<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strange return from Scanuaf freeware in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238970#M98756</link>
    <description>You are correct, I was just using that search string as an example of how I was looking for the "strange" account.  The point I was trying to make is that, I did search for the offending criteria in trying to understand what was being flagged.  &lt;BR /&gt;&lt;BR /&gt;The correct search was for pwdminimum of 0 which is what I did and nothing came back.</description>
    <pubDate>Fri, 07 May 2010 18:33:53 GMT</pubDate>
    <dc:creator>Mike R Smith</dc:creator>
    <dc:date>2010-05-07T18:33:53Z</dc:date>
    <item>
      <title>Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238966#M98752</link>
      <description>I was using scanuaf to check for accounts not meeting our security criteria when I received what appears to be output for an account that does not exist.  It shows up as an anomaly for several security criteria but a manual check/dump/search of sysuaf does not reveal the record.  Has anyone seen anything like this before? The one difference is that this node is 7.3-2 and only one other node runs that version.&lt;BR /&gt;&lt;BR /&gt;SCANUAF&amp;gt; pwdminimum&amp;lt;8&lt;BR /&gt;&lt;BR /&gt;============&lt;BR /&gt;Node: XXXYYY&lt;BR /&gt;============&lt;BR /&gt;&lt;BR /&gt;Username    : &lt;SYSTEM&gt;               &lt;BR /&gt;PWDMINIMUM  : 0&lt;BR /&gt;&lt;BR /&gt;--------------------------------&lt;BR /&gt;Records:  6835    Matches:     1&lt;BR /&gt;--------------------------------&lt;BR /&gt;&lt;BR /&gt;It is almost like this is a hidden account or  maybe scanuaf is confused but a manual search does not find any account with a pwdminimum of 0.&lt;/SYSTEM&gt;</description>
      <pubDate>Fri, 07 May 2010 17:40:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238966#M98752</guid>
      <dc:creator>Mike R Smith</dc:creator>
      <dc:date>2010-05-07T17:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238967#M98753</link>
      <description>Hi Mike,&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt; but a manual check/dump/search of sysuaf does not reveal the record&lt;BR /&gt;By manually do u mean you have dumped all the contents of the SYSUAF to&lt;BR /&gt;a file and checked thi file for the USERNAME displayed by SCANUAF ?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Murali</description>
      <pubDate>Fri, 07 May 2010 18:06:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238967#M98753</guid>
      <dc:creator>P Muralidhar Kini</dc:creator>
      <dc:date>2010-05-07T18:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238968#M98754</link>
      <description>Yes, I did things like:&lt;BR /&gt;&lt;BR /&gt;$ defin/user sys$output t.t&lt;BR /&gt;$ mcr authorize show *&lt;BR /&gt;&lt;BR /&gt;I then ran searches on this file as well as manual edits.  I did things like searching for the offending setting from inside and outside the file just to be sure.&lt;BR /&gt;&lt;BR /&gt;$ sea t.t "pwdminium:    8"&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;spacing may be off but you get the idea</description>
      <pubDate>Fri, 07 May 2010 18:17:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238968#M98754</guid>
      <dc:creator>Mike R Smith</dc:creator>
      <dc:date>2010-05-07T18:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238969#M98755</link>
      <description>Hi Mike,&lt;BR /&gt;&lt;BR /&gt;About PWDMINIMUM,&lt;BR /&gt;PWDMINIMUM specifies the minimum password length in characters.&lt;BR /&gt;But this rule is enforced only by DCL command SET PASSWORD.&lt;BR /&gt;It does not prevent you from entering a password shorter than the&lt;BR /&gt;minimum length when you use AUTHORIZE to create or modify an&lt;BR /&gt;account. By default, a password must have at least 6 characters.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt; Username : &lt;SYSTEM&gt; &lt;BR /&gt;&amp;gt;&amp;gt; PWDMINIMUM : 0&lt;BR /&gt;SCANUAF has given you a entry where it says that some entry has&lt;BR /&gt;PWDMINIMUM of 0.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt; $ sea t.t "pwdminium: 8"&lt;BR /&gt;You are searching for SYSUAF output in file t.t for user with PWDMINIMUM of 8.&lt;BR /&gt;&lt;BR /&gt;I think the search should be&lt;BR /&gt;$ sea t.t "pwdminium: 0"&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Murali&lt;/SYSTEM&gt;</description>
