home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.os.vms
- Path: sparky!uunet!think.com!sdd.hp.com!ux1.cso.uiuc.edu!news.cso.uiuc.edu!jsue
- From: jsue@ncsa.uiuc.edu (Jeffrey L. Sue)
- Subject: Re: Failures in system security.
- References: <1duniqINNkrp@gap.caltech.edu> <1992Nov13.100241.254@rlgsc.com> <1e2e81INN9h4@gap.caltech.edu>
- Message-ID: <1992Nov16.154413.13758@ncsa.uiuc.edu>
- Originator: jsue@troon.ncsa.uiuc.edu
- Sender: usenet@news.cso.uiuc.edu (Net Noise owner)
- Organization: The Dow Chemical Company
- Date: Mon, 16 Nov 1992 15:44:13 GMT
- Lines: 39
-
- In article <1e2e81INN9h4@gap.caltech.edu> carl@SOL1.GPS.CALTECH.EDU writes:
- >In article <1992Nov13.100241.254@rlgsc.com>, gezelter@rlgsc.com writes:
- >>> I understand that in version 5.5-2 DEC modified things so that to request an
- >>> outgoing connection to object 27 one needs SYSPRV.
- >
- >Clarification: They now allow the system manager to enable such a feature.
- >
- >>Sorry to be the bearer of bad news, but requiring SYSPRV on the
- >>outgoing connection merely makes it slightly more difficult to
- >>fake a connection, it is NOT a useful indication of authenticity.
- >
- >If you use NCP to set access for all but trusted nodes (where a trusted node
- > is
- >one which you know has the new feature enabled) to OUTGOING only, then you
- >know
- >(assuming that there are no security bugs in the MAIL image) that any one-hop
- >mail message originates either:
- > 1) From the ostensible author; or
- > 2) From a privileged user or process on one of the trusted machines; or
- > 3) From someone with PHY_IO priv or equivalent on a machine that is
- > impersonating one of the trusted machines.
- >While that's not 100% secure, it's a lot more secure than VMS mail has been in
- >the past.
-
- Tell you what. You give me a PC on your network with Ethernet & DECnet,
- and we'll just see who your VAX thinks I am. Remember, *I* am the system
- manager for my PC/MAC/VAXstation. Thus I can look like anyone I want.
- And if I know that your system is down, or if I can interrupt the network
- connection between systems (place myself in the middle), I can even do
- it without anyone knowing.
-
- Also, I don't think it takes PHY_IO privilege to open a network object.
- If you know what VMS Mail expects as input from the network connection I
- believe it's very easy in DCL to fake it out.
-
- --
- -----
- Jeff Sue
- - All opinions are mine - (and you can't have any, nya nya nya)
-