- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Re: How to use SUBSYSTEM ACL's
Operating System - OpenVMS
1753856
Members
7573
Online
108809
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Go to solution
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-07-2011 08:41 AM
тАО03-07-2011 08:41 AM
Re: How to use SUBSYSTEM ACL's
Why do disk volumes require explicitly enabling subsystem identifiers?
Um, do you really want a random disk mounted by a user to have the ability to grant subsystem ACL access by default?
Even for a /SYSTEM disk mount, that might not be the most desirable default. (Do you want a MOUNT nuking your system security?)
Ever wondered why Microsoft Windows security keeps getting stomped on? This tool surprised me:
http://technet.microsoft.com/en-us/sysinternals/bb963902
Stuff can be activated from all over the place. And mounting a disk is one of the most common spots you can see an AUTORUN light up.
Well, the subsystem identifier (if enabled by default) would be a more subtle form of the same basic mess.
Um, do you really want a random disk mounted by a user to have the ability to grant subsystem ACL access by default?
Even for a /SYSTEM disk mount, that might not be the most desirable default. (Do you want a MOUNT nuking your system security?)
Ever wondered why Microsoft Windows security keeps getting stomped on? This tool surprised me:
http://technet.microsoft.com/en-us/sysinternals/bb963902
Stuff can be activated from all over the place. And mounting a disk is one of the most common spots you can see an AUTORUN light up.
Well, the subsystem identifier (if enabled by default) would be a more subtle form of the same basic mess.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-07-2011 08:48 AM
тАО03-07-2011 08:48 AM
Re: How to use SUBSYSTEM ACL's
ps: Security can be a real problem to maintain when you have trusted and untrusted code mixed together and executing in the same process context, and it's very easy to open up huge holes here.
This is at the core of AUTORUN and subsystem identifiers and any number of other ways that an attacker can (try to) burrow into a trusted application or into the VMS kernel.
It is often best to avoid the combination where you can, and to use separate processes for trusted and untrusted code. This is why auditing and alarms or the REQUEST command or a DECnet task-to-task connection can be useful; you have either OpenVMS code maintaining the separation, or you use processes to maintain separation.
And even with process-level separation of privileges, you still need to handle the parameter-passing or the data sanitization correctly where the trusted and untrusted code meets.
Variations of this attack are known as SQL injection and cross-site scripting, and these are huge problems with web tools.
--
Reposting this reply after having checked for duplicates, as ITRC is being ITRC again today.
This is at the core of AUTORUN and subsystem identifiers and any number of other ways that an attacker can (try to) burrow into a trusted application or into the VMS kernel.
It is often best to avoid the combination where you can, and to use separate processes for trusted and untrusted code. This is why auditing and alarms or the REQUEST command or a DECnet task-to-task connection can be useful; you have either OpenVMS code maintaining the separation, or you use processes to maintain separation.
And even with process-level separation of privileges, you still need to handle the parameter-passing or the data sanitization correctly where the trusted and untrusted code meets.
Variations of this attack are known as SQL injection and cross-site scripting, and these are huge problems with web tools.
--
Reposting this reply after having checked for duplicates, as ITRC is being ITRC again today.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-09-2011 12:11 PM
тАО03-09-2011 12:11 PM
Re: How to use SUBSYSTEM ACL's
And FWIW, various Unix operating systems will also mount volumes with NOSUID for similar reasons; you usually don't want any "surprises" lurking when you mount a volume.
- « Previous
-
- 1
- 2
- Next »
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
News and Events
Support
© Copyright 2024 Hewlett Packard Enterprise Development LP