Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Early UNIX Contributor Robert Morris Dead at 78

timothy posted more than 3 years ago | from the elder-statesman dept.

Security 90

dtmos writes "Robert Morris, a major contributor to the Unix password and security features while at Bell Labs, has passed at the age of 78. His interesting life was made even more interesting by his son, Robert Tappan Morris, who invented the computer worm."

cancel ×

90 comments

Sorry! There are no comments related to the filter you selected.

If we send condolences by email... (1)

topham (32406) | more than 3 years ago | (#36626952)

If we send condolences by email, will we crash the internet?

Re:If we send condolences by email... (1)

No2Gates (239823) | more than 3 years ago | (#36628224)

Come on guys, this guy is like a hero. Let's give him some respect. Save the jokes for someone like Wiener who deserves it.

Re:If we send condolences by email... (1)

Anonymous Coward | more than 3 years ago | (#36628748)

Wiener made an idiot mistake recently, but he did some pretty heroic things in his own right. Review his healthcare rhetoric on the floor of the House.

Re:If we send condolences by email... (1)

angel'o'sphere (80593) | more than 3 years ago | (#36689960)

I assume not even 0.001% here will understand your pun ... kudos.

What are the burial plans? (4, Funny)

jameskojiro (705701) | more than 3 years ago | (#36627072)

Conventional Burial?
Cremation?
Crygenic Preservation?
.
. /dev/null ?

Re:What are the burial plans? (4, Funny)

GameboyRMH (1153867) | more than 3 years ago | (#36627186)

It would be only fitting for the dates on his headstone to be in seconds relative to the Unix epoch.

Re:What are the burial plans? (1)

Anonymous Coward | more than 3 years ago | (#36628082)

Since he was born in 1932, about 38 years prior to the Unix epoch, the family will have to decide whether to use two's complement, one's complement or a signed decimal.

Re:What are the burial plans? (2)

rvw (755107) | more than 3 years ago | (#36627272)

Conventional Burial?
Cremation?
Crygenic Preservation?
.
. /dev/null ?

A worm wil do!

Re:What are the burial plans? (1)

cababunga (1195153) | more than 3 years ago | (#36627504)

. /dev/null ?

or
source /dev/null
if using C-shell

Re:What are the burial plans? (3, Funny)

MaxBooger (1877454) | more than 3 years ago | (#36628096)

Conventional Burial? Cremation? Crygenic Preservation? . . /dev/null ?

Buried in a crypt, of course.

Re:What are the burial plans? (1)

turing_m (1030530) | more than 3 years ago | (#36630092)

It's difficult to say where his destination will ultimately be. One thing we can be sure of - he will be piped there.

He brought (0)

Anonymous Coward | more than 3 years ago | (#36627090)

Robert T Morris into this world, why didn't he take him (and his worm) out? -- In all seriousness, he did a lot for the UNIX community and will be missed.

Passed? (1)

Anonymous Coward | more than 3 years ago | (#36627112)

Out? Wind?

Re:Passed? (0)

Anonymous Coward | more than 3 years ago | (#36627154)

his bedtime?

Login Required (1)

Anonymous Coward | more than 3 years ago | (#36627158)

Fuck you, New York Times.

Re:Login Required (1)

Warlord88 (1065794) | more than 3 years ago | (#36627188)

Login required for what? Certainly not for reading the article.

Re:Login Required (1)

GameboyRMH (1153867) | more than 3 years ago | (#36627582)

I think it depends how many NYT articles they can track that you've read today. GP should try using a clean browser through a different IP.

Re:Login Required (1)

Hylandr (813770) | more than 3 years ago | (#36627694)

www.pagewash.com

Re:Login Required (1)

AlterEager (1803124) | more than 3 years ago | (#36631838)

So, how do the NYT store the password?

Unix? (0)

Anonymous Coward | more than 3 years ago | (#36627184)

# /sbin/init
# /bin/cp RM RTM
# /bin/true
# /sbin/shutdown -r now

WAS GREAT IN HOW TO SUCCEED IN BUSINESS WITHOUT (-1)

Anonymous Coward | more than 3 years ago | (#36627206)

really trying. Too bad about his son, a common criminal that not only drank the whole bottle he ate the worm !!

