HP OpenVMS Guide to System Security |
Security for the User |
Using the System Responsibly |
|
|
| |
Network Security Considerations
Protecting Information
in Access Control Strings ![]()
Network access control strings can be included in the file
specifications of DCL commands working across the DECnet for OpenVMS
network. They permit a user on a local node to access a file on
a remote node.
An access control string consists of the user name for the remote account and the user's password enclosed within quotation marks, as follows: NODE"username password"::disk:[directory]file.typ
Because access control strings include sufficient information to allow someone to break in to the remote account, they create serious security exposure. To protect access control string information, do the following:
To avoid the need for access control strings, you might prefer to use proxy login accounts, which are described in Using Proxy Login Accounts to Protect Passwords.
Using Proxy Login Accounts to Protect Passwords ![]()
Proxy logins let you access files across
a network without specifying a user name or password in an access control
string. Thus, proxy logins have the following security benefits:
Before you can initiate a proxy login, the system or security administrator at the remote node must create a proxy account for you. Proxy accounts, like regular accounts, are created with the Authorize utility (AUTHORIZE). They are usually nonprivileged accounts. Security administrators can allow you access to one default proxy account and up to 15 other proxy accounts. While proxy logins require more setup effort on the part of system managers, they provide more secure network access and eliminate the need for users to enter access control strings.
The following examples illustrate the differences between a normal network login request and a proxy login request. For each example, the following conditions exist:
| An account on node BIRCH with the password XYZ123ABC |
| An account on node WALNUT with the password A25D3255 |
The following diagram illustrates these conditions:

The user KMAHOGANY could use an access control string to copy the file BIONEWS.MEM, as follows:
Notice that the password A25D3255 echoes. Anyone who observes the screen can see it. In contrast, if KMAHOGANY has proxy access from node BIRCH to the account on node WALNUT, the command for copying the file BIONEWS.MEM is as follows:$COPY WALNUT"KMAHOGANY A25D3255"::BIONEWS.MEM BIONEWS.MEM
KMAHOGANY does not need to specify a password in an access control string. Instead, the system performs a proxy login from the account on node BIRCH into the account on node WALNUT. There is no exchange of passwords.$COPY WALNUT::BIONEWS.MEM BIONEWS.MEM
Using a General Access Proxy Account ![]()
Your security administrator can also authorize groups of users from foreign nodes to share in the use of a general access proxy account. For example, the security administrator at node WALNUT can create a general access account with the following conditions:
If the security administrator grants BIRCH::KMAHOGANY proxy access to the GENACCESS account, the user KMAHOGANY can copy the file BIONEWS.MEM by entering the following command:
Note that KMAHOGANY must specify the directory [KMAHOGANY] because the file BIONEWS.MEM is not in the default device and directory for the GENACCESS account (STAFFDEV:[BIOSTAFF]). In addition, the protection for the file BIONEWS.MEM must permit access to the GENACCESS account. Otherwise, the command fails.$COPY WALNUT::[KMAHOGANY]BIONEWS.MEM BIONEWS.MEM
When You Need to Specify the Name of a Proxy Account ![]()
If you have access to more than one proxy account on a given node and you do not want to use the default proxy account, specify the name of the proxy account. For example, to use a proxy account called PROXY2 instead of the GENACCESS account (the default), KMAHOGANY enters the following command:
This command uses the PROXY2 account to copy the file BIONEWS.MEM from the [KMAHOGANY] directory on node WALNUT.$COPY WALNUT"PROXY2"::[KMAHOGANY]BIONEWS.MEM BIONEWS.MEM
|
|