- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Log keystokes for the SYSTEM account
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-24-2004 07:39 PM
05-24-2004 07:39 PM
as part of an audit requirement, I need to log the keystrokes entered for the SYSTEM account.
They do not want me to $set host 0/log=[filename]. They want an automated solution.
Suggestions anyone? Much appreciated.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-24-2004 07:56 PM
05-24-2004 07:56 PM
Re: Log keystokes for the SYSTEM account
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-24-2004 10:41 PM
05-24-2004 10:41 PM
Re: Log keystokes for the SYSTEM account
Perhaps your audit people are satisfied, if you put a call into LOGIN.COM for the system account for interactive logins.
You can find LOGGER e.g. here
http://ftp.uma.es/Vms/Wku/logger.zip
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-25-2004 01:38 PM
05-25-2004 01:38 PM
Re: Log keystokes for the SYSTEM account
However a lot of other questions as to the feasibility of logging the SYSTEM a/c has come up. eg. cause & affect to system performance, system startup etc. which I need to work through...
again, thanks for you help MC
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-26-2004 12:02 AM
05-26-2004 12:02 AM
Re: Log keystokes for the SYSTEM account
http://h71000.www7.hp.com/wizard/wiz_9607.html
http://h71000.www7.hp.com/wizard/wiz_4920.html
http://h71000.www7.hp.com/wizard/openvms_faq.html
(especially topic 5.2, but it's all good stuff)
You'll also want to refer to the Guide to OpenVMS System Security manual, available off of the Documentation link at http://www.hp.com/go/openvms
You will want to secure physical access to the system console, since that can be used to bypass security.
I have written a script that logs access to the SYSTEM account. Run it from SYS$MANAGER:SYLOGIN.COM. It's attached.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-26-2004 03:16 AM
05-26-2004 03:16 AM
Re: Log keystokes for the SYSTEM account
$ if (f$mode() .eqs. "INTERACTIVE") .and. -
f$getdvi("TT","TRM")
$ then
$ rlogin/log=xxx localhost
$ logout
$ endif
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-08-2004 05:08 AM
06-08-2004 05:08 AM
Re: Log keystokes for the SYSTEM account
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-08-2004 09:39 AM
06-08-2004 09:39 AM
SolutionAuditors can be rather silly at times. This request is a bit like a bank giving tellers a special ledger to record the amounts they embezzle ;-)
Since this is the SYSTEM account, there is simply NO WAY to guarantee a high integrity log on the same host. The SYSTEM account has several "ALL" class privileges, so would be able to bypass or censor any mechanism you implement.
It would be possible to make a log on a different host (on which the users of the target SYSTEM account have no privileged access). You then need to force all logins to the secure system through the gatekeeper system.
Please log a call with the CSC. I have some sample code which may help. We can also discuss performance and management.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-08-2004 02:54 PM
06-08-2004 02:54 PM
Re: Log keystokes for the SYSTEM account
if there is really a good need for it, there
is always the solution of secondary passwords for the system account. If you make sure that every person only knows one of the two passwords, you can be pretty sure that no >>single<< person can tamper with the system, you need at least two to do so ;-). This does assume physical access to the console is secured.
Greetings, Martin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-08-2004 09:29 PM
06-08-2004 09:29 PM
Re: Log keystokes for the SYSTEM account
and then you still must be able to guarantee that there is no other way to tweak the double password requirement.
How do you enforce the permanent presence of two people at the logged-on session, and simultaniously have each one of them have his/her own password regularly changed without the other being aware?
And if you want to show real paranoia, how do you guarantee those two will not form a conspiracy?
Somewhere on the line you will hit the point where you just plainly HAVE to rely on some amount of trust...
Jan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-09-2004 12:16 AM
06-09-2004 12:16 AM
Re: Log keystokes for the SYSTEM account
"If you don't trust anyone, don't allow anyone even near your machine and unplug all network connections"
I would add: "and if you're really paranoid, disconnect it from the main power as well, there might be nerds out there trying to break in along THAT way"
Ridiculous, of course. ;-))
Audit is fine. Being suspicious is Ok in some degree put paranoia tends to drift off into the blue. This type of audit logs tend to get quite unworkable
Best way to secure the system and keep a _workable_ audit log, just use some common sense. Of course you may run into exceptions, but these should be very rare (that means: exceptional).
1. NEVER use SYSTEM login, except when really required (typically installation) and then only from the console. A secondary (SYSTEM) password can be an extra barrier. Limit this to just a few people.
Diasllow interactive login, normally.
Have a password lifetime long enough to login and finish the intended activity, but as short as possible.
2. Strip authorized privileges to the bare bones to what a person REALLY needs. Same for default - being a (minimal) subset of authorized privileges.
Those that require access conform SYSTEM would need just enough privileges as well.
NEVER GIVE OUT SETPRV or BYPASS. These are 'never' needed.
3. That means that people that really need SYSTEM-like access can do with just their needs - normally a subset of the whole bunch. They can always set their level of privilege to match their need (BTW - kan SET PROC/PRIV be audited). One possibility they will need is to generate a new SYSTEM password and change other attributes when needed (this can be audited!).
4. If you do your SYSTEM work, keep away as far as you can from using arrowkeys (buffer recall), fullscreen editor....It makes the log quite unreadble.
The _easiest_ way for audit log is a plain-ASCII teletype terminal as I used to have them on PDP's. If you have a VT terminal hookedup as a console, you could think of attaching a printer to it and set it to follow in- and output.
Willem
OpenVMS Developer & System Manager