RIP (0)

Anonymous Coward | more than 3 years ago | (#36627212)

universe# mv /home/rmorris /usr/archive/
universe# userdel rmorris

Full Text (5, Informative)

burning-toast (925667) | more than 3 years ago | (#36627218)

Here is the full text of the article due to the paywall suddenly becoming active for some:

Robert Morris, a cryptographer who helped developed the Unix computer operating system, which controls an increasing number of the world’s computers and touches almost every aspect of modern life, died on Sunday in Lebanon, N.H. He was 78.

The cause was complications of dementia, his wife, Anne Farlow Morris, said.

Known as an original thinker in the computer science world, Mr. Morris also played an important clandestine role in planning what was probably the nation’s first cyberwar: the electronic attacks on Saddam Hussein’s government in the months leading up to the Persian Gulf war of 1991.

Although details are still classified, the attacks, along with laser-guided bombs, are believed to have largely destroyed Iraq’s military command and control capability before the war began.

Begun as a research effort at AT&T’s Bell Laboratories in the 1960s, Unix became one of the world’s leading operating systems, along with Microsoft’s Windows. Variations of the original Unix software, for example, now provide the foundation for Apple’s iPhone iOS and Macintosh OSX as well as Google’s Android operating systems.

As chief scientist of the National Security Agency’s National Computer Security Center, Mr. Morris gained unwanted national attention in 1988 after his son, Robert Tappan Morris, a graduate student in computer science at Cornell University, wrote a computer worm — a software program — that was able to propel itself through the Internet, then a brand-new entity.

Although it was intended to hide in the network as a bit of Kilroy-was-here digital graffiti, the program, because of a design error, spread wildly out of control, jamming more than 10 percent of the roughly 50,000 computers that made up the network at the time.

After realizing his error, the younger Mr. Morris fled to his parents’ home in Arnold, Md., before turning himself in to the Federal Bureau of Investigation. He was convicted under an early federal computer crime law, sentenced to probation and ordered to pay a $10,000 fine and perform community service. He later received a computer science doctorate at Harvard University and is now a member of the Massachusetts Institute of Technology computer science faculty.

Robert Morris was born in Boston on July 25, 1932, the son of Walter W. Morris, a salesman, and Helen Kelly Morris. He earned a bachelor’s degree in mathematics and a master’s in applied mathematics from Harvard.

At Bell Laboratories he initially worked on the design of specialized software tools known as compilers, which convert programmers’ instructions into machine-readable language that can be directly executed by computers.

Beginning in 1970, he worked with the Unix research group at Bell Laboratories, where he was a major contributor in both the numerical functions of the operating system and its security capabilities, including the password system and encryption functions.

His interest in computer security deepened in the late 1970s as he continued to explore cryptography, the study and practice of protecting information by converting it into code. With another researcher, he began working on an academic paper that unraveled an early German encryption device.

Before the paper could be published, however, he received an unexpected call from the National Security Agency. The agency invited him to visit, and when he met with officials, they asked him not to publish the paper because of what it might reveal about the vulnerabilities of modern cryptographic systems.

He complied, and in 1986 went to work for the agency in protecting government computers and in projects involving electronic surveillance and online warfare. Although little is known about his classified work for the government, Mr. Morris told a reporter that on occasion he would help the F.B.I. by decoding encrypted evidence.

In 1994, he retired to Etna, N.H., where he was living at his death.

In addition to his wife and his son Robert, of Cambridge, Mass., Mr. Morris is survived by a daughter, Meredith Morris, of Washington; another son, Benjamin, of Chester, N.J.; and two grandchildren.

Re:Full Text (0)

Anonymous Coward | more than 3 years ago | (#36627360)

Dementia is one of many complications that come from working with Unix.

Re:Full Text (1)

CharlyFoxtrot (1607527) | more than 3 years ago | (#36627574)

Along with uncontrollable smugness and a tendency towards beards [drbill.cc] .

I don't know about the smug, but... (0)

Anonymous Coward | more than 3 years ago | (#36627902)

Some people I know at the NSA claim Morris would lie on the floor and let his cats clean his beard for him.

Re:Full Text (1)

tehcyder (746570) | more than 3 years ago | (#36631380)

How come his son is now a member of the faculty at MIT?

I bet if he'd had poor parents and had stolen a car as a teenager he'd have been lucky to get a job serving at McDonalds.

