<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Encrypt/Create and group in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242279#M30285</link>
    <description>So you're off with a quest for system integrity?  Ok.  That's not typically implemented with symmetric encryption on any platform; that's more commonly implemented (as with OpenVMS and its password storage) with a one-way hash.&lt;BR /&gt;&lt;BR /&gt;Depending on the skills of your attacker and your OpenVMS version, the default CHECKSUM command can be applied, or (better) MD5 or (best) SHA.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/647" target="_blank"&gt;http://64.223.189.234/node/647&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/832" target="_blank"&gt;http://64.223.189.234/node/832&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I'll post up some other stuff at that site later today.&lt;BR /&gt;&lt;BR /&gt;There are pre-built versions of MD5 around (there's a known wrinkle here with building on VAX; you have to disable one of the compiler options due to a permanent restriction in the compiler's code generator) on the Freeware, gpg and openssl dgst (part of recent OpenVMS) and other such tools include signature capabilities.&lt;BR /&gt;&lt;BR /&gt;Suggestion: don't ask point questions for these.  Or if you're going to ask point questions on specific commands, consider providing some background on why.&lt;BR /&gt;</description>
    <pubDate>Tue, 29 Jul 2008 17:24:39 GMT</pubDate>
    <dc:creator>Hoff</dc:creator>
    <dc:date>2008-07-29T17:24:39Z</dc:date>
    <item>
      <title>Encrypt/Create and group</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242276#M30282</link>
      <description>I'd like to create a key for the Encryption utiltiy, but restrict it to the System group ([1,*]).  I want to easily create this after any system reboot, but of course don't want to put my passphrase into a script file.&lt;BR /&gt;&lt;BR /&gt;My first thought was to issue a $ SET UIC [1,4] then run the $ ENCRYPT/CREATE/GROUP, but this failed -- the key was created in my own UIC's group, not [1,*].&lt;BR /&gt;&lt;BR /&gt;So now I'm thinking about creating a small script that will accept the passphrase as input, the RUN/DETACH/UIC=[1,4] with the passphrase in a temporary input file, then immediately DELETE/ERASE that input file.  There's more exposure doing this, as I'll be writing the passphrase to the disk temporarily, whereas the other option would not.&lt;BR /&gt;&lt;BR /&gt;But, are there any other options I've not considered?  Any other ideas on how to easily and securely create a key in a group that I'm not a member of?  (It would be cool if /GROUP was /GROUP{=[UIC]} and required CMKRNL, but it's not.)&lt;BR /&gt;&lt;BR /&gt;TIA,&lt;BR /&gt;Aaron</description>
      <pubDate>Tue, 29 Jul 2008 14:58:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242276#M30282</guid>
      <dc:creator>Aaron Sakovich</dc:creator>
      <dc:date>2008-07-29T14:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypt/Create and group</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242277#M30283</link>
      <description>Please forget you ever heard about or knew of SET UIC.  That command never worked right.  If you want to do that sort of across-UIC thing, use RUN /UIC or SUBMIT /USER.  &lt;BR /&gt;&lt;BR /&gt;As for RUN, pick either RUN /DETACH or RUN /UIC.  Not both.  The former is a detached process under your UIC.  The latter is a detached process under the specified UIC.&lt;BR /&gt;&lt;BR /&gt;I might punt the whole of the existing encryption support and pick something better; what's there (DES and AES) works, but you have to deal with and secure keys whenever you pick symmetric encryption.&lt;BR /&gt;&lt;BR /&gt;Public key encryption (PKE) can potentially be useful here.  (There are multiple gpg ports around; the HP gpg port seems a little unstable, but there are others around.)&lt;BR /&gt;&lt;BR /&gt;Though yes, there's the question of integration; there's the level of DCL integration provided by the existing ENCRYPTION for OpenVMS product (or the V8.3 and later integration of same).  (I don't know off-hand if anyone has stuffed PKE into the encryption layer.  I'd hope it's at least planned, as symmetric encryption is far from the only game in town.)&lt;BR /&gt;&lt;BR /&gt;As for passing the key around, it's intended to be entered by a human.  If you're automating that and using a file or a mailbox or such, lock it all down to the best of your ability and then worry about something else; you're already risking your key.  (This is why I tend to prefer PKE; you can freely expose your public key.)   But since folks that can peek at the system-level files can see it, you can't secure it any further than the folks and the servers and the applications that have access via the system-level protection mask.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 29 Jul 2008 15:12:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242277#M30283</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2008-07-29T15:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypt/Create and group</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242278#M30284</link>
