T.R | Title | User | Personal Name | Date | Lines |
---|
679.1 | OA$ADMIN makes the difference | BUFFER::VICKERS | Rearranging the DEChairs | Wed May 13 1992 01:38 | 27 |
| Joan,
Almost certainly, the reason that you were able to change the profile
records even with no privileges is that you have the OA$ADMIN
identifier. Only accounts with OA$ADMIN are allowed to change profile
records which they do not own.
I am not aware of any way around this particular part of the ALL-IN-1
security system.
It sounds like the users on the system are sufficiently otherwise
engaged that giving their VMS UAF records the OA$ADMIN privilege
shouldn't be THAT risky. If they don't have the ADMIN forms library
they won't be able to get to the UI of the administrator subsystem.
A sufficiently computer and system knowledgeable person could use
OA$ADMIN to submit batch jobs that could do some harm.
You certainly could try granting the OA$ADMIN identifier to one of the
user accounts and verify that the 'joint' can be rolled that way. You
then have the security issues to ponder. Hopefully, someone can give
you some pointers that may be less risky.
I assume that these 'joints' are the safe kind. Safe meaning that they
are in Great Britain and not inhaled? That's Bill Clinton 'humour'.
Keep smiling,
don
|
679.2 | A Quick play with ACLs? | IOSG::PYE | Graham - ALL-IN-1 Sorcerer's Apprentice | Wed May 13 1992 09:50 | 19 |
| The profile can be updated if the updating process has *DEFAULT* access
to the profile file. As Don says, there's also a special check for
Administrators, although I can't remember whether it's based on the
Admin flsag in the profile, or having the ACL.
It's possible that you may just be able to give people the Admin flag
and not the ACL, causing the image to raise provs to access it. But
maybe not. Even if this worked, you'd then get the problem that seeing
the Admin flag at initialisation time, we'd try to open the SYSTEM.PST
for writer, but fail, since the user wouldn't have the ACL to get to
it.
Perhaps you could just put some write ACLs on the profile, which you
just grant to these JT users?
Graham
PS In Britain, "joint" still has the meaning of what one of my college
friends used to call "naughty ciggies"....
|
679.3 | 2.4 Upgrade could be the problem?? | LARVAE::COLLINS_J | | Wed May 13 1992 10:54 | 29 |
| >Almost certainly, the reason that you were able to change the profile
>records even with no privileges is that you have the OA$ADMIN
>identifier.
I did have the OA$ADMIN id originally, but I removed it from my UA
along with other all other privileges. My account 'looked' exactly
the same as the user's account I was testing.
>The profile can be updated if the updating process has *DEFAULT*
>access to the profile file.
Sorry to be a pain, but could you explain the above - I'm still
fairly new to ALL-IN-1 and as I'm begining to find out - there's a lot
to learn and understand!
One thing I forgot to mention in all this, these users were able to
update their profile prior to 2.4 upgrade that took place recently!
I'm going to attempt to speak to user, log into his account and put a
trace on then do the same on my own account and check the differences of
both. If this doesn't show anything, then I'll do the same from an
account on the other cluster (This cluster isn't presenting the same
problem and in theory they're now supposed to be the same "COMMON
SYSTEM" In practice however....well I'm not so sure...) anyway I will
let you know the outcome of my findings!!
Thanks & regards
Joan
|
679.4 | A slightly fuller story :-) | IOSG::PYE | Graham - ALL-IN-1 Sorcerer's Apprentice | Wed May 13 1992 11:59 | 38 |
| Joan,
I didn't realise that you were "new on the block" or I would have
explained it in more detail.
The Profile file is protected against write by anyone other than
system, so that people can't hack into it to give themselves ALL-IN-1
privs they shouldn't have. Unfortunately, this means that you can't
update those fields in the profile that you aresupposed to have access
to, like mail status etc. So when you try to write to the profile, the
code turns on its image SYSPRV to write to the file, assuming a certin
set of checks have passed...
First call the VMS System service $CHECK_ACCESS to see if the user has
write access to the OA$DATA:PROFILE.DAT file. Now you might want to
look up the description of this in the books, but basically one of its
"features" is that it is intended to be used to establish if some other
user could access a file, so it decided if the access is permitted
based on what their *default* privs and identifiers are in AUTHORIZE,
rather than anything that might be currently turned on. So having
SETPRV as an authorized prov doesn't help, since the system service
doesn't see that as enabling you to turn on SYSPRV (or BYPASS!!) to get
to the file.
Then, if the admin flag is set in the profile (NB *NOT* the posession
of the OA$ADMIN ACL) then privs are turned on to write to the file, so
it doesn't matter how it's protected or what other privs you have.
Next check whether it's our own record we're trying to change, don't
allow other records to be changed.
Finally the code checks if the field is one of the fields in the
PROFILe form, which is the set that unprivileged users are allowed to
change. If so, turn on image privs and go ahead.
Hope that helps,
Graham
|