Bombs (0)

Anonymous Coward | more than 3 years ago | (#36627322)

"the [cyber] attacks, along with laser-guided bombs"

Does no-one else find this hilarious?

command line death (3, Funny)

jbeaupre (752124) | more than 3 years ago | (#36627336)

God@heaven /usr/earth/RobertTappanMorris sudo mv soul.bin /heaven
password:
God@heaven /usr/earth/RobertTappanMorris rm -f *
God@heaven /usr/earth/RobertTappanMorris cd ..
God@heaven /usr/earth/ chmod 777 RobertTappanMorris

(later other users will move his empty directory to /usr/earth/cemetery)

Re:command line death (2, Interesting)

Anonymous Coward | more than 3 years ago | (#36627456)

God@heaven /usr/earth/RobertTappanMorris sudo mv soul.bin /heaven

Except he was an atheist.

Re:command line death (2)

GameboyRMH (1153867) | more than 3 years ago | (#36627692)

sudo mv /home/rmorris /dev/dirt
exit

Re:command line death (2, Funny)

Anonymous Coward | more than 3 years ago | (#36627792)

God@heaven /usr/earth/RobertTappanMorris sudo mv soul.bin /heaven

Except he was an atheist.

God@heaven /usr/earth cd /heaven
God@heaven /heaven mv soul.bin /hell
God@heaven /heaven cd /hell
God@heaven /hell ./torture soul.bin -t fire

Re:command line death (2, Funny)

Anonymous Coward | more than 3 years ago | (#36627536)

That is his son you've just killed.

This is about RHM, RTM's father (1)

billstewart (78916) | more than 3 years ago | (#36629954)

AC is correct.

Re:command line death (0)

Anonymous Coward | more than 3 years ago | (#36627572)

God should use god as his password. It's just fitting.

Re:command line death (0)

Anonymous Coward | more than 3 years ago | (#36627700)

God should use god as his password. It's just fitting.

He tried that once 13.75 billion years ago.

Does God Use sudo? (1)

saudadelinux (574392) | more than 3 years ago | (#36628452)

I mean, seeing how he's God and all, I'd think He can run as root all He pleases ;-)

Re:Does God Use sudo? (0)

Anonymous Coward | more than 3 years ago | (#36629934)

He's all-wise. He's not going to just run as root all the time. It goes like this:

Jesus@heaven$ sudo -s
Password:
Father@heaven$ kill -9 Jesus
Father@heaven$ sleep 259200 ; ./Jesus&
[1] 3

Re:Does God Use sudo? (1)

CAIMLAS (41445) | more than 3 years ago | (#36630526)

That would explain Los Angeles and Shanghai, at any rate.

Re:command line death (2)

SigmundFloyd (994648) | more than 3 years ago | (#36629750)

God@heaven /usr/earth/RobertTappanMorris sudo mv soul.bin /heaven
password:

You don't exist. Go away.

logout

Re:command line death (0)

lothos (10657) | more than 3 years ago | (#36630422)

Robert Tappan Morris is the son of Robert Morris. You might know RTM as the creator of the first computer worm on the internet in 1988.

Does nobody check their facts anymore? (5, Informative)

chucku2 (723044) | more than 3 years ago | (#36627420)

The computer worm was invented by the sci-fi author John Brunner in his 1975 novel "The Shockwave Rider". The first real implementation of a computer worm was published by John Shoch and Jon Hupp of Xerox PARC in 1982 (CACM Vol 25 No 3). I wrote my first one in 1985 (on BNA) but I am quite sure that hundreds, perhaps thousands, of other people had written their own versions by then. Robert TAPPAN Morris only released his worm in 1988. This is important because today we have the situation where large corporations are claiming patents on inventions that have been common knowledge for fifty years or more. We, the /. crowd, need to keep reminding people, especially the USPTO, of PRIOR ART. Otherwise the whole free/open software movement will be dead within a few years.

Re:Does nobody check their facts anymore? (0)

Anonymous Coward | more than 3 years ago | (#36627804)

We, the /. crowd, need to keep reminding people, especially the USPTO, of PRIOR ART. Otherwise the whole free/open software movement will be dead within a few years.;

You had me up until this (I would have posted about the Xerox PARC worm if you hadn't). But pray tell, why is it important to remind the USPTO of the PRIOR ART concerning computer worms?

