<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detecing someone used /NOCOMMAND upon login in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871295#M20321</link>
    <description>Wim,&lt;BR /&gt;&lt;BR /&gt;cf documentation that flag prevents choosing another CLI, but there is nothing about choosing another (or no) /COMM procedure! Have you tested it? Under 7.3-2 I can still use /NOCOMM with /FLAG=DEFCLI !&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Cheers.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;Jan</description>
    <pubDate>Fri, 19 Nov 2004 02:39:08 GMT</pubDate>
    <dc:creator>Jan van den Ende</dc:creator>
    <dc:date>2004-11-19T02:39:08Z</dc:date>
    <item>
      <title>Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871288#M20314</link>
      <description>Hi,&lt;BR /&gt;    Does anyone know of a way of detecting that a interactive process used the /NOCOMM qualifier to login (so that their personal LGICMD doesn't run), such as:&lt;BR /&gt;Username: USER/NOCOMMAND&lt;BR /&gt;     Ideally, I would like to check for this in SYS$SYLOGIN with DCL, but a method to check other processes for this, such as using SDA would be very useful, as well.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Dave</description>
      <pubDate>Thu, 18 Nov 2004 16:11:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871288#M20314</guid>
      <dc:creator>Dave Lennon</dc:creator>
      <dc:date>2004-11-18T16:11:26Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871289#M20315</link>
      <description>Dave, &lt;BR /&gt;1. You can prevent changing of defaults for /disk /command or /lgicmd by setting /flags=restricted in AUTHORIZE.&lt;BR /&gt;2. Don't know of a way that you could detect someone using /NOCOMMAND.&lt;BR /&gt;Lawrence</description>
      <pubDate>Thu, 18 Nov 2004 16:42:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871289#M20315</guid>
      <dc:creator>Lawrence Czlapinski</dc:creator>
      <dc:date>2004-11-18T16:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871290#M20316</link>
      <description>If you have IMAGE enabled in accounting and the user login executes a specific image or a specific pattern of images, you would see that in the accounting report. i.e:&lt;BR /&gt;&lt;BR /&gt;... LOGINOUT....username&lt;BR /&gt;... SET.........username&lt;BR /&gt;... APPINIT.....username&lt;BR /&gt;&lt;BR /&gt;So, if you don't see your pattern, the user didn't execute the login.&lt;BR /&gt;&lt;BR /&gt;The sys$manager:accountng.dat file can get big real fast on an active system, though. &lt;BR /&gt;&lt;BR /&gt;  Doug&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Nov 2004 17:29:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871290#M20316</guid>
      <dc:creator>Doug Phillips</dc:creator>
      <dc:date>2004-11-18T17:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871291#M20317</link>
      <description>individual images can be installed with accounting enabled. audit ACE can also be used but the problem is you would be looking for the absence of accessing a file.&lt;BR /&gt;&lt;BR /&gt;What is the real problem you are trying to solve?</description>
      <pubDate>Thu, 18 Nov 2004 17:47:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871291#M20317</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2004-11-18T17:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871292#M20318</link>
      <description>Dave,&lt;BR /&gt;&lt;BR /&gt;  Tricky question! I *think* this is correct, but haven't been able to positively confirm it. It's also totally unsupported, so don't rely on it! &lt;BR /&gt;&lt;BR /&gt;  The field PPD$B_NPROCS in the Process Permanent Data (PPD) area is a count of the number of procedures to be executed during login. It includes SYLOGIN and LGICMD. &lt;BR /&gt;&lt;BR /&gt;  For a "normal" process the value of this byte will be 2, one that logged in with /NOCOMMAND will be 1.&lt;BR /&gt; &lt;BR /&gt;  From SDA, you can check this with:&lt;BR /&gt;&lt;BR /&gt;SDA&amp;gt; SET PROCESS/INDEX=&lt;INDEX of="" target=""&gt;&lt;BR /&gt;SDA&amp;gt; EXAMINE CTL$AG_CLIDATA+1C&lt;BR /&gt;&lt;BR /&gt;  Look at the low byte of the longword. I haven't been able to find a place that PPD$B_NPROCS is defined in a distribution. The magic number for V7.2 and V7.3 is 28 (%X1C)&lt;BR /&gt;&lt;BR /&gt;  HOWEVER, note that you can't tell if they logged in with /COMMAND=some-other-file , *including* /COMMAND=NL: (which is exactly equivalent to /NOCOMMAND). So I guess it depends on how clever your users are!&lt;BR /&gt;&lt;BR /&gt;  From DCL we need to get into even deeper hackery. You can do this for the CURRENT process only. Also this is STRICTLY unsupported DCL hackery, so don't complain if it doesn't work, and don't use it in any critical code. No guarantees that it will work, or if it does, that it will continue to do so.