Re: Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread David Boyes
> A full pack is allocated to each page and spool with Version 5.
> Although that may not be enough for some (most) Linux implementations,
> it's certainly better than the old defaults.  :)

Which got changed by exactly this kind of discussion...


Re: Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread Rich Smrcina
A full pack is allocated to each page and spool with Version 5. 
Although that may not be enough for some (most) Linux implementations, 
it's certainly better than the old defaults.  :)


[EMAIL PROTECTED] wrote:


And the Starter System (Initial System) has very limited page and spool 
space, too...  And, if they are going to expand on the page and spool 
space, they really should know enough to get onto their own (hopefully 
secure) system.
 


--
Rich Smrcina
VM Assist, Inc.
Phone: 414-491-6001
Ans Service:  360-715-2467
rich.smrcina at vmassist.com
http://www.linkedin.com/in/richsmrcina

Catch the WAVV!  http://www.wavv.org
WAVV 2008 - Chattanooga - April 18-22, 2008


Re: Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread pfa
And the Starter System (Initial System) has very limited page and spool 
space, too...  And, if they are going to expand on the page and spool 
space, they really should know enough to get onto their own (hopefully 
secure) system.
 




"Huegel, Thomas" <[EMAIL PROTECTED]> 
Sent by: The IBM z/VM Operating System 
10/09/2007 01:20 PM
Please respond to
The IBM z/VM Operating System 


To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
Re: Initial User Directory ( was: hacking vm/cms (probably old news))







I'm sorry, but if I have to learn LINUX I think it only fitting that LINUX 
people learn a little VM.. Didn't we all have to learn VM at one time? and 
probably at least one other OS MVS or VSE.. 
Maybe IBM could supply a LINUX only directory using names like ROOT 
instead of MAINT. 
-Original Message- 
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] 
Behalf Of Thomas Kern 
Sent: Tuesday, October 09, 2007 12:09 PM 
To: IBMVM@LISTSERV.UARK.EDU 
Subject: Re: Initial User Directory ( was: hacking vm/cms (probably old 
news)) 

unfortunately lots of new Linux-server VM systems are being run off that 
initial starter system. They deserve the most secure starter system that 
IBM can give them. 
/Tom Kern 
[EMAIL PROTECTED] wrote: 
> 
> Isn't that a bit of an overkill for a starter system?? 
> 
> 
> 
> 
> *Thomas Kern <[EMAIL PROTECTED]>* 
> Sent by: The IBM z/VM Operating System  
> 
> 10/09/2007 10:00 AM 
> Please respond to 
> The IBM z/VM Operating System  
> 
> 
> 
> To 
>   IBMVM@LISTSERV.UARK.EDU 
> cc 
> 
> Subject 
>   Initial User Directory ( was: hacking vm/cms (probably old news)) 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> I would like it to go a step further, like with some linux installations 

> that ask for a root password and another userid to be added. I like 
> having ALL system related userids be AUTOONLY, LBYONLY, NOLOG or have a 
> randomly generated password. All userids that need to actually need to 
> be logged onto must have a LOGONBY record authorizing that initial 
> sysprog userid. After that initial setup, it isn't hard to replace the 
> passwords for those users that need to logged on. No one ever really 
> needs the password to those accounts if properly LOGONBY authorized. 
> That random password could be randomized daily, until you can properly 
> divide all accounts into the proper AUTOONLY, LBYONLY, NOLOG or personal 

> password categories. 
> 
> /Tom Kern 
> /301-903-2211 
> 
> 
> 
> Nick Laflamme wrote: 
>  > Robert Nix wrote: 
>  >> Hi Alan; 
>  >> 
>  >> Given that the starting CP Directory is dynamically created, for the 

> most 
>  >> part, today, how hard would it be to allow the installer to select a 

>  >> "root 
>  >> password" to be applied to all of the initial accounts? 
>  >> 
>  > 
>  > I'll go one step further: how about a default of all userids except 
>  > MAINT, OPERATOR, and CMSUSER (does that still ship on fresh system?) 
>  > being LBYONLY, defaulting to MAINT as the user who can do LOGONBY. 
>  > Anyone who wants a different LOGONBY user (or additional users) 
should 
>  > know which trivial XEDIT command will change that. 
>  > 
>  > Nick 
>  > 
> 

__ 
<< ella for Spam Control >> has removed VSE-List messages and set aside 
VM-List for me 
You can use it too - and it's FREE!  http://www.ellaforspam.com 


Re: Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread Rich Smrcina
ROOT is already in the directory for Open Extensions.  Let's not mess 
with a good thing.


When we're teaching classes invariably there are a good mix of Linux 
people and mainframe (usually z/OS) people.  Actually the last class 
that I taught, the Linux people kept up quite well with the z/VM parts 
and we're very intrigued by all that could be done with z/VM.


Huegel, Thomas wrote:
I'm sorry, but if I have to learn LINUX I think it only fitting that 
LINUX people learn a little VM.. Didn't we all have to learn VM at one 
time? and probably at least one other OS MVS or VSE..


