<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: user priviledges in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616267#M29343</link>
    <description>&amp;gt; UIC: [11,1]&lt;BR /&gt;&lt;BR /&gt;That looks like you are aware of the feature of the system parameter MAXSYSGROUP, aren't you? ;-)</description>
    <pubDate>Tue, 06 Sep 2005 09:59:31 GMT</pubDate>
    <dc:creator>Uwe Zessin</dc:creator>
    <dc:date>2005-09-06T09:59:31Z</dc:date>
    <item>
      <title>user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616243#M29319</link>
      <description>I am using the install utility to create known file entries, for my "C" applications, with enhanced privledges (bypass).&lt;BR /&gt;These applications are run by users who have minimal dollar-sign ($) priviledges. The applications are given&lt;BR /&gt;world execute protection so the users can run them. One of the applications that is run by minimal priviledged users&lt;BR /&gt;has system call sys$sndjbcw which completes with a good status. This system call runs a command file, with logging, which &lt;BR /&gt;runs an application. In the log created by this system call I get the following error:&lt;BR /&gt;&lt;BR /&gt;Error opening primary input file SYS$INPUT&lt;BR /&gt;Insufficient privilege or file protection violation&lt;BR /&gt;&lt;BR /&gt;and the command file quits.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I modified the priviledges for this minimalized user to have READALL as a default priviledge. Now, the command file runs&lt;BR /&gt;the application just fine and I get the following error at the beginning of the log file:&lt;BR /&gt;&lt;BR /&gt;%DCL-W-UNDFIL, file has not been opened by DCL - check logical name&lt;BR /&gt;&lt;BR /&gt;Can you tell me where this error is coming from and how to get rid of it?</description>
      <pubDate>Wed, 31 Aug 2005 15:33:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616243#M29319</guid>
      <dc:creator>Eric_369</dc:creator>
      <dc:date>2005-08-31T15:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616244#M29320</link>
      <description>Eric,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;"Error opening primary input file SYS$INPUT&lt;BR /&gt;Insufficient privilege or file protection violation"&lt;BR /&gt;&lt;BR /&gt;Be shure that this user can read the command procedure you submit with the sys$sndjbcw system service. Change the file protection not the user privileges.&lt;BR /&gt;&lt;BR /&gt;Bojan</description>
      <pubDate>Wed, 31 Aug 2005 15:42:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616244#M29320</guid>
      <dc:creator>Bojan Nemec</dc:creator>
      <dc:date>2005-08-31T15:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616245#M29321</link>
      <description>Sorry,&lt;BR /&gt;&lt;BR /&gt;I didnt ansawer to yours second question.&lt;BR /&gt;&lt;BR /&gt;Try to put a $ SET VERIFY at the beginning of the command procedure and see which command generates the error.&lt;BR /&gt;&lt;BR /&gt;And now I see that you are new to this forum so:&lt;BR /&gt;&lt;BR /&gt;Welcome to the VMS forum!&lt;BR /&gt;&lt;BR /&gt;Bojan</description>
      <pubDate>Wed, 31 Aug 2005 15:57:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616245#M29321</guid>
      <dc:creator>Bojan Nemec</dc:creator>
      <dc:date>2005-08-31T15:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616246#M29322</link>
      <description>Check file IO in the commandprocedurfe and be sure to have /ERROR=&lt;LABEL&gt; on each step. CLOSE of a file that is not opened by DCL may cause this problem as well: you can check the contents of logical to prevent the problem:&lt;BR /&gt;&lt;BR /&gt;$ OPEN/ERROR=No_infile IN &lt;FILESPEC&gt;&lt;BR /&gt;$! do your stuff&lt;BR /&gt;$! at end of process:&lt;BR /&gt;$ goto endjob&lt;BR /&gt;$!&lt;BR /&gt;$ No_Infile:&lt;BR /&gt;$! Just ean example!&lt;BR /&gt;$ S = $STATUS&lt;BR /&gt;$ write sys$output "Error opening file"&lt;BR /&gt;$!&lt;BR /&gt;$endjob:&lt;BR /&gt;$ IF F$TRNLNM("IN") .NES. "" then close IN&lt;BR /&gt;$ EXIT 'S' &lt;BR /&gt;&lt;BR /&gt;&lt;/FILESPEC&gt;&lt;/LABEL&gt;</description>
