- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- restricting MONITOR for unprivileged users
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-20-2009 10:54 AM
тАО08-20-2009 10:54 AM
restricting MONITOR for unprivileged users
For such users the SHOW USERS and SHOW SYSTEM command will only display the processes that they own - after you have done an INSTALL REPLACE SHOW command that removes WORLD privilege.
I'm looking for a similar way to restrict the information that MONITOR will display. I'd rather not have to change the file protection on MONITOR_TV.EXE itself.
Alpha VMS 7.3-2.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-20-2009 11:06 AM
тАО08-20-2009 11:06 AM
Re: restricting MONITOR for unprivileged users
The usernames are not generally considered sensitive per most typical military security reviews; this sort of data is really hard to completely lock down. You can probe users with MAIL, for instance.
Here, I'd just protect MONITOR, or remove it. Hacking the default protections and settings of OpenVMS will increase support costs. But if you're in for a penny, you're in for a pound.
For higher security, just don't let random folks at DCL. Using the CAPTIVE flag is typical here. Or don't let folks onto the box (interactive) at all.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-20-2009 11:44 AM
тАО08-20-2009 11:44 AM
Re: restricting MONITOR for unprivileged users
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-20-2009 12:29 PM
тАО08-20-2009 12:29 PM
Re: restricting MONITOR for unprivileged users
The clients have no access to MAIL, the network, or our compilers. (Yes, I know its possible to hack together an .EXE using an editor and DCL.)
We do not wish these clients to know the name, or even the number, of other clients on the system, or the name of our system processes.
We have removed WORLD and CMKRNL from VMS installed images, but that does not inhibit MONITOR.
We also have inhouse users who are trusted with WORLD privilege but not READALL/SYSPRV/BYPASS. So to protect MONITOR_TV or SPISHR from clients, but still allow any inhouse user to run MONITOR my only option seems to be using an access control list.
My question is: Are there any other options?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-20-2009 01:28 PM
тАО08-20-2009 01:28 PM
Re: restricting MONITOR for unprivileged users
Do what various secure sites do? Pick bogus usernames. Done. If you're really paranoid, make them one-shot names.
If you want to offer timeshare in parallel, then some stuff is going to be visible. It's _really_ hard to hide this stuff, which is why even systems evaluated to NCSC Class B1 security don't try to hide this sort of user data.
If the box is capable of it (and you're willing to pay for the option), you could also brute-force it and use OpenVMS Galaxy. Or with a small fleet of boxes, roll in a prebuilt OpenVMS installation, and treat the box as a single user. Or there's always emulation, too.
Or you tell the customers that "some aspects of your on-line activities might be visible".
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-23-2009 01:54 PM
тАО08-23-2009 01:54 PM
Re: restricting MONITOR for unprivileged users
Although MONITOR is a privileged image, it's not those privileges that enable it to gather information about other processes. It uses SPISHR to get performance information. SPISHR is a protected image, and uses that mechanism to access otherwise privileged information.
I doubt SPISHR would work if not installed protected. If there are legitimate things your uses should be able to do with MONITOR, you may be able to implement your own version with your required limitations imposed. That won't block users acquiring a distribution copy of MONITOR, and/or writing their own code which calls SPISHR.
Another option would be to implement you own SPISHR which obfuscates process and user names, maybe just replace them all with PID strings?
Note that it's one thing to break the ability of MONITOR to display real time information. It may be entirely different to block it from recording a snapshot and playing it back (possibly on a different sysetm).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-24-2009 04:55 AM
тАО08-24-2009 04:55 AM
Re: restricting MONITOR for unprivileged users
Different DCLTABLES with and without MONITOR? Or an ACL to allow MONITOR for "power users" only?
Cheers,
Art