Maybe IBM could supply a LINUX only directory using names like ROOT 
instead of MAINT.




--
Rich Smrcina
VM Assist, Inc.
Phone: 414-491-6001
Ans Service:  360-715-2467
rich.smrcina at vmassist.com
http://www.linkedin.com/in/richsmrcina

Catch the WAVV!  http://www.wavv.org
WAVV 2008 - Chattanooga - April 18-22, 2008


Re: Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread Schuh, Richard
Actually, I would rather have some mechanism that would prevent the starter 
system from being used in production. That has actually been the source of a 
fair number of problems reported on this list. 

Regards, 
Richard Schuh 


-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On Behalf Of 
David Boyes
Sent: Tuesday, October 09, 2007 9:23 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Initial User Directory ( was: hacking vm/cms (probably old news))

> Isn't that a bit of an overkill for a starter system?? 
  
Not really. If you start with a fairly buttoned-up system, you know exactly 
what holes you open because you do it deliberately (and it's completely your 
fault if you screw it up). What Tom's described is a pretty tight system, and 
it's not a bad default if you have few or no CMS users. 

The question we're really answering in this discussion:

In this day and age, is there really any reason/excuse to ship a system in a 
state that is known to be insecure? 

I'd argue that the answer now is "no".  

We used to say "start with a simple system, and make it secure". What this 
discussion seems to be proposing is "let's start with a secure system, and open 
things as necessary". Seems like a Good Thing (tm) to me. 


Re: Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread Huegel, Thomas
I'm sorry, but if I have to learn LINUX I think it only fitting that LINUX
people learn a little VM.. Didn't we all have to learn VM at one time? and
probably at least one other OS MVS or VSE.. 
Maybe IBM could supply a LINUX only directory using names like ROOT instead
of MAINT.

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED]
Behalf Of Thomas Kern
Sent: Tuesday, October 09, 2007 12:09 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Initial User Directory ( was: hacking vm/cms (probably old
news))


unfortunately lots of new Linux-server VM systems are being run off that 
initial starter system. They deserve the most secure starter system that 
IBM can give them.

/Tom Kern

[EMAIL PROTECTED] wrote:
> 
> Isn't that a bit of an overkill for a starter system??
>  
>  
> 
> 
> *Thomas Kern <[EMAIL PROTECTED]>*
> Sent by: The IBM z/VM Operating System 
> 
> 10/09/2007 10:00 AM
> Please respond to
> The IBM z/VM Operating System 
> 
> 
>   
> To
>   IBMVM@LISTSERV.UARK.EDU
> cc
>       
> Subject
>   Initial User Directory ( was: hacking vm/cms (probably old news))
> 
> 
>   
> 
> 
> 
> 
> 
> 
> I would like it to go a step further, like with some linux installations
> that ask for a root password and another userid to be added. I like
> having ALL system related userids be AUTOONLY, LBYONLY, NOLOG or have a
> randomly generated password. All userids that need to actually need to
> be logged onto must have a LOGONBY record authorizing that initial
> sysprog userid. After that initial setup, it isn't hard to replace the
> passwords for those users that need to logged on. No one ever really
> needs the password to those accounts if properly LOGONBY authorized.
> That random password could be randomized daily, until you can properly
> divide all accounts into the proper AUTOONLY, LBYONLY, NOLOG or personal
> password categories.
> 
> /Tom Kern
> /301-903-2211
> 
> 
> 
> Nick Laflamme wrote:
>  > Robert Nix wrote:
>  >> Hi Alan;
>  >>
>  >> Given that the starting CP Directory is dynamically created, for the 
> most
>  >> part, today, how hard would it be to allow the installer to select a
>  >> "root
>  >> password" to be applied to all of the initial accounts?
>  >>  
>  >
>  > I'll go one step further: how about a default of all userids except
>  > MAINT, OPERATOR, and CMSUSER (does that still ship on fresh system?)
>  > being LBYONLY, defaulting to MAINT as the user who can do LOGONBY.
>  > Anyone who wants a different LOGONBY user (or additional users) should
>  > know which trivial XEDIT command will change that.
>  >
>  > Nick
>  >
> 


__
<< ella for Spam Control >> has removed VSE-List messages and set aside
VM-List for me
You can use it too - and it's FREE!  http://www.ellaforspam.com


Re: Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread Thomas Kern
unfortunately lots of new Linux-server VM systems are being run off that 
initial starter system. They deserve the most secure starter system that 
IBM can give them.


/Tom Kern

[EMAIL PROTECTED] wrote:


Isn't that a bit of an overkill for a starter system??
 