Are there malware authors out there actually trying to PATENT the idea of a computer worm? And if so, shouldn't we allow them to step forward and do us the service of identifying themselves, just before we hand out their Darwin Awards?

Re:Does nobody check their facts anymore? (1)

Maximum Prophet (716608) | more than 3 years ago | (#36632858)

Because computer worms and viruses are prior art for P2P networks. It's not difficult to imagine a program that is just like a worm, but uses authorized channels to distribute software. An authorized virus could be used to apply OS patches.

Does nobody check their facts anymore? Indeed. (2)

betterunixthanunix (980855) | more than 3 years ago | (#36628480)

The first computer worm was the CREEPER, which appeared on ARPANET in 1971.

Re:Does nobody check their facts anymore? (0)

pclminion (145572) | more than 3 years ago | (#36629840)

This is important because today we have the situation where large corporations are claiming patents on inventions that have been common knowledge for fifty years or more.

You can't have it both ways. You consider some vague reference in a work of fiction to be an "invention" yet a clearly spelled-out and technically detailed list of claims is not worthy of the same title? If the latter is not an invention then don't make me die of laughter claiming some piece of sci-fi is, either. Seriously, what the fuck.

Re:Does nobody check their facts anymore? (0)

Anonymous Coward | more than 3 years ago | (#36630842)

Well, at least the science fiction is expressed in a form understandable by engineers, as opposed to patent-legalese.

Re:Does nobody check their facts anymore? (1)

angel'o'sphere (80593) | more than 3 years ago | (#36689992)

The Shockwave Rider is one of the best SF novels ever written, a must read for any geek, nerd, computer scientist, programmer ... and every other human being anyway as well.

Thanks for covering this (1)

jonabbey (2498) | more than 3 years ago | (#36627440)

RM really contributed a lot to all *nix users.

Slightly OT: not first computer worm (2)

maxwells_deamon (221474) | more than 3 years ago | (#36627494)

No, Robert Morris, Jr did not invent the computer worm. He build the first "successful" worm.

If you look at old videos of the TV reports at the time security folks identified it as a worm by name right away. The term was discussed briefly in an OS class in college a few years earlier.

Re:Slightly OT: not first computer worm (1)

Maximum Prophet (716608) | more than 3 years ago | (#36632880)

No, the first to get caught. There were worms that only went so far, then self destructed. But, they're secret.

Passed What? (1)

Bruce66423 (1678196) | more than 3 years ago | (#36627604)

Isn't 78 a little late to be taking exams? Or am I just ageist?

Stoll's "Cuckoo's Egg" has some great anecdotes (4, Interesting)

rbrander (73222) | more than 3 years ago | (#36627644)

Clifford Stoll, who tracked a cracker backwards from the government science-lab networks being snooped on, eventually to eastern Europe, told a few great RTM stories in his memoir of it, "The Cuckoo's Egg". Stoll accepted an invitation to lecture various government and intelligence officials on his search to that point, and had one of those deals where he had to wait outside the room while other presenters spoke, then ushered out afterwards because it was all reflexively classified.

Stoll, an astronomer by trade who studied temperatures on Jupiter and became a sysadmin when his grants failed, got to the end of his presentation on ping timing and tracing and getting foreign police to check the telephone origin of a modem connection to an IP, to be asked several questions. The one from Morris, sprawled in the front row, was about adiabatic heating in Jupiter's atmosphere. Stoll switched mental tracks with some effort and answered as CIA types and military officers craned their necks around in confusion.

Later on, when the RTM-Jr. worm was wreaking havoc on the 1987 Internet, Stoll called Morris Sr. to get his take on it. A subdued and monosyllabic Morris answered that he knew about the problem and believed he could get to the bottom of it, but couldn't talk now.

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

jgrahn (181062) | more than 3 years ago | (#36627956)

Clifford Stoll, who tracked a cracker backwards from the government science-lab networks being snooped on, eventually to eastern Europe

Yes, if you count West Germany as eastern Europe ...

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (0)

Anonymous Coward | more than 3 years ago | (#36629646)

the guy he was paid by KGB/Stasi people and if I'm not mistaken lived in west berlin

hardly 'western europe' and arguably 'tracing the cracker to eastern europe' if you count the origins of his handlers

captcha: 'redcoat' btw

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

tehcyder (746570) | more than 3 years ago | (#36631434)

No, West Berlin was very, very, very much in Western Europe. Politically, not geographically. Eastern Europe specifically referred to countries under the control of the USSR at the time.

