[comp.unix.wizards] various worm questions

friedl@vsi.COM (Stephen J. Friedl) (11/11/88)

Hi folks,

     I've a couple of worm questions.  First, we all know that a
bug in the program caused it to propagate wildly.  Does anybody
know what the bug was?  No source code, just a general idea....

     Second, if Mr. Morris had decided to hide himself, and
assuming nobody stumbled across his files on his home machine, is
there any chance that this whole thing could have gone one
without a clue as to where it came?  How would you IP wizards
track this down had it been necessary?

     Steve

-- 
Steve Friedl    V-Systems, Inc.  +1 714 545 6442    3B2-kind-of-guy
friedl@vsi.com     {backbones}!vsi.com!friedl    attmail!vsi!friedl
------------Nancy Reagan on the worm: "Just say OH NO!"------------

gwyn@smoke.BRL.MIL (Doug Gwyn ) (11/12/88)

In article <935@vsi.COM> friedl@vsi.COM (Stephen J. Friedl) writes:
>     I've a couple of worm questions.  First, we all know that a
>bug in the program caused it to propagate wildly.  Does anybody
>know what the bug was?  No source code, just a general idea....

This wasn't characterized quite correctly in the media reports.
The biggest flaw in the design was that no provision was made
to avoid propagation back to an already-infested host.

>     Second, if Mr. Morris had decided to hide himself, and
>assuming nobody stumbled across his files on his home machine, is
>there any chance that this whole thing could have gone one
>without a clue as to where it came?

It should be noted that Morris is only the ALLEGED perpetrator.
I suggest that discussions should use "the perpetrator" until
the perpetrator's identity has been legally established.

Investigators made considerable progress in tracing the origin
of the attacks without help from any alleged confession.  I don't
think it would be wise to explain publicly how this could be done.

chris@mimsy.UUCP (Chris Torek) (11/13/88)

>In article <935@vsi.COM> friedl@vsi.COM (Stephen J. Friedl) writes:
>>... we all know that a bug in the program caused it to propagate wildly.
>>Does anybody know what the bug was?  No source code, just a general idea....

In article <8868@smoke.BRL.MIL> gwyn@smoke.BRL.MIL (Doug Gwyn ) writes:
>This wasn't characterized quite correctly in the media reports.
>The biggest flaw in the design was that no provision was made
>to avoid propagation back to an already-infested host.

Not quite:  In a routine called checkother(), the program would look
for a copy of itself running on the local machine.  It had a 1/7 chance
of not looking at all, and if it did look, it had a timeout that could
fire off before the other copy could respond.  If it did find one, it
had a 1/2 chance of exiting (and, I think, if it did not, the other
was supposed to).  For whatever reasons, this did not work well.
-- 
In-Real-Life: Chris Torek, Univ of MD Comp Sci Dept (+1 301 454 7163)
Domain:	chris@mimsy.umd.edu	Path:	uunet!mimsy!chris