 



*Thomas Kern <[EMAIL PROTECTED]>*
Sent by: The IBM z/VM Operating System 

10/09/2007 10:00 AM
Please respond to
The IBM z/VM Operating System 



To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
Initial User Directory ( was: hacking vm/cms (probably old news))









I would like it to go a step further, like with some linux installations
that ask for a root password and another userid to be added. I like
having ALL system related userids be AUTOONLY, LBYONLY, NOLOG or have a
randomly generated password. All userids that need to actually need to
be logged onto must have a LOGONBY record authorizing that initial
sysprog userid. After that initial setup, it isn't hard to replace the
passwords for those users that need to logged on. No one ever really
needs the password to those accounts if properly LOGONBY authorized.
That random password could be randomized daily, until you can properly
divide all accounts into the proper AUTOONLY, LBYONLY, NOLOG or personal
password categories.

/Tom Kern
/301-903-2211



Nick Laflamme wrote:
 > Robert Nix wrote:
 >> Hi Alan;
 >>
 >> Given that the starting CP Directory is dynamically created, for the 
most

 >> part, today, how hard would it be to allow the installer to select a
 >> "root
 >> password" to be applied to all of the initial accounts?
 >>  
 >

 > I'll go one step further: how about a default of all userids except
 > MAINT, OPERATOR, and CMSUSER (does that still ship on fresh system?)
 > being LBYONLY, defaulting to MAINT as the user who can do LOGONBY.
 > Anyone who wants a different LOGONBY user (or additional users) should
 > know which trivial XEDIT command will change that.
 >
 > Nick
 >



Re: Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread David Boyes
> Isn't that a bit of an overkill for a starter system?? 
  
Not really. If you start with a fairly buttoned-up system, you know exactly 
what holes you open because you do it deliberately (and it's completely your 
fault if you screw it up). What Tom's described is a pretty tight system, and 
it's not a bad default if you have few or no CMS users. 

The question we're really answering in this discussion:

In this day and age, is there really any reason/excuse to ship a system in a 
state that is known to be insecure? 

I'd argue that the answer now is "no".  

We used to say "start with a simple system, and make it secure". What this 
discussion seems to be proposing is "let's start with a secure system, and open 
things as necessary". Seems like a Good Thing (tm) to me. 


Re: Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread pfa
Isn't that a bit of an overkill for a starter system??
 
 



Thomas Kern <[EMAIL PROTECTED]> 
Sent by: The IBM z/VM Operating System 
10/09/2007 10:00 AM
Please respond to
The IBM z/VM Operating System 


To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
Initial User Directory ( was: hacking vm/cms (probably old news))







I would like it to go a step further, like with some linux installations 
that ask for a root password and another userid to be added. I like 
having ALL system related userids be AUTOONLY, LBYONLY, NOLOG or have a 
randomly generated password. All userids that need to actually need to 
be logged onto must have a LOGONBY record authorizing that initial 
sysprog userid. After that initial setup, it isn't hard to replace the 
passwords for those users that need to logged on. No one ever really 
needs the password to those accounts if properly LOGONBY authorized. 
That random password could be randomized daily, until you can properly 
divide all accounts into the proper AUTOONLY, LBYONLY, NOLOG or personal 
password categories.

/Tom Kern
/301-903-2211



Nick Laflamme wrote:
> Robert Nix wrote:
>> Hi Alan;
>>
>> Given that the starting CP Directory is dynamically created, for the 
most
>> part, today, how hard would it be to allow the installer to select a 
>> "root
>> password" to be applied to all of the initial accounts?
>> 
> 
> I'll go one step further: how about a default of all userids except 
> MAINT, OPERATOR, and CMSUSER (does that still ship on fresh system?) 
> being LBYONLY, defaulting to MAINT as the user who can do LOGONBY. 
> Anyone who wants a different LOGONBY user (or additional users) should 
> know which trivial XEDIT command will change that.
> 
> Nick
> 



Re: hacking vm/cms (probably old news)

2007-10-09 Thread Thomas Kern
Auditors are the only snag in the works. Our Cyber/Network security 
people feel that if there is an IP address assigned, then the 
scriptkiddies can infiltrate our network and steal all of our secrets, 
or at least store all of their porn.


Being FORCED to work on closing the directory before being able to bring 
up the TCPIP stack would help in dealing with them.


/Tom Kern
/301-903-2211

Huegel, Thomas wrote:
I agree. Auditors need not even know a second level installation 
machine even exist, other than it is just another virtual machine..


Since I am always installing second level only the password for my 
second level machine needs to be secure. In my opinion this is a single 
user machine.


All of this password manipulation can easily be done before turning the 
directory over to DIRMAINT and before going to production with a user 
written exec.




-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED]
Behalf Of RPN01
Sent: Tuesday, October 09, 2007 9:44 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: hacking vm/cms (probably old news)


As far as I'm concerned, until the system matches the production
environment, it's mine, and auditors have no business looking at it at all;
I'll do as I please. They can whine all they want; they don't have an ID on
the installation system to look at anything with anyway, so how can they 
say

it isn't secure?

--
   .~.Robert P. Nix Mayo Foundation
   /V\RO-OE-5-55200 First Street SW
  /( )\   507-284-0844  Rochester, MN 55905
  ^^-^^   -
"In theory, theory and practice are the same, but
 in practice, theory and practice are different."