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

rbrander (73222) | more than 3 years ago | (#36633518)

The "end of the trail", at least from my point of view, was not the geographic location of Marcus Hess, but the end-point the information went to - and the money came from.

I rather doubt the west German government was paying him for information about American computer systems. The trail, in the book, rather clearly went past Marcus Hess to the KGB that were paying him. The book doesn't mention, but the PBS show they made from it offered additional detail (the police investigation was ongoing when the book came out) that it was (I think) the Romanian KGB or something, rather than actual Russians. But I forgot (was at work when I typed) exactly which KGB, so I went with "eastern Europe".

I guess I could dig out the VHS of that PBS show if you like, but, ahem, we were talking about RT Morris, you know, the guy that just died?

Glad I didn't make spelling or grammatical errors, or we'd have been here all day.

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

rbrander (73222) | more than 3 years ago | (#36633690)

...and five minutes later I finally notice Cliff Stoll also replied to my post, and it was "Bulgarian" that I was trying to think of. I think the Nova special mentioned they were the "KGB's KGB", or some such, often used for foreign ops as a proxy. But never mind that.

Since everybody jumped in to (justly) praise his book, I want to add praise for his *second* book. His "second thoughts on the information superhighway" still strike me as a wise view. I've seen the related Newsweek article reprinted as derisive comedy, because of all the Internet commerce he thought wouldn't work so well, that eventually did. But the thrust of the book was much more than that. He decried spending money on computers for schools to do things like simulate chemistry experiments or show multimedia about the woods - displacing money that might have paid for real chemistry labs or trips to actual woods. In general, that we are all to eager to simulate life, play video games with a stranger in another state, rather than frisbee with a friend.

Oddly enough for a "techie" subject, The Cuckoo's Egg was mostly about the human relationships that Stoll formed with other sysadmins, police and intelligence folk, and of course, RT Morris, (to get back to topic) - and it is the human dimension that endears the book to so many of us.

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (5, Informative)

Cliff Stoll (242915) | more than 3 years ago | (#36628518)

Yes, I met and worked with Robert T. Morris in the late 1980's.

During 1986 and 1987, I had tracked a computer intruder from our systems in Berkeley California, through a complex trail, into Hannover, Germany. Using a honeypot, we were able to show the involvement of the E. German Stassi and a rather mysterious Bulgarian connection. I testified at the intruders' trial in Germany.

As the investigation wound up, I visited the National Computer Security Center (a part of the NSA), and met Robert T. Morris. Of course, I'd known him from his Unix/Bell Labs days. With a cigarette in his hand, we talked extensively about password security and the need to go beyond simple encryption of the Unix etc/passwd file. (At this time, salts & rainbow files were in the experimental stage). He was convinced that encryption was needed for many more processes than just logging into a system.

Later, Bob Morris encouraged me to write up my experiences in a paper, "Stalking the Wily Hacker", which was published in the April 1988 CACM.

Robert T. Morris was one of the computer pioneers who foresaw the troubles of unsecured computers and networks. He recognized that it wasn't possible to simply isolate a computer from the network -- that a computer's power was multiplied when connected to others. And his work in applying cryptographic protection to data foreshadowed much of today's efforts in computer security.

All of us owe Robert T. Morris a debt: our systems and networks work better and more securely because of his work.

May he rest in peace.

-Cliff

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (3, Informative)

Cliff Stoll (242915) | more than 3 years ago | (#36628554)

Whoops = replace Robert H. Morris for Robert T. Morris. My mistake...

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (2)

gknoy (899301) | more than 3 years ago | (#36628700)

You know, it's indescribably cool (even if this is off-topic) to have the person referenced in a post reply to it with even more info. :-D It's tempting to go read your book, as it sounds tremendously interesting.

