HP OpenVMS Guide to System Security |
Security for the User |
Descriptions of Object Classes |
|
|
| |
Naming
Rules ![]()
You can use physical, logical, or generic names to refer to
devices. In addition, if your system is part of a clustered system,
certain devices are accessible to all members of the cluster. They
have the following formats:
| A device code (dd), which represents the hardware device type. |
| A controller designator (c), which identifies the hardware controller to which the device is attached. |
| The unit number (U), which uniquely identifies a device on a particular controller. |
See the HP OpenVMS System Manager's Manual and the HP OpenVMS User's Manual for a full description of device names.
Types
of Access ![]()
Devices can be shared and thus have concurrent users or be
unshared and have a single user.
Shared devices support the following types of access:
Unshared devices support only read, write, and control access. The device driver rather than the operating system's security policy defines the access requirements for other types of operations.
Access Requirements for I/O Operations ![]()
Access requirements for I/O operations on devices can be quite
complex. The following list explains access requirements for typical
operations:
| OpenVMS supported volumes Any virtual I/O to the volume has the same access requirements as the File or Volume class (see Files and Volumes). |
| Volumes mounted foreign (/FOREIGN) Virtual read and write functions are converted to logical I/O. All other functions are not processed by the operating system and are sent to the device driver for processing. Physical I/O functions also require PHY_IO privilege. |
| Devices without a mounted volume Access to devices without mounted volumes requires privilege. |
| Shareable devices With shareable devices, such as mailboxes, any virtual I/O function other than READVBLK/WRITEVBLK is handled by the system I/O driver program. Any logical I/O function requires privilege or logical access to the device. Any physical I/O function requires privilege or physical access to the device. |
| Unshareable devices With unshareable devices, such as terminals or printers, the operating system checks only for read or write access to perform virtual and logical I/O functions. Any physical I/O function requires privilege. |
Template Profile ![]()
The device class provides the following template profiles:
| Template Name | Device Type | Owner UIC | Protection Code |
|---|---|---|---|
|
BUS
|
DC$_BUS
|
[SYSTEM]
|
S:RWPL,O:RWPL,G,W
|
|
CARDREADER
|
DC$_CARD
|
[SYSTEM]
|
S:RWPL,O:RWPL,G,W
|
|
COMMUNICATION
|
DC$_SCOM
|
[SYSTEM]
|
S:RWPL,O:RWPL,G,W
|
|
DEFAULT
|
|
[SYSTEM]
|
S:RWPL,O:RWPL,G:RWPL,W:RWPL
|
|
DISK
|
DC$_DISK
|
[SYSTEM]
|
S:RWPL,O:RWPL,G:R,W
|
|
MAILBOX
|
DC$_MAILBOX
|
[SYSTEM]
|
S:RWPL,O:RWPL,G:RWPL,W:RWPL
|
|
PRINTER
|
DC$_LP
|
[SYSTEM]
|
S:RWPL,O:RWPL,G,W
|
|
REALTIME
|
DC$_REALTIME
|
[SYSTEM]
|
S:RWPL,O:RWPL,G:RWPL,W:RWPL
|
|
TAPE
|
DC$_TAPE
|
[SYSTEM]
|
S:RWPL,O:RWPL,G:R,W
|
|
TERMINAL
|
DC$_TERM
|
[SYSTEM]
|
S:RWPL,O:RWPL,G,W
|
|
WORKSTATION
|
DC$_WORKSTATION
|
[SYSTEM]
|
S:RWPL,O:RWPL,G:RWPL,W:RWPL
|
Setting Up Profiles for New Devices ![]()
A device usually derives its security profile from the template
profile associated with its device type; however, the template is
often modified. The following list describes how the operating system
assigns a profile to different types of devices:
| In OpenVMS Version 7.2-1 and earlier, all pseudo-terminal
(FT) device protection codes were set by the driver to (S:RWLP,O:RWLP,G,W).
In OpenVMS Version 7.3 and later, only device FTA0 is set to this
forced protection. This allows the system manager the option of modifying
the FTA0 device protection later in the boot process. This new protection
is inherited from FTA0 by any new FT devices created thereafter
(as well as other settings originating from the SECURITY class DEVICE
TERMINAL template profile, such as ACLs). A system manager can modify FTA0 manually, or change the SYSTARTUP_VMS.COM command procedure. For example: $ SET SECURITY/CLASS=DEVICE - _$ /PROTECTION=(S:RWLP,O:RWLP,G:RW,W:R) FTA0:If the device protection for FTA0 is left unmodified, the behavior is unchanged from versions of OpenVMS prior to Version 7.3. That behavior is that all terminals except FT pseudo-terminal devices inherit their device protection and other security characteristics from the TERMINAL template profile. All FTA pseudo-terminal devices inherit their protection from FTA0, which by default is set to (S:RWLP,O:RWLP,G,W). Other settings, such as ACLs, are inherited from the TERMINAL template profile. This ensures compatibility with existing applications. |
Privilege Requirements ![]()
All logical or physical I/O to a spooled device requires privilege.
The LOG_IO privilege allows the user's process to execute the Queue I/O Request ($QIO) system service to perform logical-level I/O operations. LOG_IO privilege is also required for certain device-control functions, such as setting permanent terminal elements.
The PHY_IO privilege allows the user's process to execute the Queue I/O Request ($QIO) system service to perform physical-level I/O operations. The PHY_IO privilege also grants LOG_IO privilege.
To create a permanent mailbox or mark it for deletion requires PRMMBX privilege.
Kinds of Auditing Performed ![]()
The following types of events can be audited, provided the
security administrator enables auditing for the appropriate event
class:
| Event Audited | When Audit Occurs |
|---|---|
|
Access
|
For nonshareable devices,
when the process calls $ASSIGN; for a shareable device, when the
process calls $QIO
|
|
Creation
|
When a process creates a
virtual device like a mailbox
|
|
Deletion
|
When a process deletes a virtual device
like a mailbox
|
Permanence of the Object ![]()
The profile of clusterwide disks and tapes is stored in the
object database VMS$OBJECTS.DAT, but other object profiles have
to be reset each time the system starts up.
|
|