<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS$MSG.EXE protection in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/dns-msg-exe-protection/m-p/3847504#M78528</link>
    <description>Someone noticed that SYS$MESSAGE:DNS$MSG.EXE doesn't have W:RE protection. (World has NO access).  All the other EXE files in SYS$MESSAGE have W:RE access. Does anyone know why? Is this on purpose?</description>
    <pubDate>Mon, 21 Aug 2006 12:49:17 GMT</pubDate>
    <dc:creator>Thomas A. Williams</dc:creator>
    <dc:date>2006-08-21T12:49:17Z</dc:date>
    <item>
      <title>DNS$MSG.EXE protection</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dns-msg-exe-protection/m-p/3847504#M78528</link>
      <description>Someone noticed that SYS$MESSAGE:DNS$MSG.EXE doesn't have W:RE protection. (World has NO access).  All the other EXE files in SYS$MESSAGE have W:RE access. Does anyone know why? Is this on purpose?</description>
      <pubDate>Mon, 21 Aug 2006 12:49:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dns-msg-exe-protection/m-p/3847504#M78528</guid>
      <dc:creator>Thomas A. Williams</dc:creator>
      <dc:date>2006-08-21T12:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: DNS$MSG.EXE protection</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dns-msg-exe-protection/m-p/3847505#M78529</link>
      <description>&lt;!--!*#--&gt;I have two:&lt;BR /&gt;&lt;BR /&gt;DNS$MSG.EXE;1        (RWED,RWED,RE,)&lt;BR /&gt;DNS$MSG_VMS.EXE;1    (RWED,RWED,RE,)&lt;BR /&gt;&lt;BR /&gt;but there's a similar-looking:&lt;BR /&gt;&lt;BR /&gt;DNS$MSG_V.EXE;1      (RWED,RWED,RE,RE)&lt;BR /&gt;&lt;BR /&gt;Looks to me like an error.&lt;BR /&gt;&lt;BR /&gt;A bunch of mine have G:REWD, too, but most&lt;BR /&gt;are G:RE.</description>
      <pubDate>Mon, 21 Aug 2006 16:29:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dns-msg-exe-protection/m-p/3847505#M78529</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2006-08-21T16:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: DNS$MSG.EXE protection</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dns-msg-exe-protection/m-p/3847506#M78530</link>
      <description>Thomas,&lt;BR /&gt;&lt;BR /&gt;  It might be an oversight. On my V6.2 systems, the protection is W:RE, but on later versions it's W(none).&lt;BR /&gt;&lt;BR /&gt;  I guess it depends on what images are intended to use the message file. If they're all installed, privileged images, or they're intended to be used only by privileged users, then the security may be deliberate, or may not be relevant. &lt;BR /&gt;&lt;BR /&gt;  A quick look at a V8.2 system disk, it appears DNS$MSG is referenced from NET$EVENT_DISPATCHER, NCLSHR, NET$EVD_RELAY_FORMATTER and DNS$MSG_V. I can't imagine joe-unprivileged-user messing with any of them.&lt;BR /&gt;&lt;BR /&gt;  On one hand, it probably doesn't matter if you open W:RE access to the message file, but on the other, what's broke that you think you're fixing?&lt;BR /&gt;&lt;BR /&gt;  If your users aren't complaining about failure to translate DNS messages, it might be better to just leave it be. If you have file access failure auditing enabled, you'll now quickly enough if anyone who should have access is being denied.&lt;BR /&gt;</description>
      <pubDate>Mon, 21 Aug 2006 23:09:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dns-msg-exe-protection/m-p/3847506#M78530</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2006-08-21T23:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: DNS$MSG.EXE protection</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dns-msg-exe-protection/m-p/3847507#M78531</link>
      <description>I don't know about anyone else, but I have a&lt;BR /&gt;procedure which tries to get the message text&lt;BR /&gt;for a status code, and when it gets "NOMSG",&lt;BR /&gt;it tries to "set message" on each of the&lt;BR /&gt;files in sys$message until it gets a good&lt;BR /&gt;message (or runs out of files).&lt;BR /&gt;&lt;BR /&gt;Anyone, privileged or not, might wish to&lt;BR /&gt;translate such an error code, but it won't&lt;BR /&gt;work well if he can't read the file.&lt;BR /&gt;&lt;BR /&gt;The probability of anyone actually caring may&lt;BR /&gt;be fairly small, but I estimate the&lt;BR /&gt;probability of W:RE on any of these files&lt;BR /&gt;being wrong enough to cause trouble to be&lt;BR /&gt;_vanishingly_ small.&lt;BR /&gt;&lt;BR /&gt;I'd vote for setting all of them the same,&lt;BR /&gt;and then waiting for a disaster.  I'd expect&lt;BR /&gt;to be waiting a very long time.</description>
      <pubDate>Mon, 21 Aug 2006 23:21:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dns-msg-exe-protection/m-p/3847507#M78531</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2006-08-21T23:21:07Z</dc:date>
    </item>
  </channel>
</rss>