      <pubDate>Wed, 31 Aug 2005 16:13:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616246#M29322</guid>
      <dc:creator>Willem Grooters</dc:creator>
      <dc:date>2005-08-31T16:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616247#M29323</link>
      <description>Bojan,&lt;BR /&gt;   Thanks! I decreased the user priviledge and changed the command file protection and it worked great; however, the second error:&lt;BR /&gt;&lt;BR /&gt;%DCL-W-UNDFIL, file has not been opened by DCL - check logical name,&lt;BR /&gt;&lt;BR /&gt;appears before the "set verify" command in the command file, like so:&lt;BR /&gt;&lt;BR /&gt;%DCL-W-UNDFIL, file has not been opened by DCL - check logical name&lt;BR /&gt;$SET VERIFY&lt;BR /&gt;....&lt;BR /&gt;&lt;BR /&gt;Eric</description>
      <pubDate>Wed, 31 Aug 2005 16:28:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616247#M29323</guid>
      <dc:creator>Eric_369</dc:creator>
      <dc:date>2005-08-31T16:28:20Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616248#M29324</link>
      <description>Willem,&lt;BR /&gt;   In the following command snippet you posted do I use the name of my command procedure in the &lt;FILESPEC&gt; field?&lt;BR /&gt;&lt;BR /&gt;$ OPEN/ERROR=No_infile IN &lt;FILESPEC&gt;&lt;BR /&gt;$! do your stuff&lt;BR /&gt;$! at end of process:&lt;BR /&gt;$ goto endjob&lt;BR /&gt;$!&lt;BR /&gt;$ No_Infile:&lt;BR /&gt;$! Just ean example!&lt;BR /&gt;$ S = $STATUS&lt;BR /&gt;$ write sys$output "Error opening file"&lt;BR /&gt;$!&lt;BR /&gt;$endjob:&lt;BR /&gt;$ IF F$TRNLNM("IN") .NES. "" then close IN&lt;BR /&gt;$ EXIT 'S'&lt;BR /&gt;&lt;BR /&gt;&lt;/FILESPEC&gt;&lt;/FILESPEC&gt;</description>
      <pubDate>Wed, 31 Aug 2005 17:25:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616248#M29324</guid>
      <dc:creator>Eric_369</dc:creator>
      <dc:date>2005-08-31T17:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616249#M29325</link>
      <description>Sounds like maybe the process login.com or system sylogin.com may be trying to open or read a file that has not been opened yet.  Look through those and see if there is any files that abe being used.&lt;BR /&gt;&lt;BR /&gt;Phil</description>
      <pubDate>Wed, 31 Aug 2005 17:54:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616249#M29325</guid>
      <dc:creator>Phillip Thayer</dc:creator>
      <dc:date>2005-08-31T17:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616250#M29326</link>
      <description>Eric,&lt;BR /&gt;&lt;BR /&gt;Use the same technique with the sys$sylogin and the login procedure. Put set verify at the begining of this files. To avoid displaying on interactive terminals which can confuse normal users you can do a set verify only for batch jobs:&lt;BR /&gt;&lt;BR /&gt;$ IF F$MODE().EQS."BATCH" THEN SET VERIFY&lt;BR /&gt;&lt;BR /&gt;Bojan</description>
      <pubDate>Thu, 01 Sep 2005 01:27:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616250#M29326</guid>
      <dc:creator>Bojan Nemec</dc:creator>
      <dc:date>2005-09-01T01:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616251#M29327</link>
      <description>Eric,&lt;BR /&gt;nice to meet you.&lt;BR /&gt; &lt;BR /&gt;If you have V7.3 you can simply define&lt;BR /&gt;$ DEFINE/SYS SYLOGIN_VERIFY TRUE&lt;BR /&gt;After of this all login procedure have set verify enable. When you deass SYLOGIN_VERIFY, verify turn off. In this way you have no to modify command procedures.&lt;BR /&gt; &lt;BR /&gt;Antonio Vigliotti&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Sep 2005 04:07:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616251#M29327</guid>
      <dc:creator>Antoniov.</dc:creator>
      <dc:date>2005-09-01T04:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616252#M29328</link>
