When the process creating the common event flag cluster supplies a prot argument to $ASCEFC that has a value of 1, then the system modifies the template so the process UIC is the owner, and the protection code denies group access.
Creation of a permanent common event flag cluster requires the PRMCEB privilege. This privilege also grants delete access for permanent clusters.
The system can audit the following types of events:
Event Audited | When Audit Occurs |
---|---|
Creation | When the first process to associate with a particular cluster calls $ASCEFC |
Access | Whenever subsequent callers to $ASCEFC associate with the cluster |
Deaccess | When a process calls $DACEFC or associates with another cluster or at image rundown |
Deletion | When the process calls $DLCEFC |
A common event flag cluster and its security profile need to be reset each time a system starts up.
A device is a peripheral, physically connected or logically known to a processor and capable of receiving, storing, or transmitting data. A device can be physical, like a disk or terminal, or it can be virtual, like a mailbox or pseudoterminal. Virtual devices are implemented entirely in software.
You can use physical, logical, or generic names to refer to devices. In addition, if your system is part of a clustered system, certain devices are accessible to all members of the cluster. They have the following formats:
See the OpenVMS System Manager's Manual and the OpenVMS User's Manual for a full description of device names.
Devices can be shared and thus have concurrent users or be unshared and have a single user.
Shared devices support the following types of access:
Read | Gives you the right to read data from the device |
Write | Gives you the right to write data to the device |
Physical | Gives you the right to perform physical I/O operations to the device |
Logical | Gives you the right to perform logical I/O operations to the device |
Control | Gives you the right to change the protection elements and owner of the device |
Unshared devices support only read, write, and control access. The device driver rather than the operating system's security policy defines the access requirements for other types of operations.
Access requirements for I/O operations on devices can be quite complex. The following list explains access requirements for typical operations:
Functions Requiring Read Access | ||
---|---|---|
READHEAD | READVBLK | TTYREADALL |
READPBLK | REREADN | TTYREADPALL |
READLBLK | REREADP | |
READTRACKD | READPROMPT | |
Functions Requiring Write Access | ||
WRITECHECK | WRITELBLK | WRITETRACKD |
WRITECHECKH | WRITEPBLK | WRITEVBLK |
WRITEHEAD | WRITERET |
The device class provides the following template profiles:
Template Name | Device Type | Owner UIC | Protection Code |
---|---|---|---|
BUS | DC$_BUS | [SYSTEM] | S:RWPL,O:RWPL,G,W |
CARDREADER | DC$_CARD | [SYSTEM] | S:RWPL,O:RWPL,G,W |
COMMUNICATION | DC$_SCOM | [SYSTEM] | S:RWPL,O:RWPL,G,W |
DEFAULT | [SYSTEM] | S:RWPL,O:RWPL,G:RWPL,W:RWPL | |
DISK | DC$_DISK | [SYSTEM] | S:RWPL,O:RWPL,G:R,W |
MAILBOX | DC$_MAILBOX | [SYSTEM] | S:RWPL,O:RWPL,G:RWPL,W:RWPL |
PRINTER | DC$_LP | [SYSTEM] | S:RWPL,O:RWPL,G,W |
REALTIME | DC$_REALTIME | [SYSTEM] | S:RWPL,O:RWPL,G:RWPL,W:RWPL |
TAPE | DC$_TAPE | [SYSTEM] | S:RWPL,O:RWPL,G:R,W |
TERMINAL | DC$_TERM | [SYSTEM] | S:RWPL,O:RWPL,G,W |
WORKSTATION | DC$_WORKSTATION | [SYSTEM] | S:RWPL,O:RWPL,G:RWPL,W:RWPL |
A device usually derives its security profile from the template profile associated with its device type; however, the template is often modified. The following list describes how the operating system assigns a profile to different types of devices:
All logical or physical I/O to a spooled device requires privilege.
The LOG_IO privilege allows the user's process to execute the Queue I/O Request ($QIO) system service to perform logical-level I/O operations. LOG_IO privilege is also required for certain device-control functions, such as setting permanent terminal elements.
The PHY_IO privilege allows the user's process to execute the Queue I/O Request ($QIO) system service to perform physical-level I/O operations. The PHY_IO privilege also grants LOG_IO privilege.
