191 lines
17 KiB
HTML
191 lines
17 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
|||
|
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>The Meaning of ‘Hack’</title><link rel="stylesheet" href="jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="index.html" title="The Jargon File"/><link rel="up" href="appendixa.html" title="Appendix A. Hacker Folklore"/><link rel="previous" href="appendixa.html" title="Appendix A. Hacker Folklore"/><link rel="next" href="tv-typewriters.html" title="TV Typewriters: A Tale of Hackish Ingenuity"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">The Meaning of ‘Hack’</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="appendixa.html">Prev</a> </td><th width="60%" align="center">Appendix A. Hacker Folklore</th><td width="20%" align="right"> <a accesskey="n" href="tv-typewriters.html">Next</a></td></tr></table><hr/></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a id="meaning-of-hack"/>The Meaning of ‘Hack’</h2></div></div><div/></div><p>“<span class="quote">The word <a href="H/hack.html"><i class="glossterm">hack</i></a> doesn't really have 69
|
|||
|
different meanings</span>”, according to MIT hacker Phil Agre. “<span class="quote">In
|
|||
|
fact, <a href="H/hack.html"><i class="glossterm">hack</i></a> has only one meaning, an extremely subtle
|
|||
|
and profound one which defies articulation. Which connotation is implied by a
|
|||
|
given use of the word depends in similarly profound ways on the context.
|
|||
|
Similar remarks apply to a couple of other hacker words, most notably
|
|||
|
<a href="R/random.html"><i class="glossterm">random</i></a>.</span>”</p><p>Hacking might be characterized as ‘an appropriate application of
|
|||
|
ingenuity’. Whether the result is a quick-and-dirty patchwork job or a
|
|||
|
carefully crafted work of art, you have to admire the cleverness that went
|
|||
|
into it.</p><p>An important secondary meaning of <a href="H/hack.html"><i class="glossterm">hack</i></a> is
|
|||
|
‘a creative practical joke’. This kind of hack is easier to
|
|||
|
explain to non-hackers than the programming kind. Of course, some hacks have
|
|||
|
both natures; see the lexicon entries for <a href="P/pseudo.html"><i class="glossterm">pseudo</i></a> and
|
|||
|
<a href="K/kgbvax.html"><i class="glossterm">kgbvax</i></a>. But here are some examples of pure practical
|
|||
|
jokes that illustrate the hacking spirit:</p><div class="blockquote"><blockquote class="blockquote"><p>In 1961, students from Caltech (California Institute of Technology, in
|
|||
|
Pasadena) hacked the Rose Bowl football game. One student posed as a reporter
|
|||
|
and ‘interviewed’ the director of the University of Washington
|
|||
|
card stunts (such stunts involve people in the stands who hold up colored
|
|||
|
cards to make pictures). The reporter learned exactly how the stunts were
|
|||
|
operated, and also that the director would be out to dinner later.</p><p>While the director was eating, the students (who called themselves the
|
|||
|
‘Fiendish Fourteen’) picked a lock and stole a blank direction
|
|||
|
sheet for the card stunts. They then had a printer run off 2300 copies of the
|
|||
|
blank. The next day they picked the lock again and stole the master plans for
|
|||
|
the stunts — large sheets of graph paper colored in with the stunt
|
|||
|
pictures. Using these as a guide, they made new instructions for three of the
|
|||
|
stunts on the duplicated blanks. Finally, they broke in once more, replacing
|
|||
|
the stolen master plans and substituting the stack of diddled instruction
|
|||
|
sheets for the original set.</p><p>The result was that three of the pictures were totally different.
