[mod.computers.vax] Problem with illegal users of SET HOST/DTE

RMALOUF@SBCCMAIL.BITNET.UUCP (02/22/87)

               State University of New York at Stony Brook
                       Stony Brook, NY 11794-5000
 
                                          Robert Malouf
 
                                          Marine Sciences
 
                                          22-Feb-1987 11:55am EST
FROM:  RMALOUF
 
TO:  Remote Addressee                     ( _INFO-VAX@SRI-KL.ARPA )
 
SUBJECT: RE: Re: Problem with illegal users of SET HOST/DTE
 
Hello,
 
Todd Warnock (WARNOCK@CLEMSON.BITNET) writes
 
>  Why not put an ACL on SYS$SHARE:DTE_xxxx (where xxxx is DF03, DF112,
>  HAYES, etc.) ? That's certainly easier than trying to seperate [sic]
>  "good" from "bad" users using RTAD [sic]...
 
I don't think that would solve the problem, since anyone could connect to
the modem port with SET HOST/DTE (with no /DIAL=(...) clause) and then give
the modem explicit autodial commands (e.g., AT DT 92125556767 for a Hayes
modem).  It seems to me that the protection (i.e., ACL) has to go onto the
port itself, and not onto any software used to access it.
 
                             Rob Malouf
                                RMALOUF@SBCCMAIL.BITNET
 
P.S. - Just out of curiosity, why do average users have to make long
distance calls out of the VAX anyway?  Why not just allow use of the long
distance dial out ports only for privileged users, or by appointment only?