RMALOUF@SBCCMAIL.BITNET.UUCP (02/22/87)
State University of New York at Stony Brook Stony Brook, NY 11794-5000 Robert Malouf Marine Sciences 22-Feb-1987 11:55am EST FROM: RMALOUF TO: Remote Addressee ( _INFO-VAX@SRI-KL.ARPA ) SUBJECT: RE: Re: Problem with illegal users of SET HOST/DTE Hello, Todd Warnock (WARNOCK@CLEMSON.BITNET) writes > Why not put an ACL on SYS$SHARE:DTE_xxxx (where xxxx is DF03, DF112, > HAYES, etc.) ? That's certainly easier than trying to seperate [sic] > "good" from "bad" users using RTAD [sic]... I don't think that would solve the problem, since anyone could connect to the modem port with SET HOST/DTE (with no /DIAL=(...) clause) and then give the modem explicit autodial commands (e.g., AT DT 92125556767 for a Hayes modem). It seems to me that the protection (i.e., ACL) has to go onto the port itself, and not onto any software used to access it. Rob Malouf RMALOUF@SBCCMAIL.BITNET P.S. - Just out of curiosity, why do average users have to make long distance calls out of the VAX anyway? Why not just allow use of the long distance dial out ports only for privileged users, or by appointment only?