[mod.computers.vax] Access Control Lists and Security

#D1Z@DDATHD21.BITNET (11/12/85)

With VAX-VMS Version 4.0, DEC introduced an implementation of
Access Control Lists (ACL), in that release for files and devices.
In release 4.2 they were extended to logical name tables.

Though the theoretical concept of Access Control Lists gives a high
amount of access security, the realisation in VMS opens some ways for
intruders:

 a) A user may set an ACL for the terminal he is logged in. This
    ACL still remains active, when he logs out. Since the user may well
    have set an ACL which allows him allocation of the terminal, he
    then may run a program simulating the Login Process - and acquire
    knowledge of the password(s) of privileged users. (If DECnet is
    available at that site in question, even a Login Failure may be
    simulated automatically!)

 b) When a logical name table does not have an owner nor an ACL -
    and LNM$SYSTEM does not have neither as a default - anybody may
    set an ACL for it allowing him any access he wants. (Note that
    if he does not include CONTROL access, he must not remove the
    ACL any more!)

 c) Note that if you use file access across DECnet without proxy
    accounts  (e.g. TYPE NODE"USER PASSWORD"::FILENAME), the password
    will be stored in the RECALL buffer, so anyone who may use your
    session without your paying attention to it may find some pass-
    words he should not know of...

             Yours
                   Wilhelm Mueller