T.R | Title | User | Personal Name | Date | Lines |
---|
1250.1 | | CSC32::BUTTERWORTH | Gun Control is a steady hand. | Mon Mar 25 1996 14:00 | 23 |
| >Customer is *very* concerned about security on the system. He believes
>that a tricky user can manipulate the contents of that file and then
>can execute it.
How could they manipulate the contents of the file if they have
eXexcute only access? If this file can't be edited and the only way a
user could create the file in that director was via the C3
Extract/Review interface then all the file could ever contain would be
console data. If a user could manipulate the contents of the console
logfile then proper file protection was not placed on those files which
is a management issue.
>Another concern is that a user by accident can overwrite an existing
>file. This behaviour I wasn't able to reproduce because my extracted
>files always had an extension -e, e.g. /tmp/xxx-e
>What do you think, is that a security issue?
I just don't see any security holes here.
Regs,
Dan
|
1250.2 | how to manipulate extract/review'ed data | 50305::ERNST | | Fri Mar 29 1996 09:10 | 44 |
|
Thanks, Dan, for your answer. I have discussed your suggestions with
my customer. He has found some examples on how to manipulate the contents
of extracted PCM-data.
>> How could they manipulate the contents of the file if they have
>> eXexcute only access? If this file can't be edited and the only way a
>> user could create the file in that director was via the C3
>> Extract/Review interface then all the file could ever contain would be
>> console data.
Customer's answer appended:
" You're definitely right, but with a little crerative phantasie,
there are lots of ways to manipulate the console-data.
Here are two of them:
a) Just connect to a Console of a DEC-Unix-System log in as ordinary
user and do
ksh> cat > /dev/null
(Now wait a minute)
(after that type in what ever you want to have as the contents of your
file, for example a +-sign to go into .rhost or so)
Now enter the contents that you want to have in a file later.
(Wait another minute then press Ctrl-D)
Now you can extract the period of time that contains only manipulated
data.
Similar procedures work with a console of a VMS computer
b) It even doesn't depend on the access to the console of a Computer
To get a few command lines in the console output, users could
issue a
$ REQUEST "<CR><LF>What ever they want<CR><LF> in the console log"
using any non-privileged account on a managed VMS-system.
"
Any idea? QAR it?
Regards
Maria
|
1250.3 | | CSC32::BUTTERWORTH | Gun Control is a steady hand. | Mon Apr 01 1996 14:41 | 43 |
| >Customer's answer appended:
>" You're definitely right, but with a little crerative phantasie,
> there are lots of ways to manipulate the console-data.
>
> Here are two of them:
> a) Just connect to a Console of a DEC-Unix-System log in as ordinary
> user and do
> ksh> cat > /dev/null
> (Now wait a minute)
> (after that type in what ever you want to have as the contents of your
> file, for example a +-sign to go into .rhost or so)
> Now enter the contents that you want to have in a file later.
> (Wait another minute then press Ctrl-D)
> Now you can extract the period of time that contains only manipulated
> data.
> Similar procedures work with a console of a VMS computer
My response is still SO WHAT!!!???? So I type MCR AUTHORIZE and then
enter the commans to change a password. This gets written to the
logfile and then I later extract it and edit out the junk. I still
can't manipulate the UAF unless I have access to SYSUAF.DAT and unless
my username is priviledged I can't do it!!!!
> b) It even doesn't depend on the access to the console of a Computer
> To get a few command lines in the console output, users could
> issue a
> $ REQUEST "<CR><LF>What ever they want<CR><LF> in the console log"
> using any non-privileged account on a managed VMS-system.
"
Who cares??? I simply see no security breach here whatsoever. I could
login to the console on a VT220 and issue the same command. The only
difference is that PCM logs this and *that* is a very good thing as the
system manager can now use the review interface and see *exactly* what
was entered on the console and by whom.
Regs,
Dan
|