<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Open VMS BASIC programming Doubt in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088668#M13546</link>
    <description>Bob,&lt;BR /&gt;&lt;BR /&gt;it all depends.&lt;BR /&gt;&lt;BR /&gt;Fundamentally, you are right.&lt;BR /&gt;In todays, environments, trained to handle things "the Micro$oft way", the non-availability of Quick &amp;amp; dirty (but non-secure) solutions is considered a deficiency.&lt;BR /&gt;This is such a solution.&lt;BR /&gt;&lt;BR /&gt;I do admit that I should have stressed the security issues (much) more.&lt;BR /&gt;&lt;BR /&gt;fwiw&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
    <pubDate>Fri, 19 Oct 2007 08:38:52 GMT</pubDate>
    <dc:creator>Jan van den Ende</dc:creator>
    <dc:date>2007-10-19T08:38:52Z</dc:date>
    <item>
      <title>Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088662#M13540</link>
      <description>Hi All,&lt;BR /&gt;I have a doubt on the follwing scenario,&lt;BR /&gt;A program written in BASIC that run under a user account tries to rename a file in a disk.&lt;BR /&gt;This user has been denied privilege to do rename,delete,copy etc on this disk.Hence the program bombs.Is there any soulution to rename the file under user account through the program?&lt;BR /&gt;I would appreciate if you could help me to sort out this issue?&lt;BR /&gt;Looking forward to hear from you.&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Oct 2007 04:56:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088662#M13540</guid>
      <dc:creator>sreeraj7</dc:creator>
      <dc:date>2007-10-19T04:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088663#M13541</link>
      <description>sreeraj7,&lt;BR /&gt;&lt;BR /&gt;To begin with,&lt;BR /&gt;&lt;BR /&gt;WELCOME to the VMS forum!!&lt;BR /&gt;&lt;BR /&gt;Your question essentially has 2 solutions.&lt;BR /&gt;&lt;BR /&gt;The quick one: INSTALL the program with privilege. If the file owner is in the same UIC group as the user, then GRPPRV is sufficient, else, SYSPRV is needed.&lt;BR /&gt;&lt;BR /&gt;This is maybe a crude weapon for the problem.&lt;BR /&gt;&lt;BR /&gt;The second one is much more sofisticated, but also much more system management work.&lt;BR /&gt;&lt;BR /&gt;- enable protected subsystems on the device that holds the .EXE&lt;BR /&gt;- create an identifier specific for this purpose&lt;BR /&gt;- INSTALL the .EXE with this identifier as SUBSYSTEM identifier&lt;BR /&gt;- add an ACL entry to the files to be protected, requiring the susbsystem identifier for the protected access modes.&lt;BR /&gt;&lt;BR /&gt;Now, only when running the .EXE does the user have the specified rights to the file.&lt;BR /&gt;&lt;BR /&gt;--- and it is also possible to add (another) identifier as EXECUTE ACL to the EXE file, requiring the user to hold THAT identifier to be allowed to RUN that image!&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Fri, 19 Oct 2007 05:34:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088663#M13541</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2007-10-19T05:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088664#M13542</link>
      <description>sreeraj7,&lt;BR /&gt;&lt;BR /&gt;I concur with Jan, to the extent that a protected subsystem is the best answer. Installing the program with privileges in this context is far more power than is needed.&lt;BR /&gt;&lt;BR /&gt;In a protected subsystem, the ability to manipulate the file (and only that ability) is available to the user only when running the identified image. Thus, there is no danger of unexpected and unintended leakage.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Fri, 19 Oct 2007 06:29:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088664#M13542</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2007-10-19T06:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088665#M13543</link>
      <description>The program which the user run is from a menu.</description>
      <pubDate>Fri, 19 Oct 2007 06:33:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088665#M13543</guid>
      <dc:creator>sreeraj7</dc:creator>
      <dc:date>2007-10-19T06:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088666#M13544</link>
      <description>sreeraj7,&lt;BR /&gt;&lt;BR /&gt;well, if the program is run from a menu, AND, the user is NOT allowed out of the menu (nor are other users), THEN (and only THEN) you can SET PROTECTION on the file to W:RWED.&lt;BR /&gt;(on more modern versions of VMS that has been superceded by SET SECURITY, but SET PROTECTION still works, and is good on all versions)&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Fri, 19 Oct 2007 06:49:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088666#M13544</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2007-10-19T06:49:16Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088667#M13545</link>
      <description>Jan,&lt;BR /&gt;&lt;BR /&gt;With all due respect, I cannot disagree more strongly.&lt;BR /&gt;&lt;BR /&gt;Just because the user is supposed to be trapped in a menu, does not guarantee that other programs available from the menu are well behaved (and for that matter, nowhere was it stated that the users were CAPTIVE).&lt;BR /&gt;&lt;BR /&gt;If an auditor looked at the security properly, then the only solution that addresses the problem is a secured subsystem.&lt;BR /&gt;&lt;BR /&gt;Otherwise, there are potentials out there.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Fri, 19 Oct 2007 07:17:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088667#M13545</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2007-10-19T07:17:38Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088668#M13546</link>
      <description>Bob,&lt;BR /&gt;&lt;BR /&gt;it all depends.&lt;BR /&gt;&lt;BR /&gt;Fundamentally, you are right.&lt;BR /&gt;In todays, environments, trained to handle things "the Micro$oft way", the non-availability of Quick &amp;amp; dirty (but non-secure) solutions is considered a deficiency.&lt;BR /&gt;This is such a solution.&lt;BR /&gt;&lt;BR /&gt;I do admit that I should have stressed the security issues (much) more.&lt;BR /&gt;&lt;BR /&gt;fwiw&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Fri, 19 Oct 2007 08:38:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088668#M13546</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2007-10-19T08:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088669#M13547</link>
