[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference azur::mcc

Title:DECmcc user notes file. Does not replace IPMT.
Notice:Use IPMT for problems. Newsletter location in note 6187
Moderator:TAEC::BEROUD
Created:Mon Aug 21 1989
Last Modified:Wed Jun 04 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:6497
Total number of notes:27359

4633.0. "DECmcc "Ping" requires SYSPRV privilege" by ZUR01::FUEGLISTER (Roland Fueglister, 760-2498) Thu Mar 04 1993 06:30

A nonprivileged user can use the UCX V2.0 "Ping" feature if the image 
ucx$ping.exe is installed with "sysprv" privilege.

Whatelse needs to be installed that the equivalent DECmcc "Ping" command can be
used by a nonprivileged user? 

			Best Regards,

			Roland


The following log shows the problem:

$ instal list/full sys$system:ucx$ping.exe

DISK$VAXVMSV055:<SYS0.SYSCOMMON.SYSEXE>.EXE
   UCX$PING;1                     Prv 
        Entry access count         = 2
        Privileges = SYSPRV 

$ ucx ping hubwtc
UCX-I-LOOPACT, hubwtc.zuo.dec.com is alive

$ manage/enter
DECmcc (V1.2.3)

MCC> test snmp hubwtc
SNMP hubwtc 
AT  4-MAR-1993 11:55:00 
This operation requires SYSPRV privilege

MCC> show snmp hubwtc all status
SNMP hubwtc 
AT  4-MAR-1993 12:13:45 Status 
This operation requires SYSPRV privilege

MCC> exit

$ show proc/priv
4-MAR-1993 11:55:08.66   User: FUEGLISTER       Process ID:   000000AD
                          Node: NCC003           Process name: "FUEGLISTER"
 Process privileges:
 TMPMBX               may create temporary mailbox
 NETMBX               may create network device
T.RTitleUserPersonal
Name
DateLines
4633.1Major security problemZUR01::FUEGLISTERRoland Fueglister, 760-2498Wed May 12 1993 09:2419
Help!! 
I still expect an answer from DECmcc engineering regarding .0

The questions is:

Is there a workaround like  installing the necessary images with "SYSPRV" 
priviledge to use the DECmcc "Ping" feature?

Any help will be appreciated.


			Best regards,

			Roland





4633.2MOLAR::YAHEY::BOSEWed May 12 1993 13:2211
	To do pings in DECmcc we need to open raw sockets. SYSPRV privilege
	is required to open raw sockets. That is why the SNMP AM requires
	that it be run with SYSPRV (you need it to receive traps too).

	I have tried installing the SNMP AM with privileges, but the creation
	of raw sockets still fail, causing the exception "This operation requires 
	SYSPRV privilege" to be generated. Someone more familiar with UCX may
	be able to help you out on this.

	Rahul.
4633.3Use the QAR systemRACER::daveAhh, but fortunately, I have the key to escape reality.Wed May 12 1993 17:457
If you expect a reply, you should file a QAR,

Notes files are not an official support system, and
anything posted here is not required to be responded to.

Anything posted here is clearly on a "Best effort, when we have time"
basis.
4633.4UNIX users don't need privs for a Ping!!ZUR01::FUEGLISTERRoland Fueglister, 760-2498Thu May 13 1993 08:2720
			Hi Rahul,

Thank you for your immediate answer.

As mentioned in .0, it is possible to install the ucx$ping image with
privileges. 
As a current workaround, I would propose that a nonprivileged DECmcc user 
has to launch the ucx ping command from the DECmcc application interface.

Anyhow, this is a major security problem which must be fixed.

RE:.2     I don't agree that you need SYSPRV to receive traps.

Normally the VMS user "System" creates at system startup a dummy notify to
start the mcc_tcpip_sink process.
Afterwords every nonprivileged VMS user is able to receive Trap notifications.


				Roland

4633.5MOLAR::YAHEY::BOSEThu May 13 1993 11:1426
	Roland,

>>Title:  UNIX users don't need privs for a Ping!!

	Ping on Ultrix does setuid to root, so it is running with superuser
	privileges. But to the ordinary user it is transparent and he can
	run it from his account without taking any special action. The SNMP AM
	works the same way on Ultrix.

>>As mentioned in .0, it is possible to install the ucx$ping image with
>>privileges. 

	It should be the same for the SNMP AM, but for some reason opening
	of raw sockets still fail. This needs further investigation.


>>Normally the VMS user "System" creates at system startup a dummy notify to
>>start the mcc_tcpip_sink process.
>>Afterwords every nonprivileged VMS user is able to receive Trap notifications.

	Pretty clever. Actually, in my original mail I meant to say that you
	need SYSPRV to start up the sink. All users need not have SYSPRV to
	receive traps subsequently, as you've shown above.

	Rahul.
4633.62582::YAHEY::BOSEThu May 13 1993 12:4110
		Actually you need to install the image MCC_MAIN.EXE with
	privileges. That is the image which is invoked by "manage/enterprise"
	DCL command. All MMs will inherit their privileges from that image 
	(which again could be looked upon as a security violation).

		BTW, you may not be able to install MCC_MAIN with privileges
	since it may have been linked with traceback.

	Rahul.
4633.7image MCC_MAIN is the problemZUR01::FUEGLISTERRoland Fueglister, 760-2498Mon May 17 1993 13:2114
			Hi Rahul,

Thank you very much for your further investigation.

I came exactly to the same result: the MCC_MAIN image should be installed with
the appropriate privileges. 
Unfortunately the image has been linked with traceback, so we are not able to
do it.

In the meantime I also recognized, that a nonprivileged MCC user needs only
"OPER" privilege to use the directive "Test snmp hostname".


			Roland