[Info-vax] Restrict the use of SUBMIT/USER= to one particular user.
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Wed Nov 9 15:36:29 EST 2016
On 2016-11-09 19:36:17 +0000, John Reagan said:
> ...
> burst has been in the SUBMIT.CLD going as far back as 1992
> ...
Okay. Good to know. Exactly what happened here isn't known. Obviously.
Unfortunately — if the contents of the system are skewed — OpenVMS has
no mechanism to detect such skews, nor to try to determine where those
corruptions arose, nor to resolve the skews.
It would be useful if OpenVMS could do something like verify that an
installation is correct and consistent, that it's not been corrupted or
had malware or a rogue certificate inserted, and that the results of an
OpenVMS upgrade and an install and a sequence of patches all match the
expected results. Bonus points for allowing reinstallation and
recovering a damaged installation to "pristine" without having the
clobber the whole universe of settings and customizations, whether
recovering from a mistake or a bad block or otherwise. Extra bonus
points for adding support to secure the files of the operating system
against all but vendor-authorized and digitally signed modifications,
even from users with BYPASS barring a site-local override by the system
manager. This is all obviously a few steps past the rather limited
capabilities of "secure distribution" as presently implemented, too.
(BTW: much of this already exists on some other operating systems, and
I'm — again — looking at 2021 or 2026 here, where these capabilities
will only be more commonly available.)
I deal with some configurations that verify specific critical files —
the equivalent of connecting into the OpenVMS source code control
system and related databases, and that then performs end-to-end SHA-3
checksums looking for differences — looking for trouble. That's way
past a verb definition or suchlike here and absurd for this specific
CLD case, but — in the more general case — there have been skews
between upgrades and installs and patches in the past and the
ever-popular morass arising from the manual file copies that some
patches have involved, and there have certainly been more than a few
systems that have ended up corrupted or compromised or skewed.
Tying this back to the original part of this thread, executable images
installed with privileges and UWSS images and server images launched
with privileges would all be logical targets for checksumming the file
contents, too. These are the sorts of things that folks want to know,
but often tend to not have the time to implement or perform or verify
the results, and tend to be highlighted in post-crash or post-breach
retrospectives.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list