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (2)

n7ytd (230708) | more than 3 years ago | (#36629064)

Mr. Stoll's book is well worth your time. I've read it 3 or 4 times; leaving four or five years between readings, it's a delight to discover again. Also try the cookie recipe. :)

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

tehcyder (746570) | more than 3 years ago | (#36633384)

I just went to read this, and was amused to see that the initial gaping security hole in the system was caused by emacs

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

socz (1057222) | more than 3 years ago | (#36629306)

Definitely check out the book, it's great! Makes me wish I was in a position to do what he did (sure it took a lot of time and back then, a lot of physical effort (running around checking his equipment)) but would surely be satisfying to come to the end he did. I don't know about you guys, but one I finished reading the book, I started going through my logs! FreeBSD forever!

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

adolf (21054) | more than 3 years ago | (#36630262)

Also check out the Nova special, The KGB, the Computer, and Me [imdb.com] , which appears to be on Youtube [youtube.com] for the moment. It stars our friend Mr. Stoll.

I remember being particularly enthralled that video when I was around 10 or 11. I went on to find and read the book, learned a lot, and enjoyed the hell out of it.

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

xandroid (680978) | more than 3 years ago | (#36630360)

It is -- actually it's what first got 14-year-old me interested in learning more about computers and networking. Thanks Cliff!

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (2)

CAIMLAS (41445) | more than 3 years ago | (#36630580)

It's one of my favorite books, and a large motivator in getting me into sysadmin work.

I hate you, Cliff Stoll. :P

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (2)

trb (8509) | more than 3 years ago | (#36628836)

(At this time, salts & rainbow files were in the experimental stage).

UNIX /etc/passwd had salt before 1986, but early UNIX had passwords that were truncated at 8 characters and I think the salts were two plaintext bytes/12 bits (4096 combinations). The password file (included the encrypted salted password) was world-readable. I think systems use the same ideas these days, but with non-world-readable encrypted passwords, and bigger passwords and salts.

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (3, Interesting)

jcrb (187104) | more than 3 years ago | (#36629352)

In one of those odd connections of fate, I remember reading The Cuckoo's Egg, and having an email conversation with Cliff Stoll about the generating function that Robert Morris discussed with him at the NSA..... and Cliff's response of "hot diggity!" when I managed to work it out. And then a few years later I wound up as a fellow grad student of RTM, which resulted in meeting RHM and hearing some fascinating stories, that the times article refers to as "still classified" about his work in the first gulf war. Indeed the usual /. bad jokes in this thread are even more troll than usual.

jon

p.s. hi cliff

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (0)

Anonymous Coward | more than 3 years ago | (#36629624)

Great post Cliff. I loved your book "Cuckoo's Egg."

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

kstatefan40 (922281) | more than 3 years ago | (#36630812)

Cliff- I'm another person who has you to thank for getting me into the security field through your book. I'm 21 now, just getting ready to finish up my undergrad in Information Assurance. I was working as a web developer at an internet security firm in high school when my boss, an old Unix hacker, suggested your book to me. It got me hooked and I haven't ever looked back. Appreciate your insight into Mr. Morris's life. He laid the foundation for all of us. Thanks for jumping in. Tyler

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (0)

Anonymous Coward | more than 3 years ago | (#36630982)

read your book more than a decade ago, some time between high school and college. I think an old physics prof/mentor gave it as a gift. It was well before I knew much about UNIX, but I'd credit it with giving me a good perspective to approach it from, & if you have a good viewpoint to look at a problem any new thing is easy to pick up.

good stuff!

ps - I always wondered about the part where you jangled the keys to corrupt the connection when things started to get too sensitive. From an EE standpoint it always felt a bit far fetched. Euphemism?

Re:Stoll's "Cuckoo's Egg" has some great anecdotes (1)

yanyan (302849) | more than 3 years ago | (#36632502)

Way offtopic, but hello Cliff! I love your book and re-read it every 2-3 years! You are fucking awesome!

*hat to chest* (1)

Tolkien (664315) | more than 3 years ago | (#36627914)

Rest in peace, sir.

78 years old? (0)

Anonymous Coward | more than 3 years ago | (#36628114)

You mean computers weren't developed by a bunch of 20-somethings? Dear god what is this world coming to? Have to wonder why age discrimination is so rampant in IT.

Re:78 years old? (1)

tehcyder (746570) | more than 3 years ago | (#36631476)

You mean computers weren't developed by a bunch of 20-somethings? Dear god what is this world coming to? Have to wonder why age discrimination is so rampant in IT.

