<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to create a privileged COPY command? in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750177#M101226</link>
    <description>DCL Tips: Temporarily Granting Privileges:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://labs.hoffmanlabs.com/node/491" target="_blank"&gt;http://labs.hoffmanlabs.com/node/491&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Has some options.&lt;BR /&gt;&lt;BR /&gt;I'd probably use a DECnet task here, since I'm guessing this isn't a heavy-usage application.&lt;BR /&gt;&lt;BR /&gt;There are other options.&lt;BR /&gt;&lt;BR /&gt;Trying to secure a process with privileged and unprivileged code mixed together is to be avoided.  That's more difficult to secure, and more vulnerable to attacks.&lt;BR /&gt;&lt;BR /&gt;The subsystem identifier would probably work here, but you can firewall this whole task by passing along a directory specification to a privileged server process via DECnet task-to-task, and have the server do all the work for your user.  That's simpler to build and secure, given the only connection between the untrusted and the trusted software is the DECnet link.&lt;BR /&gt;&lt;BR /&gt;If you're just logging stuff and this COPY is a canard, then you might look at the OPCOM REQUEST command:&lt;BR /&gt;&lt;BR /&gt;REQUEST "Hello, I'm Home"&lt;BR /&gt;&lt;BR /&gt;or analogous.   That'll log whatever is requested, and where the gremlins can't get at it.&lt;BR /&gt;&lt;BR /&gt;Or look at adding modern operator and system logging onto VMS, rather than the antique OPCOM scheme.  syslog and other options do exist.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 11 Feb 2011 14:08:03 GMT</pubDate>
    <dc:creator>Hoff</dc:creator>
    <dc:date>2011-02-11T14:08:03Z</dc:date>
    <item>
      <title>How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750164#M101213</link>
      <description>I would like to create a privileged copy command (with a different name like PRIVED_COPY.EXE)  I'm guessing that I could make a copy of COPY.EXE as PRIVED_COPY.EXE and install it with privs required to do the copy.  But I'm not sure how to do the set command part.  I'm thinking it would be most useful to run set command on a process level every time it needs to be used.  I would like to not mess with the DCL Tables, of course.&lt;BR /&gt;&lt;BR /&gt;The object would be to create a program that makes an audit log of who, when and what files are copied to a protected production directory.  The directory can only be accessed with privilege or by using this program with an audit trail. &lt;BR /&gt;&lt;BR /&gt;Any ideas out there?&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Feb 2011 18:58:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750164#M101213</guid>
      <dc:creator>Clark Powell</dc:creator>
      <dc:date>2011-02-08T18:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750165#M101214</link>
      <description>Clark,&lt;BR /&gt;&lt;BR /&gt;How about skipping the privileged executable and setting the appropriate settings in the target directory to:&lt;BR /&gt;&lt;BR /&gt;- allow the writer to write to the directory; and&lt;BR /&gt;- turn on auditing on the directory.&lt;BR /&gt;&lt;BR /&gt;(Am about to go on a conference call, otherwise would sit down and gin up the example).&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Tue, 08 Feb 2011 19:05:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750165#M101214</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2011-02-08T19:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750166#M101215</link>
      <description>Clark,&lt;BR /&gt;&lt;BR /&gt;For a description of ALARM and AUDIT ACEs, see the OpenVMS System Management Utilities Reference Manual (at &lt;A href="http://h71000.www7.hp.com/doc/83final/6048/6048pro.html#index_x_34" target="_blank"&gt;http://h71000.www7.hp.com/doc/83final/6048/6048pro.html#index_x_34&lt;/A&gt; ), Section 1.3.&lt;BR /&gt;&lt;BR /&gt;Obviously, the documented privileges are required to establish the ACL entries, but they can be defaulted on the directory.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Tue, 08 Feb 2011 19:39:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750166#M101215</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2011-02-08T19:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750167#M101216</link>
      <description>Clark,&lt;BR /&gt;&lt;BR /&gt;  Installing images with privileges that weren't designed for that purpose has many pitfalls and potential to create unintended security holes. &lt;BR /&gt;&lt;BR /&gt;  Simple example, suppose I used the privileged COPY to overwrite the audit trail with my version of the audit trail?&lt;BR /&gt;&lt;BR /&gt;  Much simpler and safer to use appropriate ACLs to allow authorised users to access the directory in question, and generate the required audit messages.&lt;BR /&gt;&lt;BR /&gt;  Another option which may not require privilege, look up SUBSYSTEMS in the security manual.</description>
      <pubDate>Tue, 08 Feb 2011 21:51:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750167#M101216</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2011-02-08T21:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750168#M101217</link>
