[Info-vax] DECnet Phase IV and VMS code comments

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Mon Nov 21 16:11:46 EST 2016


On 2016-11-21, Simon Clubley <clubley at remove_me.eisner.decus.org-Earth.UFP> wrote:
>
> I also had another look at this last night and further discovered
> that 1.1 ACKed an incoming connect-init from what was claimed to
> be 1.1 in the router level s_id field before FAL rejected it due
> to missing username and password.
>
> It also ACKed an incoming packet with the s_id field set to a
> multicast address (the OPCOM network login failure message showed
> it as DECnet node 1.0).
>

Loose wording on my part above. I don't know if Connect ACKs were
actually issued in the above two cases; all I know is that the dodgy
packets were fully processed instead of being dropped on the floor.

Here's a couple of OPCOM messages from last night's experiments; as
before, these are as the result of external packets from 1.2 being
received by node 1.1.

The field of interest is the Remote node id: field.

%%%%%%%%%%%  OPCOM  20-NOV-2016 23:15:48.04  %%%%%%%%%%%
Message from user AUDIT$SERVER on AXPA
Security alarm (SECURITY) and security audit (SECURITY) on AXPA, system id: 1025
Auditable event:          Network login failure
Event time:               20-NOV-2016 23:15:48.03
PID:                      000000AC        
Process name:             FAL_16391       
Username:                 DECNET          
Process owner:            [1,3]
Image name:               AXPA$DKA0:[SYS0.SYSCOMMON.][SYSEXE]LOGINOUT.EXE
Remote nodename:          AXPA            
Remote node id:           1025 (1.1)
Posix UID:                -2              
Posix GID:                -2 (%XFFFFFFFE) 
Status:                   %LOGIN-F-NOTVALID, user authorization failure

%%%%%%%%%%%  OPCOM  20-NOV-2016 23:53:32.80  %%%%%%%%%%%
Message from user AUDIT$SERVER on AXPA
Security alarm (SECURITY) and security audit (SECURITY) on AXPA, system id: 1025
Auditable event:          Network login failure
Event time:               20-NOV-2016 23:53:32.80
PID:                      000000B6        
Process name:             FAL_8210        
Username:                 DECNET          
Process owner:            [1,3]
Image name:               AXPA$DKA0:[SYS0.SYSCOMMON.][SYSEXE]LOGINOUT.EXE
Remote node id:           1024 (1.0)
Posix UID:                -2              
Posix GID:                -2 (%XFFFFFFFE) 
Status:                   %LOGIN-F-NOTVALID, user authorization failure

BTW, the only reason this is even possible is due to the design of
DECnet.

In protocols where you have to first do an exchange of SYN and ACK
packets (or equivalent) before the higher level protocols even get
a chance to transmit anything, the source IP address has to be
valid or the initial connection will never complete.

In DECnet however, all that higher level information gets transmitted
in the initial Connect Init packet before any ACKs (or more critically,
the target port number to use) are even required.

This is what allows DECnet packets to get all the way to FAL without
a valid DECnet source node address.

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Microsoft: Bringing you 1980s technology to a 21st century world



More information about the Info-vax mailing list