      <description>All,&lt;BR /&gt;   Thank you for welcoming me to this site. It is a site I've desired for a very long time. Your help was much appreciated and your comments led me to the solution of my problem. &lt;BR /&gt;&lt;BR /&gt;The problem was in my login.com file. There I had the following command:&lt;BR /&gt;&lt;BR /&gt;Write sys$output: f$time()&lt;BR /&gt;&lt;BR /&gt;I change it to:&lt;BR /&gt;&lt;BR /&gt;Write sys$output f$time() &lt;BR /&gt;&lt;BR /&gt;removing the colon after sys$output, and everything worked perfectly! &lt;BR /&gt;&lt;BR /&gt;   There was one thing I didn't understand. That login.com and sylogin.com were called when I run a batch job. Does this mean that when I run a batch job as a user that I am logging into the system again in "batch mode" to process the command file?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Sep 2005 12:24:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616252#M29328</guid>
      <dc:creator>Eric_369</dc:creator>
      <dc:date>2005-09-01T12:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616253#M29329</link>
      <description>Eric: Yes, when you run a batch job, you are logging in again in BATCH mode.&lt;BR /&gt;If you do work between clusters or non-clustered nodes, you logon in NETWORK mode.&lt;BR /&gt;Lawrence</description>
      <pubDate>Thu, 01 Sep 2005 12:51:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616253#M29329</guid>
      <dc:creator>Lawrence Czlapinski</dc:creator>
      <dc:date>2005-09-01T12:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616254#M29330</link>
      <description>BYPASS is a _very_ dangerous privilege.&lt;BR /&gt;&lt;BR /&gt;I hope you have properly written your program so that it only enables BYPASS when it really needs it.&lt;BR /&gt;&lt;BR /&gt;Imaging the following case:&lt;BR /&gt;- you programm sends some output to the terminal&lt;BR /&gt;- your 'unprivileged' user executes the following command&lt;BR /&gt;-- before (s)he runs you program&lt;BR /&gt;$ define sys$output sys$common:[sysexe]sysuaf.dat;0&lt;BR /&gt;&lt;BR /&gt;Guess what will happen?</description>
      <pubDate>Thu, 01 Sep 2005 13:05:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616254#M29330</guid>
      <dc:creator>Uwe Zessin</dc:creator>
      <dc:date>2005-09-01T13:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616255#M29331</link>
      <description>Uwe,&lt;BR /&gt;   I will consider this concern and look into it. The major safety measure is that the 'unpriviledged' user is logged into a captive account and has no '$' access. At no point in time does any program change sys$output. I imagine that it could be done from by a higher level user across a processes! Is this a possibility?&lt;BR /&gt;Eric</description>
      <pubDate>Thu, 01 Sep 2005 13:49:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616255#M29331</guid>
      <dc:creator>Eric_369</dc:creator>
      <dc:date>2005-09-01T13:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616256#M29332</link>
      <description>Yes, a captive account reduces the risk.&lt;BR /&gt;&lt;BR /&gt;It depends on the capability of these 'higher-level' users whether they can do any damage that way. Do they need access to those privileged programs, too? Can you block access from them?</description>
      <pubDate>Thu, 01 Sep 2005 14:08:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616256#M29332</guid>
      <dc:creator>Uwe Zessin</dc:creator>
      <dc:date>2005-09-01T14:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616257#M29333</link>
      <description>Uwe,&lt;BR /&gt;   A point that I'd forgotten about concerning the 'unpriviledged' user is that they don't have the priviledge of using the define command even if they could get to the dollar sign.&lt;BR /&gt;&lt;BR /&gt;  Second, there is only one user with priviledge enough to do what I suggested and that is the system administrator.&lt;BR /&gt;&lt;BR /&gt;Eric</description>
      <pubDate>Thu, 01 Sep 2005 16:10:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616257#M29333</guid>
      <dc:creator>Eric_369</dc:creator>