      <description>Good idea, Bob.  I will explore that.  An audit trail is part of what we are looking for.  &lt;BR /&gt;&lt;BR /&gt;I should explain that the object is to make our financial auditors happy by not allowing our programmers full, unlogged access to production files.  It's not just a matter of keeping the world out, it's keeping almost everyone out except the application itself.  Hence my desire to have a program that would only copy certain files to a directory and identify who, what, and when.  I'm sure there are other solution so I'm open to suggestions.</description>
      <pubDate>Tue, 08 Feb 2011 22:06:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750168#M101217</guid>
      <dc:creator>Clark Powell</dc:creator>
      <dc:date>2011-02-08T22:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750169#M101218</link>
      <description>Clark,&lt;BR /&gt;&lt;BR /&gt;Then you definitely DO NOT want to install a privileged image. However, the ALARM and AUDIT ACEs are designed for precisely this type of requirement.&lt;BR /&gt;&lt;BR /&gt;As they are documented in that way, they are particularly well-suited to satisfying audit requirements.&lt;BR /&gt;&lt;BR /&gt;If I can be of any assistance, please let me know.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Tue, 08 Feb 2011 22:17:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750169#M101218</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2011-02-08T22:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750170#M101219</link>
      <description>I would consider locking down the directory for all users and have an access failure alarm ACE and then add an ACE with access and with audit for one or more designated Identifiers.  &lt;BR /&gt;&lt;BR /&gt;Then you can determine just how you want to grant/revoke the Identifiers - manually through Authorize if the usage is low and occurs during hours when a sysadmin can grant it - or write a privileged program with some reasonably good authentication to grant/revoke the Identifier (and log that separately) if there is a lot of activity or you need off-hours access.</description>
      <pubDate>Tue, 08 Feb 2011 22:30:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750170#M101219</guid>
      <dc:creator>Mike Kier</dc:creator>
      <dc:date>2011-02-08T22:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750171#M101220</link>
      <description>&lt;!--!*#--&gt;Clark,&lt;BR /&gt;&lt;BR /&gt;All you have to do after copying COPY.EXE to PRIVED_COPY.EXE and installing it, is to DEFINE COPY as a logical name pointing to PRIVED_COPY.EXE in the login.com of the users you wish to have access to it&lt;BR /&gt;&lt;BR /&gt;That way when these users invoke the standard COPY verb from DCLTABLES, it will launch PRIVED_COPY.EXE.&lt;BR /&gt;&lt;BR /&gt;Be sure to set the file protection on PRIVED_COPY.EXE so that no one can access it except those that were intended to use it.  This will probably means you will need an ACL that grants them execute access to the file.</description>
      <pubDate>Wed, 09 Feb 2011 00:17:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750171#M101220</guid>
      <dc:creator>Jess Goodman</dc:creator>
      <dc:date>2011-02-09T00:17:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750172#M101221</link>
      <description>re: Jess,&lt;BR /&gt;&lt;BR /&gt;&amp;gt;Be sure to set the file protection on &lt;BR /&gt;&amp;gt;PRIVED_COPY.EXE so that no one can access &lt;BR /&gt;&amp;gt;it except those that were intended to use &lt;BR /&gt;&amp;gt;it.  This will probably means you will need &lt;BR /&gt;&amp;gt;an ACL that grants them execute access to &lt;BR /&gt;&amp;gt;the file.&lt;BR /&gt;&lt;BR /&gt;  Yes, but how come you're trusting the ACL on your PRIVED_COPY.EXE to work, when (by implication) you don't trust the same ACL to work on the target directory? Remove the middle entity, just protect the target directly exactly as you're proposing to protect the privileged image.&lt;BR /&gt;&lt;BR /&gt;re: Clark: "it's keeping almost everyone out except the application itself."&lt;BR /&gt;&lt;BR /&gt;This is EXACTLY what a PROTECTED SUBSYSTEM does. You define the subsystem using identifiers, then GRANT the subsystem identifier to an application. Only applications belonging to the subsystem are allowed to access the files. It's much finer control than using general privileges. &lt;BR /&gt;&lt;BR /&gt;See Chapter 14 of Guide to OpenVMS System Security &lt;A href="http://h71000.www7.hp.com/doc/84final/ba554_90015/ch14.html" target="_blank"&gt;http://h71000.www7.hp.com/doc/84final/ba554_90015/ch14.html&lt;/A&gt;</description>
      <pubDate>Wed, 09 Feb 2011 00:35:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750172#M101221</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2011-02-09T00:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750173#M101222</link>
      <description>Clark,&lt;BR /&gt;&lt;BR /&gt;After considering your question overnight, the ACL solution is IMHO the right path.&lt;BR /&gt;&lt;BR /&gt;Audit requirements include a requirement that all changes be identified, thus the directory needs to be protected against the widest group of users. ACLs on the directory are the solution to this requirement.&lt;BR /&gt;&lt;BR /&gt;A privileged version of COPY does not improve the level of protection. In fact, it restricts operations to COPY operations, which in many situations is not desirable.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Wed, 09 Feb 2011 14:48:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750173#M101222</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2011-02-09T14:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750174#M101223</link>
