OpenVMS Security Update



Similar documents
Configuring Security Features of Session Recording

OpenVMS Security. Paul Williams. Presented by. PARSEC Group th Street, Suite 1725 Denver, CO

Perceptive Content Security

VMS Authentication Module Version 3.1

SOLARIS 10 SECURITY. Technical Overview. Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Securing Data in Oracle Database 12c

Windows NT Server Operating System Security Features Carol A. Siegel Payoff

Computer Security: Principles and Practice

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Windows Server 2003 default services

Complying with PCI Data Security

SPICE auf der Überholspur. Vergleich von ISO (TR) und Automotive SPICE

Kerberos authentication made easy on OpenVMS

Digicomp Microsoft Evolution Day MIM 2016 Oliver Ryf. Partner:

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

Security IIS Service Lesson 6

iphone in Business Security Overview

Introduction to Computer Security

Introduction U41241-J-Z

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

SHARING FILE SYSTEM RESOURCES

Web Security School Entrance Exam

Introducing etoken. What is etoken?

SonicWALL PCI 1.1 Implementation Guide

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Common Internet File System

Infrastruktur Sicherheit mit Checkpoint

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

Secure Network Communications FIPS Non Proprietary Security Policy

Security White Paper The Goverlan Solution

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

Microsoft Nano Server «Tuva» Rinon Belegu

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

Security Architecture Whitepaper

White Paper. PCI Guidance: Microsoft Windows Logging

DRAFT Standard Statement Encryption

Exchange Synchronization AX 2012

Clustered Data ONTAP 8.3

PrivateServer HSM Integration with Microsoft IIS

HP A-IMC Firewall Manager

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

HP OpenVMS System Manager s Manual, Volume 2: Tuning, Monitoring, and Complex Systems

ADM:49 DPS POLICY MANUAL Page 1 of 5

Training module 2 Installing VMware View

RSA SecurID Ready Implementation Guide

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Oracle Whitepaper April Security and the Oracle Database Cloud Service

Defense Security Service Office of the Designated Approving Authority Standardization of Baseline Technical Security Configurations

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

ipad in Business Security

Enabling SSL and Client Certificates on the SAP J2EE Engine

McAfee Cloud Identity Manager

Security Advice for Instances in the HP Cloud

Features of AnyShare

RSA Authentication Manager 7.1 Basic Exercises

Check Point FDE integration with Digipass Key devices

Certification Report

What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team

CIS 551 / TCOM 401 Computer and Network Security

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Unicenter Remote Control r11

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417

Software Product Description

CA Performance Center

How Reflection Software Facilitates PCI DSS Compliance

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting

Security Controls for the Autodesk 360 Managed Services

Windows Advanced Audit Policy Configuration

Citrix NetScaler Best Practices. Claudio Mascaro Senior Systems Engineer BCD-Sintrag AG

Navigating Endpoint Encryption Technologies

This chapter describes how to set up and manage VPN service in Mac OS X Server.

IBM Security QRadar SIEM Version MR1. Administration Guide

Advanced Administration

ESM s management across multi-platforms eliminates the need for various account managers.

Benutzerfreundlich, tiefe Betriebskosten und hohe Sicherheit. Warum sich diese Ziele nicht widersprechen müssen

CGHub Client Security Guide Documentation

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

ADO and SQL Server Security

Rights Management Services

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev Seite 1 von d Seite 1 von 11

Department of Information Technology Active Directory Audit Final Report. August promoting efficient & effective local government

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Sync Security and Privacy Brief

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

System Management. What are my options for deploying System Management on remote computers?

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

/ Preparing to Manage a VMware Environment Page 1

Transcription:

OpenVMS Security Update Helmut Ammer CSSC München 1F06 25. DECUS München Symposium Bonn 2002 1 Überblick OpenVMS Security Roadmap Rückblick OpenVMS V7.3-1 Zukunft ACLs *Previously announced; subject to change 2 1