      <dc:date>2005-09-01T16:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616258#M29334</link>
      <description>Eric,&lt;BR /&gt;&lt;BR /&gt;&amp;gt; they don't have the priviledge of &lt;BR /&gt;&amp;gt;using the define command even if &lt;BR /&gt;&amp;gt;they could get to the dollar sign.&lt;BR /&gt;&lt;BR /&gt;  Nevertheless! When designing a program which will be installed with any privilege, it is still prudent to always disable any unnecessary privileges as the first executable statement in the program, then enable privileges immediately before they are required and disable them immediately afterward they are used.&lt;BR /&gt;&lt;BR /&gt;  If you're running V7.3 or higher, you can use INSTALL/AUTHPRIVILEGE=(BYPASS) to give the image the ability to enable BYPASS, but not have it enabled upon image activation. &lt;BR /&gt;&lt;BR /&gt;If at all possible, use this option instead of INSTALL/PRIVILEGE (but even then, being paranoid about this type of thing, I would STILL strongly recommend having a $SETPRV(NOALL,TMPMBX,NETMBX) as the first executable statement)&lt;BR /&gt;&lt;BR /&gt;  Furthermore, you should protect the image so it can only be executed by authorized users. WORLD EXECUTE is NOT good. Use an ACL to limit access to users holding a rights identifier.  &lt;BR /&gt;&lt;BR /&gt;  Although what you say may be true right now, you don't know if someone is going to add new users with different access rights to the system in future, nor do you know what changes may be made to the program. There are just too many possible ways exploit a privileged image.&lt;BR /&gt;&lt;BR /&gt;  All that said, it sounds like your application would be better implemented using a Project Directory (see OpenVMS Guide to System Security, Section 8.8.1.2.2 &lt;A href="http://h71000.www7.hp.com/doc/732FINAL/aa-q2hlg-te/00/00/78-con.html#projectaccountssettingup" target="_blank"&gt;http://h71000.www7.hp.com/doc/732FINAL/aa-q2hlg-te/00/00/78-con.html#projectaccountssettingup&lt;/A&gt; ), or as a "protected subsystem" &lt;A href="http://h71000.www7.hp.com/doc/732FINAL/aa-q2hlg-te/00/01/112-con.html#projectaccountsasprotectedsubsystems" target="_blank"&gt;http://h71000.www7.hp.com/doc/732FINAL/aa-q2hlg-te/00/01/112-con.html#projectaccountsasprotectedsubsystems&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Either of these mechanisms should give you the ability to create a far more precise solution in a much more secure manner, and without the inherent limitations of protected images.&lt;BR /&gt;&lt;BR /&gt;BYPASS and READALL are THERMONUCLEAR hammers. If you find yourself resorting to using them to solve relatively simple problems, you should see big red flags and LOUD alarm bells. Think "huge security hole waiting to be exploited". OpenVMS has a very rich variety of security control mechanisms, please use them to keep your system secure.</description>
      <pubDate>Thu, 01 Sep 2005 20:23:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616258#M29334</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2005-09-01T20:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616259#M29335</link>
      <description>Eric,&lt;BR /&gt;I might have misunderstood you, but the DEFINE command itself does not need a privilege. You can create logical names in your process and job logical name tables without additional privileges.</description>
      <pubDate>Fri, 02 Sep 2005 00:06:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616259#M29335</guid>
      <dc:creator>Uwe Zessin</dc:creator>
      <dc:date>2005-09-02T00:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616260#M29336</link>
      <description>Eric,&lt;BR /&gt;my working user has no priviledge and I daily work without any trouble. Just for system manteinance I have to use SYSTEM.&lt;BR /&gt; &lt;BR /&gt;Antonio Vigliotti&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Sep 2005 01:25:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616260#M29336</guid>
      <dc:creator>Antoniov.</dc:creator>