      <description>W.  (what does that stand for?)&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;&lt;BR /&gt;It's not just a matter of keeping the world out, it's keeping almost everyone out except the application itself.&lt;BR /&gt;&amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;BR /&gt;Reread John G.'s answer w.r.t. Protected Subsystems!&lt;BR /&gt;&lt;BR /&gt;It can do EXACTLY what you seem to desire, but is NOT limited to COPY operations.&lt;BR /&gt;&lt;BR /&gt;- you need to enable the volume where the application program(s) reside(s) for subsystems&lt;BR /&gt;- you need to create (a) SUBSYSTEM identifier(s) (maybe differentiate between Read/Write/Delete functionalities?)&lt;BR /&gt;- you install the relevant program(s) with the relevant ident(s)&lt;BR /&gt;- you restrict the access to the data structures to be limited to the relevant subsystem IDs.&lt;BR /&gt;- create a DIFFERENT set of application IDs, and use those to specify execute access to the application images.&lt;BR /&gt;&lt;BR /&gt;Now, &lt;BR /&gt;ONLY authorised users can run (maybe part of?) the application&lt;BR /&gt;ONLY users RUNNING the app image have (ONLY the specified) access to the data.&lt;BR /&gt;&lt;BR /&gt;--- In implementing, be sure to read (and understand) the relevant chapter in the Guide to System Security.&lt;BR /&gt;It is no magic, but all in all not entirely trivial.&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe &lt;BR /&gt;</description>
      <pubDate>Wed, 09 Feb 2011 16:30:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750174#M101223</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2011-02-09T16:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750175#M101224</link>
      <description>One thing I'm not getting is how to use the SUBSYSTEM ace.  In the docutments there is this line, "The Subsystem ACE applies to executable images only"  I'm writing a DCL command procedure.</description>
      <pubDate>Thu, 10 Feb 2011 23:53:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750175#M101224</guid>
      <dc:creator>Clark Powell</dc:creator>
      <dc:date>2011-02-10T23:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750176#M101225</link>
      <description>Clark,&lt;BR /&gt;&lt;BR /&gt;  Subsystem images need to be INSTALLed, so you can't do it from DCL.&lt;BR /&gt;&lt;BR /&gt;  If you can't write an executable image to mediate access to the data files, that takes you back to designing an ACL structure which grants appropriate access.&lt;BR /&gt;&lt;BR /&gt;  You're unlikely to be able to write a "secure" DCL procedure to do what you want. If it's possible to do something inside the procedure, it's possible to do it outside as well.&lt;BR /&gt;&lt;BR /&gt; An installed image (subsystem or privileged) is a different beast. You can control exactly what is permitted.</description>
      <pubDate>Fri, 11 Feb 2011 01:04:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750176#M101225</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2011-02-11T01:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a privileged COPY command?</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750177#M101226</link>
      <description>DCL Tips: Temporarily Granting Privileges:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://labs.hoffmanlabs.com/node/491" target="_blank"&gt;http://labs.hoffmanlabs.com/node/491&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Has some options.&lt;BR /&gt;&lt;BR /&gt;I'd probably use a DECnet task here, since I'm guessing this isn't a heavy-usage application.&lt;BR /&gt;&lt;BR /&gt;There are other options.&lt;BR /&gt;&lt;BR /&gt;Trying to secure a process with privileged and unprivileged code mixed together is to be avoided.  That's more difficult to secure, and more vulnerable to attacks.&lt;BR /&gt;&lt;BR /&gt;The subsystem identifier would probably work here, but you can firewall this whole task by passing along a directory specification to a privileged server process via DECnet task-to-task, and have the server do all the work for your user.  That's simpler to build and secure, given the only connection between the untrusted and the trusted software is the DECnet link.&lt;BR /&gt;&lt;BR /&gt;If you're just logging stuff and this COPY is a canard, then you might look at the OPCOM REQUEST command:&lt;BR /&gt;&lt;BR /&gt;REQUEST "Hello, I'm Home"&lt;BR /&gt;&lt;BR /&gt;or analogous.   That'll log whatever is requested, and where the gremlins can't get at it.&lt;BR /&gt;&lt;BR /&gt;Or look at adding modern operator and system logging onto VMS, rather than the antique OPCOM scheme.  syslog and other options do exist.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 11 Feb 2011 14:08:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/how-to-create-a-privileged-copy-command/m-p/4750177#M101226</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2011-02-11T14:08:03Z</dc:date>
    </item>
  </channel>
</rss>