On 10/9/07 9:25 AM, "David Boyes" <[EMAIL PROTECTED]> wrote:


 >
 > Easier, but you have no evidence that you actually did so if some
 > auditor yahoo comes and whines about it. You also can then ensure that
 > whatever new passwords assigned actually meet your password policies,
 > etc, etc, blah, blah.
 >


__
<< ella for Spam Control >> has removed VSE-List messages and set aside 
VM-List for me

You can use it too - and it's FREE!  http://www.ellaforspam.com



Re: hacking vm/cms (probably old news)

2007-10-09 Thread Huegel, Thomas
I agree. Auditors need not even know a second level installation machine
even exist, other than it is just another virtual machine..

Since I am always installing second level only the password for my second
level machine needs to be secure. In my opinion this is a single user
machine.

All of this password manipulation can easily be done before turning the
directory over to DIRMAINT and before going to production with a user
written exec.



-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED]
Behalf Of RPN01
Sent: Tuesday, October 09, 2007 9:44 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: hacking vm/cms (probably old news)


As far as I'm concerned, until the system matches the production
environment, it's mine, and auditors have no business looking at it at all;
I'll do as I please. They can whine all they want; they don't have an ID on
the installation system to look at anything with anyway, so how can they say
it isn't secure?

-- 
   .~.Robert P. Nix Mayo Foundation
   /V\RO-OE-5-55200 First Street SW
  /( )\   507-284-0844  Rochester, MN 55905
  ^^-^^   - 
"In theory, theory and practice are the same, but
 in practice, theory and practice are different."




On 10/9/07 9:25 AM, "David Boyes" <[EMAIL PROTECTED]> wrote:


> 
> Easier, but you have no evidence that you actually did so if some
> auditor yahoo comes and whines about it. You also can then ensure that
> whatever new passwords assigned actually meet your password policies,
> etc, etc, blah, blah.
> 


__
<< ella for Spam Control >> has removed VSE-List messages and set aside
VM-List for me
You can use it too - and it's FREE!  http://www.ellaforspam.com


Re: hacking vm/cms (probably old news)

2007-10-09 Thread David Boyes
> As far as I'm concerned, until the system matches the production
> environment, it's mine, and auditors have no business looking at it at
> all;
> I'll do as I please. They can whine all they want; they don't have an
ID
> on
> the installation system to look at anything with anyway, so how can
they
> say
> it isn't secure?

Maybe for your auditors. In other places, some pigs are more equal than
others. 8-(


Re: hacking vm/cms (probably old news)

2007-10-09 Thread Kris Buelens
Furthermore, the AUTOLOG permissions given to MAINT and OPERATOR are useless
as a CLASS A user can XAUTOLOG anyone, that is, without an AUTOLOG record in
the CP directory.

2007/10/9, David Boyes <[EMAIL PROTECTED]>:
>
> > I'll go one step further: how about a default of all userids except
> > MAINT, OPERATOR, and CMSUSER (does that still ship on fresh system?)
> > being LBYONLY, defaulting to MAINT as the user who can do LOGONBY.
>
> With all the service machine ids having AUTOLOG lines for AUTOLOG1,
> OPERATOR and MAINT.
>
> Personally, I'd NOLOG CMSUSER. I can't think of the last time I've
> actually used it.
>
> > Anyone who wants a different LOGONBY user (or additional users) should
> > know which trivial XEDIT command will change that.
>
> Or should have a directory manager.
>
> Requirement?
>
> -- db
>



-- 
Kris Buelens,
IBM Belgium, VM customer support


Re: hacking vm/cms (probably old news)

2007-10-09 Thread RPN01
As far as I'm concerned, until the system matches the production
environment, it's mine, and auditors have no business looking at it at all;
I'll do as I please. They can whine all they want; they don't have an ID on
the installation system to look at anything with anyway, so how can they say
it isn't secure?

-- 
   .~.Robert P. Nix Mayo Foundation
   /V\RO-OE-5-55200 First Street SW
  /( )\   507-284-0844  Rochester, MN 55905
  ^^-^^   - 
"In theory, theory and practice are the same, but
 in practice, theory and practice are different."




On 10/9/07 9:25 AM, "David Boyes" <[EMAIL PROTECTED]> wrote:


> 
> Easier, but you have no evidence that you actually did so if some
> auditor yahoo comes and whines about it. You also can then ensure that
> whatever new passwords assigned actually meet your password policies,
> etc, etc, blah, blah.
> 


Re: hacking vm/cms (probably old news)

2007-10-09 Thread Thomas Kern
The auditor problem is why I would like ALL userid setups to be done 
automatically  by the install process before being inserted into a 
default DIRMAINT server before I as the installer ever get to edit the 
master directory. And all of the default settings should be as closed 
down as possible, OPERATOR/MAINT in LBYONLY mode, other servers in 
AUTOONLY, placeholders in NOLOG and only the real interactive userids 
that I added through a programmed dialog with the passwords that I 
assigned.


