[Info-vax] Unexpected DECnet Phase IV functionality with possible captive account implications

Mark Berryman mark at theberrymans.com
Thu May 13 15:39:17 EDT 2021


On 5/13/21 11:58 AM, Simon Clubley wrote:
> On 2021-05-13, Mark Berryman <mark at theberrymans.com> wrote:
>> On 5/12/21 10:14 PM, Simon Clubley wrote:
>>> .
>>> .
>>> .
>>> The point is that if they have network access, they can copy over
>>> a filename of their choosing to the captive account and then execute
>>> that file while still in network access mode, without ever having
>>> to go anywhere near an interactive login in order to execute the
>>> command file they have just transferred.
>>>
>>
>> As I believe I have effectively demonstrated, no they can't.  Why do you
>> continue to exist they can?
>>
> 
> No you haven't Mark. There's no way in hell that you have even come
> _close_ to demonstrating that.
> 
> All you have been able to demonstrate is that someone with detailed
> knowledge of VMS (ie: you) and the time to experiment has been able
> to implement something that addresses my concerns, and only by outright
> denying network access to the captive account.

Wrong.  I did not.  There was no denying network access whatsoever. 
Take a look at the posting again.  There was also no experimenting.  I 
simply setup a captive login procedure with two lines in it and then 
tried to access that account via FAL.  It failed.

> Now what about the average system manager or someone who has been given
> some VMS systems to manage along with other systems but is not a VMS expert ?

That is what the manuals are for.  You've assumed that captive accounts 
tend to be privileged, which is not a valid assumption.  Setting up an 
account with elevated access without reading the documentation is just 
asking for trouble, regardless of the situation or the OS.  (See most 
Windows systems).

However, I think you will find that most captive accounts are setup so 
that users need not learn the command line.  They are given a nice menu 
to do their work and they don't need to worry about how it is done.

> 
> What if they fail to write the perfect captive command procedure which
> falls through instead of doing an explicit logout ?

It such a case, the users get this error message:
%DCL-E-CAPTINT, captive account - interactive access denied

Along with a security audit.

Rather than constantly addressing the questions asked about that, the 
logout gets added (yes, this is based on the input of multiple system 
managers).

> 
> What if they actually _do_ need to allow network access to the captive
> account so files can be dropped into the account for later processing ?

That happens.  *In every single case* where I have seen this done, the 
files were dropped into a "dropbox" directory and did not use the 
captive account directly, regardless of the skill level of the person 
setting up the system.

In fact, every captive account I have seen (and I have seen many) 
disallows inbound network access - again, regardless of the skill level 
of the system manager.  So maybe, regardless of the fact that this is 
new to you, it is not a surprise to anyone else (at least, not to anyone 
involved enough in a VMS system to be setting up a captive account).

As has been stated before, you've obviously never been responsible for a 
captive account.  Had you been, you likely would have already realized 
that these issues get addressed.
> 
> In your worldview Mark, are these people solely responsible for any VMS
> security issues simply because they didn't fully grasp the security
> implications of some unknown to them concepts specific to VMS such as
> task-to-task communications and remote batch submission ?
> 
> Did they even think about these concepts in the first place because the
> documentation wasn't explicit enough about pointing out the security
> implications of this functionality ?
> 
> In your worldview Mark, are they expected to read every single page
> of the VMS documentation, eventually find the bit about SUBMIT/REMOTE
> and then magically connect that to the captive account they setup ?

Well, let's see.  Way back when I was responsible for setting up some 
captive accounts I was fairly new to VMS myself.  I hadn't read all of 
the VMS docs but I did make use of them for reference.

I was fully aware of submit/remote because it is clearly spelled out in 
"DECnet for OpenVMS Guide to Networking".  I was also aware of task to 
task capabilities because it is also clearly spelled out in the same manual.

In *my* worldview, I don't put people ignorant of the system in charge 
of the system.  However, if that is the only option available, I do 
expect them to make use of available resources to learn the system 
before making changes to it.

As I said, I was once "ignorant of the system" myself.  And yet, 
somehow, none of my captive accounts were susceptible to the issue at 
point here.

Let me be pointed.

Are there any captive accounts that don't take user input?  If the 
captive account is set up by someone with no idea of what they are doing 
(i.e. they do take into account network, batch, etc.) then any attempt 
to use FAL to talk to that account will result in FAL attempting to talk 
to that user input, not its expected network object, and the FAL access 
will fail.

If the captive account is set up to do some work and then quit without 
ever getting any user input, then that account will do a logout (if for 
no other reason than to prevent an error message and a security audit 
every time it is used).

So, in what circumstance do you find this to be a genuine concern.
> 
> VMS should be secure by default and have multiple layers of protection
> to help stop people from doing the wrong thing by mistake.

You are welcome to resurrect SEVMS and find a way to make it viable 
enough to be maintained moving forward.  However, you will probably find 
there are reasons that what you are asking for pretty much died on the vine.

> 
> This is why I am annoyed with Doug's dismissive response. At a technical
> level, he is correct. At a practical level, he is wrong because DECnet
> should have some better controls than it currently does, with active
> functionality disabled especially for captive accounts until explicitly
> enabled by the system manager for an account.
> 
> So no Mark, you have not even come close to demonstrating that,
> especially for systems which might be managed by people without the
> level of knowledge that you have.

I believe I have.  Show me where I haven't.

Mark



More information about the Info-vax mailing list