<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security check in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938949#M30133</link>
    <description>There are various documents to this end including the list in the appendix of the OpenVMS security manual, though I am not aware of a freeware tool that would review security.&lt;BR /&gt;&lt;BR /&gt;The DIGITAL-era (commercial) tool to this end (eons ago) was DECinspect.&lt;BR /&gt;&lt;BR /&gt;From long experience with DECinspect, better security is not without cost.  DECinspect could render a system unusable, if you blindly invoked the DECinspect-generated lockdown script.  If your environment did not meet the DECinspect profile and expectations, you might find yourself running with heavy privileges enabled to get anything done.  Hardly the intended result of a lockdown.  (And this "fun" was arising from a local implementation and a local profile definition for DECinspect.  I'd be very surprised if a generic profile would work acceptably.)&lt;BR /&gt;&lt;BR /&gt;I do have various tools and DCL procedures I use, and various procedures.  The process and the techniques I use do not lend themselves to DCL and to generic DCL or application automation -- some of the more obvious parts do automate, but not the key parts of the process.  The key pieces of the security review are inherently site-specific.&lt;BR /&gt;&lt;BR /&gt;I've a blog entry or two on this topic queued for the HL whole-site reboot and reload.&lt;BR /&gt;&lt;BR /&gt;Stephen Hoffman&lt;BR /&gt;HoffmanLabs&lt;BR /&gt;</description>
    <pubDate>Tue, 06 Feb 2007 09:46:44 GMT</pubDate>
    <dc:creator>Hoff</dc:creator>
    <dc:date>2007-02-06T09:46:44Z</dc:date>
    <item>
      <title>Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938947#M30131</link>
      <description>VMS is one of the most secure OS.&lt;BR /&gt;&lt;BR /&gt;But is there a freeware script available that will report all security holes ? Such as world writeable files &amp;amp; mailboxes, unprotected accounts, unprotected SSH files, etc ?&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Tue, 06 Feb 2007 02:43:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938947#M30131</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2007-02-06T02:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938948#M30132</link>
      <description>There are commercial products which do security reports&lt;BR /&gt;e.g from &lt;BR /&gt;&lt;A href="http://www.pointsecure.com/" target="_blank"&gt;http://www.pointsecure.com/&lt;/A&gt; &lt;BR /&gt;and from&lt;BR /&gt;&lt;A href="http://www.ljk.com/ljk/ljk_security.html" target="_blank"&gt;http://www.ljk.com/ljk/ljk_security.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Where they report all security holes is a matter of opinion. &lt;BR /&gt;&lt;BR /&gt;I'm not aware of any freeware scripts - fee free to write one and release it :-)</description>
      <pubDate>Tue, 06 Feb 2007 05:12:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938948#M30132</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2007-02-06T05:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938949#M30133</link>
      <description>There are various documents to this end including the list in the appendix of the OpenVMS security manual, though I am not aware of a freeware tool that would review security.&lt;BR /&gt;&lt;BR /&gt;The DIGITAL-era (commercial) tool to this end (eons ago) was DECinspect.&lt;BR /&gt;&lt;BR /&gt;From long experience with DECinspect, better security is not without cost.  DECinspect could render a system unusable, if you blindly invoked the DECinspect-generated lockdown script.  If your environment did not meet the DECinspect profile and expectations, you might find yourself running with heavy privileges enabled to get anything done.  Hardly the intended result of a lockdown.  (And this "fun" was arising from a local implementation and a local profile definition for DECinspect.  I'd be very surprised if a generic profile would work acceptably.)&lt;BR /&gt;&lt;BR /&gt;I do have various tools and DCL procedures I use, and various procedures.  The process and the techniques I use do not lend themselves to DCL and to generic DCL or application automation -- some of the more obvious parts do automate, but not the key parts of the process.  The key pieces of the security review are inherently site-specific.&lt;BR /&gt;&lt;BR /&gt;I've a blog entry or two on this topic queued for the HL whole-site reboot and reload.&lt;BR /&gt;&lt;BR /&gt;Stephen Hoffman&lt;BR /&gt;HoffmanLabs&lt;BR /&gt;</description>
      <pubDate>Tue, 06 Feb 2007 09:46:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938949#M30133</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2007-02-06T09:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938950#M30134</link>