OpenVMS Security Roadmap 2002 2003 2004 2005 ITSEC C2 Security Evaluation on V7.2-2 Version 7.3-1 (Alpha only) CDSA (For IPSEC) OpenSSL API Published SYS$ACM API Published Kerberos integration Version 7.x (Alpha and VAX) Full external Authentication support External Authentication Early Adopters Kit (EAK) Encryption for OpenVMS V1.6 Alternative Authentication BIOMETRIC support 3 Smartcard OpenVMS DECwindows MUP DECwindows Motif Server has a potential Security vulnerability that could be exploited to allow existing users unauthorized access to data and system resources. CDs sind ausgeliefert. ECOs auf Webseiten Reboot notwendig Betroffen sind nur Systeme, welche DECwindows Server installiert haben Alle supporteten Versionen von OpenVMS Alpha, OpenVMS VAX, SEVMS VAX or SEVMS Alpha wurden darauf untersucht. Alle supporten Versionen mit Ausnahme von OpenVMS VAX Version V5.5-2 sind betroffen 4 2

DECwindows MUP Betroffene supportete Versionen: OpenVMS Alpha Version 6.2 einschl. aller zugeh. Hardware Releases (z.b. Version 6.2-1H1) OpenVMS Alpha Version 7.1-2 OpenVMS Alpha Version 7.2-1H1 OpenVMS Alpha Version 7.2-2 OpenVMS Alpha Version 7.3 OpenVMS VAX Version 6.2 OpenVMS VAX Version 7.1 OpenVMS VAX Version 7.2 OpenVMS VAX Version 7.3 SEVMS Alpha Version 6.2 SEVMS VAX Version 6.2 5 OpenVMS V7.3 Kerberos V1.0 based on MIT Kerberos Version 5 Release 1.0.5 Client & KDC Server Clusterwide Intrusion Detection OpenSSL integrated in CSWS (mod_ssl) 6 3

OpenVMS V7.3-1 7 Kerberos Kerberos V1.0 Security Client integriert in OpenVMS V7.3-1 Zuvor ein Layered Product 8 4

OpenSSL for OpenVMS Alpha Portierung von OpenSSL 0.9.6B Layered Product (ab V7.2-2 installierbar) PCSI Kit beinhaltet 32-bit SSL & Crypt libraries 64-bit SSL & Crypt libraries Eigenschaften: 64-bit SSL und Crypto APIs (32 bit API s as well) Dokumentation & Beispiele Neues Manual Open Source Security on OpenVMS Alpha ~200 SSL APIs (60 zuvor undokumentiert) ~40 Crypt APIs (10 zuvor undokumentiert) Certificate Tool 9 Common Data Security Architecture (CDSA) CDSA definiert eine 4-layer Architektur für cross-platform, high-level Security Services CSSM definiert ein common API & SPI für Security Services and Integrity Base Service Provider implementieren selek- tierbare Security Services Applications Layered Security Services CSSM Security API Common Security Services Manager Service Provider Interfaces Security Service Modules http://developer.intel.com/ial/security/ http://sourceforge/projects/cdsa 10 5

CDSA for OpenVMS Auslieferung als Teil von V7.3-1 Installierbar ab OpenVMS V7.2-2 Basiert auf Intel CDSA V2.0 Release 3 Voraussetzung für IPSEC Enthält RSA & OpenSSL als Crypto Service Provider 11 CDSA for OpenVMS CDSA beinhaltet: CSSM Shared Library (Common Security Services Manager) Header Files definieren CSSM APIs CSPs (Cryptographic Service Provider) MDS (Module Directory Services) ermöglicht Applikationen Service Provider zu lokalisieren 12 6

LOGINOUT OpenVMS Common User Authentication and Credential Management Model OpenVMS ACM Extension SYSUAF..DAT Common User Authentication Interface SYS$ACM Authentication and Credential Management (ACM) Authority Native Authentication Agent External Authentication Agent NT ACM Extension PATHWORKS ACME LOGIN The ability to have alternate external agents supported by the OpenVMS Common User Authentication Model will be in a future release. Kerberos ACM Extension X.509 Public- Key ACM Extension LAN Manager SYS$ACM Veröffentlicht und supportet in V7.3-1 Reduziert Authentication Calls/Schritte von 12 auf 1! Beispiel: CSWS for OpenVMS wird dies verwenden für Mod_Auth_vms Teil 1 der vollen External Authentication Lösung Teil 2 NDA Document/EAK ACME Developers Guide ACME Loginout & Set Password 14 7

