TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Xerox Alto zero-day: cracking disk password protection on a 45 year old system

240 pointsby jjwisemanover 7 years ago

12 comments

mattnewportover 7 years ago
The comment from the owner of the disk he cracked is pretty great:<p>Doug Wyatt January 4, 2018 at 10:38 PM<p>I&#x27;m flabbergasted. That&#x27;s my Alto disk you broke into!<p>The APL stuff is surely related to some work I did with Leo Guibas, showing why lazy evaluation would be a really good idea for implementing APL: see Compilation and delayed evaluation in APL, published January 1978. (That paper gives me an enviable Erdős number of 3, since Leo is a 2.) I&#x27;m sure it&#x27;s not a complete APL implementation, just a proof of concept. It happens that my very first part-time job at PARC, in 1973, involved writing decision analysis software in APL -- on a timesharing system!<p>Given the AATFDAFD hint, I&#x27;d guess the real password is ADDATADFAD. This derives from a project I did with Jef Raskin at UCSD in 1974. (He mentioned it in this interview.) The Data General Nova we were working with produced some garbled message with ADDATADFAD where it should have said ADDITIONAL, and it was a running joke ever after. Strange, the things that occupy some brain cells for over 40 years.<p>Thanks for an amusing blast from the past.<p>-- Doug Wyatt (Xerox PARC 1973-1994)
评论 #16081182 未加载
Keyframeover 7 years ago
Reminds me of a year or two ago when I had to boot my old SGI. Forgot the user password on IRIX and thought that this is where I&#x27;ll be clever (hacking terminals, matrix music in the background, etc.). Turns out, IRIX had 8 character limit for user passwords. Thanks to the modern GPUs and a passwd file restored from the system (on a recovery console), a few hours later I had the password brute-forced. I&#x27;ll get to be clever hax0r next time, I guess.
评论 #16074372 未加载
评论 #16075049 未加载
评论 #16074278 未加载
评论 #16073947 未加载
评论 #16074117 未加载
dingalingover 7 years ago
Very cool that he found a flaw in the algorithm<p>But this is really the antithesis of what a zero-day originally was, which was a crack circulated on <i>or even before</i> the release day of software[0]. The Alto is 45 years old :)<p>Odd how words and phrases can change so much over a short period of time that they invert their meaning.<p>[0] that&#x27;s what it meant in the early &#x2F; mid 1990s when I was peripherally involved. Now it seems to mean &#x27;zero days of notification to the vendor&#x27;.
评论 #16073838 未加载
评论 #16075810 未加载
评论 #16073896 未加载
评论 #16075314 未加载
评论 #16073685 未加载
评论 #16080003 未加载
评论 #16075788 未加载
mrpippyover 7 years ago
My own adventure disabling PowerBook Password Security on an old Mac:<p><a href="https:&#x2F;&#x2F;bslabs.net&#x2F;2016&#x2F;01&#x2F;30&#x2F;disabling-powerbook-password-security&#x2F;" rel="nofollow">https:&#x2F;&#x2F;bslabs.net&#x2F;2016&#x2F;01&#x2F;30&#x2F;disabling-powerbook-password-s...</a>
评论 #16075716 未加载
jjwisemanover 7 years ago
Passwords like &quot;HGFIHD&quot; and &quot;AAJMAKAY&quot; look like initialisms. It might be fun to try to decode them. (xxxAKAY on a Xerox PARC disk from the 70s&#x2F;80s... could it be?)
评论 #16074131 未加载
评论 #16074164 未加载
评论 #16074087 未加载
MikeBVaughnover 7 years ago
I always find security measures on old-school systems interesting. They always seem more geared towards keeping semi-honest mischief makers out than serious security. Which makes sense, based on the context of the time I guess.<p>IIRC, the Xerox Pilot OS was purely cooperative multitasking with a single shared address space.
dogma1138over 7 years ago
They should totally file for a CVE for this.
评论 #16073432 未加载
KindOneover 7 years ago
When can we expect the security updates for the Alto?
raphmanover 7 years ago
German IT news site heise.de posted a nice tongue-in-cheek article about the vulnerability: <a href="https:&#x2F;&#x2F;www.heise.de&#x2F;newsticker&#x2F;meldung&#x2F;XeroxDay-Zero-Day-Schwachstelle-bei-Xerox-Alto-gefunden-1elf-3934443.html" rel="nofollow">https:&#x2F;&#x2F;www.heise.de&#x2F;newsticker&#x2F;meldung&#x2F;XeroxDay-Zero-Day-Sc...</a>
z3t4over 7 years ago
When programmers and mathematicians use the word &quot;trivially&quot; it really means &quot;I&#x27;m smarter then you&quot;.
izacusover 7 years ago
&gt; Salting passwords also protects against password attacks using precomputed rainbow tables, but that wasn&#x27;t a concern back then.<p>Hmm, if not to defend against rainbow tables... why were the passwords salted back then?
评论 #16074708 未加载
评论 #16074621 未加载
评论 #16074630 未加载
colehassonover 7 years ago
Something nice to discuss at least.