      <description>There was a check_system.com for a famous worm (in the '80).&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Tue, 06 Feb 2007 09:56:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938950#M30134</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2007-02-06T09:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938951#M30135</link>
      <description>A lot of what is required can be checked by program but also a lot is checking procedures - is there a procedure for dealing with usernames after a user has left - a common hole.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 06 Feb 2007 16:39:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938951#M30135</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2007-02-06T16:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938952#M30136</link>
      <description>Inspect still exists, it is owned by Touch Technologies now;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.ttinet.com/products.html" target="_blank"&gt;http://www.ttinet.com/products.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt; Although this is obviously not freeware.</description>
      <pubDate>Tue, 06 Feb 2007 18:19:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938952#M30136</guid>
      <dc:creator>Martin Hughes</dc:creator>
      <dc:date>2007-02-06T18:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938953#M30137</link>
      <description>This is by no means an accurate or complete program.  It has many bugs in it.  But if you had access to DISA.GOV, you might be able to find OPENVMS-SRR-V2R2 as one way to examine system security.&lt;BR /&gt;&lt;BR /&gt;I eventually took its ideas and home-grew something to implement the spirit but not the letter of the DISA checks.  The problem was that the guy who wrote the SRR program was clearly not a speaker of VMS as a first language.  But I got enough ideas that I can say it was a useful exercise.&lt;BR /&gt;&lt;BR /&gt;You might find a "public" copy if you searched the web for "System Readiness Report" (which is what SRR means) to see what crops up.  Unfortunately, I am not allowed to post my version because it contains some government-specific tests.  No, it doesn't matter to me - but my government point of contact goes into near apoplexy if I mention "posting code" on any forum.  (One of these days that SOB will tick me off enough that it will be worth it to watch him choke...)&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Dec 2007 17:32:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938953#M30137</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2007-12-11T17:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938954#M30138</link>
      <description>I have the links over to the SRR and related security review materials posted at the web site.&lt;BR /&gt;&lt;BR /&gt;Stephen Hoffman&lt;BR /&gt;HoffmanLabs LLC</description>
      <pubDate>Tue, 11 Dec 2007 19:29:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938954#M30138</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2007-12-11T19:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938955#M30139</link>
      <description>I found that also. But there were many errors in it : syntax like f$parse with dir instead of directory, functional like unprotected mailboxes.&lt;BR /&gt;&lt;BR /&gt;I'm currently correcting it and will post it over here, if I'm satisfied with the results.&lt;BR /&gt;&lt;BR /&gt;But most stuff reported is very normal over here. E.g. group users have the same access as the owner of a file (thus rwed) and the script reports this as an error.&lt;BR /&gt;&lt;BR /&gt;And what is the use of reporting all files with acl's ?&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Wed, 12 Dec 2007 07:10:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938955#M30139</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2007-12-12T07:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938956#M30140</link>
      <description>[quote]&lt;BR /&gt;E.g. group users have the same access as the owner of a file (thus rwed) and the script reports this as an error.&lt;BR /&gt;[/quote]&lt;BR /&gt;&lt;BR /&gt;This might be very valid - it depends on what security base the check-tool is based on. If that disallows G:RWED, it's obvious you get a "Not Ok". Same applies to ACL checking. IMHO, that should be covered as well, but again, if the standard on which the tool is based has no clue about ACL, don't expect it to be checked, or partly, and certainly not what fits your organization.&lt;BR /&gt;&lt;BR /&gt;If you require a security audit, I would first determine what standard is used and what exceptions can be tolerated and why (and in what context), and have that agreed by the auditor. Then run tests with multiple tools that are based on that standard.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Dec 2007 07:07:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938956#M30140</guid>