ACLs 15 Was sind ACLs und ACEs ACL = Access Control List Attribut eines Objekts ACL ist eine geordnete Liste von Access Control Entries, oder ACEs ACE Typ definiert Erlaubt oder verbietet Zugriff aufs Objekt Security Alarm oder Security Audit Aktion beim Kreieren oder Benutzung des Objekts { ACE ACE ACL ACE 16 ACE 8

Objekte die ACLs unterstützen Files - Default Batch/Print Queues Devices Volumes System and Group Global Sections Logical Name Tables Common Event Flag Clusters Resource Domains Security Classes Capabilities 17 Objekte die ACLs unterstützen Resource Domains Namespace controlling lock manager resources $SET_RESOURCE_DOMAIN system service Security Classes Parent of all classes of protected objects Protects template profiles for objects See OpenVMS Guide to System Security manual 18 9

Beispiele ACL einer Logical Name Table LNM$SYSTEM_TABLE object of class LOGICAL_NAME_TABLE Owner: [SYSTEM] Protection: (System: RWC, Owner: RWC, Group: R, World: R) Access Control List: (IDENTIFIER=[PROXY,*],ACCESS=READ+WRITE) RESOURCE_DOMAIN Security Class RESOURCE_DOMAIN object of class SECURITY_CLASS Owner: [SYSTEM] Protection: (System: RW, Owner: RW, Group: R, World: R) Access Control List: (IDENTIFIER=[TESTS],ACCESS=READ+WRITE+DELETE+CONTROL) 19 Typen von ACEs Identifier ACE Default Protection ACE Creator ACE Alarm and Audit Journal ACE Subsystem ACE Application ACE 20 10

Identifier ACE Der gebräuchlichste ACE Zum Erlauben oder Verbieten von bestimmten Zugriffsrechten für Personen oder Gruppen (UIC) oder Besitzer eines bestimmten Identifiers oder environmental Identifiers 21 Identifier ACE Format - Identifiers (IDENTIFIER=identifier[+identifier...] [,OPTIONS=attributes[+attributes...]], ACCESS=access-type+[access-type...]) ACE Identifier: UICs General identifiers Environmental identifier batch, network, interactive, local, dialup, remote 22 11

Identifier ACE Format - Options (IDENTIFIER=identifier[+identifier...] [,OPTIONS=attributes[+attributes...]], ACCESS=access-type+[access-type...]) Identifier ACE Options: Default Hidden Protected Nopropagate None default case meaning no attributes 23 Identifier ACE Format - Options Default Applies to directory files only Describes ACE to be placed on a file created in this directory DEFAULT attribute removed from the ACE when propagated Has no effect on object access Hidden Indicates only application that created ACE should change it Valid for all ACE types, but intended for application ACE Need SECURITY privilege to display a hidden ACE 24 12

Identifier ACE Format - Options Protected Protects the ACE against casual deletion Can only be deleted by ACL Editor $ SET SECURITY /ACL=<ace> /DELETE $ SET SECURITY /ACL /DELETE=ALL Nopropagate Indicates that the ACE cannot be copied by operations that usually propagate ACEs $ SET SECURITY /LIKE $ SET SECURITY /DEFAULT 25 Identifier ACE Format - Access types (IDENTIFIER=identifier[+identifier...] [,OPTIONS=attributes[+attributes...]], ACCESS=access-type+[access-type...]) Identifier ACE Access Types for Files: READ WRITE EXECUTE DELETE CONTROL NONE 26 13

Beispiel Identifier ACE Mr. Spacely wants only members of the board reading the Idea Box: DSK:[SPROCKET]IDEAS_FILE.TXT;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=[BOD,*],ACCESS=READ)...but he likes to be the only one to make suggestions!! DSK:[SPROCKET]IDEAS_FILE.TXT;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=[BOD,SPACELY],ACCESS=READ+WRITE) (IDENTIFIER=[BOD,*],ACCESS=READ) 27 Beispiel Identifier ACE To keep secrets from falling into the hands of the competitors, all access to the Idea Box is protected from dialup access: DSK:[SPROCKET]IDEAS_FILE.TXT;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=DIALUP,ACCESS=NONE) (IDENTIFIER=[BOD,SPACELY],ACCESS=READ+WRITE) (IDENTIFIER=[BOD,*],ACCESS=READ) 28 14

