| T.R | Title | User | Personal Name
 | Date | Lines | 
|---|
| 3979.1 |  | RMULAC::S_WATTUM | Scott Wattum - FTAM/VT/OSAK Engineering | Thu May 29 1997 14:25 | 5 | 
|  | Do other applications (like FAL) have a problem, or just MAIL?  DECnet is
considered a "trusted user" and so doesn't present a password to loginout (which
is why passwords don't show up in NCL - they simply aren't there); if loginout
is reporting an invalid password, I would suspect maybe some OpenVMS component
is confused (as opposed to DECnet).
 | 
| 3979.2 | $ show intrusion | VELI::KORKKO | Veli K�rkk� @FNO, 879-5512 | Thu May 29 1997 14:45 | 23 | 
|  |         The most likely explanation is that intrusion subsystem has
        started evading your "login" attempts. Very simple way to
        reproduce this is
        
        VELI$ show intrusion
        VELI$ dir 0"nosuchuser nevermindpwd"::
        VELI$ dir 0"nosuchuser nevermindpwd"::
        VELI$ dir 0"nosuchuser nevermindpwd"::
        VELI$ dir 0"nosuchuser nevermindpwd"::
        VELI$ dir 0"nosuchuser nevermindpwd"::
        VELI$ dir 0"nosuchuser nevermindpwd"::
        VELI$ show intrusion
        VELI$ mail/subj=test/noself nla0: veli::_korkko
        
        and by golly, it fails! Now
        
        VELI$ delete/intrusion *
        VELI$ mail/subj=test/noself nla0: veli::_korkko
        
        and it should work right now. I am running OpenVMS V7.1,
        DECnet/OSI V7.1 btw.
        
        _veli
 | 
| 3979.3 | Fal fails too.  Intrusions are not the problem. | GADWAL::W_MCGAW |  | Thu May 29 1997 15:05 | 20 | 
|  |     RE: .1
    
    Hi Scott!
    
    Fal also fails the same way.  If I set a password in UAF, I can use
    explicit access to get in with a dir command through either the
    fal$server or mail$server account.  I had Alan Anderson looking at it
    too and we both came up with a blank... :)
    
    Re:.2
    
    I am very aware of the intrusion records.   This will fail even when no
    intrusion records are present.  It creates one as a result of the
    failure and the account in UAF actually incremaents the login failure
    count.
    
    Any other ideas?
    
