home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!stanford.edu!agate!ucbvax!CCS1.BBN.COM!RMCEWEN
- From: RMCEWEN@CCS1.BBN.COM (Regis McEwen)
- Newsgroups: comp.os.vms
- Subject: Re: SYSUAF.DAT access - the real world
- Message-ID: <01GTTRFB70ZO002FVU@ccs1.bbn.com>
- Date: 22 Jan 93 20:50:00 GMT
- Sender: daemon@ucbvax.BERKELEY.EDU
- Distribution: world
- Organization: The Internet
- Lines: 48
-
- In article <9301202243.AA01736@uu3.psi.com>, leichter@lrw.com (Jerry Leichter) writes:
-
- [...]
-
- > In Mr. Perucci's position, the ideal would be to be able to give the auditor
- > read-only access to the SYSUAF. Unfortunately, AUTHORIZE demands WRITE
- > access. I consider this a serious limitation, since it makes it unnecessarily
- > more difficult to implement an "outside auditor" facility. One way to do this
- > would be to give the auditor just read access and have him copy the live
- > SYSUAF.DAT to a private file, which he could then modify to his heart's
- > content without damaging anything. Another approach is to trust the auditor
- > not to do anything stupid - but have someone else check the audit logs for any
- > changes he might make to the SYSUAF. (Again, make sure two people have to
- > work together to subvert the system.)
- >
- > Of course, with the listings it should be simple to patch AUTHORIZE NOT to
- > demand write access - just pull out the explicit check. If it keels over when
- > someone tries to write to the file, well, big deal.
-
- Another suggestion along these lines is to write a GETUAI program,
- installed with SYSPRV and WORLD that has the "look and feel" of
- AUTHORIZE. Several DECUS programs and a few by Joe Meadows could
- be used as a jump-off point to cannibolized one together.
-
- Or a quick-n-dirty solution would be to have a program installed that
- will only do a (pseudo-code):
-
- $ read/prompt="Username [*]: " sys$command: username
- $ if username .eqs. "" then username := "*"
- $ define/user sysuaf sys$system:sysuaf.dat
- $ mcr authorize list/full 'username (or show/full)
-
-
- Subtlely (or not so subtlely!) hidden observation in your post is
- that while some of us are charged with the responsibility of machines:
- security, maintenance, integrity, whatever -- the machine is still
- not *OURS* -- we are just the caretakers of a resource that might
- even be used or owned by others. And sometimes that means, unless a
- specific request goes against your princibles, that you have to come
- up with a solution you'd might not feel entirely comfortable with.
-
- Real world situations, demand real world solutions:
-
- Good post, Jerry !
-
-
- -Regis
-
-