<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strange intrusion behaviour in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/strange-intrusion-behaviour/m-p/3656887#M29393</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;1)As I understand it, LGI_HID_TIM gives the period for the Intruder state. So after the 60 seconds are reached the system probably returns the value 'suspect' to intrusion record. Try to watch it. You should see Intruder state some times. Or encrease LGI_HID_TIM.&lt;BR /&gt;2) There is for sure an logging sequence happening under the username *DECNET_TASK*. The connect request to a server as you've written (not to an object) probably causes it.&lt;BR /&gt;3)Suspect state shouldn't block nothing. It's defined by  LGI_BRK_TMO and it specifies the length of the failure monitoring&lt;BR /&gt;       period. This time increment is added to the suspect's expiration&lt;BR /&gt;       time each time a login failure occurs. Once the expiration period&lt;BR /&gt;       passes, prior failures are discarded, and the suspect is given a&lt;BR /&gt;       clean slate.&lt;BR /&gt;&lt;BR /&gt;Mike</description>
    <pubDate>Wed, 26 Oct 2005 05:11:03 GMT</pubDate>
    <dc:creator>Mike Reznak</dc:creator>
    <dc:date>2005-10-26T05:11:03Z</dc:date>
    <item>
      <title>Strange intrusion behaviour</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-intrusion-behaviour/m-p/3656886#M29392</link>
      <description>I have a program that tries to connect to a non-existing server, which is a decnet object.&lt;BR /&gt;Of course it fails but I get in operator log :&lt;BR /&gt;&lt;BR /&gt;%%%%%%%%%%%  OPCOM  23-OCT-2005 13:36:23.27  %%%%%%%%%%%&lt;BR /&gt;Message from user SYSTEM on SPVMX2&lt;BR /&gt;Event: Access Control Violation from: Node LOCAL:.SPVMX2 Session Control,&lt;BR /&gt;        at: 2005-10-23-13:36:23.273+02:00Iinf&lt;BR /&gt;        NSAP Address=49::00-14:AA-00-04-00-02-50:20,&lt;BR /&gt;        Source=UIC = [0,0]GIS_MAINT,&lt;BR /&gt;        Destination=name = FOE_FMI_SRV,&lt;BR /&gt;        Destination User="",&lt;BR /&gt;        Destination Account="",&lt;BR /&gt;        Node Name=LOCAL:.SPVMX2&lt;BR /&gt;        eventUid   008FD160-43CA-11DA-860F-AA0004000250&lt;BR /&gt;        entityUid  10953BB1-43B8-11DA-8372-AA0004000250&lt;BR /&gt;        streamUid  1FAE48D0-43B8-11DA-8501-AA0004000250&lt;BR /&gt;&lt;BR /&gt;In audit I get :&lt;BR /&gt;&lt;BR /&gt;Security audit (SECURITY) on SPVMX2, system id: 20482&lt;BR /&gt;Auditable event:          Network login failure&lt;BR /&gt;Event time:               23-OCT-2005 13:36:23.27&lt;BR /&gt;PID:                      2160021D&lt;BR /&gt;Process name:             NET$ACP&lt;BR /&gt;Username:                 *DECNET_TASK*&lt;BR /&gt;Remote node id:           490014AA000400025020&lt;BR /&gt;Remote node fullname:     LOCAL:.SPVMX2&lt;BR /&gt;Remote username:          GIS_MAINT&lt;BR /&gt;Status:                   %LOGIN-F-NOSUCHUSER, no such user&lt;BR /&gt;&lt;BR /&gt;The LGI params :&lt;BR /&gt;LGI_BRK_TERM                    0          1         0          1 Boolean    D&lt;BR /&gt;LGI_BRK_DISUSER                 0          0         0          1 Boolean    D&lt;BR /&gt;LGI_PWD_TMO                    30         30         0        255 Seconds    D&lt;BR /&gt;LGI_RETRY_LIM                   3          3         0        255 Tries      D&lt;BR /&gt;LGI_RETRY_TMO                  20         20         2        255 Seconds    D&lt;BR /&gt;LGI_BRK_LIM                     6          5         1        255 Failures   D&lt;BR /&gt;LGI_BRK_TMO                   600        300         0    5184000 Seconds    D&lt;BR /&gt;LGI_HID_TIM                    60        300         0 1261440000 Seconds    D&lt;BR /&gt;LGI_CALLOUTS                    0          0         0        255 Count      D&lt;BR /&gt;&lt;BR /&gt;The violation is repeated a lot of times and when I do show intrus I got a suspect intrusion with more than 120 violations in 1 hour (uptime). This while I was expecting an real intruder.&lt;BR /&gt;&lt;BR /&gt;1) Why no intruder ?&lt;BR /&gt;2) Why is a non-existing ncl object leading to intrusion (if I do the same with type x::77=yyy" I don't get a violation but simply network object unknown) ?&lt;BR /&gt;2) Is it possible that a suspect intruder blocks something ?&lt;BR /&gt;&lt;BR /&gt;Wim&lt;BR /&gt;Wim</description>
      <pubDate>Tue, 25 Oct 2005 06:58:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-intrusion-behaviour/m-p/3656886#M29392</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2005-10-25T06:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: Strange intrusion behaviour</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-intrusion-behaviour/m-p/3656887#M29393</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;1)As I understand it, LGI_HID_TIM gives the period for the Intruder state. So after the 60 seconds are reached the system probably returns the value 'suspect' to intrusion record. Try to watch it. You should see Intruder state some times. Or encrease LGI_HID_TIM.&lt;BR /&gt;2) There is for sure an logging sequence happening under the username *DECNET_TASK*. The connect request to a server as you've written (not to an object) probably causes it.&lt;BR /&gt;3)Suspect state shouldn't block nothing. It's defined by  LGI_BRK_TMO and it specifies the length of the failure monitoring&lt;BR /&gt;       period. This time increment is added to the suspect's expiration&lt;BR /&gt;       time each time a login failure occurs. Once the expiration period&lt;BR /&gt;       passes, prior failures are discarded, and the suspect is given a&lt;BR /&gt;       clean slate.&lt;BR /&gt;&lt;BR /&gt;Mike</description>
      <pubDate>Wed, 26 Oct 2005 05:11:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-intrusion-behaviour/m-p/3656887#M29393</guid>
      <dc:creator>Mike Reznak</dc:creator>
      <dc:date>2005-10-26T05:11:03Z</dc:date>
    </item>
  </channel>
</rss>