|
|||
|
Instead of ‘WASHINGTON’, the word ‘CALTECH’ was
|
|||
|
flashed. Another stunt showed the word ‘HUSKIES’, the Washington
|
|||
|
nickname, but spelled it backwards. And what was supposed to have been a
|
|||
|
picture of a husky instead showed a beaver. (Both Caltech and MIT use the
|
|||
|
beaver — nature's engineer — as a mascot.)</p><p>After the game, the Washington faculty athletic representative said:
|
|||
|
“<span class="quote">Some thought it ingenious; others were indignant.</span>” The
|
|||
|
Washington student body president remarked: “<span class="quote">No hard feelings, but at
|
|||
|
the time it was unbelievable. We were amazed.</span>”</p></blockquote></div><p>This is now considered a classic hack, particularly because revising the
|
|||
|
direction sheets constituted a form of programming.</p><p>Here is another classic hack:</p><div class="blockquote"><blockquote class="blockquote"><p>On November 20, 1982, MIT hacked the Harvard-Yale football game. Just
|
|||
|
after Harvard's second touchdown against Yale, in the first quarter, a small
|
|||
|
black ball popped up out of the ground at the 40-yard line, and grew bigger,
|
|||
|
and bigger, and bigger. The letters ‘MIT’ appeared all over the
|
|||
|
ball. As the players and officials stood around gawking, the ball grew to six
|
|||
|
feet in diameter and then burst with a bang and a cloud of white
|
|||
|
smoke. </p><p>The <i class="citetitle">Boston Globe</i> later reported: “<span class="quote">If you
|
|||
|
want to know the truth, MIT won The Game.</span>”</p><p>The prank had taken weeks of careful planning by members of MIT's Delta
|
|||
|
Kappa Epsilon fraternity. The device consisted of a weather balloon, a
|
|||
|
hydraulic ram powered by Freon gas to lift it out of the ground, and a
|
|||
|
vacuum-cleaner motor to inflate it. They made eight separate expeditions to
|
|||
|
Harvard Stadium between 1 and 5 AM, locating an unused 110-volt circuit in the
|
|||
|
stadium and running buried wires from the stadium circuit to the 40-yard line,
|
|||
|
where they buried the balloon device. When the time came to activate the
|
|||
|
device, two fraternity members had merely to flip a circuit breaker and push a
|
|||
|
plug into an outlet.</p><p>This stunt had all the earmarks of a perfect hack: surprise, publicity,
|
|||
|
the ingenious use of technology, safety, and harmlessness. The use of manual
|
|||
|
control allowed the prank to be timed so as not to disrupt the game (it was
|
|||
|
set off between plays, so the outcome of the game would not be unduly
|
|||
|
affected). The perpetrators had even thoughtfully attached a note to the
|
|||
|
balloon explaining that the device was not dangerous and contained no
|
|||
|
explosives.</p><p>Harvard president Derek Bok commented: “<span class="quote">They have an awful lot of
|
|||
|
clever people down there at MIT, and they did it again.</span>” President Paul
|
|||
|
E. Gray of MIT said: “<span class="quote">There is absolutely no truth to the rumor that I
|
|||
|
had anything to do with it, but I wish there were.</span>”</p></blockquote></div><p>The hacks above are verifiable history; they can be proved to have
|
|||
|
happened. Many other classic-hack stories from MIT and elsewhere, though
|
|||
|
retold as history, have the characteristics of what Jan Brunvand has called
|
|||
|
‘urban folklore’ (see <a href="F/FOAF.html"><i class="glossterm">FOAF</i></a>). Perhaps the
|
|||
|
best known of these is the legend of the infamous trolley-car hack, an alleged
|
|||
|
incident in which engineering students are said to have welded a trolley car
|
|||
|
to its tracks with thermite. Numerous versions of this have been recorded
|
|||
|
from the 1940s to the present, most set at MIT but at least one very detailed
|
|||
|
version set at CMU.</p><p>Brian Leibowitz has researched MIT hacks both real and mythical
|
|||
|
extensively; the interested reader is referred to his delightful pictorial
|
|||
|
compendium <i class="citetitle">The Journal of the Institute for Hacks, Tomfoolery, and
|
|||
|
Pranks</i> (MIT Museum, 1990; ISBN 0-917027-03-5). The Institute has
|
|||
|
a World Wide Web page at <a href="http://hacks.mit.edu/Hacks/Gallery.html" target="_top">http://hacks.mit.edu/Hacks/Gallery.html</a>. There
|
|||
|
is a sequel entitled <i class="citetitle">Is This The Way To Baker House?</i>.
