RMALOUF@SBCCMAIL.BITNET.UUCP (02/22/87)
State University of New York at Stony Brook
Stony Brook, NY 11794-5000
Robert Malouf
Marine Sciences
22-Feb-1987 11:55am EST
FROM: RMALOUF
TO: Remote Addressee ( _INFO-VAX@SRI-KL.ARPA )
SUBJECT: RE: Re: Problem with illegal users of SET HOST/DTE
Hello,
Todd Warnock (WARNOCK@CLEMSON.BITNET) writes
> Why not put an ACL on SYS$SHARE:DTE_xxxx (where xxxx is DF03, DF112,
> HAYES, etc.) ? That's certainly easier than trying to seperate [sic]
> "good" from "bad" users using RTAD [sic]...
I don't think that would solve the problem, since anyone could connect to
the modem port with SET HOST/DTE (with no /DIAL=(...) clause) and then give
the modem explicit autodial commands (e.g., AT DT 92125556767 for a Hayes
modem). It seems to me that the protection (i.e., ACL) has to go onto the
port itself, and not onto any software used to access it.
Rob Malouf
RMALOUF@SBCCMAIL.BITNET
P.S. - Just out of curiosity, why do average users have to make long
distance calls out of the VAX anyway? Why not just allow use of the long
distance dial out ports only for privileged users, or by appointment only?