Thanks David, Rebecca:

Basically, I agree with all Rebecca said about limiting access in general: that's why 
we try not to work under root account on Unix, even if we have it; in the particular 
case, however, I implicitly assumed David was seeking to actually prohibit users in 
mqm group from accessing a queue; I should have probably asked first.

I also made my check (on AIX system) and found that setmqaut cannot deprive mqm group 
of its ability to access queues (checked with dspmqaut: -all does not change mqm's 
unlimited rights). I was wrong in my previous mail : mqm *is* on the list from the 
beginning; and it cannot be removed (at least I could not).

I also agree that, from security administration point of view, the argument of 
accountability is used (and misused) pretty often especially when they cannot offer 
some technically sound solution for a difficult problem, like providing keystore 
passphrases for unattended servers (MQ's CMS keystore is not an exception -- another 
reason why you may want to keep most users out of mqm group). Once I had to scramble 
(of course, not to encrypt -- with what password?) such a phrase for these guys who 
earnestly beleived that using 'od' on encrypted password file or 'vi' or 'view' on a 
script in which did the scrambling would look much more fishy in their logs than using 
'view' or 'vi' on an unencrypted file (and whom they want to hide the password from? 
-- from the very user who was supposed to enter it at the first place!). Back to 
David's problem, I do not see any greater chances for the user allowed in mqm group to 
be caught for running setmqaut (why else he would be allowed
there?) than for running the application capable to access a queue (why would s/he do 
it if s/he is supposed to administer?).

Also, on Unix, playing around with MQ installation (you would have to change the 
binary permissions that are r-sr-s--- for setmqaut after installation) might make the 
work IBM technical support, should you need it, more difficult. I always try to avoid 
that.

Actually, I had to play with this unnatural (MQ+security on distributed systems) 
combination quite a bit, so, if David tells us in more details what he wants to 
achieve, there is a chance I have some more or less proven recipe (for Unix or Windows 
platform only).

Thanks for reading this far :-),
Pavel







                      "Bullock, Rebecca
                      (CSC)"                   To:       [EMAIL PROTECTED]
                      <[EMAIL PROTECTED]        cc:
                      >                        Subject:  Re: Using setmqaut
                      Sent by: MQSeries
                      List
                      <[EMAIL PROTECTED]
                      n.AC.AT>


                      07/09/2003 11:56
                      AM
                      Please respond to
                      MQSeries List






Pavel, while it may seem somewhat counterintuitive, it's not terribly
uncommon for a user who can change security access to something to not have
access to that thing. Yes, they can change the access, but the hope is that
this would be caught through some sort of reporting/logging. The other
advantage of doing this is that it prevents accidental modification of some
critical queue data; if you needed to do those modifications, you would at
that time do the setmqaut and then turn it back off when you're done.

This may not be irrelevant here anyway. Since setmqaut sets access at the
group level and, I presume, you could set the permissions on setmqaut so
that group could not run it while the owner could, it would be possible to
stop a user in the mqm group, but is not mqm himself, from running setmqaut
to reset permissions.

Just my take on this issue, based on doing other security stuff that's not
MQ... Rebecca

Rebecca Bullock
Computer Sciences Corporation
MFCoE/Newark CS Team

Educational Testing Service Account
Princeton, NJ 08541

email: [EMAIL PROTECTED] or [EMAIL PROTECTED]


-----Original Message-----
From: Pavel Tolkachev [mailto:[EMAIL PROTECTED]
Sent: Wednesday, July 09, 2003 11:06 AM
To: [EMAIL PROTECTED]
Subject: Re: Using setmqaut


David,

First, I seems to me I tried all those tricks while ago and found mqm is a
God.

Second, logically mqm is not in the ACLs from the very beginning (check with
dspmqaut), so deleting him from there should not change anything (just an
educated guess)

Third, even assuming mqm could be deleted from .. whatever, why whould s/he
be able to add him/herself back .. there.. using that very setmqaut?
(another educated guess).

All those considerations are valid for Unix and (if I am not mistaken)
Windows. I am not sure about other platforms.

Hope this will help,
Pavel




                      "David C.
                      Partridge"                To:
[EMAIL PROTECTED]
                      <[EMAIL PROTECTED]        cc:
                      RIMEUR.COM>               Subject:  Re: Using setmqaut
                      Sent by: MQSeries
                      List
                      <[EMAIL PROTECTED]
                      .AC.AT>


                      07/09/2003 10:17
                      AM
                      Please respond to
                      MQSeries List






Rick,

Hmmm... that sounds like it *is* possible, but use at your own risk - can
anyone confirm?

Thanks
David

Instructions for managing your mailing list subscription are provided in
the Listserv General Users Guide available at http://www.lsoft.com
Archive: http://vm.akh-wien.ac.at/MQSeries.archive





--

This e-mail may contain confidential and/or privileged information. If you
are not the intended recipient (or have received this e-mail in error)
please notify the sender immediately and destroy this e-mail. Any
unauthorized copying, disclosure or distribution of the material in this
e-mail is strictly forbidden.

Instructions for managing your mailing list subscription are provided in
the Listserv General Users Guide available at http://www.lsoft.com
Archive: http://vm.akh-wien.ac.at/MQSeries.archive



**************************************************************************
This e-mail and any files transmitted with it may contain privileged or
confidential information. It is solely for use by the individual for whom
it is intended, even if addressed incorrectly. If you received this e-mail
in error, please notify the sender; do not disclose, copy, distribute, or
take any action in reliance on the contents of this information; and delete
it from your system. Any other use of this e-mail is prohibited. Thank you
for your compliance.

Instructions for managing your mailing list subscription are provided in
the Listserv General Users Guide available at http://www.lsoft.com
Archive: http://vm.akh-wien.ac.at/MQSeries.archive





--

This e-mail may contain confidential and/or privileged information. If you are not the 
intended recipient (or have received this e-mail in error) please notify the sender 
immediately and destroy this e-mail. Any unauthorized copying, disclosure or 
distribution of the material in this e-mail is strictly forbidden.

Instructions for managing your mailing list subscription are provided in
the Listserv General Users Guide available at http://www.lsoft.com
Archive: http://vm.akh-wien.ac.at/MQSeries.archive

Reply via email to