      <pubDate>Fri, 07 May 2010 18:26:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238969#M98755</guid>
      <dc:creator>P Muralidhar Kini</dc:creator>
      <dc:date>2010-05-07T18:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238970#M98756</link>
      <description>You are correct, I was just using that search string as an example of how I was looking for the "strange" account.  The point I was trying to make is that, I did search for the offending criteria in trying to understand what was being flagged.  &lt;BR /&gt;&lt;BR /&gt;The correct search was for pwdminimum of 0 which is what I did and nothing came back.</description>
      <pubDate>Fri, 07 May 2010 18:33:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238970#M98756</guid>
      <dc:creator>Mike R Smith</dc:creator>
      <dc:date>2010-05-07T18:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238971#M98757</link>
      <description>That &lt;SYSTEM&gt;  entry is an expected and entirely normal SYSUAF record entry that's present within some OpenVMS systems and configurations. &lt;BR /&gt;&lt;BR /&gt;That record happens to be where the so-called system password (the system-wide login password, as differentiated from SYSTEM username and its password) is stored.&lt;BR /&gt;&lt;BR /&gt;See SET TERMINAL /SYSPASSWORD and the system parameter TTY_DEFCHAR2 for related details.&lt;BR /&gt;&lt;BR /&gt;Its presence within SYSUAF can be safely ignored for the purposes of a security audit or a password audit, and it is never available as an interactive login username.&lt;/SYSTEM&gt;</description>
      <pubDate>Fri, 07 May 2010 18:43:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238971#M98757</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2010-05-07T18:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238972#M98758</link>
      <description>Duh.  I neglected to provide the major commands involved here with the system password, in favor of providing some far more obscure ones.   Here are the major knobs:&lt;BR /&gt;&lt;BR /&gt;UAF&amp;gt; MODIFY /SYSTEM_PASSWORD=string&lt;BR /&gt;&lt;BR /&gt;$ SET PASSWORD /SYSTEM&lt;BR /&gt;&lt;BR /&gt;Have a look at the VMS source listings for some of the related details with the SYSUAF storage; I don't know how much of this stuff was ever officially documented.&lt;BR /&gt;&lt;BR /&gt;There are other details (such as VMS- and customer-reserved identifier ranges that exist over in the RIGHTSLIST file) that can also lurk here, too.&lt;BR /&gt;</description>
      <pubDate>Fri, 07 May 2010 21:26:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238972#M98758</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2010-05-07T21:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238973#M98759</link>
      <description>Hi Mike,&lt;BR /&gt;&lt;BR /&gt;The entry displayed by SCANUAF is indeed the system password (i.e not the&lt;BR /&gt;password associated with the SYSTEM account in SYSUAF.DAT file)&lt;BR /&gt;&lt;BR /&gt;Generally when you login to a VMS system, you are asked for username and&lt;BR /&gt;password. This would be based on various accounts that are created in the&lt;BR /&gt;SYSUAF.DAT file.&lt;BR /&gt;&lt;BR /&gt;System password is the one which is used in order to gain access to a&lt;BR /&gt;particular terminal. Once the system password is entered, then user would be&lt;BR /&gt;prompted for the username/password in order to login to the system.&lt;BR /&gt;The system password are generally used to control access to terminals that&lt;BR /&gt;are publicly acessible and not tightly secured.&lt;BR /&gt;Example: Computer lab at universities.&lt;BR /&gt;&lt;BR /&gt;Note that this system password is different from the password for SYSTEM&lt;BR /&gt;account in the SYSUAF.DAT file.&lt;BR /&gt;&lt;BR /&gt;This is documented in the HP VMS Guide to System Security Document.&lt;BR /&gt;You can download it from the following link -&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/doc/732final/aa-q2hlg-te/aa-q2hlg-te.pdf" target="_blank"&gt;http://h71000.www7.hp.com/doc/732final/aa-q2hlg-te/aa-q2hlg-te.