Beispiel Identifier ACE The directory containing sprocket test data is populated by many test teams, but George has to run the data reduction tools, so he always needs to have access: DSK:[SPROCKET]TEST.DIR;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=[TESTS,JETSON],OPTIONS=DEFAULT,ACCESS=READ) When TEST_1.DAT is created in the test directory the ACE propagates: DSK:[SPROCKET.TEST]TEST_1.DAT;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=[TESTS,JETSON],ACCESS=READ) 29 Beispiel Identifier ACE One day the marketing team needs access to the test data, but care has to be taken to prevent access to subsequent runs: DSK:[SPROCKET.TEST]TEST_1.DAT;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=[MARKET,*],OPTIONS=NOPROPAGATE,ACCESS=READ) (IDENTIFIER=[TESTS,JETSON],ACCESS=READ) The next version of the file has the following ACL: DSK:[SPROCKET.TEST]TEST_1.DAT;2 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=[TESTS,JETSON],ACCESS=READ) 30 15

Beispiel Identifier ACE One day the marketing team needs access to the test data, but care has to be taken to prevent access to subsequent runs: DSK:[SPROCKET.TEST]TEST_1.DAT;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=[MARKET,*],OPTIONS=NOPROPAGATE,ACCESS=READ) (IDENTIFIER=[TESTS,JETSON],ACCESS=READ) The next version of the file has the following ACL: DSK:[SPROCKET.TEST]TEST_1.DAT;2 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=[TESTS,JETSON],ACCESS=READ) 31 Beispiel Identifier ACE The printer in the administration offices is for board members and Mr. Spacely s secretary. Henry needs to be able to fix things when they print Postscript to the ANSI queue: LN03$PRINT: object of class QUEUE Owner: [SYSTEM] Protection:(System: RSDM, Owner: RSDM, Group, World) Access Control List: (IDENTIFIER=[BOD,*],ACCESS=SUBMIT) (IDENTIFIER=[JANE],ACCESS=SUBMIT) (IDENTIFIER=[HENRY],ACCESS=MANAGE+CONTROL) 32 16

Default Protection ACE Applies to directory files only Used to describe what SOGW ("UIC-based") protection to apply to files that are created in this directory Default protection ACEs are propagated (unless marked NOPROPAGATE) to newly created subdirectories Files in subdirectories will have the same default protection The actual SOGW protection code is NOT applied to the subdirectory 33 Default Protection ACE Format - Options (DEFAULT_PROTECTION [,OPTIONS=attribute[+attribute...]],access) Default Protection Options: Hidden Protected Nopropagate None 34 17

Default Protection ACE Format - Access (DEFAULT_PROTECTION [,OPTIONS=attribute[+attribute...]],access) Default Protection Access Example SOGW mask: (DEFAULT_PROTECTION,S:RWED,O:RWED,G:RE,W) Omitted user categories imply no access for that category 35 Beispiel Default Protection ACE The company has a public directory. All files in the directory should always be world readable: DSK:[SPROCKET]PUBLIC.DIR;1 [SYSTEM] (RWED,RWED,RE,E) (DEFAULT_PROTECTION,S:RWED,O:RWED,G:RE,W:RE) A File created here will get this protection mask: DSK:[SPROCKET.PUBLIC]PUB.DOC [SYSTEM] (RWED,RWED,RE,RE) A subdirectory created in the public directory will inherit this ACE: DSK:[SPROCKET.PUBLIC]SUB.DIR;1 [SYSTEM] (RWE,RWE,RE,E) (DEFAULT_PROTECTION,S:RWED,O:RWED,G:RE,W:RE) 36 18

Creator ACE Applies to directory files only Places an ACE on a newly created file describing access for the file s creator Only applied when the following conditions exist: File is not owned by the UIC of the process creating the file The process creating the file doesn t have system privileges 37 Creator ACE Format - Options (CREATOR [,OPTIONS=attribute[+attribute...]],ACCESS=access-type[+access-type...]) Creator ACE Options Protected Nopropagate None 38 19

