Using the Secure Attention Key
A trusted communication path is established by pressing the Secure Attention Key (SAK) reserved key sequence (Ctrl-X, and then Ctrl-R).
Note: Use caution when using SAK because it stops
all processes that attempt to access the terminal and any links
to it (for example, /dev/console can be linked to /dev/tty0).
A trusted communication path is established under the following conditions:
- When logging in to the system
After you press the SAK:
- If a new login screen displays, you have a secure path.
- If the trusted shell prompt displays, the initial login screen was an unauthorized program that might have been trying to steal your password. Determine who is currently using this terminal by using the who command and then log off.
- When you want the command you enter to result in a trusted program running. Some examples of this include: