<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tcpip$telnet_trust_location in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992855#M52573</link>
    <description>Thanks, I was missing the /exec.  It works as advertised and what we want.  Thanks for the quick and accurate response.&lt;BR /&gt;&lt;BR /&gt;rob.</description>
    <pubDate>Tue, 25 Jul 2006 09:13:11 GMT</pubDate>
    <dc:creator>Robert Youngquist</dc:creator>
    <dc:date>2006-07-25T09:13:11Z</dc:date>
    <item>
      <title>tcpip$telnet_trust_location</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992852#M52570</link>
      <description>I am experiencing the problem described in the release notes related to TELNET and references a fix using tcpip$telnet_trust_location but doesn't specify how to define it.  Any help would be appreciated.</description>
      <pubDate>Mon, 24 Jul 2006 19:27:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992852#M52570</guid>
      <dc:creator>Robert Youngquist</dc:creator>
      <dc:date>2006-07-24T19:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: tcpip$telnet_trust_location</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992853#M52571</link>
      <description>Robert,&lt;BR /&gt;&lt;BR /&gt;  TCPIP$TELNET_TRUST_LOCATION is an existence logical name. The value doesn't matter, just if it's defined or not. By convention you would define it to "TRUE":&lt;BR /&gt;&lt;BR /&gt;$ DEFINE/SYSTEM/EXEC TCPIP$TELNET_TRUST_LOCATION TRUE&lt;BR /&gt;&lt;BR /&gt;This tells TELNET to "trust" the location information sent from the remote host in identifying the source of the incoming connection. This means password failures from incoming telnet sessions can be more accurately logged for audit &amp;amp; intrusion detection.&lt;BR /&gt;&lt;BR /&gt;The intention is to get around the issue of an intrusion detection on a single port on a terminal server blocking accesses from other ports. Instead of the intrusion source being based solely on the IP address of the server, it will be qualified by the port name.&lt;BR /&gt;&lt;BR /&gt;Of course, it requires the remote host to actually SEND location information. I think it's only DECservers and other OpenVMS hosts that do so. It also means that a hacker could potentially defeat intrusion detection by sending bogus location information when attempting a dictionary attack against your node.</description>
      <pubDate>Mon, 24 Jul 2006 20:28:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992853#M52571</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2006-07-24T20:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: tcpip$telnet_trust_location</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992854#M52572</link>
      <description>Robert,&lt;BR /&gt;&lt;BR /&gt;  BTW, if you're having the problem of multiple users from a remote host being blocked by one user reaching intrusion threshold for failed login attempts, I believe a more secure solution is to raise the threshold.&lt;BR /&gt;&lt;BR /&gt;  The default LGI_BRK_LIM is 5, which, in my opinion is WAY too low. It means that most intrusion detections are false alarms. Just ordinary users persistently typing the (acidental) wrong password too many times.&lt;BR /&gt;&lt;BR /&gt;Suppose you have a 16 port terminal server. Raising GLI_BRK_LIM to (say) 50 will allow each of your users 3 failed login attempts within the LGI_BRK_TMO window before the terminal server is blocked.&lt;BR /&gt; &lt;BR /&gt;  In terms of security, the difference between 5 and 50 attempts really doesn't matter in terms of detecting a true brute force or dictionary attack against your system. Even the most lax password policies should survive 50 random probes. On the other hand if you ever do see an intrusion detection, it's more than likely real (even the dumbest of dumb users isn't persistent enough to retry their incorrect password 50 times!). I would therefore argue that the higher value is MORE secure, because a real attack is less likely to get lost amongst the false alarms.&lt;BR /&gt;&lt;BR /&gt;  If you have especially paranoid auditors, you may be able to find a smaller number that is high enough that your users don't hit it (or at least very rarely) but low enough to keep the auditor happy.&lt;BR /&gt;&lt;BR /&gt;  Note that this solution eliminates the potential hole of crackers sending bogus location information to hide their attack, and it works for ALL host types, not just the ones that know about the OpenVMS extensions to telnet protocol.</description>
      <pubDate>Mon, 24 Jul 2006 20:42:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992854#M52572</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2006-07-24T20:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: tcpip$telnet_trust_location</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992855#M52573</link>
      <description>Thanks, I was missing the /exec.  It works as advertised and what we want.  Thanks for the quick and accurate response.&lt;BR /&gt;&lt;BR /&gt;rob.</description>
      <pubDate>Tue, 25 Jul 2006 09:13:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992855#M52573</guid>
      <dc:creator>Robert Youngquist</dc:creator>
      <dc:date>2006-07-25T09:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: tcpip$telnet_trust_location</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992856#M52574</link>
      <description>define/sys/exec tcpip$telnet_trust_location true&lt;BR /&gt;&lt;BR /&gt;worked, thanks.</description>
      <pubDate>Tue, 25 Jul 2006 09:14:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-telnet-trust-location/m-p/4992856#M52574</guid>
      <dc:creator>Robert Youngquist</dc:creator>
      <dc:date>2006-07-25T09:14:53Z</dc:date>
    </item>
  </channel>
</rss>