Creator ACE Format - Access Types (CREATOR [,OPTIONS=attribute[+attribute...]],ACCESS=access-type[+access-type...]) Creator ACE Access Types: READ WRITE EXECUTE DELETE CONTROL NONE 39 Beispiel Creator ACE It was decided that the original submitter of a file to the public directory should retain full access to the file: DSK:[SPROCKET]PUBLIC.DIR;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=PUB_ACCESS,ACCESS=READ+WRITE) (DEFAULT_PROTECTION,S:RWED,O:RWED,G:RE,W:RE) (CREATOR,ACCESS=READ+WRITE+EXECUTE+DELETE) A file created here by George will inherit the protection mask and an ACE allowing George full access: DSK:[SPROCKET.PUBLIC]PUB.DOC [SYSTEM] (RWED,RWED,RE,RE) (IDENTIFIER=[JETSON],ACCESS=READ+WRITE+EXECUTE+DELETE) 40 20

Alarm/Audit Journal ACE First ACEs in the ACL, always enforced. Specifies the access that causes a security alert An ALARM ACE sends an alarm to all security terminals An AUDIT ACE sends an audit message to the audit journal Enabled only if ACL events are audited or alarmed $ SET AUDIT /ALARM /ENABLE=ACL $ SET AUDIT /AUDIT /ENABLE=ACL Disabled by turning off ACL audits or alarms $ SET AUDIT /ALARM /DISABLE=ACL $ SET AUDIT /AUDIT /DISABLE=ACL No effect on access 41 Alarm/Audit Journal ACE Format - Options (AUDIT=SECURITY,[OPTIONS=attribute[+attribute...]],ACCESS=access-type[+access-type...]) (ALARM=SECURITY,[OPTIONS=attribute[+attribute...]],ACCESS=access-type[+access-type...]) Alarm/Audit ACE options Default Hidden Protected Nopropagate None 42 21

Alarm/Audit Journal ACE Format - Access Type (ALARM=SECURITY,[OPTIONS=attribute[+attribute...]],ACCESS=access-type[+access-type...]) Alarm/Audit ACE Access Types: Read Write Delete Execute Control and SUCCESS or FAILURE or both 43 Beispiel Alarm/Audit Journal ACE Mr. Spacely wants to adequately monitor their accounting data file: ACCOUNTNG.DAT;1 [SYSTEM] (RWED,RWED,RE,) (ALARM=SECURITY,ACCESS=DELETE+CONTROL+SUCCESS) (AUDIT=SECURITY,ACCESS=DELETE+CONTROL+SUCCESS) They d also like to see anybody that plays with the payroll file: PAYROLL.DAT;1 [SYSTEM] (RWED,RWED,RE,) (ALARM=SECURITY,ACCESS=WRITE+DELETE+CONTROL+SUCCESS+FAILURE) (AUDIT=SECURITY,ACCESS=WRITE+DELETE+CONTROL+SUCCESS+FAILURE) 44 22

Subsystem ACE Grants additional identifiers to a process while it is running the image to which the Subsystem ACE applies Applies to executable images only Not applicable to sharable images Similar in function to installing an image with privs Must enable volume support of subsystem ACEs $ SET VOLUME /SUBSYSTEM 45 Subsystem ACE Format - Options (SUBSYSTEM,[OPTIONS=attribute[+attribute...],] IDENTIFIER=identifier [,ATTRIBUTES=attribute[+attribute...]] [,IDENTIFIER=identifier [,ATTRIBUTES=attribute[+attribute...]],...]) Subsystem ACE Options Protected Nopropagate None 46 23

Subsystem ACE Format - Identifiers (SUBSYSTEM,[OPTIONS=attribute[+attribute...],] IDENTIFIER=identifier [,ATTRIBUTES=attribute[+attribute...]] [,IDENTIFIER=identifier [,ATTRIBUTES=attribute[+attribute...]],...]) Subsystem ACE Identifiers UICs General identifiers Environmental identifiers batch, network, interactive, local, dialup, remote 47 Subsystem ACE Format - Attributes (SUBSYSTEM,[OPTIONS=attribute[+attribute...],] IDENTIFIER=identifier [,ATTRIBUTES=attribute[+attribute...]] [,IDENTIFIER=identifier [,ATTRIBUTES=attribute[+attribute...]],...]) Subsystem ACE Attributes Resource For file objects only Identifier holders can charge disk space to the identifier 48 24