      <description>Good points, Hoff.  Sorry 'bout the brain fart on the /UIC/DETACH switches -- I've run into that before, but for some reason I've got a mental block on that pair.  The block frees up about the time I run it the first time after I've coded it that way! 8)&lt;BR /&gt;&lt;BR /&gt;BTW, I'm not looking to encrypt files -- I just want to /AUTHENTICATE them to make sure they've not been tampered with (above and beyond the file auditing already done).</description>
      <pubDate>Tue, 29 Jul 2008 16:01:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242278#M30284</guid>
      <dc:creator>Aaron Sakovich</dc:creator>
      <dc:date>2008-07-29T16:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypt/Create and group</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242279#M30285</link>
      <description>So you're off with a quest for system integrity?  Ok.  That's not typically implemented with symmetric encryption on any platform; that's more commonly implemented (as with OpenVMS and its password storage) with a one-way hash.&lt;BR /&gt;&lt;BR /&gt;Depending on the skills of your attacker and your OpenVMS version, the default CHECKSUM command can be applied, or (better) MD5 or (best) SHA.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/647" target="_blank"&gt;http://64.223.189.234/node/647&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/832" target="_blank"&gt;http://64.223.189.234/node/832&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I'll post up some other stuff at that site later today.&lt;BR /&gt;&lt;BR /&gt;There are pre-built versions of MD5 around (there's a known wrinkle here with building on VAX; you have to disable one of the compiler options due to a permanent restriction in the compiler's code generator) on the Freeware, gpg and openssl dgst (part of recent OpenVMS) and other such tools include signature capabilities.&lt;BR /&gt;&lt;BR /&gt;Suggestion: don't ask point questions for these.  Or if you're going to ask point questions on specific commands, consider providing some background on why.&lt;BR /&gt;</description>
      <pubDate>Tue, 29 Jul 2008 17:24:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242279#M30285</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2008-07-29T17:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypt/Create and group</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242280#M30286</link>
      <description>&amp;gt; [...] the HP gpg port seems a little&lt;BR /&gt;&amp;gt; unstable [...]&lt;BR /&gt;&lt;BR /&gt;Nah.  It's _very_ stable, especially for the&lt;BR /&gt;VAX, where it's still dated "November 2003".&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/opensource/gnupg.html" target="_blank"&gt;http://h71000.www7.hp.com/opensource/gnupg.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;(They broke the VAX build when they added,&lt;BR /&gt;badly, IA64 support.)&lt;BR /&gt;&lt;BR /&gt;The pyramids in Egypt are also _very_ stable,&lt;BR /&gt;but there're not much use if what you wanted&lt;BR /&gt;was a GnuPG implementation.</description>
      <pubDate>Tue, 29 Jul 2008 17:33:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242280#M30286</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-07-29T17:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypt/Create and group</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242281#M30287</link>
      <description>Hmmm, I asked pointed questions because the other options you mentioned are not possible.  As is often the case with many customers, we can not run non-vendor software on some of our systems, and I want a solution that will always be there.&lt;BR /&gt;&lt;BR /&gt;CHECKSUM is indeed a possibility that I considered, but a simple checksum is far easier to subvert than the MAC in ENCRYPT.&lt;BR /&gt;&lt;BR /&gt;But I didn't want to talk about that -- I was simply interested in finding out if there was an alternative or better way of populating a key outside of my group.  Based on the lack of a response, I'll presume there isn't.</description>
      <pubDate>Tue, 29 Jul 2008 17:38:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242281#M30287</guid>
      <dc:creator>Aaron Sakovich</dc:creator>
      <dc:date>2008-07-29T17:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypt/Create and group</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242282#M30288</link>
      <description>OpenSSL is built into current OpenVMS, though I've not dealt with the digest mechanisms within in OpenVMS.  (It works in the other boxes I deal with that have OpenSSL baked in.)&lt;BR /&gt;&lt;BR /&gt;The code to MD5 is freely available, and can be acquired directly out of the associated RFC.&lt;BR /&gt;&lt;BR /&gt;And here's a discussion with some related details.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/992" target="_blank"&gt;http://64.223.189.234/node/992&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 29 Jul 2008 18:35:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encrypt-create-and-group/m-p/4242282#M30288</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2008-07-29T18:35:21Z</dc:date>
    </item>
  </channel>
</rss>