To create a permanent mailbox or mark it for deletion requires PRMMBX privilege.
The following types of events can be audited, provided the security administrator enables auditing for the appropriate event class:
Event Audited | When Audit Occurs |
---|---|
Access | For nonshareable devices, when the process calls $ASSIGN. For a shareable device, when the process calls $QIO. |
Creation | When a process creates a virtual device like a mailbox. |
Deletion | When a process deletes a virtual device like a mailbox. |
The profile of clusterwide disks and tapes is stored in the object database VMS$OBJECTS.DAT, but other object profiles have to be reset each time the systems starts up.
A file is a named array of fixed-size (512-byte) data blocks with an associated set of attributes. In OpenVMS systems, the file class include both data files and directory files. The operating system provides full security protection for individual disk files stored on Files-11 On-Disk Structure Level 2 (ODS-2) volumes. Tape files are collectively protected by the protection code on the volume but are not protected on an individual basis.
The file object differs from other protected objects in one important way: because files provide more flexibility than any other object class, files do not acquire their profiles from a template. Section 5.4.5 describes the rules the operating system applies in assigning a profile.
A file specification is a string of 1 to 255 characters. See the OpenVMS User's Manual for a full description.
The file class supports the following types of access:
Read | Gives you the right to read, print, or copy a disk file. With directory files, read access gives you the right to read or list a file and use a file name with wildcard characters to look up files. Read access implies execute access. |
Write | Gives you the right to write to or change the contents of a file but not delete it. Write access allows modification of the file elements that describe the contents of the file. Write access allows creation of a new version of an existing file's primary name. With directory files, write access gives you the right to make or delete an entry in the catalog of files. |
Execute | Gives you the right to execute a file that contains an executable program image or DCL command procedure. With a directory file, execute access gives you the right to look up files whose names you know. |
Delete | Gives you the right to delete a file. To delete a file, you must have delete access to the file and write access to the directory that contains the file. To remove or rename a file's primary name also requires delete access. |
Control |
Gives you the right to change the protection code and ACL. You need to
satisfy one of the following conditions to change the owner:
|
The following conditions apply to file access:
Note
It is possible to access a file by its file identifier. When users do so, they bypass the directory file protection. Therefore, you must not rely entirely on directory file protection to control access to a file.
Before you can create a file, the operating system checks to see that you have satisfied the following conditions:
The new file obtains its owner, protection code, and ACL from a number of sources. The ownership assignment of a new file is done independently of protection and ACL.
If any of the following conditions are true, then you can assign an identifier as the owner of a file:
A file receives its owner identifier from the first applicable source that you are allowed to assign:
See Section 8.8.1.2 for a description of how resource identifiers can own files and directories.
The sources of a new file's protection code and ACL are similar to those of ownership and are considered in the same order. The system assigns a file's protection code and ACL from one of the following sources:
$ COPY USE1:[PAYDATA]PAYROLL.DAT PAYSORT.DAT - _$ /PROTECTION=(SYSTEM:RW,OWNER:RWED,GROUP:RW,WORLD)
The output file of a COPY command is treated as a newly created file and so is assigned a new security profile. The security profiles of the input files are immaterial.
However, a renamed file by default retains its existing security profile. To assign a new security profile, as if the file were newly created, use the DCL command RENAME/INHERIT_SECURITY. This causes the file to be assigned a security profile.
Section 5.4.5.1 and Section 5.4.5.2 explain how a security profile is assigned.
The following types of events can be audited, provided the security administrator enables auditing for the appropriate event class:
Event Audited | When Audit Occurs |
---|---|
Access | When a process opens, reads, writes, or executes a file or inquires about its attributes |
Creation | When a process creates a file |
Deaccess | When a process closes a file |
Deletion | When a process deletes a file |
Ordinary file protection mechanisms control who can access a file, but they do not address the problem of protecting old data that remains on disk after a file is deleted.
When a file is deleted, its header is removed from the directory, but its contents remain intact on disk until it is overwritten. Because data exists on a disk, it is necessary to protect deleted or purged file information from disk scavenging.
6346P007.HTM OSSG Documentation 22-NOV-1996 13:04:59.87
Copyright © Digital Equipment Corporation 1996. All Rights Reserved.