I don't think he was 78 thirty years ago...

memory of rhm (5, Interesting)

trb (8509) | more than 3 years ago | (#36628248)

I worked with Bob Morris (rhm) at Bell Labs back around 1980. We were on a Bell Labs Navy contract, and Bob was on loan to the project from his usual research hacking. We were doing signal processing stuff, decoding sonar data. Anyway, I was a UNIX hacker kid (I was about 20 at the time) and he was a really sharp gadfly/rascal BTL CS research guy. We were colleagues and there was some friendly sniping back and forth between us.

Everyone at Bell Labs was sharp, but he was a an especially talented special expert on loan. Anyway, I was doing random UNIX hacking and I was also the sysadm for a couple of PDP-11s that we all timeshared for our UNIX hacking. This is a story that I've kept secret for 30 years.

This all was before the days of viruses, and the ARPANET existed, but not at Bell Labs. Occasionally hackers would break into other people's systems, usually just for fun.

We made heavy use of modems to send data all around (uucp, usenet, remote login, etc), so there was some concern about system intrusion, and as I said, this was a Navy contract (with Secret and Top Secret elements). We had lots of security in the buildings and labs (big locks, guards, rs232 wires in secured tubes, etc.). We had some secret/secured UNIX systems and some not.

On a whim, I had decided to install a little security hack on a couple of my non-secure UNIX systems - a nightly cron job that did a "find / -perm 04000 -uid 0 -ls" or whatever it was, to find all the suid root programs on the system, and write the list to a log file, and to diff yesterday's and today's, and make sure nothing changed. One Saturday morning, I logged into my system from home (as a sysadm, I had a "foreign exchange" phone in my bedroom that acted like the extension that was sitting in my office at work). I see an email from cron that said that /bin/login had changed overnight!

I was shocked, I called my boss and I started looking around the system to see what I could find (I was the admin and had root access). I found some suspicious files in Bob Morris's $HOME. He had some files encrypted with UNIX crypt, and one was exactly the size of the login.c source, and one was a bit bigger. I knew that UNIX crypt encoded files on a byte-for-byte basis, so this was very strange, but I didn't know how to crack crypt.

I had friends in BTL research, and I called one and they said to call Jim Reeds (I think) because he was a main BTL crypto guy, so I did. BTL was pretty big (at least 30k engineers) and the pure research folks (like Reeds, and Morris for that matter) were in an ivory tower, and didn't necessarily listen whenever Bell Labs development folks called them, especially 20-year-old kids like me. So I call Reeds and I tell him my story. I'm in this BTL department, we're doing a contract with the Navy, it looks like someone hacked my /bin/login, I have some encrypted files. He didn't sound too interested. I told him the files were in Bob Morris's $HOME. He said, "send the files right over here."

In a few hours, he'd decoded the files. I guess if you already have a crypt-cracker, it would be especially easy if you knew that one file was an existing login.c and the other was probably a small hack to it. So Bob had hacked /bin/login to save usernames and passwords in a file somewhere, I think xored with -1 or something. Nothing fancy. There were also uucp logs of his sending either the login.c or his password booty to some another Bell Labs research system (allegra, I think, for those who remember).

Bell Labs had many layers of management, and occasionally funny business would occur and the supervisors, department heads, directors, vps, etc would get together to pow-wow about what to do, and I think this was one of those cases. In the end, it resolved pretty quietly, and I don't know what the upshot was, but Bob stayed on our project and I think it was "no harm, no foul." I don't think I ever asked him "what the hell were you thinking?"

When I heard a few years later that rtm (Bob's son) was in hot water for the famous Morris worm, I thought to myself, like father, like son. I don't mean to imply anything negative about either guy, I thought they were both just hacking for fun and without destructive intent. I just wanted to share this story, and I look back very fondly to my days at Bell Labs and working with Bob, who was a legendary hacker, really smart, and quite a rascal.

RHM cracked my Unix accounts in early 80s (2)

billstewart (78916) | more than 3 years ago | (#36630012)

I forget exactly what year it was, but I was a Unix newbie trying to learn security, and working at Bell Labs, and had an account that I thought I had gotten to be fairly secure. I got a call the next morning from somebody who did not immediately identify himself telling me what was in my "secure" file, and suggesting several different ways he could have broken in. RHM was department head for computer security at the time; a week later one of his folks did another attack on another threat I'd missed (though that only knocked me off my session by kicking my modem into loopback, but didn't actually break in.) I learned a lot from him - was it really ~30 years ago?