      <dc:date>2005-09-02T01:25:47Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616261#M29337</link>
      <description>Eric,&lt;BR /&gt;&lt;BR /&gt;The snipplet is just an example how I would do IO in a command procedure. &lt;FILESPEC&gt; is the file you open to process. At any point you can get the error you found when you access a file not opened when expected like on READ, WRITE or CLOSE.&lt;BR /&gt;That this would happen with SYS$OUTPUT is a strange thing anyway. &lt;BR /&gt;&lt;BR /&gt;I have to agree on the security issue, with all. BYPASS should NOT be used unless all other facilities fail.&lt;BR /&gt;IMHO a user environment should be such that no other privileges than normally granted (TMPMBX and NETMBX) are required. You can do so by setting up the right directory structures, protect them and all subsequent files by UIC, ACL or both. Use rights identifiers that can dynamicly be granted to users to access files they normally do not have to, at the moment they need that access.&lt;BR /&gt;There are just a few issues that require extra privileges, and then use John Gilling's suggestion to enable them just when needed and disable them afterwards.&lt;BR /&gt;&lt;BR /&gt;Willem&lt;BR /&gt;&lt;BR /&gt;&lt;/FILESPEC&gt;</description>
      <pubDate>Fri, 02 Sep 2005 02:28:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616261#M29337</guid>
      <dc:creator>Willem Grooters</dc:creator>
      <dc:date>2005-09-02T02:28:28Z</dc:date>
    </item>
    <item>
      <title>Re: user priviledges</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616262#M29338</link>
      <description>All,&lt;BR /&gt;   Thank you for the help. It is refreshing to be corrected and shown the pitfalls of a particular course of action. In this case using (BYPASS) priviledges on an executable. Instead of writing 3 or 4 replies I'll try to do it in just one, responding to each post.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Uwe wrote:&lt;BR /&gt;&amp;gt;&amp;gt;&lt;BR /&gt;Eric,&lt;BR /&gt;I might have misunderstood you, but the DEFINE command itself does not need a privilege. You can create logical names in your process and job logical name tables without additional privileges.&lt;BR /&gt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;BR /&gt;Uwe,&lt;BR /&gt;   I tried using the define command at the prompt for the 'unpriviledged' user and the system wouldn't let me do it. In order to get to the prompt I had to make the 'unpriviledged' user non-captive.&lt;BR /&gt;Eric&lt;BR /&gt;&lt;BR /&gt;Antonio wrote:&lt;BR /&gt;&amp;gt;&amp;gt;&lt;BR /&gt;Eric,&lt;BR /&gt;my working user has no priviledge and I daily work without any trouble. Just for system manteinance I have to use SYSTEM.&lt;BR /&gt;&lt;BR /&gt;Antonio Vigliotti&lt;BR /&gt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;BR /&gt;Antonio,&lt;BR /&gt;   This is goal I have in mind! All users will be 'unpriviledged.' Our support staff will be the only 'priviledged' or SYSTEM users.&lt;BR /&gt;Eric&lt;BR /&gt;&lt;BR /&gt;Willem wrote:&lt;BR /&gt;&amp;gt;&amp;gt;&lt;BR /&gt;Eric,&lt;BR /&gt;&lt;BR /&gt;The snipplet is just an example how I would do IO in a command procedure. &lt;FILESPEC&gt; is the file you open to process. At any point you can get the error you found when you access a file not opened when expected like on READ, WRITE or CLOSE.&lt;BR /&gt;That this would happen with SYS$OUTPUT is a strange thing anyway. &lt;BR /&gt;&lt;BR /&gt;I have to agree on the security issue, with all. BYPASS should NOT be used unless all other facilities fail.&lt;BR /&gt;IMHO a user environment should be such that no other privileges than normally granted (TMPMBX and NETMBX) are required. You can do so by setting up the right directory structures, protect them and all subsequent files by UIC, ACL or both. Use rights identifiers that can dynamicly be granted to users to access files they normally do not have to, at the moment they need that access.