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Refer&lt;BR /&gt;* Knowing what type of passwords to use&lt;BR /&gt;* Entering a system password&lt;BR /&gt;* Using password to control system Access&lt;BR /&gt;&lt;BR /&gt;1) If you are setting the system password for the first time then you have to use&lt;BR /&gt;   UAF&amp;gt;MODIFY SYSTEM_PASSWORD=PASSWORD&lt;BR /&gt;   This will create a corresponding record in the SYSUAF.DAT file.&lt;BR /&gt;&lt;BR /&gt;2) Once the record is created in SYSUAF.DAT file, subsequent change to the&lt;BR /&gt;   system password can be done using DCL "$SET PASSWORD/SYSTEM" command.&lt;BR /&gt;&lt;BR /&gt;Without a record created for system password in SYSUAF.DAT file, if you use&lt;BR /&gt;step 2 (i.e. DCL command) then you will get a error &lt;BR /&gt;%SET-F-UAFERR, error accessing authorization file&lt;BR /&gt;-RMS-E-RNF, record not found&lt;BR /&gt;&lt;BR /&gt;To enable the use of the system password for the remote class of logins&lt;BR /&gt;(those accomplished through the DCL command SET HOST), set the&lt;BR /&gt;appropriate bit in the default terminal characteristics parameter by using&lt;BR /&gt;AUTOGEN. This is bit 19 (hexadecimal value 80000) in the parameter TTY_DEFCHAR2.&lt;BR /&gt;&lt;BR /&gt;SYS_PARAMETERS&lt;BR /&gt;  TTY_DEFCHAR2&lt;BR /&gt;&lt;BR /&gt;       TTY_DEFCHAR2 sets a second longword of default terminal characteristics.&lt;BR /&gt;       The default characteristics are represented as a code that is derived by&lt;BR /&gt;       summing the following hexadecimal values:&lt;BR /&gt;       Characteristic Value (Hex)   Function&lt;BR /&gt;       ...&lt;BR /&gt;       SYSPWD            80000      Log in with system password only.&lt;BR /&gt;&lt;BR /&gt;Check out the DCL help of SET TERM also -&lt;BR /&gt;SET&lt;BR /&gt;  TERMINAL&lt;BR /&gt;    /SYSPASSWORD&lt;BR /&gt;          /SYSPASSWORD&lt;BR /&gt;          /NOSYSPASSWORD (default)&lt;BR /&gt;&lt;BR /&gt;       Requires LOG_IO (logical I/O) privilege.&lt;BR /&gt;&lt;BR /&gt;       Determines whether the terminal requires that a system password&lt;BR /&gt;       be entered before the Username: prompt.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt; It is almost like this is a hidden account or maybe scanuaf is confused but a&lt;BR /&gt;&amp;gt;&amp;gt; manual search does not find any account with a pwdminimum of 0. &lt;BR /&gt;As Hoff has suggested, looks like entry displayed by SCANUAF is the system&lt;BR /&gt;password as mentioned above. In which case you can safely ignore this entry&lt;BR /&gt;for auditing purpose.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Murali</description>
      <pubDate>Sat, 08 May 2010 06:55:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238973#M98759</guid>
      <dc:creator>P Muralidhar Kini</dc:creator>
      <dc:date>2010-05-08T06:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238974#M98760</link>
      <description>Two great answers that not only answered the question but led me to addtional documentation for review.  Thanks!!!</description>
      <pubDate>Mon, 10 May 2010 15:36:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238974#M98760</guid>
      <dc:creator>Mike R Smith</dc:creator>
      <dc:date>2010-05-10T15:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Strange return from Scanuaf freeware</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238975#M98761</link>
      <description>"&lt;BR /&gt;Yes, I did things like:&lt;BR /&gt;&lt;BR /&gt;$ defin/user sys$output t.t&lt;BR /&gt;$ mcr authorize show *&lt;BR /&gt;"&lt;BR /&gt;&lt;BR /&gt;No one pointed out, but just as an FYI ... you can just use UAF to produce a brief or full listing with:&lt;BR /&gt;&lt;BR /&gt;$ MCR AUTHORIZE LIST&lt;BR /&gt;&lt;BR /&gt;or &lt;BR /&gt;&lt;BR /&gt;$ MCR AUTHORIZE LIST /FULL&lt;BR /&gt;&lt;BR /&gt;Both variations provide a file named SYSUAF.LIS .&lt;BR /&gt;&lt;BR /&gt;This listing capability can be used to provide information regarding various entities in the SYSUAF and RIGHTSLIST files with a few other LIST command switches.&lt;BR /&gt;&lt;BR /&gt;UAF&amp;gt; help list&lt;BR /&gt;&lt;BR /&gt;to see all it can do.&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Art</description>
      <pubDate>Sat, 15 May 2010 15:57:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/strange-return-from-scanuaf-freeware/m-p/5238975#M98761</guid>
      <dc:creator>Art Wiens</dc:creator>
      <dc:date>2010-05-15T15:57:49Z</dc:date>
    </item>
  </channel>
</rss>

