T.R | Title | User | Personal Name | Date | Lines |
---|
3979.1 | | RMULAC::S_WATTUM | Scott Wattum - FTAM/VT/OSAK Engineering | Thu May 29 1997 15:25 | 5 |
| Do other applications (like FAL) have a problem, or just MAIL? DECnet is
considered a "trusted user" and so doesn't present a password to loginout (which
is why passwords don't show up in NCL - they simply aren't there); if loginout
is reporting an invalid password, I would suspect maybe some OpenVMS component
is confused (as opposed to DECnet).
|
3979.2 | $ show intrusion | VELI::KORKKO | Veli K�rkk� @FNO, 879-5512 | Thu May 29 1997 15:45 | 23 |
| The most likely explanation is that intrusion subsystem has
started evading your "login" attempts. Very simple way to
reproduce this is
VELI$ show intrusion
VELI$ dir 0"nosuchuser nevermindpwd"::
VELI$ dir 0"nosuchuser nevermindpwd"::
VELI$ dir 0"nosuchuser nevermindpwd"::
VELI$ dir 0"nosuchuser nevermindpwd"::
VELI$ dir 0"nosuchuser nevermindpwd"::
VELI$ dir 0"nosuchuser nevermindpwd"::
VELI$ show intrusion
VELI$ mail/subj=test/noself nla0: veli::_korkko
and by golly, it fails! Now
VELI$ delete/intrusion *
VELI$ mail/subj=test/noself nla0: veli::_korkko
and it should work right now. I am running OpenVMS V7.1,
DECnet/OSI V7.1 btw.
_veli
|
3979.3 | Fal fails too. Intrusions are not the problem. | GADWAL::W_MCGAW | | Thu May 29 1997 16:05 | 20 |
| RE: .1
Hi Scott!
Fal also fails the same way. If I set a password in UAF, I can use
explicit access to get in with a dir command through either the
fal$server or mail$server account. I had Alan Anderson looking at it
too and we both came up with a blank... :)
Re:.2
I am very aware of the intrusion records. This will fail even when no
intrusion records are present. It creates one as a result of the
failure and the account in UAF actually incremaents the login failure
count.
Any other ideas?
Thank you,
Walt
|
3979.4 | | ALPHAZ::HARNEY | John A Harney | Thu May 29 1997 20:29 | 15 |
| re: .3
You said $ SHOW INTRUSION doesn't show anything.
What about $ SHOW INTRUSION/OLD ?
The $ DELETE/INTRUSION * might help; it clears the "old" database that
some applications believe they understand as well as the new database
of intrusion records.
Also, the actual audit (as opposed to the alarms) should eventually
start showing the password being attempted, if intrusion detection and
breakin evasion are being tickled.
\john
|
3979.5 | | VELI::KORKKO | Veli K�rkk� @FNO, 879-5512 | Fri May 30 1997 09:03 | 8 |
| How about
$ show logical sys$single_signon
i.e. do you have external authentication active by any chance? Btw., what is
the value LGI_CALLOUTS?
_veli
|
3979.6 | Still not working... | GADWAL::W_MCGAW | | Fri May 30 1997 10:55 | 59 |
| re: .4
Hi John,
>You said $ SHOW INTRUSION doesn't show anything.
>What about $ SHOW INTRUSION/OLD ?
>The $ DELETE/INTRUSION * might help; it clears the "old" database that
>some applications believe they understand as well as the new database
>of intrusion records.
There were indeed old intrusion records too but only suspect. At any
rate, I deleted the intrusions with a * and tried again but I still fail
the login.
>Also, the actual audit (as opposed to the alarms) should eventually
>start showing the password being attempted, if intrusion detection and
>breakin evasion are being tickled.
I'm not sure I understand what you mean by the actual audit. Since this is
PhaseV, the login is not suppose to even use a password. Phase IV needed
it on the object but under PhaseV, you don't even have a place to enter a
password for the session control object.
re: .5
Hi Veli,
>How about
>$ show logical sys$single_signon
This returned:
%SHOW-S-NOTRAN, no translation for logical name SYS$SINGLE_SIGNON
>i.e. do you have external authentication active by any chance? Btw., what is
>the value LGI_CALLOUTS?
SYSGEN> SHOW LGI
Parameter Name Current Default Min. Max. Unit Dynamic
-------------- ------- ------- ------- ------- ---- -------
LGI_BRK_TERM 1 1 0 1 Boolean D
LGI_BRK_DISUSER 0 0 0 1 Boolean D
LGI_PWD_TMO 30 30 0 255 Seconds D
LGI_RETRY_LIM 3 3 0 255 Tries D
LGI_RETRY_TMO 20 20 2 255 Seconds D
LGI_BRK_LIM 5 5 1 255 Failures D
LGI_BRK_TMO 300 300 0 5184000 Seconds D
LGI_HID_TIM 300 300 0 1261440000 Seconds D
LGI_CALLOUTS 0 0 0 255 Count D
Thanks for any other ideas here :) btw, I rebooted the node late yesterday
and the problem has not gone away...
Walt
|
3979.7 | Check accouting and auditing... | TWICK::PETTENGILL | mulp | Fri May 30 1997 21:50 | 8 |
| Accounting will often provide a hint. $acc/sinc=<time>/full
And auditing. $ana/audit/sinc=<time>
This seems familar; what is the protection on sys$sylogin, ie.,
$directory/sec sys$sylogin ; this needs to be world readable.
It seems to me that I created a copy that could be read by
my "group" but not by "world" and that created a problem with
mail. I think it was mail. Anyway, it was similarly confusing.
|
3979.8 | Outputs from anal/audit and accounting. | GADWAL::W_MCGAW | | Mon Jun 02 1997 11:54 | 56 |
| Hi,
Thanks for the suggestions but I'm not quite sure what I am looking for
from this. Here are the outputs from the commands you gave me. Does this
give you any ideas?