&lt;BR /&gt;&lt;BR /&gt;  Step 1: This is VERSION DEPENDENT&lt;BR /&gt;&lt;BR /&gt;Find the value of CTL$AG_CLIDATA for your specific version of OpenVMS (this one is for V7.3-2)&lt;BR /&gt;&lt;BR /&gt;$ ANALYZE/SYSTEM&lt;BR /&gt;SDA&amp;gt; EVALUATE CTL$AG_CLIDATA&lt;BR /&gt;Hex = 00000000.7FFCDA60 Decimal = 214727740 CTL$AG_CLIDATA&lt;BR /&gt;&lt;BR /&gt;  Step 2: Store the value in a symbol&lt;BR /&gt;&lt;BR /&gt;$ CTL$AG_CLIDATA = %X7FFCDA60&lt;BR /&gt;&lt;BR /&gt;  Now read the byte at offset 28 from that address:&lt;BR /&gt;&lt;BR /&gt;$ DDP$B_PROCS=F$CVUI(0,8,-&lt;BR /&gt;    F$FAO("!AD",1,CTL$AG_CLIDATA+28))&lt;BR /&gt;&lt;BR /&gt;  Symbol DDP$B_PROCS will be 1 is the process logged in with /NOPROCESS&lt;BR /&gt;&lt;BR /&gt;&lt;/INDEX&gt;</description>
      <pubDate>Thu, 18 Nov 2004 21:28:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871292#M20318</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2004-11-18T21:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871293#M20319</link>
      <description>Dave,&lt;BR /&gt;&lt;BR /&gt;  Aha! &lt;BR /&gt;&lt;BR /&gt;  Again unsupported, but perhaps a bit less so than hacking around in PPD structures. Much simpler, and version independent...&lt;BR /&gt;&lt;BR /&gt;  Login procedures are implemented by faking out the procedure call stack. When LOGINOUT exits, DCL "returns" to the first line in SYLOGIN and it appears that SYLOGIN was called from LGICMD, so when SYLOGIN exits, it returns to the first line of LGICMD (the mechanism is actually generic, so there could be many more procedures executed at login).&lt;BR /&gt;&lt;BR /&gt;  What this means is F$ENVIRONMENT("DEPTH") from SYLOGIN will tell you if there is an LGICMD to be executed.&lt;BR /&gt;&lt;BR /&gt;  If the user logs in with /NOCOMMAND, F$ENVIRONMENT("DEPTH") will be 1 from SYLOGIN. Otherwise it will be 2.&lt;BR /&gt;&lt;BR /&gt;  Same caveat as with PPD$B_NPROCS - we can't tell if the user logged in with /COMMAND=NL: or /COMMAND=other-proc&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;  Back to hacking... here's some version dependent code that will traverse the DCL call stack. Executing this from SYLOGIN will find the name of LGICMD derived either from the UAF, or from the login /COMMAND qualifier.&lt;BR /&gt;&lt;BR /&gt;  Check values of the symbols in SDA, procedure assumes V7.3-2 (beware of wrapping)&lt;BR /&gt;&lt;BR /&gt;SDA&amp;gt; READ DCLDEF&lt;BR /&gt;SDA&amp;gt; EVAL CTL$AG_CLIDATA&lt;BR /&gt;etc...&lt;BR /&gt;&lt;BR /&gt;$  ctl$ag_clidata =  %x7FFCDA60   ! From SYS.STB&lt;BR /&gt;$  ppd$l_prc      =  %x00000008   ! From DCLDEF.STB&lt;BR /&gt;$  idf_l_lnk      =  %x00000000   ! From DCLDEF.STB&lt;BR /&gt;$  idf_l_filename =  %x00000068   ! From DCLDEF.STB&lt;BR /&gt;$  prc_l_idflnk   =  %x000000BC   ! From DCLDEF.STB&lt;BR /&gt;$  prc =  f$cvui(0,32,f$fao("!AD",4,ctl$ag_clidata+ppd$l_prc))&lt;BR /&gt;$  idf =  f$cvui(0,32,f$fao("!AD",4,prc+prc_l_idflnk))&lt;BR /&gt;$  lev =  f$environment("depth")&lt;BR /&gt;$  next:&lt;BR /&gt;$     if idf .eq. 0 then exit&lt;BR /&gt;$     write sys$output -&lt;BR /&gt;       f$fao(" !2UL !AC",lev,-&lt;BR /&gt;             f$cvui(0,32,f$fao("!AD",4,idf+idf_l_filename)))&lt;BR /&gt;$     idf =  f$cvui(0,32,f$fao("!AD",4,idf+idf_l_lnk))&lt;BR /&gt;$     lev = lev - 1&lt;BR /&gt;$  goto next  &lt;BR /&gt;</description>
      <pubDate>Thu, 18 Nov 2004 22:08:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871293#M20319</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2004-11-18T22:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871294#M20320</link>
      <description>There is also a flag called DEFCLI that does less than RESTRICTED (e.g. control Y is not changed).&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Fri, 19 Nov 2004 02:15:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871294#M20320</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2004-11-19T02:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871295#M20321</link>
      <description>Wim,&lt;BR /&gt;&lt;BR /&gt;cf documentation that flag prevents choosing another CLI, but there is nothing about choosing another (or no) /COMM procedure! Have you tested it? Under 7.3-2 I can still use /NOCOMM with /FLAG=DEFCLI !&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Cheers.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;Jan</description>
      <pubDate>Fri, 19 Nov 2004 02:39:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871295#M20321</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2004-11-19T02:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871296#M20322</link>
