<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re:  FDL Security in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122018#M87786</link>
    <description>For me delete and write access to an FDL file are equivalent.&lt;BR /&gt;&lt;BR /&gt;I don't think anyone (other than me :-) has ever used write access to an FDL file ever!&lt;BR /&gt;&lt;BR /&gt;The main FDL (design) files should be safe in an CMS library.&lt;BR /&gt;&lt;BR /&gt;The current FDL files can readily be recovered from the data files themselved and/or from the design + current statistics.&lt;BR /&gt;So they need no special protection IMHO.&lt;BR /&gt;&lt;BR /&gt;fwiw,&lt;BR /&gt;Hein.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 28 Dec 2007 18:01:33 GMT</pubDate>
    <dc:creator>Hein van den Heuvel</dc:creator>
    <dc:date>2007-12-28T18:01:33Z</dc:date>
    <item>
      <title>FDL Security</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122012#M87780</link>
      <description>I need to investigate the current ownership and protection for files in the PROD_FDL directory on all of our 40 nodes. &lt;BR /&gt;&lt;BR /&gt;I need to recommend a security standard that will work around the country while protecting the files at the highest possible level.&lt;BR /&gt;&lt;BR /&gt;Has anyone done this on their sites?&lt;BR /&gt; &lt;BR /&gt; For instance, if World does not have access to any FDL files on some of the nodes, I can guess that World probably does not need any access, and recommend that as a standard. &lt;BR /&gt;&lt;BR /&gt;Is there a better command that I can use besides dir/sec? &lt;BR /&gt;&lt;BR /&gt;This is what I get as an example&lt;BR /&gt;&lt;BR /&gt;dir/sec Nodename::prod_fdl:&lt;BR /&gt;SYSTBMIS.FDL;5 [500,7777]                      (RWED,RWED,RWE,RWE)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Any ideas? &lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Dec 2007 15:25:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122012#M87780</guid>
      <dc:creator>vmsserbo</dc:creator>
      <dc:date>2007-12-28T15:25:19Z</dc:date>
    </item>
    <item>
      <title>Re:  FDL Security</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122013#M87781</link>
      <description>&amp;gt; [...] I can guess [...]&lt;BR /&gt;&lt;BR /&gt;It might make more sense to start by trying&lt;BR /&gt;to understand the access requirements for&lt;BR /&gt;these files, rather than assuming that the&lt;BR /&gt;existing protections actually make any sense.&lt;BR /&gt;(For example, why would W:RWE be better than,&lt;BR /&gt;say, W:RW?)  You could save a lot of work by&lt;BR /&gt;guessing that everything's ok now, too, if&lt;BR /&gt;guessing is good enough.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Is there a better command that I can use&lt;BR /&gt;&amp;gt; besides dir/sec?&lt;BR /&gt;&lt;BR /&gt;I believe that you can get the owner-group&lt;BR /&gt;data from F$FILE_ATTRIBUTES.  I don't know of&lt;BR /&gt;a handy way to get the security data.</description>
      <pubDate>Fri, 28 Dec 2007 16:05:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122013#M87781</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2007-12-28T16:05:13Z</dc:date>
    </item>
    <item>
      <title>Re:  FDL Security</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122014#M87782</link>
      <description>If the FDL files are indeed what the names imply then they are RMS File Description Files, used for production file re-creates or convert.&lt;BR /&gt;&lt;BR /&gt;So they need to be readable by whatever username executes those creates/converts, and in that sense might as well have the same protection as the data files to be created&lt;BR /&gt;&lt;BR /&gt;There is no valuable data - data in them, just meta data, so world read is fine, unless you feel the need to control idle curiousity.&lt;BR /&gt;&lt;BR /&gt;World write is rather bad for those files, not because they can directly trash production data, but because of 'denial of service' potential. Anyone mucking with those files can leave a boobytrap for some future convert which may be months (years) away and then create an unusable data file.&lt;BR /&gt;&lt;BR /&gt;You could argue that only development and a DBA style user can/should have write access to FDL files, NOT the operators / production support users using them.&lt;BR /&gt;&lt;BR /&gt;Typically I would hope operators / production support is smart enough to be trusted with FDL and even allowed to make tuning changes (allocation, extent, bucketsize).&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Hein van den Heuvel&lt;BR /&gt;HvdH Performance Consulting&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Dec 2007 16:37:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122014#M87782</guid>
      <dc:creator>Hein van den Heuvel</dc:creator>
      <dc:date>2007-12-28T16:37:42Z</dc:date>
    </item>
    <item>
      <title>Re:  FDL Security</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122015#M87783</link>
      <description>Thanks for the input I do agree with what your saying. &lt;BR /&gt;&lt;BR /&gt;The way it stands now, most fdl protectons &lt;BR /&gt;are set like this &lt;BR /&gt;&lt;BR /&gt;(RWED,RWED,RWE,RW)&lt;BR /&gt;&lt;BR /&gt;I think I am going to recommend the following&lt;BR /&gt;&lt;BR /&gt;(RWED,RWED,RWE,R)&lt;BR /&gt;&lt;BR /&gt;Should the Group be able to have the "D" delete permission? &lt;BR /&gt;&lt;BR /&gt;Your thoughts?&lt;BR /&gt;&lt;BR /&gt;Thanks again!&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Dec 2007 17:43:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122015#M87783</guid>
