<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1 in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561063#M99265</link>
    <description>Do you have a web reference for Peek and Spy please?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Steve</description>
    <pubDate>Sat, 09 Jan 2010 09:10:13 GMT</pubDate>
    <dc:creator>Steve Reece_3</dc:creator>
    <dc:date>2010-01-09T09:10:13Z</dc:date>
    <item>
      <title>Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561059#M99261</link>
      <description>Hiya,&lt;BR /&gt;&lt;BR /&gt;We presently have AUDIT installed on our VMS systems to take logs of keystrokes from privileged users and other users that have access to a VMS prompt.  This is a requirement for company auditing purposes.&lt;BR /&gt;&lt;BR /&gt;Does anyone have any ideas of other tools that are available that can do logging of keystrokes on VMS for auditing?&lt;BR /&gt;&lt;BR /&gt;What I'm specifically interested in is the keystrokes that the users put into the VMS system, not necessarily the response from the system.  We also still want the input even if the terminal is set /NOECHO&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;&lt;BR /&gt;Steve</description>
      <pubDate>Fri, 08 Jan 2010 16:46:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561059#M99261</guid>
      <dc:creator>Steve Reece_3</dc:creator>
      <dc:date>2010-01-08T16:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561060#M99262</link>
      <description>Steve,&lt;BR /&gt;&lt;BR /&gt;It isn't clear to me if there is a problem with AUDIT, or if you are looking for a cheaper alternative.&lt;BR /&gt;&lt;BR /&gt;Does AUDIT have the capability to log /input ?&lt;BR /&gt;&lt;BR /&gt;My opinion is that keystroke logging by itself is of limited use from an auditing standpoint.  A knowledgeable user with privilege and malicious intent, can disguise what they are doing with command files and other techniques.  The point being that keystrokes alone are not sufficient.  They can be useful for debugging and for determining what was being done when other auditing events occurred.&lt;BR /&gt;&lt;BR /&gt;Jon&lt;BR /&gt;</description>
      <pubDate>Fri, 08 Jan 2010 20:47:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561060#M99262</guid>
      <dc:creator>Jon Pinkley</dc:creator>
      <dc:date>2010-01-08T20:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561061#M99263</link>
      <description>Hi Jon,&lt;BR /&gt;&lt;BR /&gt;We're evaluating options now that we're planning the move to Integrity.  We don't just use keystroke logging/auditing, we use other things too, such as the auditing within VMS.  The keystroke logging/auditing is but one of the tools that's necessary with corporate standards&lt;BR /&gt;&lt;BR /&gt;Steve</description>
      <pubDate>Fri, 08 Jan 2010 21:08:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561061#M99263</guid>
      <dc:creator>Steve Reece_3</dc:creator>
      <dc:date>2010-01-08T21:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561062#M99264</link>
      <description>Hey Steve&lt;BR /&gt;&lt;BR /&gt;We use Peek and Spy for the exact same thing.  Works great.</description>
      <pubDate>Fri, 08 Jan 2010 21:42:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561062#M99264</guid>
      <dc:creator>EWL</dc:creator>
      <dc:date>2010-01-08T21:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561063#M99265</link>
      <description>Do you have a web reference for Peek and Spy please?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Steve</description>
      <pubDate>Sat, 09 Jan 2010 09:10:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561063#M99265</guid>
      <dc:creator>Steve Reece_3</dc:creator>
      <dc:date>2010-01-09T09:10:13Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561064#M99266</link>
      <description>Steve,&lt;BR /&gt;&lt;BR /&gt;how about:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.networkingdynamics.com/TheVmsStore.htm" target="_blank"&gt;http://www.networkingdynamics.com/TheVmsStore.htm&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Look at Peek &amp;amp; Spy and KeyCapture&lt;BR /&gt;&lt;BR /&gt;Volker.</description>
      <pubDate>Sat, 09 Jan 2010 15:05:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561064#M99266</guid>
      <dc:creator>Volker Halle</dc:creator>
      <dc:date>2010-01-09T15:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561065#M99267</link>