|
|||
|
The Caltech Alumni Association has published two similar books titled
|
|||
|
<i class="citetitle">Legends of Caltech</i> and <i class="citetitle">More Legends of
|
|||
|
Caltech</i>.</p><p>Here is a story about one of the classic computer hacks:</p><div class="blockquote"><blockquote class="blockquote"><p>Back in the mid-1970s, several of the system support staff at Motorola
|
|||
|
discovered a relatively simple way to crack system security on the Xerox CP-V
|
|||
|
timesharing system. Through a simple programming strategy, it was possible
|
|||
|
for a user program to trick the system into running a portion of the program
|
|||
|
in ‘master mode’ (supervisor state), in which memory protection
|
|||
|
does not apply. The program could then poke a large value into its
|
|||
|
‘privilege level’ byte (normally write-protected) and could then
|
|||
|
proceed to bypass all levels of security within the file-management system,
|
|||
|
patch the system monitor, and do numerous other interesting things. In short,
|
|||
|
the barn door was wide open.</p><p>Motorola quite properly reported this problem to Xerox via an official
|
|||
|
‘level 1 SIDR’ (a bug report with an intended urgency of
|
|||
|
‘needs to be fixed yesterday’). Because the text of each SIDR was
|
|||
|
entered into a database that could be viewed by quite a number of people,
|
|||
|
Motorola followed the approved procedure: they simply reported the problem as
|
|||
|
‘Security SIDR’, and attached all of the necessary documentation,
|
|||
|
ways-to-reproduce, etc.</p><p>The CP-V people at Xerox sat on their thumbs; they either didn't realize
|
|||
|
the severity of the problem, or didn't assign the necessary
|
|||
|
operating-system-staff resources to develop and distribute an official
|
|||
|
patch.</p><p>Months passed. The Motorola guys pestered their Xerox field-support
|
|||
|
rep, to no avail. Finally they decided to take direct action, to demonstrate
|
|||
|
to Xerox management just how easily the system could be cracked and just how
|
|||
|
thoroughly the security safeguards could be subverted.</p><p>They dug around in the operating-system listings and devised a
|
|||
|
thoroughly devilish set of patches. These patches were then incorporated into
|
|||
|
a pair of programs called ‘Robin Hood’ and ‘Friar
|
|||
|
Tuck’. Robin Hood and Friar Tuck were designed to run as ‘ghost
|
|||
|
jobs’ (daemons, in Unix terminology); they would use the existing
|
|||
|
loophole to subvert system security, install the necessary patches, and then
|
|||
|
keep an eye on one another's statuses in order to keep the system operator (in
|
|||
|
effect, the superuser) from aborting them.</p><p>One fine day, the system operator on the main CP-V software development
|
|||
|
system in El Segundo was surprised by a number of unusual phenomena. These
|
|||
|
included the following:</p><div class="itemizedlist"><ul type="disc"><li><p>Tape drives would rewind and dismount their tapes in the middle of a
|
|||
|
job.</p></li><li><p>Disk drives would seek back and forth so rapidly that they would attempt
|
|||
|
to walk across the floor (see <a href="W/walking-drives.html"><i class="glossterm">walking drives</i></a>).</p></li><li><p>The card-punch output device would occasionally start up of itself and
|
|||
|
punch a ‘lace card’ (card with all positions punched). These
|
|||
|
would usually jam in the punch.</p></li><li><p>The console would print snide and insulting messages from Robin Hood
|
|||
|
to Friar Tuck, or vice versa.</p></li><li><p>The Xerox card reader had two output stackers; it could be instructed
|
|||
|
to stack into A, stack into B, or stack into A (unless a card was
|
|||
|
unreadable, in which case the bad card was placed into stacker B). One
|
|||
|
of the patches installed by the ghosts added some code to the
|
|||
|
card-reader driver... after reading a card, it would flip over to
|
|||
|
the opposite stacker. As a result, card decks would divide themselves
|
|||
|
in half when they were read, leaving the operator to recollate them
|
|||
|
manually.</p></li></ul></div><p>Naturally, the operator called in the operating-system developers. They
|
|||
|
found the bandit ghost jobs running, and killed them... and were once
|
|||
|
again surprised. When Robin Hood was gunned, the following sequence of events
|
|||
|
took place:</p><table border="0" bgcolor="#E0E0E0"><tr><td><pre class="screen">
|
|||
|
!X id1
|
|||
|
|
|||
|
id1: Friar Tuck... I am under attack! Pray save me!
|
|||
|
id1: Off (aborted)
|
|||
|
|
|||
|
id2: Fear not, friend Robin! I shall rout the Sheriff
|
|||
|
of Nottingham's men!
|
|||
|
|
|||
|
id1: Thank you, my good fellow!
