<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: priviledge to reset password in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755719#M19402</link>
    <description>TMcB,&lt;BR /&gt;&lt;BR /&gt;  In this case "minimum required" is an oxymoron. Any of the ALL category privileges should do. According to the System Services Reference Manual, $SETUAI "You must have SYSPRV privilege to set passwords for any user account (including your own)."&lt;BR /&gt;&lt;BR /&gt;  Implementing such a mechanism, while protecting against unauthorised privilege amplification requires care, as it would be easy to leave loopholes open.&lt;BR /&gt;&lt;BR /&gt;  The simplest, and most obvious case - preventing your helpdesk operators from modifying the password of SYSTEM and thereby taking control of the system is but the tip of the iceberg. &lt;BR /&gt;&lt;BR /&gt;Robert's example of DCL qualifier syntax hacking shows that knocking up a DCL script to feed AUTHORIZE has some unexpected pitfalls. &lt;BR /&gt;&lt;BR /&gt;My recommendation would be a program to be installed with SYSPRV which uses $SETUAI and UAI$_PASSWORD. I'd protect the image with an ACL, filter the input username with both an INCLUDE list AND an EXCLUDE list (remember he program has SYSPRV, so the lists can be hidden), and audit every action, again to a protected file.&lt;BR /&gt;&lt;BR /&gt;With appropriate table driven logic, you could define it so that a given user had a set of usernames they're allowed to modify.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 21 Feb 2011 22:06:42 GMT</pubDate>
    <dc:creator>John Gillings</dc:creator>
    <dc:date>2011-02-21T22:06:42Z</dc:date>
    <item>
      <title>priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755713#M19396</link>
      <description>Hi all&lt;BR /&gt;&lt;BR /&gt;What VMS privileges does a user need to be able to reset other users passwords.&lt;BR /&gt;i would like to allow our helpdesk to reset the users passwords - and give them an account to do so with the minimum required priviledges.&lt;BR /&gt;Thanks so much</description>
      <pubDate>Mon, 21 Feb 2011 11:49:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755713#M19396</guid>
      <dc:creator>TMcB</dc:creator>
      <dc:date>2011-02-21T11:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755714#M19397</link>
      <description>The AUTHORIZE utility is installed with SYSLCK and AUDIT. Beyond that, access to the SYSUAF (sys$system:sysuaf.dat by default)should be all that is needed.&lt;BR /&gt;&lt;BR /&gt;Creating an ACL on the SYSUAF would do it. Since that would allow you to create extra accounts and change privileges etc also, it would be good practice to not to give a helpdesk account free access to this. The simplest would be making the password changing account a captive account.</description>
      <pubDate>Mon, 21 Feb 2011 12:19:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755714#M19397</guid>
      <dc:creator>Richard Brodie_1</dc:creator>
      <dc:date>2011-02-21T12:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755715#M19398</link>
      <description>Thanks Richard - indeed would use a captive account</description>
      <pubDate>Mon, 21 Feb 2011 12:37:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755715#M19398</guid>
      <dc:creator>TMcB</dc:creator>
      <dc:date>2011-02-21T12:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755716#M19399</link>
      <description>TMcB,&lt;BR /&gt;&lt;BR /&gt;When using a captive account, be careful to note that the command procedures need to CHECK THE USER-SUPPLIED INPUTS WITH EXTREME CARE.&lt;BR /&gt;&lt;BR /&gt;The same cautionary notes that apply to back-end web scripts (e.g., CGI using DCL and other languages with string substitution), apply as well to captive account command procedures. One needs to beware unchecked string substitution, it can create an unintended attack vector.&lt;BR /&gt;&lt;BR /&gt;For example, can the user supply a string "JJDUFFH/PRIV=CMKRML" as a password. This COULD lead to an unwitting symbol substitution, to wit:&lt;BR /&gt;$ AUTHORIZE MODIFY &lt;USERNAME&gt;/PASSWORD='NEWPASSWORD' becoming&lt;BR /&gt;$ AUTHORIZE MODIFY &lt;USERNAME&gt;/PASSWORD=JJDUFMH/PRIV=CMKRNL&lt;BR /&gt;&lt;BR /&gt;Extreme caution is recommended.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;&lt;BR /&gt;&lt;/USERNAME&gt;&lt;/USERNAME&gt;</description>
      <pubDate>Mon, 21 Feb 2011 13:21:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755716#M19399</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2011-02-21T13:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755717#M19400</link>
      <description>TMcB,&lt;BR /&gt;&lt;BR /&gt;Like others noted, all kinds of misuse potential (intentional or not) are easily introduced.&lt;BR /&gt;&lt;BR /&gt;We have made that at least a lot more difficult by making a little utility (only accessible by holders of HELPDESK identifier)&lt;BR /&gt;which just takes a username as parameter.&lt;BR /&gt;Then it generates a password by concatenating current year - month - day - hour - minute.&lt;BR /&gt;This is set as the new password and displayed to the helpdesk person to tell the calling user.&lt;BR /&gt;... and of course, usernames are checked, and privileged usernames are NOT accepted!&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe&lt;BR /&gt;</description>
      <pubDate>Mon, 21 Feb 2011 13:41:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755717#M19400</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2011-02-21T13:41:34Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755718#M19401</link>