    Thank you,
    Walt
 | 
| 3979.4 |  | ALPHAZ::HARNEY | John A Harney | Thu May 29 1997 19:29 | 15 | 
|  | re: .3
You said $ SHOW INTRUSION doesn't show anything.
What about $ SHOW INTRUSION/OLD ?
The $ DELETE/INTRUSION * might help; it clears the "old" database that
some applications believe they understand as well as the new database
of intrusion records.
Also, the actual audit (as opposed to the alarms) should eventually
start showing the password being attempted, if intrusion detection and
breakin evasion are being tickled.
\john
 | 
| 3979.5 |  | VELI::KORKKO | Veli K�rkk� @FNO, 879-5512 | Fri May 30 1997 08:03 | 8 | 
|  | How about 
$ show logical sys$single_signon
i.e. do you have external authentication active by any chance? Btw., what is
the value LGI_CALLOUTS?
_veli
 | 
| 3979.6 | Still not working... | GADWAL::W_MCGAW |  | Fri May 30 1997 09:55 | 59 | 
|  | re: .4
Hi John,
>You said $ SHOW INTRUSION doesn't show anything.
>What about $ SHOW INTRUSION/OLD ?
>The $ DELETE/INTRUSION * might help; it clears the "old" database that
>some applications believe they understand as well as the new database
>of intrusion records.
There were indeed old intrusion records too but only suspect.  At any 
rate, I deleted the intrusions with a * and tried again but I still fail 
the login.
>Also, the actual audit (as opposed to the alarms) should eventually
>start showing the password being attempted, if intrusion detection and
>breakin evasion are being tickled.
I'm not sure I understand what you mean by the actual audit.  Since this is
PhaseV, the login is not suppose to even use a password.  Phase IV needed
it on the object but under PhaseV, you don't even have a place to enter a
password for the session control object.
re: .5
Hi Veli,
>How about 
>$ show logical sys$single_signon
This returned:
%SHOW-S-NOTRAN, no translation for logical name SYS$SINGLE_SIGNON
>i.e. do you have external authentication active by any chance? Btw., what is
>the value LGI_CALLOUTS?
SYSGEN>  SHOW LGI
Parameter Name           Current    Default     Min.      Max.     Unit  Dynamic
--------------           -------    -------    -------   -------   ----  -------
LGI_BRK_TERM                    1          1         0          1 Boolean    D
LGI_BRK_DISUSER                 0          0         0          1 Boolean    D
LGI_PWD_TMO                    30         30         0        255 Seconds    D
LGI_RETRY_LIM                   3          3         0        255 Tries      D
LGI_RETRY_TMO                  20         20         2        255 Seconds    D
LGI_BRK_LIM                     5          5         1        255 Failures   D
LGI_BRK_TMO                   300        300         0    5184000 Seconds    D
LGI_HID_TIM                   300        300         0 1261440000 Seconds    D
LGI_CALLOUTS                    0          0         0        255 Count      D
Thanks for any other ideas here :)  btw, I rebooted the node late yesterday 
and the problem has not gone away...
Walt
 | 
| 3979.7 | Check accouting and auditing... | TWICK::PETTENGILL | mulp | Fri May 30 1997 20:50 | 8 | 
|  | Accounting will often provide a hint.  $acc/sinc=<time>/full
And auditing.  $ana/audit/sinc=<time>
This seems familar; what is the protection on sys$sylogin, ie.,
$directory/sec sys$sylogin ; this needs to be world readable.
It seems to me that I created a copy that could be read by
my "group" but not by "world" and that created a problem with
mail.  I think it was mail.  Anyway, it was similarly confusing.
 | 
| 3979.8 | Outputs from anal/audit and accounting. | GADWAL::W_MCGAW |  | Mon Jun 02 1997 10:54 | 56 | 
|  | Hi,
Thanks for the suggestions but I'm not quite sure what I am looking for 
from this.  Here are the outputs from the commands you gave me.  Does this 
give you any ideas?
Thanks,
Walt
LOGIN FAILURE
-------------
Username:          MAIL$SERVER       UIC:               [0,403]                
Account:           <net>             Finish time:        2-JUN-1997 08:42:26.13
Process ID:        000000AD          Start time:         2-JUN-1997 08:42:25.87
Owner ID:                            Elapsed time:                0 00:00:00.26
Terminal name:                       Processor time:              0 00:00:00.07
Remote node addr:                    Priority:          4  
Remote node name:  PENNYM            Privilege <31-00>: FFFFFFFF
Remote ID:         W_MCGAW           Privilege <63-32>: FFFFFFFF
Remote full name:  LOCAL:.PENNYM                                               
Queue entry:                         Final status code: 00D380FC
Queue name:                                       
Job name:                                                 
Final status text: %LOGIN-F-INVPWD, invalid password                           
Page faults:               60        Direct IO:                  7
Page fault reads:           9        Buffered IO:                9
Peak working set:        1184        Volumes mounted:            0
Peak page file:        164336        Images executed:            1
                       Security Audit Analysis Utility
--------------------------------------------------------------------------------
Security alarm (SECURITY) and security audit (SECURITY) on PENNYM, system id: 63
Auditable event:          Network login failure 
Event time:                2-JUN-1997 08:42:26.04
PID:                      000000AD        
Process name:             MAIL_14010005   
Username:                 MAIL$SERVER     
Remote node fullname:     LOCAL:.PENNYM
Remote username:          W_MCGAW
Status:                   %LOGIN-F-INVPWD, invalid password
                                     Last match:    3701 Current record:    3702
Command > 
 | 
| 3979.9 |  | RMULAC::S_WATTUM | Scott Wattum - FTAM/VT/OSAK Engineering (303) 840-2986 | Mon Jun 02 1997 13:12 | 5 | 
|  | It still sounds to me like OpenVMS security services are hosed, and no longer
consider DNA Session Control to be a "trusted user" - you might want to try an
OpenVMS conference with this to see what response you get.
--Scott
 | 
| 3979.10 | Making progress but... | GADWAL::W_MCGAW |  | Mon Jun 02 1997 17:20 | 16 | 
|  |     Hi,
    
    I've been getting local help on this and we've discovered that NET$ACP
    is checking the default accounts for passwords of 0 length.  If we
    modify the account passwords to be "", the login works.  AS soon as we
    put any password back on the account, it goes back to failing the
    login.
    