I wish password syntax validation could be added but that sort of means 
more code in DIRMAINT or having RACF as the automatic ESM.


/Tom Kern
/301-903-2211

David Boyes wrote:

Actually, it's much easier, at least in my opinion, to do the massive
edits
to the directory before handing off the first version to DirMaint or

some

other directory manager. Why do in 100 or more dirm commands what you
could
do in three or four xedit commands.


Easier, but you have no evidence that you actually did so if some
auditor yahoo comes and whines about it. You also can then ensure that
whatever new passwords assigned actually meet your password policies,
etc, etc, blah, blah. 


I'm not disagreeing that doing it before the load into DIRM is a lot
easier, just been dealing with too many whiny auditor types recently to
think it's likely to get past some of them. But, your suggestion is
certainly better than the current situation, anyway. 


Whatever happened to RPWLIST FILE in the install process? There was a
step in the VM/SP or HPO installation that forced you to change the
default passwords, and you couldn't use anything that was in RPWLIST
FILE, which included the dumb defaults (same as userid, easy guess,
etc). That step appears to have fallen out of the current install. 


-- db



Re: hacking vm/cms (probably old news)

2007-10-09 Thread David Boyes
> Actually, it's much easier, at least in my opinion, to do the massive
> edits
> to the directory before handing off the first version to DirMaint or
some
> other directory manager. Why do in 100 or more dirm commands what you
> could
> do in three or four xedit commands.

Easier, but you have no evidence that you actually did so if some
auditor yahoo comes and whines about it. You also can then ensure that
whatever new passwords assigned actually meet your password policies,
etc, etc, blah, blah. 

I'm not disagreeing that doing it before the load into DIRM is a lot
easier, just been dealing with too many whiny auditor types recently to
think it's likely to get past some of them. But, your suggestion is
certainly better than the current situation, anyway. 

Whatever happened to RPWLIST FILE in the install process? There was a
step in the VM/SP or HPO installation that forced you to change the
default passwords, and you couldn't use anything that was in RPWLIST
FILE, which included the dumb defaults (same as userid, easy guess,
etc). That step appears to have fallen out of the current install. 

-- db


Re: hacking vm/cms (probably old news)

2007-10-09 Thread Adam Thornton

On Oct 9, 2007, at 12:41 AM, Alan Altmark wrote:
But the true gems in it are about human behavior: Failure to change  
the

default passwords, failure to use an ESM to eliminate the need for
minidisk passwords, failure to reject trivial passwords, failure to  
set a

low number for lockout of a userid due to excessive invalid passwords
within some time interval, putting mdisk passwords in EXECs, and so  
on.

Most of those technology cannot fix.


Sure they can!  Cutting the power is a technological fix.

Adam


Initial User Directory ( was: hacking vm/cms (probably old news))

2007-10-09 Thread Thomas Kern
I would like it to go a step further, like with some linux installations 
that ask for a root password and another userid to be added. I like 
having ALL system related userids be AUTOONLY, LBYONLY, NOLOG or have a 
randomly generated password. All userids that need to actually need to 
be logged onto must have a LOGONBY record authorizing that initial 
sysprog userid. After that initial setup, it isn't hard to replace the 
passwords for those users that need to logged on. No one ever really 
needs the password to those accounts if properly LOGONBY authorized. 
That random password could be randomized daily, until you can properly 
divide all accounts into the proper AUTOONLY, LBYONLY, NOLOG or personal 
password categories.


/Tom Kern
/301-903-2211



Nick Laflamme wrote:

Robert Nix wrote:

Hi Alan;

Given that the starting CP Directory is dynamically created, for the most
part, today, how hard would it be to allow the installer to select a 
"root

password" to be applied to all of the initial accounts?
  


I'll go one step further: how about a default of all userids except 
MAINT, OPERATOR, and CMSUSER (does that still ship on fresh system?) 
being LBYONLY, defaulting to MAINT as the user who can do LOGONBY. 
Anyone who wants a different LOGONBY user (or additional users) should 
know which trivial XEDIT command will change that.


Nick



Re: hacking vm/cms (probably old news)

2007-10-09 Thread RPN01
Actually, it's much easier, at least in my opinion, to do the massive edits
to the directory before handing off the first version to DirMaint or some
other directory manager. Why do in 100 or more dirm commands what you could
do in three or four xedit commands.

-- 
   .~.Robert P. Nix Mayo Foundation
   /V\RO-OE-5-55200 First Street SW
  /( )\   507-284-0844  Rochester, MN 55905
  ^^-^^   - 
"In theory, theory and practice are the same, but
 in practice, theory and practice are different."




