[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference iosg::all-in-1_v30

Title:*OLD* ALL-IN-1 (tm) Support Conference
Notice:Closed - See Note 4331.l to move to IOSG::ALL-IN-1
Moderator:IOSG::PYE
Created:Thu Jan 30 1992
Last Modified:Tue Jan 23 1996
Last Successful Update:Fri Jun 06 1997
Number of topics:4343
Total number of notes:18308

1851.0. "OAFC$SERVER and OAFC$DEFAULT accounts" by BERN02::MUELLERS (Stefan A. M�ller DTN 761-4864) Wed Nov 25 1992 14:36

    Hi,
    
    Is there anybody who can explain (or give me a pointer to the
    appropriate documentation) what the accounts OAFC$SERVER and
    OAFC$DEFAULT are used for?
    
    I have some INSPECT )-: conflicts which I should clean up...
    
    Stefan
T.RTitleUserPersonal
Name
DateLines
1851.1OAFC$DEFAULT & *WORLDDUBSWS::EIJSWed Nov 25 1992 17:5412
    
    Stefan,
    
    I've no docs at hand (but I should only being 5 feet away from EDU here
    in Dublin ;-)), but last time I saw OAFC$DEFAULT used it was for a
    'Remote' user accessing a Drawer on out system which had *WORLD defined
    as access level. So, as the 'remote' user didn't have a PROXY set up,
    the OAFC$DEFAULT served as the account to access the drawer.
    
    Ciao,
    
    	Simon
1851.2Here's what they are forCHRLIE::HUSTONWed Nov 25 1992 18:2522
    
    re .0
    
    Here's what they are for...
    
    OAFC$SERVER: This is the account that the FCS is started from. It is 
                 created with the privs needed during the installation of
                 the FCS.  It will never be logged into, this is the
                 INSPECT problem we have run into with it.
    
    OAFC$DEFAULT: Again, this will never be logged into. THe FCS uses this
                 account on a remote connection (brokering), remote
                 connections are authenticated via proxy checks, when you 
                 don't have a proxy check we (the FCS) authenticates you 
                 into OAFC$DEFAULT, this is how the FCS allows world
                 access. We gotta let you in as someone with no privs so
                 that you have access to world accessible docs, so we 
                 create this one during installation for that reason. It
                 should not be priv'd.
    
    --Bob
    
1851.3Some more questions...BERN02::MUELLERSStefan A. M�ller DTN 761-4864Thu Nov 26 1992 08:3123
    Thanks for your quick answers, Simon and Bob!
    
    I still have some questions:
    
    1.	Where are this accounts documented?
    
    2.	>This is the account that the FCS is started from. It is
    	>created with the privs needed during the installation of
    	>the FCS.  It will never be logged into, this is the
    	>INSPECT problem we have run into with it.
    
    	What means "...during the installation of the FCS."? Installation
    	of the image during system startup or installation of FCS during
    	VMSINSTAL?
    
    	
    3.	What do you suggest to overcome the INSPECT problem? 
    	(The only dirty way I found was to stop FCS, backup SYSUAF.DAT and 
    	RIGHTSLIST.DAT, delete the OAFC$* accounts, run INSPECT, restore 
        SYSUAF.DAT and RIGHTSLIST.DAT)
    
    
    	Stefan
1851.4ALL-IN-1 Installation; Get INSPECT Fixed!!IOSG::PYEGraham - ALL-IN-1 Sorcerer's ApprenticeThu Nov 26 1992 11:4618
    2. The ALL-IN-1 installation creates the accounts. We tell you about it
    in the log. We ask you for UICs, but we make up the passwords, since
    you'll never log into these accounts.
    
    
    3. Get INSPECT fixed to cope with this sort of requirement, which must
    be common to other products too.
    
    What exactly does INSPECT complain about?
    
    Run a batch job that uses the account every couple of weeks to make it
    look active? Login to it interactively occassionally?
    
    It's possible that you can disable a lot of the access to these
    accounts and have everything still work. Bob would need to confirm
    that!
    
    Graham
1851.5IOSG::MARCHANTOnly parrots succeedThu Nov 26 1992 17:039
    There are a number of these `server' accounts that fail INSPECT (e.g.
    EPC$SERVER, DFS$SERVER.)  See note #466 in the IAMOK::INSPECT_SRF notes
    conference for a (oldish) discussion on this.

    Cheers,
        Paul

    (Strictly speaking, it is not INSPECT that is broken but the security
    policy [11.1].  INSPECT just checks your compliance with the policy.)
1851.6Can't remove the accountsCHRLIE::HUSTONMon Nov 30 1992 14:0328
    
    >3. Get INSPECT fixed to cope with this sort of requirement, which must
    >be common to other products too.
    
    As .5 mentions, it is the security policy, not inspect that is broken.
    DNS$SERVER is another that we have had problems with.
    
    >What exactly does INSPECT complain about?
    
    It complains about a priv'd account not being logged into in x days, 
    same for OAFC$DEFAULT, but x is bigger for non-priv'd accounts.
    
    >Run a batch job that uses the account every couple of weeks to make it
    >look active? Login to it interactively occassionally?
    
    Won't work, I believe you actually have to log into the account. 
    
    >It's possible that you can disable a lot of the access to these
    >accounts and have everything still work. Bob would need to confirm
    >that!
    
    We REQUIRE OAFC$DEFAULT to be there so you can't do much about this
    one. You could always change the FCS startup file to start hte FCS
    under another account, I don't recommend it, but it would work as long
    as the account you use has the proper privs and quotas.
    
    --bob
    
1851.7Program to update batch login datesBERN02::MUELLERSStefan A. M�ller DTN 761-4864Tue Dec 01 1992 07:4813
	Hi,

	I asked our security manager what to do to avoid the described INSPECT
	conflict.

	He gave me a program that fixes the problem of template/broker accounts.
	It must be run regularly (eg. once a month from sched) to update the
	batch access date of the account. This stops inspect complaining about
	them.

	The program image may be copied from bern02::sys$kits:uaf_hack.exe

	Stefan