home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!walter!att-out!pacbell.com!sgiblab!bridge2!news.claremont.edu!nntp-server.caltech.edu!SOL1.GPS.CALTECH.EDU!CARL
- From: carl@SOL1.GPS.CALTECH.EDU (Carl J Lydick)
- Newsgroups: comp.os.vms
- Subject: Re: Failures in system security.
- Message-ID: <1e8lskINNgmo@gap.caltech.edu>
- Date: 16 Nov 92 17:30:59 GMT
- References: <1duniqINNkrp@gap.caltech.edu> <1992Nov13.100241.254@rlgsc.com> <1e2e81INN9h4@gap.caltech.edu>,<1992Nov16.154413.13758@ncsa.uiuc.edu>
- Reply-To: carl@SOL1.GPS.CALTECH.EDU
- Organization: HST Wide Field/Planetary Camera
- Lines: 45
- NNTP-Posting-Host: sol1.gps.caltech.edu
-
- In article <1992Nov16.154413.13758@ncsa.uiuc.edu>, jsue@ncsa.uiuc.edu (Jeffrey L. Sue) writes:
- >>While that's not 100% secure, it's a lot more secure than VMS mail has been in
- >>the past.
- >
- >Tell you what. You give me a PC on your network with Ethernet & DECnet,
- >and we'll just see who your VAX thinks I am. Remember, *I* am the system
- >manager for my PC/MAC/VAXstation. Thus I can look like anyone I want.
- >And if I know that your system is down, or if I can interrupt the network
- >connection between systems (place myself in the middle), I can even do
- >it without anyone knowing.
-
- As I said, it takes someone with PHY_IO or equivalent. Having your own
- transceiver on the network certainly counts as equivalent to PHY_IO. As to
- what happens when you start issuing packets that are alleged to come from a
- machine other than your own, it that machine is actually up, running, and on
- the DECnet, both I and the manager of the machine you're impersonating are
- going to see odd things happening to DECnet. In those circumstances, you're
- not going to be able to impersonate another node without leaving tracks.
-
- >Also, I don't think it takes PHY_IO privilege to open a network object.
- >If you know what VMS Mail expects as input from the network connection I
- >believe it's very easy in DCL to fake it out.
-
- It takes PHY_IO priv to spoof the NCB. When you construct your own NCB, that
- doesn't affect what the remote process sees as the NCB (well, since you can
- include some user data in the NCB, that part can be affected). DECnet
- constructs the NCB that the remote process sees. If you want the remote
- process to see a phony NCB, you've got to build and dispatch your own packets.
- This requires PHY_IO.
-
- Also, as I pointed out at the beginning of my article (didn't you actually read
- it?), starting with VMS v5.5-2, DEC allows the system manager the option of
- setting things up so that making an outgoing connection to the MAIL object
- requires SYSPRV. Other network objects can still be opened with just NETMBX, I
- think, but DEC finally made it (as I said in my article, to which you've
- apparently replied without reading it) somewhat harder to counterfeit mail over
- DECnet.
- --------------------------------------------------------------------------------
- Carl J Lydick | INTERnet: CARL@SOL1.GPS.CALTECH.EDU | NSI/HEPnet: SOL1::CARL
-
- Disclaimer: Hey, I understand VAXen and VMS. That's what I get paid for. My
- understanding of astronomy is purely at the amateur level (or below). So
- unless what I'm saying is directly related to VAX/VMS, don't hold me or my
- organization responsible for it. If it IS related to VAX/VMS, you can try to
- hold me responsible for it, but my organization had nothing to do with it.
-