On 10/9/07 8:34 AM, "David Boyes" <[EMAIL PROTECTED]> wrote:

> 
>> Anyone who wants a different LOGONBY user (or additional users) should
>> know which trivial XEDIT command will change that.
> 
> Or should have a directory manager.
> 
> Requirement?
> 
> -- db


Re: hacking vm/cms (probably old news)

2007-10-09 Thread David Boyes
> I'll go one step further: how about a default of all userids except
> MAINT, OPERATOR, and CMSUSER (does that still ship on fresh system?)
> being LBYONLY, defaulting to MAINT as the user who can do LOGONBY.

With all the service machine ids having AUTOLOG lines for AUTOLOG1,
OPERATOR and MAINT. 

Personally, I'd NOLOG CMSUSER. I can't think of the last time I've
actually used it. 

> Anyone who wants a different LOGONBY user (or additional users) should
> know which trivial XEDIT command will change that.

Or should have a directory manager. 

Requirement?

-- db


Re: hacking vm/cms (probably old news)

2007-10-09 Thread Nick Laflamme

Robert Nix wrote:

Hi Alan;

Given that the starting CP Directory is dynamically created, for the most
part, today, how hard would it be to allow the installer to select a "root
password" to be applied to all of the initial accounts?
  


I'll go one step further: how about a default of all userids except 
MAINT, OPERATOR, and CMSUSER (does that still ship on fresh system?) 
being LBYONLY, defaulting to MAINT as the user who can do LOGONBY. 
Anyone who wants a different LOGONBY user (or additional users) should 
know which trivial XEDIT command will change that.


Nick


Re: hacking vm/cms (probably old news)

2007-10-09 Thread RPN01
Hi Alan;

Given that the starting CP Directory is dynamically created, for the most
part, today, how hard would it be to allow the installer to select a "root
password" to be applied to all of the initial accounts?

While putting the same password on everything is still not ideal, it is
better than matching the userids and passwords, and would give a bit of
security to the installation system, and to lazy systems programmers.

-- 
   .~.Robert P. Nix Mayo Foundation
   /V\RO-OE-5-55200 First Street SW
  /( )\   507-284-0844  Rochester, MN 55905
  ^^-^^   - 
"In theory, theory and practice are the same, but
 in practice, theory and practice are different."




On 10/9/07 12:41 AM, "Alan Altmark" <[EMAIL PROTECTED]> wrote:

> On Monday, 10/08/2007 at 05:05 EDT, Marty Zimelis
> <[EMAIL PROTECTED]> wrote:
>> Lionel,
>>"Old news?"  You really ought to read  this stuff before forwarding
> links to 
>> it.  In the very first paragraph  (after the intro), they show a
> line-mode log 
>> on to VM/370 and make reference to  43xx and 30xx processors.
> This material is 
>> 30+ years  old.
> 
> It may be 30+ years old and may have some antique references, but those
> prompts are still in the system and appear on a linemode telnet session.
> The password overlay in linemode hasn't worked properly, of course, since
> CRTs came onto the scene.  I suppose I should turn my attention to it one
> of these days
> 
> The system weaknesses it talked about:
> - Allowing passwords on the LOGON and LINK command lines rather than
> unconditionally requiring a prompt when entered from the console.
> - Differentiating between a user that does not exist and an incorrect
> password during LOGON
> - Allowing the DIAL command without prior authentication
> all still exist.
> 
> But the true gems in it are about human behavior: Failure to change the
> default passwords, failure to use an ESM to eliminate the need for
> minidisk passwords, failure to reject trivial passwords, failure to set a
> low number for lockout of a userid due to excessive invalid passwords
> within some time interval, putting mdisk passwords in EXECs, and so on.
> Most of those technology cannot fix.
> 
> Alan Altmark
> z/VM Development
> IBM Endicott


Re: hacking vm/cms (probably old news)

2007-10-09 Thread RPN01
This is true. 

When I was in college in the 70¹s, we toured the air traffic control center
in Indianapolis. They had a large number of s/360 systems with huge amounts
(then) of additional memory; so much so, that to shorten electrical paths,
one memory cabinet for each system was hung from the ceiling over the CPU.

We asked them at that time why they hadn¹t converted to s/370 boxes, and the
response was ³Because this works; Why change it?²

-- 
   .~.Robert P. Nix Mayo Foundation
   /V\RO-OE-5-55  200 First Street SW
 / ( ) \  507-284-0844   Rochester, MN 55905
^^-^^   - 
"In theory, theory and practice are the same, but ³Join the story...
Ride Ural.²
 in practice, theory and practice are different."




On 10/8/07 4:34 PM, "Huegel, Thomas" <[EMAIL PROTECTED]> wrote:

> It wasn't all that long ago, 5-6 years that they moved our air traffic control
> system off s/360 hardware. 



Re: hacking vm/cms (probably old news)

2007-10-09 Thread Rod
> I raid that the Dutch Railways are now planning for 2009 to move their
> traffic management system away from VAX/VMS.

You got a link for this? As it happens, I was at the signal box in
Maastricht a couple of weeks ago to look at the system and work method
there (the advantages of belonging to the local model railway club with a
member who can now gain access). The front end stuff that I saw is
Redmond OS based.

