's day ...
http://www-128.ibm.com/developerworks/l ... clnx2.html
Source code reviews
Ken Thompson, one of the original creators of UNIX, discusses in Reflections on trusting trust a number of steps he took that managed to render source code useless for revealing a security issue.
First, he patched the login command to contain a back door that would let him log into any UNIX system with a certain password.
He then patched the C compiler to detect whenever the login command was being compiled. The C compiler would automatically insert the back door into the login program, so there was no need to keep the back door in the source of the login command.
Then, he modified the C compiler to detect when the C compiler itself was compiled from source and to automatically add the login-detection-and-patching code as well as the C-compiler-detection-and-patching code.
The result was a system where the source code did not contain any trace of a backdoor.
http://www-128.ibm.com/developerworks/l ... clnx2.html
Source code reviews
Ken Thompson, one of the original creators of UNIX, discusses in Reflections on trusting trust a number of steps he took that managed to render source code useless for revealing a security issue.
First, he patched the login command to contain a back door that would let him log into any UNIX system with a certain password.
He then patched the C compiler to detect whenever the login command was being compiled. The C compiler would automatically insert the back door into the login program, so there was no need to keep the back door in the source of the login command.
Then, he modified the C compiler to detect when the C compiler itself was compiled from source and to automatically add the login-detection-and-patching code as well as the C-compiler-detection-and-patching code.
The result was a system where the source code did not contain any trace of a backdoor.