× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: Re: Password "Hint" Feasibility
  • From: John Earl <johnearl@xxxxxxxxxxxxxxx>
  • Date: Mon, 13 Nov 2000 18:09:50 -0800
  • Organization: The PowerTech Group

Peter,

Peter Dow wrote:

> Hi John,
>
> I was going to ask which solution you thought best, and just saw it pop up
> before I sent this. I still have the following question:
>
> How difficult is it to lock down a single user profile to a single program?
> An initial signon program, limited capability user, no message queue break
> handling program, no group authority, no attention program, sign off at
> program end, etc. etc. -- what would they be able to do with their *PUBLIC
> authority? This is not a rhetorical question, I'd really like to know.

To answer your own question, take a look at your system and see which objects
*PUBLIC has *USE authority to.  Those are all of the objects that "HINT" would 
be
able to read and/or execute.  Then take a look at all of the data files that
*PUBLIC has *CHANGE authoroity to.  Those are the data files that "HINT" could
read and/or change the contents of.  IF *PUBLIC has *ALL authority to any file,
"HINT" would be able to CLRPFM or even delete the file.

Unfortunately, OS/400 is shipped with the SYSVAL QCRTAUT set to *CHANGE, so
unless you've tightedned things down, all new objects are created with
*PUBLIC=*CHANGE.

The following passage....

> An initial signon program, limited capability user, no message queue break
>   handling program, no group authority, no attention program, sign off at
>   program end, etc. etc
>
Indicates that you have done a thorough job of securing access through 5250
interfaces, but the point I continually try to make here (I'm sure that there 
are
others besides me who are tired of hearing me say it :(      ) is that FTP, 
ODBC,
DDM, Client Access File Transfer, etc. etc. etc. are all ways of getting at your
data without respect to any of your 5250 security precautions.  (In fairness, 
yes
we sell Exit Programs tha block this sort of access, and I'm sure folks are 
tired
of hearing that line as well).  The precautions that you've written about only
protect your data from users who sign on via an AS/400 signon screen.  If the
user doesn't use the signon screen, those precautions can't protect you.

To demonstrate my point, create a user profile called HINT (with a secret
password!) that does not belong to any group, has no special authority, is
limited capability, and what the heck, give it an initial menu of *NONE and an
initial program of *NONE so that it isn't even allowed to access via the green
screen.  Now use that profile to signon with FTP, ODBC, Client Access, etc. and
see what it has access to.  I think you will be shocked.  Anything that *PUBLIC
has appropriate (or should I say inappropriate!) access to, "HINT" will be able
to read, change, clear, or delete.


[For the uninitiated, here's an excerpt on an FTP test that we host on our
website....
1) Open a DOS window on your PC.
2) At the C:\WINDOWS prompt type "FTP as400name" or "FTP nnn.nnn.nnn.nnn"
     (Quotes not required)
3) The system will prompt you to signon. Sign on as any valid AS/400 user.
4) To see all of the objects in your current library, use the DOS "dir" command
to display the contents of the library.
5) Type the FTP "get" command to download any file you have object level
authority to
      Example: "get qgpl/qddssrc.qdsignon c:\qdsignon.txt"
      If you open c:\qdsignon.txt with notepad you'll see the DDS source on your
PC
6) Then use the FTP "put" command to upload a file to the AS/400
      Example: "put c:\autoexec.bat qgpl/customer
      DSPPFM qgpl/customer and you'll see your autoexec.bat on the AS/400
Theres much more to it,but that should give you a flavor]

In summary, *PUBLIC has too much authority, and there are too many ways to 
access
your data that are unaware of any 5250 menu controls that are in place.  (There
was an "ODBC Security" thread just last week that outlines the danger one
sysadmin saw with *PUBLIC's access through ODBC...)  Don't rely menu security, 
it
can't be trusted.  And don't create generic user ID's.  They can be used to
access your system with *PUBLIC's authority.  And investigate exit programs,
because if you're relying on the 5250 controls, I'd bet that your legitimate end
users have too much authority (using FTP, ODBC, etc.) to your data already.

hth,

jte


--
John Earl                    johnearl@400security.com
The PowerTech Group      --> new number --> 253-872-7788
PowerLock Network Security   www.400security.com
--



+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.