[Info-vax] VMS and MFA?
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Fri Aug 21 18:22:54 EDT 2020
On 2020-08-21 13:58:45 +0000, geze... at rlgsc.com said:
Google Groups quoting has seemingly become an even bigger trash-fire?
I might have to write a macro to untangle that quote.
> On Thursday, August 20, 2020 at 9:51:54 PM UTC-4, Dave Froble wrote:
>> On 8/20/2020 6:22 PM, geze... at rlgsc.com wrote:> > On Thursday, August
>> 20, 2020 at 4:07:48 PM UTC-4, Dave Froble wrote:> >> On 8/20/2020 12:45
>> PM, geze... at rlgsc.com wrote:> >>> On Thursday, August 20, 2020 at
>> 12:02:21 PM UTC-4, Stephen Hoffman wrote:> >>>> On 2020-08-20 07:12:01
>> +0000, Dave Froble said:> >>>>> >>>>> I'm aware there are multiple
>> methods to achieve desired results. But> >>>>> I'm curious, why get
>> into the complexity of rightslist entries?> >>>> That's using OpenVMS
>> enforcement for access.> >>>>> A captive account, with...
>
> Writing one's own security system separate from the underlying OS
> creates, at a minimum, the potential for a rupture between the OS-level
> security and the local security code. The gap or inconsistency leads to
> hazards. I have seen applications with elevated privileges and
> roll-your-own security. This is a bad combination.
That's be typical.
My favorite "fun" with home-grown security code in some app or layered
product. Some app returns SS$_NOPRIV, for instance. Looking for the
trigger for that error in the system logs is then an exercise in
frustration.
Home-grown code can work great, but code that gets some investments
generally has better features and more capabilities, as well as other
advantages. Work on home-grown code can get to the good-enough stage,
and then tends to slow or stop.
OpenVMS itself suffers from cases where some common operations are
effectively re-written multiple times and separately across various
OpenVMS facilities—file handling is one of the more common cases—and
the results of each write or rewrite tend to fall short of a more
complete and more packaged and more polished and more maintainable
approach.
Security code in particular tends to be subtle. Such as an app
reporting an access error for an accessor with a system UIC and without
an ALL-class privilege, when the system mask should have been selected
and used for the case.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list