[Info-vax] Some part of VMS attempting to execute SYSUAF.DAT

GerMarsh marsh.family at tirhir.com
Wed Jan 20 07:14:03 EST 2016


On Tuesday, January 19, 2016 at 9:49:32 PM UTC, johnwa... at yahoo.co.uk wrote:
> On Monday, 18 January 2016 17:11:37 UTC, GerMarsh  wrote:
> > I have seen an intermittent problem when a program using Websphere MQ routines attempts to execute the UAF data file. Bit like this...
> > 
> >  Terminal name:            FTA98:
> > Image name:               DSA6:[OFFICEMAN.][DECSUPP.MQ_DEV]MQPUT.EXE;2
> > Object class name:        FILE
> > Object owner:             [SYSTEM]
> > Object protection:        SYSTEM:RWED, OWNER:RWED, GROUP:, WORLD:
> > File name:                _DSA300:[VMS$COMMON.SYSEXE]SYSUAF.DAT;1
> > File ID:                  (20,1,0)
> > Access requested:         EXECUTE
> > 
> > I am pretty sure that I have seen such alarms with some VMS programs too.
> > 
> > I apologise profusely if I have missed some newsgroup article or even HP patch list which covers this but damned if I can find it!
> > 
> > Anyone any idea why any program routine would try to execute a data file?
> 
> My frequently-failing memory suggests that the audit extract you have
> included here may not be complete, that there may be fields before and
> after which may shed light on the picture. But no one else has asked,
> so ICBW.
> 
> E.g. stuff can go in the audit on success as well as on failure, and
> VMS will tell you which one is the case, but the extract you posted
> doesn't include that information. There are various examples in the
> Fine Manuals, in particular this stuff is covered in the Guide to
> System Security.
> 
> The Fine Manuals even tell you how stuff can be set up to audit every
> conceivable auditable event. Normally this would not be a useful thing
> to do, but sometimes there may be good reason to do so - e.g. someone
> in the ng recently asked "how do I see what a particular user has been
> up to", expecting the answer to be "here's how you see all the commands
> they issued". The audit log may provides useful and trustworthy
> information in a case like that.
> 
> Back to your query. An audit entry would typically indicate what kind
> of operation had been attempted, and the result of the attempt, e.g.
> 
> Access requested:      DELETE
> ...
> Status:                %SYSTEM-F-NOPRIV, no privilege for attempted operation
> 
> I don't see the equivalent of these fields in your extract. 
> 
> 
> Similarly, I might have expected to see (amongst possible others) an
> "auditable event" field which might have some related information:
> 
> Auditable event:       Object deletion
> 
> So what this example would tell us which we can't see in your extract
> is that there was a delete attempt on an object which VMS security
> had been configured to audit when the attempt failed. In this example
> the audit log tells us that it failed because of a privilege violation.
> 
> Is there some additional audit text in your picture that might be
> helpful here?
> 
> 
> Full text of Example 10.2 in the VMS 8.4 Guide to System Security,
> from http://h71000.www7.hp.com/doc/84final/ba554_90015/ch10s02.html
> 
> 
> 
> Message from user AUDIT$SERVER on BILBO
> Security alarm (SECURITY) and security audit (SECURITY) on BILBO,
>                        system id: 19662
> Auditable event:       Object deletion
> Event information:     file deletion request (IO$_DELETE)
> Event time:            24-APR-2008 13:17:24.59
> PID:                   47400085
> Process name:          Hobbit
> Username:              ROBINSON
> Process owner:         [ACCOUNTING,ROBINSON]
> Terminal name:         OPA0:
> Image name:            DSA2264:[SYS51.SYSCOMMON.][SYSEXE]DELETE.EXE
> Object class name:     FILE
> Object owner:          [SYSTEM]
> Object protection:     SYSTEM:RWED, OWNER:RWED, GROUP:RE, WORLD:RE
> File name:             _DSA2200:[ROBINSON]FOO.BAR;1
> File ID:               (17481,6299,1)
> Access requested:      DELETE
> Matching ACE:          (IDENTIFIER=MINDCRIME,ACCESS=NONE)
> Sequence key:          00008A41
> Status:                %SYSTEM-F-NOPRIV, no privilege for attempted operation
> 
> and here's part of an example of an audit of a successful access - spot
> the difference (same manual):
> 
> Username:               ABADGUY
> Image name:             BOSTON$DUA0:[SYS0.SYSCOMMON.][SYSEXE]DELETE.EXE
> Object name:            _BOSTON$DUA1:[RWOODS]CONFIDREVIEW.MEM;1
> Object type:            file
> Access requested:       DELETE
> Status:                 %SYSTEM-S-NORMAL, normal successful completion
> Privileges used:        SYSPRV
> 
> Best of luck.

Sorry - I thought I would only include the relevant info. Here is a full journal entry...
Security audit (SECURITY) on SFDV01, system id: 54973
Auditable event:          Object access
Event information:        file access request (IO$_ACCESS or IO$_CREATE)
Event time:               12-JAN-2016 15:04:12.81
PID:                      000028FA
Process name:             _FTA79:
Username:                 MARSHG1
Process owner:            [MARSHG1]
Terminal name:            FTA79:
Object class name:        FILE
Object owner:             [SYSTEM]
Object protection:        SYSTEM:RWED, OWNER:RWED, GROUP:, WORLD:
File name:                _DSA300:[VMS$COMMON.SYSEXE]SYSUAF.DAT;1
File ID:                  (20,1,0)
Access requested:         EXECUTE
Posix UID:                -2
Posix GID:                -2 (%XFFFFFFFE)
Sequence key:             94B4D282
Status:                   %SYSTEM-F-NOPRIV, insufficient privilege or object protection violation

There is nothing in the MQ logs.



More information about the Info-vax mailing list