[Info-vax] How to prevent ann account from being marked as an intruder?
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Thu May 16 18:26:37 EDT 2019
On 2019-05-16 17:59:35 +0000, Bob said:
> Is there any way I can flag one specific VMS account to NEVER be
> blocked as an intruder?
>
> We have devices that auto log in. An occasional glitch will cause them
> to keep trying with an incorrect username or password, locking them
> out. Any way to prevent this from the VMS side?
>
> Alpha 7.3-2
TL;DR:
nope.
Long answer:
This OpenVMS Alpha V7.3-2 configuration is badly down-revision, and
with known security vulnerabilities.
I'm here going to infer that this configuration follows the usual
pattern of many similar requests, and involves a network using telnet,
or maybe DECnet CTERM, or maybe LAT connections for these remote
clients. If this follows the usual path, there's little reason to be
concerned about intrusions and little reason to even enable break-in
evasion and related. There's no reason to even set and use passwords
here. Any passwords here are a polite fiction at best as this system is
probably using wide-open telnet or maybe DECnet CTERM or LAT for
logins. This configuration might bamboozle
less-than-technically-knowledgeable management folks, and might fool a
cursory audit. But it's insecure.
Turn it all off. All of the security. Passwords, etc. Turn it off.
Seriously. Document that for the folks in management certainly, but
documenting the various security holes that exist here is a good idea
regardless. Management will certainly push back here and as they
should, which then gives you to opportunity to suggest a supported
OpenVMS version and supported and secure network connections. This all
to make management "own" the configuration, and to make sure you don't
"own" the fallout should this all go sideways.
You're apparently affiliated with an organization that is familiar with
cloud-based security, with APTs, and with mobile and IoT security, so
exactly none of the above should even be remotely surprising to you.
As for the question and for any efforts toward pretend-security here or
if this configuration is VPN'd and otherwise isolated and locked down
(as is certainly possible, but also fairly rare among the folks posting
similar questions), no, there is no per-user intrusion-disable setting
available within OpenVMS. That knob is either enabled or disabled.
Some folks will run periodic DELETE /INTRUSION commands to clean up the
mess. Potential alternatives to this current (inferred) design include
using the automatic login facility ALF and SYSALF file (SYSMAN> ALF
ADD, etc). That effectively establishes a proxy. Or use ssh and
certificates, assuming the clients support ssh—though OpenVMS Alpha
V7.3-2 can't make secure ssh connections, and that'll cause
compatibility problems when interoperating with newer clients. Maybe
use Kerberos with telnet, on the off chance that the clients support
that. Kerberos will reduce the cleartext-password chatter typical of
telnet, CTERM, or LAT connections. Yes, OpenVMS does have Kerberized
telnet available, though that's fairly rarely used. And the version of
Kerberos is unsurprisingly old.
http://h30266.www3.hpe.com/odl/i64os/opsys/vmsos84/BA554_90008/ch02s06.html
Or fix whatever causes the (presumed) storm of login failures, of
course.
VSI OpenVMS V8.4-2L1 or—if EV6 or later—V8.4-2L2, is the upgrade path
here, on the way to x86-64. As is ssh, and/or TLS connections from
and/or to the clients.
Lots of work updating this configuration pending too, if there's not a
migration else-platform planned or underway.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list