[Info-vax] Creating an audit ACL/ACE

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Mon Aug 20 11:56:46 EDT 2018


On 2018-08-19 05:57:46 +0000, Jan-Erik Sderholm said:

> The file contains configuration parameters for work stations in the 
> factory. It is edited with VT-screen application where you can display 
> a record, edit and press "save". The issue is that we see unexpected 
> updates to the file. A simple logging could easily be added in the 
> application around the place where that "save" button is processed, but 
> I was just trying to see what could be done with the tools at hand...
> 
> And since it is technically possible to write to the file from other 
> sources, I thought it would be better to have the file itself to 
> trigger the logging, then that editing application.

No easy path.

It could be inferred that this environment might lack an integrated 
framework for logging, or that it's a little problematic for whatever 
reason.

Yeah, I know, OpenVMS knows zilch about distributed logging (syslog, 
syslog-ng, etc) and can't make up its mind about its integrated logging 
(OPERATOR.LOG and OPCOM messages, the audit database, the accounting 
database, various and sundry scattered dump files and equally 
scatter-shot .LOG files, integrating with T4 for 
performance-monitoring, and the ever-so-archaic 
write-a-stackdump-to-the-end-user implementation of the last-chance 
handler, etc).  There's also no easy way to capture and process 
specific events using ACEs and custom code, for that matter; you can't 
program an ACE using (for instance) Lua; not short of that pesky 
mailbox and capturing everything.  There's also no easy way to capture 
I/O and there's no FUSE or analogous, which would have helped this 
case; the system service interception is less-than-fun for this case.

Put another way, this whole area of OpenVMS is a complete and utter and 
primitive mess, and it's been a mess for decades, and the resulting 
messes will persist for the foreseeable future.

Which can then leave us with the requirement to add that bespoke 
logging, the associated log-scanning tools and the rest of the baggage 
involved.

Which leaves apps such as yours and mine to adapt or port or write our 
own logging and monitoring tools, and to port or create distributed 
logging tools where those are necessary.

Pragmatically, starting any new app with the debugging, logging and 
monitoring features — and effectively then building the app around that 
— is a more viable approach than many of us have used in years past.  
Retrofitting debugging, logging and monitoring is such sweet sorrow, 
but it's where more than a few of us have been spending some of our 
development- and operations-related time within large and complex 
environments; those apps that are being actively maintained and 
updated, that is.

As for cases where "anything" can write to system- or app-critical 
files, subsystem identifiers are one of the more useful parts of 
OpenVMS for controlling that access.  Subsystem identifiers being far 
better-targeted here than are privileges.

Some related reading...

SSI:
http://h41379.www4.hpe.com/openvms/journal/v8/ssi.pdf

Subsystems:
http://h30266.www3.hpe.com/odl/vax/opsys/vmsos73/vmsos73/6346/6346pro_019.html#index_x_1519 

http://h41379.www4.hpe.com/doc/84final/4527/4527pro_116.html
http://h30266.www3.hpe.com/odl/vax/opsys/vmsos73/vmsos73/6346/6346pro_030.html


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list