Beispiel Subsystem ACE The only application allowed to write to the master database is the Corporate Console. Only the Corporate Viewers can read it. The SUBSYSTEM ACEs grant identifiers to the processes: CONSOLE.EXE;1 [SYSTEM] (RE,RE,E,E) (SUBSYSTEM,IDENTIFIER=CONSOLE) VIEWER.EXE;1 [SYSTEM] (RE,RE,E,E) (SUBSYSTEM,IDENTIFIER=VIEWER) The database can then be protected using those identifiers: DATABASE.DAT;1 [SYSTEM] (RE,RE,,) (IDENTIFIER=CONSOLE,ACCESS=READ+WRITE) (IDENTIFIER=VIEWER,ACCESS=READ) 49 Application ACE Application defined Application managed Access via system services You ll know these when you see them! DSK:[SPROCKET]FILE.TXT [JETSON] (RWED,RWED,,) (UNKNOWN=%X80,SIZE=%D163,FLAGS=%X0C00,ACCESS=%X06900000, DATA=%X00000008,%X00000001,%X1D1C07F7,%X0000FFFF,%X43020434, %X00030020,%X10654FDD,%X00000000,%XFD232200,%X1F1F1EFF) 50 25

Creating and Managing ACLs Utilities that operate on ACLs System services that operate on ACLs Who can set up ACLs Order of access processing 51 What Utilities Operate on ACLs and ACEs SET SECURITY /ACL SET ACL (obsolete) SET FILE /ACL (obsolete) SHOW SECURITY /ACL SHOW ACL (obsolete) SHOW FILE /ACL (obsolete) EDIT /ACL ACE propagation COPY CREATE RENAME BACKUP DIR /FULL DIR /SECURITY DIR /ACL (obsolete) 52 26

Utilities - Set Security The V6+ way to access security attributes SET SECURITY /ACL SET SECURITY /DEFAULT Applies template security settings to object as if newly created $ SET SECURITY /DEFAULT FILE.DAT SET SECURITY /LIKE Applies security settings from the named object $ SET SECURITY /LIKE=NAME=FOO.DAT FILE.DAT 53 Utilities - Set Security and Templates Besides security attributes on objects, all types of objects have security templates that also have security attributes ACLs, owner field, and protection codes set on the object template are inherited by the object when created $ SHOW SECURITY /CLASS=SECURITY_CLASS * Shows what security classes exist, and what the security settings are for the templates 54 27

Who's Allowed to Put an ACL on an Object? The owner Users who have control access Users with privileges that grant control access BYPASS, GRPPRV, SYSPRV BYPASS, GRPPRV, SYSPRV, OPER for queues BYPASS, GRPPRV, SYSPRV, SYSNAM for logical name tables 55 What is the Order of Access Checking? Order of security checking ACLs then SOGW (also known as "UIC-based" protection) if object owner UIC is zero, protection code access is disabled! then privileges BYPASS, GRPPRV, READALL, SYSPRV OPER for queues SYSNAM for logical name tables 56 28

What Is The Order Of ACE Processing? ACEs processed from top to bottom The first matching identifier stops ACL processing If explicitly denied, only System and Owner protection codes checked, and then privileges (IDENTIFIER=[FOO],ACCESS=NONE) If implicitly denied, all protection codes are checked, and then privileges. (IDENTIFIER=[BAR],ACCESS=READ) 57 Beispiel ACE Processing It turns out that Mr. Spacely wants to be able to contribute ideas from home, so we need to rearrange the following ACL: DSK:[SPROCKET]IDEAS_FILE.TXT;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=DIALUP,ACCESS=NONE) (IDENTIFIER=[BOD,SPACELY],ACCESS=READ+WRITE) (IDENTIFIER=[BOD,*],ACCESS=READ) We ll put the dialup access restriction at the end: DSK:[SPROCKET]IDEAS_FILE.TXT;1 [SYSTEM] (RWED,RWED,,) (IDENTIFIER=[BOD,SPACELY],ACCESS=READ+WRITE) (IDENTIFIER=[BOD,*],ACCESS=READ) (IDENTIFIER=DIALUP,ACCESS=NONE) 58 29

The Condensed Version ACLs allow finer granularity control over objects All OpenVMS security objects support ACLs Security messages for all object accesses Manage ACLs from DCL or system services ACLs on directories can describe ACLs automatically applied to files created there 59 Fragen???? 60 30

31