Thanks,
Walt
LOGIN FAILURE
-------------
Username: MAIL$SERVER UIC: [0,403]
Account: <net> Finish time: 2-JUN-1997 08:42:26.13
Process ID: 000000AD Start time: 2-JUN-1997 08:42:25.87
Owner ID: Elapsed time: 0 00:00:00.26
Terminal name: Processor time: 0 00:00:00.07
Remote node addr: Priority: 4
Remote node name: PENNYM Privilege <31-00>: FFFFFFFF
Remote ID: W_MCGAW Privilege <63-32>: FFFFFFFF
Remote full name: LOCAL:.PENNYM
Queue entry: Final status code: 00D380FC
Queue name:
Job name:
Final status text: %LOGIN-F-INVPWD, invalid password
Page faults: 60 Direct IO: 7
Page fault reads: 9 Buffered IO: 9
Peak working set: 1184 Volumes mounted: 0
Peak page file: 164336 Images executed: 1
Security Audit Analysis Utility
--------------------------------------------------------------------------------
Security alarm (SECURITY) and security audit (SECURITY) on PENNYM, system id: 63
Auditable event: Network login failure
Event time: 2-JUN-1997 08:42:26.04
PID: 000000AD
Process name: MAIL_14010005
Username: MAIL$SERVER
Remote node fullname: LOCAL:.PENNYM
Remote username: W_MCGAW
Status: %LOGIN-F-INVPWD, invalid password
Last match: 3701 Current record: 3702
Command >
|
3979.9 | | RMULAC::S_WATTUM | Scott Wattum - FTAM/VT/OSAK Engineering (303) 840-2986 | Mon Jun 02 1997 14:12 | 5 |
| It still sounds to me like OpenVMS security services are hosed, and no longer
consider DNA Session Control to be a "trusted user" - you might want to try an
OpenVMS conference with this to see what response you get.
--Scott
|
3979.10 | Making progress but... | GADWAL::W_MCGAW | | Mon Jun 02 1997 18:20 | 16 |
| Hi,
I've been getting local help on this and we've discovered that NET$ACP
is checking the default accounts for passwords of 0 length. If we
modify the account passwords to be "", the login works. AS soon as we
put any password back on the account, it goes back to failing the
login.
Just for a test, I went to Phase IV DECnet and the objects work fine...
I will reinstall OSI again and see what happens.
btw, I forgot to mention that proxies on this system did not work
either (atleast I think I forgot to mention that).
Thanks,
Walt
|
3979.11 | interesting UIC | CAADC::LENNIG | Dave (N8JCX), MIG, @CYO | Mon Jun 02 1997 19:46 | 9 |
| re:
>LOGIN FAILURE
>-------------
>Username: MAIL$SERVER UIC: [0,403]
^^^^^^^^^
This brings back memories of note 2340.
Dave
|
3979.12 | You might want to try recreating the default MAIL$SERVER account... | DAVIDF::FOX | David B. Fox -- DTN 285-2091 | Tue Jun 03 1997 12:11 | 6 |
| You can do that by running NET$CONFIGURE ADVANCED and re-configuring the
application database. That will insure that the account is set up properly
with the correct UIC and a new random password. I'd then reboot and give it
another shot.
David
|
3979.13 | Net$configure didn't fix it. | GADWAL::W_MCGAW | | Wed Jun 04 1997 17:42 | 61 |
| re:.11
Maybe I should escalate this to engineering but other systems running
V7.1 AlphaVMS and OSI are not seeing this problem.
re:.12
I went back to Phase IV to test and the problem went away. Reinstalled
OSI V7.1 and ran net$configure advanced but still have the same
problem. I am getting the following opcom messages on the failed login
for sending mail.
%%%%%%%%%%% OPCOM 4-JUN-1997 16:34:43.14 %%%%%%%%%%%
Message from user AUDIT$SERVER on PENNYM
Security alarm (SECURITY) on PENNYM, system id: 63512
Auditable event: DECnet logical link created
Event time: 4-JUN-1997 16:34:43.13
PID: 000000BE
Process name: MAIL_14010017
Process owner: [1,3]
Image name: SYS$COMMON:[SYSEXE]MAIL_SERVER.EXE
Remote node id: 49003EAA00040018F821
Remote node fullname: LOCAL:.PENNYM
Remote username: W_MCGAW
DECnet logical link ID: 335609879
DECnet object name: MAIL
Status: %SYSTEM-S-NORMAL, normal successful completion
PENNYM +>
%%%%%%%%%%% OPCOM 4-JUN-1997 16:34:43.21 %%%%%%%%%%%
Message from user AUDIT$SERVER on PENNYM
Security alarm (SECURITY) and security audit (SECURITY) on PENNYM,
system id: 63
512
Auditable event: Network login failure
Event time: 4-JUN-1997 16:34:43.20
PID: 000000BE
Process name: MAIL_14010017
Username: MAIL$SERVER
Remote node fullname: LOCAL:.PENNYM
Remote username: W_MCGAW
Status: %LOGIN-F-INVPWD, invalid password
PENNYM +>
%%%%%%%%%%% OPCOM 4-JUN-1997 16:34:43.33 %%%%%%%%%%%
Message from user AUDIT$SERVER on PENNYM
Security alarm (SECURITY) on PENNYM, system id: 63512
Auditable event: DECnet logical link created
Event time: 4-JUN-1997 16:34:43.32
PID: 000000AD
Process owner: [1,3]
DECnet logical link ID: 335609878
Status: %NET-F-BADUSER, the access control information
is invalid
I modified the MAIL$SERVER account password to "" again and sending
mail works fine.
Still stumped...
Walt
|