Re:memory of rhm (0)

Anonymous Coward | more than 3 years ago | (#36630404)

I've met the younger. If he's like his father, his father was a careless dick wreaking havoc and doing nothing useful, only available to receive pats on the back, never to suffer the consequences of misbehavior. There's a compelling reason that www.cag.lcs.mit.edu has never listed their actual staff: it's to keep from admitting publicly that the younger Robert works there, and probably to help protect that federal funding that somehow seems to be availble for utterly pointless projects like writing yet another Lisp interpreter. (I've studied Lisp, and worked with it professionally: it's a complete waste of bits.)

Re:memory of rhm (0)

Anonymous Coward | more than 3 years ago | (#36632152)

Seems uncalled for. http://www.csail.mit.edu/user/972 is pretty public, and the MIT students I know who worked with Robert or took his classes have nothing but good things to say about him.

Re:memory of rhm (1)

lothos (10657) | more than 3 years ago | (#36630482)

Love the story, thanks for sharing :)

Re:memory of rhm (0)

Anonymous Coward | more than 3 years ago | (#36631274)

Sounds like a lame hacker.

Unsuccessful anyway. 30 years ago it would be a 10 minute chicken-walk to patch up all binaries to root any unix system with 0 traces. I know because I did it as a 14 year old every single night.

Not surprisingly, I think UNIX stinks like dirty balls attached to an unwashed crotch. Actually I think a better analogy would be detached rotten balls, parted from a decomposed retard. But, that's specifics.

Hail the king/.

Re:memory of rhm (1)

shpoffo (114124) | more than 3 years ago | (#36635350)

pony up, Mouth

I too hacked login - On a Cray 1M (0)

Anonymous Coward | more than 3 years ago | (#36637150)

I worked for Cray from 1986 to 1989. I was a junior sysadmin and had to learn Unix on Cray by myself, as it was ported onto the machines by the developers. I had to figure out how to build the kernel, libraries, shell, utilities, and compilers. I was given a full source tree, a short manual, and sessions from 6 a.m. to 9 a.m. every day on a Cray 1M. Apart from that I was on my own and I had no previous Unix experience.

One of my early experiments was a trojan login program. I would login normally on one of the machine's terminals then "exec trojanlogin". The trojan would mimic the "login:" and "password:" prompt at the terminal where I left it running. I would walk away and it would capture input from the next person who walked up to the terminal. It wasn't an original idea but copying somebody else's idea and writing the code to do it taught me a lot about getty, login, and shell. Just what I needed at the time.

I forgot all about it until one day I needed a small text file to send to test the local printer on the Cray. I picked a small file from my home directory and cat the file to /dev/lpr. A few minutes later my boss went to the machine room, came back, and asked me why a list of the operator passwords was on the printer......

Re:memory of rhm (0)

Anonymous Coward | more than 3 years ago | (#36638784)

"... I had friends in BTL research, and I called one and they said to call Jim Reeds (I think) ..." Would that have been Fred Grampp
you called?

Re:memory of rhm (1)

trb (8509) | more than 3 years ago | (#36648170)

Fred Grampp was definitely there then, but I didn't know him either. I think he and Reeds were sometimes "partners in crime" (research colleagues). I think I remember him from the semi-annual BTL UNIX meetings (which were sort of like USENIX but internal). I had a handful of friends at Murray Hill, just not the ones hacking crypto. It might have been Peter Honeyman, who was either still there at the time or else he knew who was best to call. I don't remember who directed me to Reeds.

headline error (1)

Jodka (520060) | more than 3 years ago | (#36629834)

Early UNIX Contributor Robert Morris Dead at 78

"Late UNIX Contributor Robert Morris Dead at 78"

There, fixed that for you.

Re:headline error (1)

rubycodez (864176) | more than 3 years ago | (#36630334)

Unix Contributor became the late Robert Morris at 78.

There, fixed that for you.

you know.... (1)

swilde23 (874551) | more than 3 years ago | (#36630670)

... I suspect foul play!

You'll be missed. (1)

Hubert_Shrump (256081) | more than 3 years ago | (#36676308)

Featured prominently in Stephen Levy's "Hackers".

Always wished I'd met you.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>