<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: execute acces on SYSUAF.DAT in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821315#M77482</link>
    <description>The original question is about the risk of execute only access for world.&lt;BR /&gt;&lt;BR /&gt;One way of restricting this risk would be to add an ACL with a ACE grating execute access to holders to a specific idenitifer. Then grant that identifier to users who need to run a task under the scheduler.&lt;BR /&gt;&lt;BR /&gt;I think that the locking problem mentioned above needs read access.</description>
    <pubDate>Tue, 11 Jul 2006 09:58:22 GMT</pubDate>
    <dc:creator>Ian Miller.</dc:creator>
    <dc:date>2006-07-11T09:58:22Z</dc:date>
    <item>
      <title>execute acces on SYSUAF.DAT</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821308#M77475</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I install a patch on a third party Scheduler product ($U from Orsyp). Since this moment, I have security problems on the SYSUAF.DAT file.&lt;BR /&gt;Users who runing task under the scheduler generate a protection error : they try to access the SYSUAF.DAT in execute mode.&lt;BR /&gt;&lt;BR /&gt;My question is : what is the risk to give (w:E) protection on SYSUAF.DAT. In the VMS doc I only see that execute access is to authorize to run a image or to @ a dcl file.&lt;BR /&gt;&lt;BR /&gt;Thanks for help&lt;BR /&gt;&lt;BR /&gt;Seghers Bruno</description>
      <pubDate>Tue, 11 Jul 2006 08:26:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821308#M77475</guid>
      <dc:creator>Bruno Seghers</dc:creator>
      <dc:date>2006-07-11T08:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: execute acces on SYSUAF.DAT</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821309#M77476</link>
      <description>Hi Bruno,&lt;BR /&gt;&lt;BR /&gt;Long time no see.&lt;BR /&gt;&lt;BR /&gt;I have no knowledge of side effects except that you can @ the sysuaf file.&lt;BR /&gt;BTW : over here they are RE with no side effects.&lt;BR /&gt;&lt;BR /&gt;CU&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Tue, 11 Jul 2006 09:02:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821309#M77476</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2006-07-11T09:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: execute acces on SYSUAF.DAT</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821310#M77477</link>
      <description>Wim,&lt;BR /&gt;&lt;BR /&gt;setting SYSUAF.DAT to WO:RE is an invitation to hackers to try and crack your passwords.&lt;BR /&gt;&lt;BR /&gt;The default protection for SYSUAF.DAT would be: SYSTEM:RWED, OWNER:RWED and nothing else.&lt;BR /&gt;&lt;BR /&gt;Volker.</description>
      <pubDate>Tue, 11 Jul 2006 09:11:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821310#M77477</guid>
      <dc:creator>Volker Halle</dc:creator>
      <dc:date>2006-07-11T09:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: execute acces on SYSUAF.DAT</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821311#M77478</link>
      <description>If you give W:R to the sysuaf, a user could do open/share=read/read and thus prevent other processes from updating it. This could cause hanging processes (password changes, update date last login, etc).&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Tue, 11 Jul 2006 09:19:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821311#M77478</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2006-07-11T09:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: execute acces on SYSUAF.DAT</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821312#M77479</link>
      <description>is the product asking for execute only or read and execute (the audit entry should tell you)?&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Jul 2006 09:46:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821312#M77479</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2006-07-11T09:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: execute acces on SYSUAF.DAT</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821313#M77480</link>
      <description>Execute only</description>
      <pubDate>Tue, 11 Jul 2006 09:49:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821313#M77480</guid>
      <dc:creator>Bruno Seghers</dc:creator>
      <dc:date>2006-07-11T09:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: execute acces on SYSUAF.DAT</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821314#M77481</link>
      <description>I tested it and with RE your system gets in hung after open/read/share=read.&lt;BR /&gt;&lt;BR /&gt;In accounting : error accessing system authorization file and this for all new processes.&lt;BR /&gt;&lt;BR /&gt;Wonder what other files I could use in this way ... should check *.dat at least.&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Tue, 11 Jul 2006 09:51:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821314#M77481</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2006-07-11T09:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: execute acces on SYSUAF.DAT</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821315#M77482</link>
      <description>The original question is about the risk of execute only access for world.&lt;BR /&gt;&lt;BR /&gt;One way of restricting this risk would be to add an ACL with a ACE grating execute access to holders to a specific idenitifer. Then grant that identifier to users who need to run a task under the scheduler.&lt;BR /&gt;&lt;BR /&gt;I think that the locking problem mentioned above needs read access.</description>
      <pubDate>Tue, 11 Jul 2006 09:58:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/execute-acces-on-sysuaf-dat/m-p/3821315#M77482</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2006-07-11T09:58:22Z</dc:date>
    </item>
  </channel>
</rss>