--
Rod


Re: hacking vm/cms (probably old news)

2007-10-08 Thread Alan Altmark
On Monday, 10/08/2007 at 05:05 EDT, Marty Zimelis 
<[EMAIL PROTECTED]> wrote:
> Lionel,
>"Old news?"  You really ought to read  this stuff before forwarding 
links to 
> it.  In the very first paragraph  (after the intro), they show a 
line-mode log 
> on to VM/370 and make reference to  43xx and 30xx processors.  
This material is 
> 30+ years  old.

It may be 30+ years old and may have some antique references, but those 
prompts are still in the system and appear on a linemode telnet session. 
The password overlay in linemode hasn't worked properly, of course, since 
CRTs came onto the scene.  I suppose I should turn my attention to it one 
of these days

The system weaknesses it talked about:
- Allowing passwords on the LOGON and LINK command lines rather than 
unconditionally requiring a prompt when entered from the console.
- Differentiating between a user that does not exist and an incorrect 
password during LOGON
- Allowing the DIAL command without prior authentication
all still exist.

But the true gems in it are about human behavior: Failure to change the 
default passwords, failure to use an ESM to eliminate the need for 
minidisk passwords, failure to reject trivial passwords, failure to set a 
low number for lockout of a userid due to excessive invalid passwords 
within some time interval, putting mdisk passwords in EXECs, and so on. 
Most of those technology cannot fix.

Alan Altmark
z/VM Development
IBM Endicott


Re: hacking vm/cms (probably old news)

2007-10-08 Thread Gregg C Levine
Hello!
I believe that several Federal government agencies and too many state and
city government ones are still using S/370 based systems. 

But I was aware of those notes on the proper means to hack a VM/CMS setup
even before this list did so. And everyone is indeed correct about the fact
that they are collector's items because they reflect on the history of the
systems and software discussed here.

--
Gregg C Levine [EMAIL PROTECTED]
"The Force will be with you. Always." Obi-Wan Kenobi
  

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Huegel, Thomas
Sent: Monday, October 08, 2007 5:34 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: hacking vm/cms (probably old news)

It wasn't all that long ago, 5-6 years that they moved our air traffic
control system off s/360 hardware. 
-Original Message- 
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] 
Behalf Of Rob van der Heij 
Sent: Monday, October 08, 2007 4:30 PM 
To: IBMVM@LISTSERV.UARK.EDU 
Subject: Re: hacking vm/cms (probably old news) 

On 10/8/07, Marty Zimelis <[EMAIL PROTECTED]> wrote: 
>    "Old news?"  You really ought to read  this stuff before forwarding
links to it.  In the very first paragraph  (after the intro), they show a
line-mode log on to VM/370 and make reference to  43xx and 30xx processors. 
This material is 30+ years  old.
Brings back memories... ;-)   But I had to giggle even more today when 
I raid that the Dutch Railways are now planning for 2009 to move their 
traffic management system away from VAX/VMS. 
Rob 
 


Re: hacking vm/cms (probably old news)

2007-10-08 Thread Tom Duerbusch
Not much of a hacker.

There were a lot better ways of hacking a VM system back in the '70s and '80s.

Some tricks still work.  
But some of the tricks depend on a Systems Programmer trying to get some work 
done...easily.

Tom Duerbusch
THD Consulting



FELINE PHYSICS:  
Law of Cat Motion

  A cat will move in a straight line, unless there is a really good
  reason to change direction.


>>> "Lionel B. Dyck" <[EMAIL PROTECTED]> 10/8/2007 3:16 PM >>>
This is probably old news to many of you but I just ran across it and it 
is new for me and probably new for some on this listserv:

http://www.mirrors.wiretapped.net/security/info/textfiles/lod/LOD02-08.TXT 

and

http://www.mirrors.wiretapped.net/security/info/textfiles/lod/LOD02-09.TXT 

Cheers

Lionel B. Dyck, Consultant/Specialist 

Enterprise Platform Services, Mainframe Engineering 
KP-IT Enterprise Engineering 
925-926-5332 (8-473-5332) | E-Mail: [EMAIL PROTECTED] 
AIM: lbdyck | Yahoo IM: lbdyck 
Kaiser Service Credo: "Our cause is health. Our passion is service. We?re 
here to make lives better.? 

?Never attribute to malice what can be caused by miscommunication.? 

NOTICE TO RECIPIENT: If you are not the intended recipient of this e-mail, 
you are prohibited from sharing, copying, or otherwise using or disclosing 
its contents. If you have received this e-mail in error, please notify the 
sender immediately by reply e-mail and permanently delete this e-mail and 
any attachments without reading, forwarding or saving them. Thank you. 


Re: hacking vm/cms (probably old news)

2007-10-08 Thread Rob van der Heij
On 10/8/07, Huegel, Thomas <[EMAIL PROTECTED]> wrote:

> It wasn't all that long ago, 5-6 years that they moved our air traffic
> control system off s/360 hardware.