      <description>Steve,&lt;BR /&gt;&lt;BR /&gt;  I'm not a huge fan of keystroke logging. Who's going to read it?&lt;BR /&gt;&lt;BR /&gt;  The "poor man's" keystroke log is fairly simple. Arrange for the user to login to one username, which does a SET HOST/LOG to a second username (or system).&lt;BR /&gt;&lt;BR /&gt;  Ideally use two systems. The "audit" system has two network adapters. Users on one side, and "audited" system on the other. That way there's no physical path between the users and the audited system, except via the audit system. The users also have no non-captive access to the audit system, so even privileged users can't mess with the audit logs.&lt;BR /&gt;&lt;BR /&gt;  Give the users a captive account on the audit system with no password. The LOGIN procedure generates a log file name, then:&lt;BR /&gt;&lt;BR /&gt;$ SET HOST/LOG &lt;AUDITED system=""&gt;&lt;BR /&gt;&lt;USERNAME&gt;&lt;BR /&gt;&lt;BR /&gt;Note the username is SYS$INPUT for the SET HOST command. This will pass the username to the target system. &lt;BR /&gt;&lt;BR /&gt;The user will therefore see only one "Username:" prompt and one "Password:" prompt. Whatever welcome message or LOGIN.COM output you generate will appear between the prompts.&lt;BR /&gt;&lt;BR /&gt;On the audited system, have the SYLOGIN procedure check the source of all logins. Anything not from the audit system is immediately logged out.&lt;BR /&gt;&lt;BR /&gt;I don't think this will capture /NOECHO input, but it's simple to setup and needs no special privileges or non-standard privileged code.&lt;/USERNAME&gt;&lt;/AUDITED&gt;</description>
      <pubDate>Sun, 10 Jan 2010 21:28:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561065#M99267</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2010-01-10T21:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561066#M99268</link>
      <description>I'm not a great fan either John, but audit requirements are audit requirements so it's not even worth having that argument with management.&lt;BR /&gt;&lt;BR /&gt;Steve</description>
      <pubDate>Mon, 11 Jan 2010 07:10:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561066#M99268</guid>
      <dc:creator>Steve Reece_3</dc:creator>
      <dc:date>2010-01-11T07:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561067#M99269</link>
      <description>Here are some things you should check if you are using any of the terminal logging or keystroke logging utilities, especially if they are being used for auditing purposes.&lt;BR /&gt;&lt;BR /&gt;Does it handle large QIO operations to TCPIP services TNA (Telnet) devices?&lt;BR /&gt;&lt;BR /&gt;Does it survive a disconnect/reconnect on a VTA terminal?&lt;BR /&gt;&lt;BR /&gt;Does it provide secure logging (at least for non-privileged users)?  As John Gillings said, if the logging is being done on the same system as the privileged users being monitored, I am not aware of any way to guarantee that the logs will be valid.  In other words, a user with CMKRNL privilege can compromise the logging.&lt;BR /&gt;&lt;BR /&gt;Does it have the ability to post process the output to clean up the rubout processing?  This makes the output easier to read, but may also hide some info.&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Jan 2010 09:14:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561067#M99269</guid>
      <dc:creator>Jon Pinkley</dc:creator>
      <dc:date>2010-01-11T09:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561068#M99270</link>
      <description>System Detective does session logging and more&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.pointsecure.com/products/sys_det.aspx" target="_blank"&gt;http://www.pointsecure.com/products/sys_det.aspx&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Jan 2010 10:46:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561068#M99270</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2010-01-11T10:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561069#M99271</link>
      <description>Does anyone have any direct experience of support and development of KeyCapture?  Any idea whether there's a reasonable amount of development work happening or whether it's a team of one guy somewhere with an old VAX or Alpha maintaining the code?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Steve</description>
      <pubDate>Mon, 11 Jan 2010 18:15:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561069#M99271</guid>
      <dc:creator>Steve Reece_3</dc:creator>
      <dc:date>2010-01-11T18:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561070#M99272</link>