      <dc:creator>vmsserbo</dc:creator>
      <dc:date>2007-12-28T17:43:42Z</dc:date>
    </item>
    <item>
      <title>Re:  FDL Security</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122016#M87784</link>
      <description>Thanks for all you help&lt;BR /&gt;&lt;BR /&gt;I will follow the same protections scheme for our .fdl files as we have with our .dat files&lt;BR /&gt;&lt;BR /&gt;(RWED,RWED,RWED,R)&lt;BR /&gt;&lt;BR /&gt;Thanks and Happy New Year!&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Dec 2007 17:58:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122016#M87784</guid>
      <dc:creator>vmsserbo</dc:creator>
      <dc:date>2007-12-28T17:58:32Z</dc:date>
    </item>
    <item>
      <title>Re:  FDL Security</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122017#M87785</link>
      <description>&amp;gt; Should the Group be able to have the "D" delete permission? &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Only you can answer this. Who is in the UIC group besides the owner? Do you want these other users to be able to delete these FDL files? If not, then you'll probably want to remove that potential.</description>
      <pubDate>Fri, 28 Dec 2007 18:00:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122017#M87785</guid>
      <dc:creator>Jim_McKinney</dc:creator>
      <dc:date>2007-12-28T18:00:14Z</dc:date>
    </item>
    <item>
      <title>Re:  FDL Security</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122018#M87786</link>
      <description>For me delete and write access to an FDL file are equivalent.&lt;BR /&gt;&lt;BR /&gt;I don't think anyone (other than me :-) has ever used write access to an FDL file ever!&lt;BR /&gt;&lt;BR /&gt;The main FDL (design) files should be safe in an CMS library.&lt;BR /&gt;&lt;BR /&gt;The current FDL files can readily be recovered from the data files themselved and/or from the design + current statistics.&lt;BR /&gt;So they need no special protection IMHO.&lt;BR /&gt;&lt;BR /&gt;fwiw,&lt;BR /&gt;Hein.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Dec 2007 18:01:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122018#M87786</guid>
      <dc:creator>Hein van den Heuvel</dc:creator>
      <dc:date>2007-12-28T18:01:33Z</dc:date>
    </item>
    <item>
      <title>Re:  FDL Security</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122019#M87787</link>
      <description>Hello,&lt;BR /&gt;     Are you using FDL as in the standard VMS nomenclature, File Definition Language?  It appears so given your example.&lt;BR /&gt;&lt;BR /&gt;     Another way to look at file protection and ownership is with the&lt;BR /&gt; $ dir/protection/owner command.  But that pretty much tells you the same thing.  You can also add the /file qualifier to get the file ID (that is useful mostly when you are dealing with operating system files).&lt;BR /&gt;&lt;BR /&gt;     Also, if you are to have a security standard for all of your 40 nodes, I would be concerned about the file protections and ownerships on your data files (.DAT or whatever they may be), executable (.exe), DCL command files (.com), source code files (if that applies on some or all of your nodes), and so forth.  Also, I would be worried about who can access operating system and layered product files in the sys$system directory trees, sys$manager directory, and so forth.&lt;BR /&gt;&lt;BR /&gt;     Tyically, if you suspect that Group (g) and World (W) users may cause problems by modifying or deleting these files, you should take a look at the system and application overall to see who should have access.&lt;BR /&gt;&lt;BR /&gt;     You may may want to restrict access to operating system files to system administrators and network admins, application source files to certain programmers (depending on skill level and trust), and application executables and data files to authorized users, based on file ownerships and access control lists.&lt;BR /&gt;&lt;BR /&gt;     Anyway, that's just an general example and it could vary based on your site and application requirements.  If I can be of any further help, let me know.</description>
      <pubDate>Sat, 29 Dec 2007 03:15:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122019#M87787</guid>
      <dc:creator>DECxchange</dc:creator>
      <dc:date>2007-12-29T03:15:17Z</dc:date>
    </item>
    <item>
      <title>Re:  FDL Security</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122020#M87788</link>
      <description>I would check with dir/dat=mod if any of the files are modified recently. This could indicate that the files are modified by users or programs.&lt;BR /&gt;&lt;BR /&gt;Many dcl scripts create the fdl file themself, e.g. during startup (at least over here). If there are any modified files you will have to find out who is doing it before you revoke the W access. You can set e.g. an acl on the file to get audit alarms (and thus find out who did it).&lt;BR /&gt;&lt;BR /&gt;Fwiw&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Wed, 02 Jan 2008 12:23:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/fdl-security/m-p/4122020#M87788</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2008-01-02T12:23:05Z</dc:date>
    </item>
  </channel>
</rss>

