home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!stanford.edu!rutgers!cs.utexas.edu!qt.cs.utexas.edu!yale.edu!yale!gumby!destroyer!sol.ctr.columbia.edu!zaphod.mps.ohio-state.edu!moe.ksu.ksu.edu!deimos.cis.ksu.edu!mccall!mccall!tp
- From: tp@mccall.com (Terry Poot)
- Newsgroups: vmsnet.misc
- Subject: Re: How to boot VMS from a failed AUDIT writingRE
- Message-ID: <1992Aug19.175025@mccall.com>
- Date: 19 Aug 92 23:50:25 GMT
- References: <1992Aug10.142728.4397@mic.ucla.edu>
- <1992Aug11.123003.247@winkle.bhpese.oz.au> <1992Aug18.094524@mccall.com> <1992Aug19.082759.1@zodiac.rutgers.edu>
- Reply-To: tp@mccall.com (Terry Poot)
- Organization: The McCall Pattern Co., Manhattan, KS, USA
- Lines: 53
- Nntp-Posting-Host: mis1
- Nntp-Posting-User: tp
-
-
- In article <1992Aug19.082759.1@zodiac.rutgers.edu>, leichter@zodiac.rutgers.edu
- writes:
- >Terry Poot complains that the default configuration of the audit server makes
- >the system unbootable if the audit log fills.
- >
- >This is really due to the DoD! ...
-
- Thanks for the explanation. I'll grant that it has to start up in an
- out-of-the-box system. But DEC could have made it easier and more obvious to get
- rid of it for us non DOD types.
-
- In article <78018@ut-emx.uucp>, D.Nash@utexas.edu (Donald L. Nash) writes:
- >>A much more effective command which will prevent the problem from
- >>reoccuring is set audit/server=stop, preferably in the system startup
- >>procedure.
- >
- >I found out how to keep the audit server from ever starting up in the
- >first place. In the SYSMAN STARTUP database STARTUP$STARTUP_VMS, there
- >is a file called VMS$CONFIG-050_AUDIT_SERVER.COM. Disable this file (on
- >all nodes, if you're in a cluster), and the audit server will never
- >start.
-
- That's pretty good, but...
-
- >You just need
- >to remember to do it every time you upgrade VMS (oops, I mean OpenVMS :-).
-
- That isn't good at all. My method "set audit/server=exit" is permanent, if less
- clean (I get audit server starting and stopping messages on each node).
-
- DEC could have followed their existing precedents, by providing a logical name
- that could be set in systartup_v5 (I could even live with it sysecurity) by
- putting a commented out definition of that logical name with a comment block in
- the template file that they ship. Since it'd only be looked at at system startup
- time, it certainly wouldn't be a security hole.
-
- When you set up a new system (or do an upgrade), you go through the templates as
- a matter of course. If it were there, many more people would see it and read the
- comments and realize that there this was something they needed to think about.
- The comments could direct them to the docs. For examples, look at the current
- systarup_v5.template (I'm on 5.5) and notice the logicals DECW$IGNORE_DECNET and
- DECW$IGNORE_DECWINDOWS.
-
- I know I certainly would have seen it there, and if the warning next to it were
- sufficiently clear, I'd have done something about it. You don't even have to be
- clear if you are ominous enough. Something like "if the auditserver starts, it
- can take your system down in ways difficult to repair, so you'd better read up
- on it in the security manual." would scare me enough to send me to the doc set!
- --
- Terry Poot <tp@mccall.com> The McCall Pattern Company
- (uucp: ...!rutgers!depot!mccall!tp) 615 McCall Road
- (800)255-2762, in KS (913)776-4041 Manhattan, KS 66502, USA
-