[Info-vax] VMS Privileges Versus Linux Capabilities

Paul Sture nospam at sture.ch
Wed Jun 22 17:14:53 EDT 2016


On 2016-06-22, David Froble <davef at tsoft-inc.com> wrote:
> mcleanjoh at gmail.com wrote:
>> On Friday, June 17, 2016 at 10:06:43 AM UTC+10, Stephen Hoffman wrote:
>> 
>>>  UWSS and drivers and execlets and ACPs, and images 
>>> installed with any ALL-class privilege — and other such constructs — 
>>> are already or can become fully privileged, with complete system 
>>> access.
>> 
>> I thought ALL privileges didn't automatically include SECURITY
>> privilege, or does it in some contexts?
>>

That does ring a faint bell.  What version of VMS?
 
>
> Hmmm ....
>
> AS800> set proc/priv=all
> AS800> sho proc/priv
>
> 22-JUN-2016 16:37:17.79   User: DFE              Process ID:   0000012F
>                            Node: AS800            Process name: "DFE"
>
> Authorized privileges:
>   NETMBX       SETPRV       SYSPRV       TMPMBX
>
> Process privileges:
>   ACNT                 may suppress accounting messages
>   ALLSPOOL             may allocate spooled device
>   ALTPRI               may set any priority value
>   AUDIT                may direct audit to system security audit log
>   BUGCHK               may make bug check log entries
>   BYPASS               may bypass all object access controls
>   CMEXEC               may change mode to exec
>   CMKRNL               may change mode to kernel
>   DIAGNOSE             may diagnose devices
>   DOWNGRADE            may downgrade object secrecy
>   EXQUOTA              may exceed disk quota
>   GROUP                may affect other processes in same group
>   GRPNAM               may insert in group logical name table
>   GRPPRV               may access group objects via system protection
>   IMPERSONATE          may impersonate another user
>   IMPORT               may set classification for unlabeled object
>   LOG_IO               may do logical i/o
>   MOUNT                may execute mount acp function
>   NETMBX               may create network device
>   OPER                 may perform operator functions
>   PFNMAP               may map to specific physical pages
>   PHY_IO               may do physical i/o
>   PRMCEB               may create permanent common event clusters
>   PRMGBL               may create permanent global sections
>   PRMMBX               may create permanent mailbox
>   PSWAPM               may change process swap mode
>   READALL              may read anything as the owner
>   SECURITY             may perform security administration functions
>   SETPRV               may set any privilege bit
>   SHARE                may assign channels to non-shared devices
>   SHMEM                may create/delete objects in shared memory
>   SYSGBL               may create system wide global sections
>   SYSLCK               may lock system wide resources
>   SYSNAM               may insert in system logical name table
>   SYSPRV               may access objects via system protection
>   TMPMBX               may create temporary mailbox
>   UPGRADE              may upgrade object integrity
>   VOLPRO               may override volume protection
>   WORLD                may affect other processes in the world
>
> Process rights:
>   DFE                               resource
>   INTERACTIVE
>   REMOTE
>
> System rights:
>   SYS$NODE_AS800
>
> Soft CPU Affinity: off
>
> Yep, there it is, right after READALL and before SETPRV ....

Same behaviour for SECURITY on VAX V7.3-1.

SETPRV is a special one though.  It doesn't actually go away
if you disable it.  Note for the following user SETPRV is enabled
in the default privileges, but not in the authorized ones.

UAF> show fred

...

Authorized Privileges: 
  ALTPRI    CMKRNL    IMPERSONATGRPNAM    NETMBX    OPER      SYSNAM    SYSPRV
  TMPMBX    VOLPRO    WORLD
Default Privileges: 
  ALTPRI    CMKRNL    IMPERSONATGRPNAM    NETMBX    OPER      SETPRV    SYSNAM
  SYSPRV    TMPMBX    VOLPRO    WORLD

And it doesn't show up in the authorized privileges, it is in the current
ones:

$ sh proc/priv

22-JUN-2016 22:56:37.47   User: FRED             Process ID:   00000215
                          Node: SPEEDY           Process name: "FRED"
 
Authorized privileges:
 ALTPRI    CMKRNL    IMPERSONATGRPNAM    NETMBX    OPER      SYSNAM    SYSPRV
 TMPMBX    VOLPRO    WORLD
 
Process privileges:
 ALTPRI               may set any priority value
 CMKRNL               may change mode to kernel
 IMPERSONATE          may impersonate another user
 GRPNAM               may insert in group logical name table
 NETMBX               may create network device
 OPER                 may perform operator functions
 SETPRV               may set any privilege bit
 SYSNAM               may insert in system logical name table
 SYSPRV               may access objects via system protection
 TMPMBX               may create temporary mailbox
 VOLPRO               may override volume protection
 WORLD                may affect other processes in the world

And yes, you can use it in that state.



-- 
There are two hard things in computer science, and they are cache invalidation,
naming, and off-by-one errors.



More information about the Info-vax mailing list