      <description>John,&lt;BR /&gt;&lt;BR /&gt;is there a specific reason for the F$FAO documentation (up to and including V7.3-2) to specify that &lt;BR /&gt;"Two types of directives that are supported by $FAO system service are &amp;gt;&amp;gt;&amp;gt;&amp;gt; NOT &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; supported by the DCL F$FAO lexical function:&lt;BR /&gt;.&lt;BR /&gt;.&lt;BR /&gt;.&lt;BR /&gt;String directive other than the !AS directive ...."&lt;BR /&gt;&lt;BR /&gt;where very obvious !AC and !AD are functioning?&lt;BR /&gt;Surely you did not mean THAT part of the procedure to be unsupported?&lt;BR /&gt;&lt;BR /&gt;Perhaps a need for a DOC update?&lt;BR /&gt;&lt;BR /&gt;Cheers.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;Jan&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Nov 2004 02:57:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871296#M20322</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2004-11-19T02:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871297#M20323</link>
      <description>Jan,&lt;BR /&gt;&lt;BR /&gt;You're right. It's doing a lot less (why was it invented ?). But the tricky thing of RESTRICTED is that they disabled control_Y together with /command /disk and /cli. And if you are not the owner of the login.com file you can not simply re-enable it.&lt;BR /&gt;&lt;BR /&gt;Have a Duvel on me (but not during working hours)&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Fri, 19 Nov 2004 03:35:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871297#M20323</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2004-11-19T03:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871298#M20324</link>
      <description>In my black book (VMS Internals 5.2, p799) I read that there also exists DEC/Shell and CSHELL.&lt;BR /&gt;&lt;BR /&gt;Does anyone knows where they live ?&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Fri, 19 Nov 2004 03:38:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871298#M20324</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2004-11-19T03:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871299#M20325</link>
      <description>Wim - those other CLIs where part of the POSIX layered product and long since expired.&lt;BR /&gt;&lt;BR /&gt;John G - that's the sort of fun answer to encourage me to go and play :-) I expect you've been reading the listings again.</description>
      <pubDate>Fri, 19 Nov 2004 04:52:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871299#M20325</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2004-11-19T04:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871300#M20326</link>
      <description>Ian, Posix in 5.2 ?</description>
      <pubDate>Fri, 19 Nov 2004 04:56:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871300#M20326</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2004-11-19T04:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871301#M20327</link>
      <description>Does anyone remember when VMS became Open ?&lt;BR /&gt;&lt;BR /&gt;Was it when POSIX was added ?&lt;BR /&gt;&lt;BR /&gt;As POSIX is no longer supported, shouldn't it be ClosedVMS or VMS again ?&lt;BR /&gt;&lt;BR /&gt;What was the last 4.x version ?&lt;BR /&gt;&lt;BR /&gt;In any case, my 5.2 book is not called OpenVMS but VAX/VMS.&lt;BR /&gt;&lt;BR /&gt;Wim (confused and having memory faults on memories that have been unused for 15 years)&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Nov 2004 05:20:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871301#M20327</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2004-11-19T05:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871302#M20328</link>
      <description>Wim,&lt;BR /&gt;&lt;BR /&gt;first (visible) pieces of Posix added 5.4-2&lt;BR /&gt;renamed to OpenVMS 5.4-3&lt;BR /&gt;Last V4.x V4.7-A  (or V4.7-H1), not sure which was later, nor if there have been other -H 's)&lt;BR /&gt;And V5.2 definitely was VMS, not OpenVMS&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;Not sure yet about Duvel, I may get into (wheat-) Bokbier tonight.&lt;BR /&gt;&lt;BR /&gt;Try one of those on me.&lt;BR /&gt;&lt;BR /&gt;Cheers.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Fri, 19 Nov 2004 07:45:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871302#M20328</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2004-11-19T07:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: Detecing someone used /NOCOMMAND upon login</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871303#M20329</link>
      <description>Thanks to John Gillings! That was exactly what I was looking for (and more).</description>
      <pubDate>Fri, 19 Nov 2004 11:10:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/detecing-someone-used-nocommand-upon-login/m-p/4871303#M20329</guid>
      <dc:creator>Dave Lennon</dc:creator>
      <dc:date>2004-11-19T11:10:37Z</dc:date>
    </item>
  </channel>
</rss>