|
|||
|
</pre></td></tr></table><p>Each ghost-job would detect the fact that the other had been killed, and
|
|||
|
would start a new copy of the recently slain program within a few
|
|||
|
milliseconds. The only way to kill both ghosts was to kill them
|
|||
|
simultaneously (very difficult) or to deliberately crash the system.</p><p>Finally, the system programmers did the latter — only to find that
|
|||
|
the bandits appeared once again when the system rebooted! It turned out that
|
|||
|
these two programs had patched the boot-time OS image (the kernel file, in
|
|||
|
Unix terms) and had added themselves to the list of programs that were to be
|
|||
|
started at boot time (this is similar to the way Windows viruses
|
|||
|
propagate).</p><p>The Robin Hood and Friar Tuck ghosts were finally eradicated when the
|
|||
|
system staff rebooted the system from a clean boot-tape and reinstalled the
|
|||
|
monitor. Not long thereafter, Xerox released a patch for this problem.</p><p>It is alleged that Xerox filed a complaint with Motorola's management
|
|||
|
about the merry-prankster actions of the two employees in question. It is not
|
|||
|
recorded that any serious disciplinary action was taken against either of
|
|||
|
them.</p></blockquote></div><p>Finally, here is a wonderful hack story for the new millennium:</p><p>1990's addition to the hallowed tradition of April Fool RFCs was RFC
|
|||
|
1149, <i class="citetitle">A Standard for the Transmission of IP Datagrams on Avian
|
|||
|
Carriers</i>. This sketched a method for transmitting IP packets via
|
|||
|
carrier pigeons.</p><p>Eleven years later, on 28 April 2001, the Bergen Linux User's Group
|
|||
|
successfully demonstrated CPIP (Carrier Pigeon IP) between two Linux machines
|
|||
|
running on opposite sides of a small mountain in Bergen, Norway. Their
|
|||
|
network stack used printers to hex-dump packets onto paper, pigeons to
|
|||
|
transport the paper, and OCR software to read the dumps at the other end and
|
|||
|
feed them to the receiving machine's network layer.</p><p>Here is the actual log of the ping command they successfully executed.
|
|||
|
Note the exceptional packet times.</p><table border="0" bgcolor="#E0E0E0"><tr><td><pre class="screen">
|
|||
|
Script started on Sat Apr 28 11:24:09 2001
|
|||
|
vegard@gyversalen:~$ /sbin/ifconfig tun0
|
|||
|
tun0 Link encap:Point-to-Point Protocol
|
|||
|
inet addr:10.0.3.2 P-t-P:10.0.3.1 Mask:255.255.255.255
|
|||
|
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:150 Metric:1
|
|||
|
RX packets:1 errors:0 dropped:0 overruns:0 frame:0
|
|||
|
TX packets:2 errors:0 dropped:0 overruns:0 carrier:0
|
|||
|
collisions:0
|
|||
|
RX bytes:88 (88.0 b) TX bytes:168 (168.0 b)
|
|||
|
|
|||
|
vegard@gyversalen:~$ ping -i 450 10.0.3.1
|
|||
|
PING 10.0.3.1 (10.0.3.1): 56 data bytes
|
|||
|
64 bytes from 10.0.3.1: icmp_seq=0 ttl=255 time=6165731.1 ms
|
|||
|
64 bytes from 10.0.3.1: icmp_seq=4 ttl=255 time=3211900.8 ms
|
|||
|
64 bytes from 10.0.3.1: icmp_seq=2 ttl=255 time=5124922.8 ms
|
|||
|
64 bytes from 10.0.3.1: icmp_seq=1 ttl=255 time=6388671.9 ms
|
|||
|
|
|||
|
— 10.0.3.1 ping statistics —
|
|||
|
9 packets transmitted, 4 packets received, 55% packet loss
|
|||
|
round-trip min/avg/max = 3211900.8/5222806.6/6388671.9 ms
|
|||
|
vegard@gyversalen:~$ exit
|
|||
|
|
|||
|
Script done on Sat Apr 28 14:14:28 2001
|
|||
|
</pre></td></tr></table><p>A web page documenting the event, with pictures, is at <a href="http://www.blug.linux.no/rfc1149/" target="_top">http://www.blug.linux.no/rfc1149/</a>. In
|
|||
|
the finest Internet tradition, all software involved was open-source; the
|
|||
|
custom parts are available for download from the site.</p><p>While all acknowledged the magnitude of this achievement, some debate
|
|||
|
ensued over whether BLUG's implementation was properly conformant to the RFC.
|
|||
|
It seems they had not used the duct tape specified in 1149 to attach messages
|
|||
|
to pigeon legs, but instead employed other methods less objectionable to the
|
|||
|
pigeons. The debate was properly resolved when it was pointed out that the
|
|||
|
duct-tape specification was not prefixed by a MUST, and was thus a
|
|||
|
recommendation rather than a requirement.</p><p>The perpetrators finished their preliminary writeup in this wise:
|
|||
|
“<span class="quote">Now, we're waiting for someone to write other implementations, so that
|
|||
|
we can do interoperability tests, and maybe we finally can get the RFC into
|
|||
|
the standards track... </span>”.</p><p>The logical next step should be an implementation of RFC2549.</p></div><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="appendixa.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="appendixa.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="tv-typewriters.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Appendix A. Hacker Folklore </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> TV Typewriters: A Tale of Hackish Ingenuity</td></tr></table></div></body></html>
|