&lt;BR /&gt;There are just a few issues that require extra privileges, and then use John Gilling's suggestion to enable them just when needed and disable them afterwards.&lt;BR /&gt;&lt;BR /&gt;Willem&lt;BR /&gt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;BR /&gt;Willem,&lt;BR /&gt;   Now I understand what you were getting at with IO in a command procedure.&lt;BR /&gt;&lt;BR /&gt;The issue with sys$output was that instead of writing to (sys$output) in batch mode it was writing to (sys$output:) a device that doesn't exist. I guess putting a colon after sys$output made it unrecognizable as a device/file. &lt;BR /&gt;Concerning the (BYPASS) issue with my executables, you all have helped me see the error of my way!&lt;BR /&gt;Eric&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;John wrote:&lt;BR /&gt;&amp;gt;&amp;gt;&lt;BR /&gt;Eric,&lt;BR /&gt;&lt;BR /&gt;&amp;gt; they don't have the priviledge of &lt;BR /&gt;&amp;gt;using the define command even if &lt;BR /&gt;&amp;gt;they could get to the dollar sign.&lt;BR /&gt;&lt;BR /&gt;Nevertheless! When designing a program which will be installed with any privilege, it is still prudent to always disable any unnecessary privileges as the first executable statement in the program, then enable privileges immediately before they are required and disable them immediately afterward they are used.&lt;BR /&gt;&lt;BR /&gt;If you're running V7.3 or higher, you can use INSTALL/AUTHPRIVILEGE=(BYPASS) to give the image the ability to enable BYPASS, but not have it enabled upon image activation. &lt;BR /&gt;&lt;BR /&gt;If at all possible, use this option instead of INSTALL/PRIVILEGE (but even then, being paranoid about this type of thing, I would STILL strongly recommend having a $SETPRV(NOALL,TMPMBX,NETMBX) as the first executable statement)&lt;BR /&gt;&lt;BR /&gt;Furthermore, you should protect the image so it can only be executed by authorized users. WORLD EXECUTE is NOT good. Use an ACL to limit access to users holding a rights identifier. &lt;BR /&gt;&lt;BR /&gt;Although what you say may be true right now, you don't know if someone is going to add new users with different access rights to the system in future, nor do you know what changes may be made to the program. There are just too many possible ways exploit a privileged image.&lt;BR /&gt;&lt;BR /&gt;All that said, it sounds like your application would be better implemented using a Project Directory (see OpenVMS Guide to System Security, Section 8.8.1.2.2 &lt;A href="http://h71000.www7.hp.com/doc/732FINAL/aa-q2hlg-te/00/00/78-con.html#projectaccountssettingup" target="_blank"&gt;http://h71000.www7.hp.com/doc/732FINAL/aa-q2hlg-te/00/00/78-con.html#projectaccountssettingup&lt;/A&gt; ), or as a "protected subsystem" &lt;A href="http://h71000.www7.hp.com/doc/732FINAL/aa-q2hlg-te/00/01/112-con.html#projectaccountsasprotectedsubsystems" target="_blank"&gt;http://h71000.www7.hp.com/doc/732FINAL/aa-q2hlg-te/00/01/112-con.html#projectaccountsasprotectedsubsystems&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Either of these mechanisms should give you the ability to create a far more precise solution in a much more secure manner, and without the inherent limitations of protected images.&lt;BR /&gt;&lt;BR /&gt;BYPASS and READALL are THERMONUCLEAR hammers. If you find yourself resorting to using them to solve relatively simple problems, you should see big red flags and LOUD alarm bells. Think "huge security hole waiting to be exploited". OpenVMS has a very rich variety of security control mechanisms, please use them to keep your system secure.&lt;BR /&gt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;BR /&gt;John,&lt;BR /&gt;   Thank you for the advice and links to properly implementing security on my system.&lt;BR /&gt;Eric&lt;/FILESPEC&gt;</description>
      <pubDate>Fri, 02 Sep 2005 10:57:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/user-priviledges/m-p/3616262#M29338</guid>
      <dc:creator>Eric_369</dc:creator>
      <dc:date>2005-09-02T10:57:33Z</dc:date>
    </item>
  </channel>
</rss>