      <description>That the program "bombs" implies that the program contains errors in its handling.&lt;BR /&gt;&lt;BR /&gt;Installing an image with privileges is tossing the programmer into the deep end of the programming pool.  I know how to code a program to operate as an installed and privileged image, and it can be a massive security hole if you're not really careful.  It can be a security hole if you are careful.&lt;BR /&gt;&lt;BR /&gt;For instance, you have to have some sort of filtering to avoid one of these applications from, say, renaming SYSUAF into the weeds.  Or a file within the application environment, but one intended not to be overwritten -- such as the application LOGIN.COM.  &lt;BR /&gt;&lt;BR /&gt;As for required programming practices with an installed image, you have to ensure the privilege is reliably shut off immediately after image activation, and only enable the privilege around the particular rename.&lt;BR /&gt;&lt;BR /&gt;The quick-and-dirty approach may well involve a resource identifier, and operate the whole of the shared file storage environment under the identifier, and grant the identifier to the user and/or to the application.  But then yes, the next solution in sequence is to use a traditional subsystem identifier.&lt;BR /&gt;&lt;BR /&gt;If identifiers are not sufficient for the task (which is unlikely in this case), the next step would be to communicate with a (trusted) server process that performs the privileged operation(s); a design that disconnects the user-accessible pieces from the privileged pieces, and puts in place some basic messaging that can block typical attacks.  (And if you use this client and privileged server approach, just like you would code a network connection, don't trust anything provided by the client.)&lt;BR /&gt;&lt;BR /&gt;Privileges are a last resort approach in my usual playbook.  Auditors absolutely zero in on privileges; installed privileged images are absolute audit magnets.  And privileged images require approaching the environment with a level of defensive programming that is rarely usual, and rarely needed with an approach based on subsystem identifiers.&lt;BR /&gt;&lt;BR /&gt;Stephen Hoffman&lt;BR /&gt;HoffmanLabs LLC&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Oct 2007 10:16:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088669#M13547</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2007-10-19T10:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088670#M13548</link>
      <description>I used to cringe at installed images with privs while doing system management at DEC. esp in house applications where management&lt;BR /&gt;ordered it. re throwing the programmer in the deep end of the pool, I like that. Dean</description>
      <pubDate>Fri, 19 Oct 2007 11:39:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088670#M13548</guid>
      <dc:creator>Dean McGorrill</dc:creator>
      <dc:date>2007-10-19T11:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088671#M13549</link>
      <description>Hang on! What's the issue here? All this talk of installing images assumes the problem is to allow the user to perform an operation on a file that privilege and protection settings deny.&lt;BR /&gt;&lt;BR /&gt;First step is to handle the NOPRIV condition, so the program doesn't crash. Just issue the NOPRIV message and continue.&lt;BR /&gt;&lt;BR /&gt;Second step... if there are files which the current security settings are denying access to, BUT you WANT the user to have access, then the security settings are wrong (by definition!). So, grant access to the user, either by protection mask or ACL.&lt;BR /&gt;&lt;BR /&gt;Granting privilege to the image, or implementing a protected subsystem is a very complex and costly way of fixing a flawed security model. Yes, they have their place, as far as I can tell from the problem description, this isn't one of them.</description>
      <pubDate>Sun, 21 Oct 2007 17:09:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088671#M13549</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2007-10-21T17:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088672#M13550</link>
      <description>Does "Secure subsystem" mean the following:&lt;BR /&gt;&lt;BR /&gt;* Define an identifier (named after the application), with attribute RESOURCE&lt;BR /&gt;* Make that identifier OWNER of the files of the application&lt;BR /&gt;* Set these files O:RWED, or (better) craete an ACE to the file that allows DELETE for this identifier&lt;BR /&gt;* Grant the identifier to the user that needs ro handle the file (that is: DELETE access for RENAME)&lt;BR /&gt;&lt;BR /&gt;If so, I learned something. If not, take it in consideration.&lt;BR /&gt;&lt;BR /&gt;Aopart from that: The program should be aletered to handle conditions the RIGHT way. A foreseeable condition like this should NEVER blow the image.</description>
      <pubDate>Mon, 19 Nov 2007 07:05:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088672#M13550</guid>
      <dc:creator>Willem Grooters</dc:creator>
      <dc:date>2007-11-19T07:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: Open VMS BASIC programming Doubt</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088673#M13551</link>
      <description>I think I agree with John G.  This is a bad case of re-inventing a wheel.&lt;BR /&gt;&lt;BR /&gt;If the user doesn't have privilege to do X but you want that user to have the privilege when running Y but you don't want that user to have the privilege when running Z...&lt;BR /&gt;&lt;BR /&gt;This sounds like a confused security design.  You want to have your cake and eat it too.  In essence, this design GUARANTEES job security because no one will ever figure out what you did.  (Oops - may have answered my own question of WHY BOTHER...)&lt;BR /&gt;&lt;BR /&gt;Seriously, either the user can or cannot delete a given file.  It is either fish or fowl, no middle ground.  So... what would be the value added to such a situation?&lt;BR /&gt;&lt;BR /&gt;Logging?  Put an Audit ACL on the directory or write logging code for every action of a certain class to occur in your menu system.&lt;BR /&gt;&lt;BR /&gt;Extra security checks?  OK, I could see that - but why?  In the final answer is still going to be "can delete" or "can't delete."  What is the REAL purpose here?  If you tell us what you REALLY wanted, we might be able to help you rethink the problem in a clearer light.&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Dec 2007 13:23:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/open-vms-basic-programming-doubt/m-p/4088673#M13551</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2007-12-05T13:23:48Z</dc:date>
    </item>
  </channel>
</rss>