      <dc:creator>Willem Grooters</dc:creator>
      <dc:date>2007-12-13T07:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938957#M30141</link>
      <description>SRR is actually a port of a Windows program for the similar purpose as the OpenVMS SRR.&lt;BR /&gt;&lt;BR /&gt;I found the posted version of SRR had not less than 6 "open" GOTOs and a bunch of other errors.  I used it as a springboard, not gospel.&lt;BR /&gt;&lt;BR /&gt;One of the things I discovered when playing with SRR is that it also wants to compare this run to the previous run to see what changed.  I do that another way so didn't try to implement it.&lt;BR /&gt;&lt;BR /&gt;The things that look crazy in SRR, however, make sense if you realize just how many places there are to consider in a government office, where they want reports by weight.&lt;BR /&gt;&lt;BR /&gt;Conceptually, scripting a security check doesn't always find "bugs" in code - it finds the OTHER kind of problem, which is that the user directory or system directory doesn't have adequate protection to prevent twiddlers from twiddling.&lt;BR /&gt;&lt;BR /&gt;In that vein, it is less that you have or do not have an ACL on a file - it is that you KNOW you have an ACL on a file.  Since SRR is a government program, it sometimes seems like it does trivial things, and I'm the first to say that even after 20 years, I don't always understand what they do.  But the idea is that you look for access paths to files, of which an ACL is one such path.&lt;BR /&gt;&lt;BR /&gt;So play on with your SRR copy, but just be aware that its tests are to Dept. of Defense standards, not necessarily to commercial standards.  If you are still interested in some alternative tests, keep posting and I'll keep answering.&lt;BR /&gt;</description>
      <pubDate>Mon, 28 Jan 2008 18:22:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938957#M30141</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2008-01-28T18:22:11Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938958#M30142</link>
      <description>Richard,&lt;BR /&gt;&lt;BR /&gt;I stopped my trial to improve the script. It is checking some security holes but there are a million ways to get round it. Also : lots of stuff isn't checked at all.&lt;BR /&gt;&lt;BR /&gt;I think Societe General used it ...&lt;BR /&gt;to make some auditor happy.&lt;BR /&gt;&lt;BR /&gt;We passed the sox tests ... mainly in WORD and some stuppid tests. Not by securing the VMS nodes.&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Tue, 29 Jan 2008 07:07:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938958#M30142</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2008-01-29T07:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: Security check</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938959#M30143</link>
      <description>I wish that I could stop running SRR, but I work at a government site that actually requires it because of uniformity of reporting across all platforms.&lt;BR /&gt;&lt;BR /&gt;The SRR is a sort of "internal" security check to go along with an "external" check looking for open ports on your network, etc.  The only way to look for "real" security holes is to keep up with the VMS patches and such.&lt;BR /&gt;&lt;BR /&gt;I could lecture on the subject (and in fact used to do so for my site), but I'll spare you the pain.&lt;BR /&gt;&lt;BR /&gt;SRR's purpose is to look for opportunities for an internal attack by an authorized user who wants to look at something s/he isn't supposed to be able to see.  &lt;BR /&gt;&lt;BR /&gt;SRR won't tell you that you are patched to proper level; it won't tell you whether you have a keylogger on a proxy server, firewall, or router; it won't tell you if you have a man-in-the-middle attack.  It is actually a piece of junk as written.  But if you are on a government site facing issues with FIPS-140-2, it is one way of keeping the wolves off your back by SHOWING them you have controls in place that meet DISA standards.&lt;BR /&gt;&lt;BR /&gt;The only reason I mentioned it is that it is a security evaluation program that is available for free if you wanted such a thing.  I'll back out of the discussion unless I see a specific question.&lt;BR /&gt;</description>
      <pubDate>Wed, 30 Jan 2008 19:27:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-check/m-p/3938959#M30143</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2008-01-30T19:27:34Z</dc:date>
    </item>
  </channel>
</rss>