      <description>Steve,&lt;BR /&gt;&lt;BR /&gt;I don't have any direct experience with support/development of KeyCapture.&lt;BR /&gt;&lt;BR /&gt;My guess is that none of these three commercial products have a large development group, and I would be surprised if any had more than one primary developer/maintainer for the products.  I also doubt that there are many HP engineers dedicated to the VMS terminal driver.&lt;BR /&gt;&lt;BR /&gt;I would guess that all the products that are logging on the node being monitored are intercepting the traffic between the terminal port/class interface via the GETNXT/PUTNXT routine pointers in the terminal UCB (UCB$L_TT_GETNXT/UCB$L_TT_PUTNXT).  At least that is the most direct (most efficient) approach that I am aware of.  Just for reference, PUTNXT is used for terminal input (it puts into the typeahead buffer); GETNXT is for terminal output (gets the next character or string (burst) to output to the user's terminal.)&lt;BR /&gt;&lt;BR /&gt;In my opinion, the most important question is how well the design is documented by/for the product developers/supporters and how cleanly written the code is.  This will determine how easily a new person will be able to support the product.  Unfortunately, I know of no way to determine this from the outside, as the code is proprietary and closed source.  &lt;BR /&gt;&lt;BR /&gt;One indicator is the quality of the external product documentation.  Another is how long it took each vendor to release an IA64 version of the product after OpenVMS IA64 became available.  Although this is an indirect indicator, it is an externally visible indicator of the vendor's ability/desire to support the VMS market.  Since these products are using internal features of VMS that are not in end user documentation, it implies that the vendors need access to the VMS source code listings (or at least a contact in VMS engineering that can provide select information).&lt;BR /&gt;&lt;BR /&gt;Jon&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Jan 2010 12:20:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561070#M99272</guid>
      <dc:creator>Jon Pinkley</dc:creator>
      <dc:date>2010-01-12T12:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561071#M99273</link>
      <description>I have direct experience with KeyCapture v5.2.05 that is running on two AlphaServers clustered together.  It has been invaluable in monitoring password changes which are normally blocked in SET HOST/LOG files and other AUDITing programs.  It even works with terminals set to /NOECHO.  Email me or give me a call if you want to talk personally about the product.&lt;BR /&gt;&lt;BR /&gt;Rick Lade</description>
      <pubDate>Tue, 19 Jan 2010 10:41:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561071#M99273</guid>
      <dc:creator>Rick Lade</dc:creator>
      <dc:date>2010-01-19T10:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561072#M99274</link>
      <description>steve wrote:&lt;BR /&gt;&lt;BR /&gt;&amp;gt;Does anyone have any direct experience of&lt;BR /&gt;&amp;gt;support and development of KeyCapture? Any&lt;BR /&gt;&amp;gt;idea whether there's a reasonable amount of&lt;BR /&gt;&amp;gt;development work happening or whether it's&lt;BR /&gt;&amp;gt;a team of one guy somewhere with an old VAX&lt;BR /&gt;&amp;gt;or Alpha maintaining the code?&lt;BR /&gt;&lt;BR /&gt;I have VAXen, Alphas and Integritys. ;)&lt;BR /&gt;&lt;BR /&gt;What seems to be the issue with AUDIT.  If you really need the /NOECHO in the AUDIT log, that can be enabled.  However, I think you will find with the other loggers -- as they intercept using the same patented approach -- that the keystrokes are missing from their logs as well.&lt;BR /&gt;&lt;BR /&gt;Make the case to ProvN and it will become. &lt;BR /&gt;</description>
      <pubDate>Tue, 29 Jun 2010 20:23:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561072#M99274</guid>
      <dc:creator>Brian  Schenkenberger</dc:creator>
      <dc:date>2010-06-29T20:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: Keystroke auditing on OpenVMS Integrity v8.3-1H1</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561073#M99275</link>
      <description>Hi Steve,&lt;BR /&gt;&lt;BR /&gt;You can try out the Key Capture tool.&lt;BR /&gt;&lt;BR /&gt;Check the following link -&lt;BR /&gt;* Key Capture&lt;BR /&gt;&lt;A href="http://openvmsalpha.com/75/key-capture/" target="_blank"&gt;http://openvmsalpha.com/75/key-capture/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Key Capture is a OpenVMS tool for logging/aduting the keyboard input for&lt;BR /&gt;a set of users. This should give you the feature that you are looking for.&lt;BR /&gt;&lt;BR /&gt;The link mentions that the Key Capture is availble in ALPHA versions.&lt;BR /&gt;The Itanium version is yet to be released. Not sure if the IA64 version&lt;BR /&gt;has been released.&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Murali</description>
      <pubDate>Wed, 30 Jun 2010 00:09:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/keystroke-auditing-on-openvms-integrity-v8-3-1h1/m-p/4561073#M99275</guid>
      <dc:creator>P Muralidhar Kini</dc:creator>
      <dc:date>2010-06-30T00:09:35Z</dc:date>
    </item>
  </channel>
</rss>

