- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Re: Open VMS BASIC programming Doubt
Operating System - OpenVMS
1753797
Members
7524
Online
108799
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-18-2007 11:05 PM
11-18-2007 11:05 PM
Re: Open VMS BASIC programming Doubt
Does "Secure subsystem" mean the following:
* Define an identifier (named after the application), with attribute RESOURCE
* Make that identifier OWNER of the files of the application
* Set these files O:RWED, or (better) craete an ACE to the file that allows DELETE for this identifier
* Grant the identifier to the user that needs ro handle the file (that is: DELETE access for RENAME)
If so, I learned something. If not, take it in consideration.
Aopart from that: The program should be aletered to handle conditions the RIGHT way. A foreseeable condition like this should NEVER blow the image.
* Define an identifier (named after the application), with attribute RESOURCE
* Make that identifier OWNER of the files of the application
* Set these files O:RWED, or (better) craete an ACE to the file that allows DELETE for this identifier
* Grant the identifier to the user that needs ro handle the file (that is: DELETE access for RENAME)
If so, I learned something. If not, take it in consideration.
Aopart from that: The program should be aletered to handle conditions the RIGHT way. A foreseeable condition like this should NEVER blow the image.
Willem Grooters
OpenVMS Developer & System Manager
OpenVMS Developer & System Manager
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-05-2007 05:23 AM
12-05-2007 05:23 AM
Re: Open VMS BASIC programming Doubt
I think I agree with John G. This is a bad case of re-inventing a wheel.
If the user doesn't have privilege to do X but you want that user to have the privilege when running Y but you don't want that user to have the privilege when running Z...
This sounds like a confused security design. You want to have your cake and eat it too. In essence, this design GUARANTEES job security because no one will ever figure out what you did. (Oops - may have answered my own question of WHY BOTHER...)
Seriously, either the user can or cannot delete a given file. It is either fish or fowl, no middle ground. So... what would be the value added to such a situation?
Logging? Put an Audit ACL on the directory or write logging code for every action of a certain class to occur in your menu system.
Extra security checks? OK, I could see that - but why? In the final answer is still going to be "can delete" or "can't delete." What is the REAL purpose here? If you tell us what you REALLY wanted, we might be able to help you rethink the problem in a clearer light.
If the user doesn't have privilege to do X but you want that user to have the privilege when running Y but you don't want that user to have the privilege when running Z...
This sounds like a confused security design. You want to have your cake and eat it too. In essence, this design GUARANTEES job security because no one will ever figure out what you did. (Oops - may have answered my own question of WHY BOTHER...)
Seriously, either the user can or cannot delete a given file. It is either fish or fowl, no middle ground. So... what would be the value added to such a situation?
Logging? Put an Audit ACL on the directory or write logging code for every action of a certain class to occur in your menu system.
Extra security checks? OK, I could see that - but why? In the final answer is still going to be "can delete" or "can't delete." What is the REAL purpose here? If you tell us what you REALLY wanted, we might be able to help you rethink the problem in a clearer light.
Sr. Systems Janitor
- « Previous
-
- 1
- 2
- Next »
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
News and Events
Support
© Copyright 2024 Hewlett Packard Enterprise Development LP