      <description>There is a complete username registration and associated password-reset system available for download here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://labs.hoffmanlabs.com/node/1260" target="_blank"&gt;http://labs.hoffmanlabs.com/node/1260&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 21 Feb 2011 15:26:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755718#M19401</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2011-02-21T15:26:07Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755719#M19402</link>
      <description>TMcB,&lt;BR /&gt;&lt;BR /&gt;  In this case "minimum required" is an oxymoron. Any of the ALL category privileges should do. According to the System Services Reference Manual, $SETUAI "You must have SYSPRV privilege to set passwords for any user account (including your own)."&lt;BR /&gt;&lt;BR /&gt;  Implementing such a mechanism, while protecting against unauthorised privilege amplification requires care, as it would be easy to leave loopholes open.&lt;BR /&gt;&lt;BR /&gt;  The simplest, and most obvious case - preventing your helpdesk operators from modifying the password of SYSTEM and thereby taking control of the system is but the tip of the iceberg. &lt;BR /&gt;&lt;BR /&gt;Robert's example of DCL qualifier syntax hacking shows that knocking up a DCL script to feed AUTHORIZE has some unexpected pitfalls. &lt;BR /&gt;&lt;BR /&gt;My recommendation would be a program to be installed with SYSPRV which uses $SETUAI and UAI$_PASSWORD. I'd protect the image with an ACL, filter the input username with both an INCLUDE list AND an EXCLUDE list (remember he program has SYSPRV, so the lists can be hidden), and audit every action, again to a protected file.&lt;BR /&gt;&lt;BR /&gt;With appropriate table driven logic, you could define it so that a given user had a set of usernames they're allowed to modify.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 21 Feb 2011 22:06:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755719#M19402</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2011-02-21T22:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755720#M19403</link>
      <description>TMcB,&lt;BR /&gt;&lt;BR /&gt;   Also please note... there is no "d" in the word "Privilege"</description>
      <pubDate>Mon, 21 Feb 2011 23:02:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755720#M19403</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2011-02-21T23:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755721#M19404</link>
      <description>Thanks John for pointing out my poor typing skills.&lt;BR /&gt;&lt;BR /&gt;Does anyone know if its possible to allow a user to change the password of a restricted group of users. I'm thinking that I wouldnt want the user to change the system account, but would want him to be able to change our standard users.&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Tue, 22 Feb 2011 10:55:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755721#M19404</guid>
      <dc:creator>TMcB</dc:creator>
      <dc:date>2011-02-22T10:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755722#M19405</link>
      <description>TMcB,&lt;BR /&gt;&lt;BR /&gt;Yes. Check the process' rightslist and/or UIC. For example, Group leader (typically Member 1 of the group is permitted to reset members of their group). Alternatively, holders of an identifier (e.g., GROUPADMIN_nn) can reset passwords of users in UIC group [nn,*].&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Tue, 22 Feb 2011 11:26:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755722#M19405</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2011-02-22T11:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755723#M19406</link>
      <description>thanks Bob for being a big help</description>
      <pubDate>Tue, 22 Feb 2011 11:44:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755723#M19406</guid>
      <dc:creator>TMcB</dc:creator>
      <dc:date>2011-02-22T11:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: priviledge to reset password</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755724#M19407</link>
      <description>&amp;gt;Does anyone know if its possible to allow a user to change the password of a restricted group of users. I'm thinking that I wouldnt want the user to change the system account, but would want him to be able to change our standard users.&lt;BR /&gt;&lt;BR /&gt;SMOP.  Simple Matter of Programming.&lt;BR /&gt;&lt;BR /&gt;Without doing a little work within your tool?  No.  But it's a database.  So it's trivial to do this.  Your reset mechanism can be (and should be) coded to do this.  &lt;BR /&gt;&lt;BR /&gt;The NEWUSER tool I linked to does exactly this, exempting specific users (and also dealing with random folks that might try to reset the passwords of others), so you'll see code and processing in there to avoid having out-of-range users reset, or rogue user password reset requests.  (The reset implemented in that tool is self-service.  No help desk required.)&lt;BR /&gt;&lt;BR /&gt;If you're using external authentication via LDAP (via Open Directory or Active Directory LDAP servers or otherwise), you can likely perform an LDAP password reset on some other platform as there are tools for these tasks available, and avoid this whole matter.    (I use a Mac for this web-based password change, as the security APIs and available tools are vastly more capable than those of VMS.)&lt;BR /&gt;&lt;BR /&gt;I was unable to locate a registration and reset tool for that cluster, and ended up writing that NEWUSER code specifically because of the limits and omissions in VMS.&lt;BR /&gt;</description>
      <pubDate>Tue, 22 Feb 2011 14:43:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/priviledge-to-reset-password/m-p/4755724#M19407</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2011-02-22T14:43:00Z</dc:date>
    </item>
  </channel>
</rss>