Yes, it's amazing how well a lot of old stuff keeps running. I am not
going to take the train for some time when they roll out the new SOA
stuff ;-)

Rob


Re: hacking vm/cms (probably old news)

2007-10-08 Thread Huegel, Thomas
It wasn't all that long ago, 5-6 years that they moved our air traffic
control system off s/360 hardware.

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED]
Behalf Of Rob van der Heij
Sent: Monday, October 08, 2007 4:30 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: hacking vm/cms (probably old news)


On 10/8/07, Marty Zimelis <[EMAIL PROTECTED]> wrote:

>"Old news?"  You really ought to read  this stuff before forwarding
links to it.  In the very first paragraph  (after the intro), they show a
line-mode log on to VM/370 and make reference to  43xx and 30xx processors.
This material is 30+ years  old.

Brings back memories... ;-)   But I had to giggle even more today when
I raid that the Dutch Railways are now planning for 2009 to move their
traffic management system away from VAX/VMS.

Rob


__
<< ella for Spam Control >> has removed VSE-List messages and set aside
VM-List for me
You can use it too - and it's FREE!  http://www.ellaforspam.com


Re: hacking vm/cms (probably old news)

2007-10-08 Thread Rob van der Heij
On 10/8/07, Marty Zimelis <[EMAIL PROTECTED]> wrote:

>"Old news?"  You really ought to read  this stuff before forwarding links 
> to it.  In the very first paragraph  (after the intro), they show a line-mode 
> log on to VM/370 and make reference to  43xx and 30xx processors.  This 
> material is 30+ years  old.

Brings back memories... ;-)   But I had to giggle even more today when
I raid that the Dutch Railways are now planning for 2009 to move their
traffic management system away from VAX/VMS.

Rob


Re: hacking vm/cms (probably old news)

2007-10-08 Thread Marty Zimelis
Lionel,
   "Old news?"  You really ought to read this stuff before forwarding links
to it.  In the very first paragraph (after the intro), they show a line-mode
log on to VM/370 and make reference to 43xx and 30xx processors.  This
material is 30+ years old.
 
Marty


  _  

From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Lionel B. Dyck
Sent: Monday, October 08, 2007 4:16 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: hacking vm/cms (probably old news)



This is probably old news to many of you but I just ran across it and it is
new for me and probably new for some on this listserv: 

 
<http://www.mirrors.wiretapped.net/security/info/textfiles/lod/LOD02-08.TXT>
http://www.mirrors.wiretapped.net/security/info/textfiles/lod/LOD02-08.TXT 

and 

 
<http://www.mirrors.wiretapped.net/security/info/textfiles/lod/LOD02-09.TXT>
http://www.mirrors.wiretapped.net/security/info/textfiles/lod/LOD02-09.TXT 

Cheers




  _  

Lionel B. Dyck, Consultant/Specialist 

Enterprise Platform Services, Mainframe Engineering 
KP-IT Enterprise Engineering 
925-926-5332 (8-473-5332) | E-Mail:  <mailto:[EMAIL PROTECTED]>
[EMAIL PROTECTED] 
AIM: lbdyck | Yahoo IM: lbdyck 
Kaiser Service Credo: "Our cause is health. Our passion is service. We're
here to make lives better." 

"Never attribute to malice what can be caused by miscommunication." 

NOTICE TO RECIPIENT: If you are not the intended recipient of this e-mail,
you are prohibited from sharing, copying, or otherwise using or disclosing
its contents. If you have received this e-mail in error, please notify the
sender immediately by reply e-mail and permanently delete this e-mail and
any attachments without reading, forwarding or saving them. Thank you. 



hacking vm/cms (probably old news)

2007-10-08 Thread Lionel B. Dyck
This is probably old news to many of you but I just ran across it and it 
is new for me and probably new for some on this listserv:

http://www.mirrors.wiretapped.net/security/info/textfiles/lod/LOD02-08.TXT

and

http://www.mirrors.wiretapped.net/security/info/textfiles/lod/LOD02-09.TXT

Cheers

Lionel B. Dyck, Consultant/Specialist 

Enterprise Platform Services, Mainframe Engineering 
KP-IT Enterprise Engineering 
925-926-5332 (8-473-5332) | E-Mail: [EMAIL PROTECTED] 
AIM: lbdyck | Yahoo IM: lbdyck 
Kaiser Service Credo: "Our cause is health. Our passion is service. We?re 
here to make lives better.? 

?Never attribute to malice what can be caused by miscommunication.? 

NOTICE TO RECIPIENT: If you are not the intended recipient of this e-mail, 
you are prohibited from sharing, copying, or otherwise using or disclosing 
its contents. If you have received this e-mail in error, please notify the 
sender immediately by reply e-mail and permanently delete this e-mail and 
any attachments without reading, forwarding or saving them. Thank you. <>