    Just for a test, I went to Phase IV DECnet and the objects work fine...  
    I will reinstall OSI again and see what happens.  
    
    btw, I forgot to mention that proxies on this system did not work
    either (atleast I think I forgot to mention that).
    
    Thanks,
    Walt
 | 
| 3979.11 | interesting UIC | CAADC::LENNIG | Dave (N8JCX), MIG, @CYO | Mon Jun 02 1997 18:46 | 9 | 
|  | re:
>LOGIN FAILURE
>-------------
>Username:          MAIL$SERVER       UIC:               [0,403]                
    							^^^^^^^^^
    
    This brings back memories of note 2340.
    
    Dave
 | 
| 3979.12 | You might want to try recreating the default MAIL$SERVER account... | DAVIDF::FOX | David B. Fox -- DTN 285-2091 | Tue Jun 03 1997 11:11 | 6 | 
|  | You can do that by running NET$CONFIGURE ADVANCED and re-configuring the
application database.  That will insure that the account is set up properly
with the correct UIC and a new random password.  I'd then reboot and give it
another shot.
	David
 | 
| 3979.13 | Net$configure didn't fix it. | GADWAL::W_MCGAW |  | Wed Jun 04 1997 16:42 | 61 | 
|  |     re:.11
    
    Maybe I should escalate this to engineering but other systems running
    V7.1 AlphaVMS and OSI are not seeing this problem.
    
    re:.12
    
    I went back to Phase IV to test and the problem went away.  Reinstalled
    OSI V7.1 and ran net$configure advanced but still have the same
    problem.  I am getting the following opcom messages on the failed login
    for sending mail.
    
    %%%%%%%%%%%  OPCOM   4-JUN-1997 16:34:43.14  %%%%%%%%%%%
    Message from user AUDIT$SERVER on PENNYM
    Security alarm (SECURITY) on PENNYM, system id: 63512
    Auditable event:          DECnet logical link created
    Event time:                4-JUN-1997 16:34:43.13
    PID:                      000000BE        
    Process name:             MAIL_14010017   
    Process owner:            [1,3]
    Image name:               SYS$COMMON:[SYSEXE]MAIL_SERVER.EXE
    Remote node id:           49003EAA00040018F821
    Remote node fullname:     LOCAL:.PENNYM
    Remote username:          W_MCGAW
    DECnet logical link ID:   335609879
    DECnet object name:       MAIL
    Status:                   %SYSTEM-S-NORMAL, normal successful completion
    
    PENNYM +> 
    %%%%%%%%%%%  OPCOM   4-JUN-1997 16:34:43.21  %%%%%%%%%%%
    Message from user AUDIT$SERVER on PENNYM
    Security alarm (SECURITY) and security audit (SECURITY) on PENNYM,
    system id: 63
    512
    Auditable event:          Network login failure
    Event time:                4-JUN-1997 16:34:43.20
    PID:                      000000BE        
    Process name:             MAIL_14010017   
    Username:                 MAIL$SERVER     
    Remote node fullname:     LOCAL:.PENNYM
    Remote username:          W_MCGAW
    Status:                   %LOGIN-F-INVPWD, invalid password
    
    PENNYM +> 
    %%%%%%%%%%%  OPCOM   4-JUN-1997 16:34:43.33  %%%%%%%%%%%
    Message from user AUDIT$SERVER on PENNYM
    Security alarm (SECURITY) on PENNYM, system id: 63512
    Auditable event:          DECnet logical link created
    Event time:                4-JUN-1997 16:34:43.32
    PID:                      000000AD        
    Process owner:            [1,3]
    DECnet logical link ID:   335609878
    Status:                   %NET-F-BADUSER, the access control information 
                              is invalid
    
    
    I modified the MAIL$SERVER account password to "" again and sending
    mail works fine.
    
    Still stumped...
    Walt
 |