>Before it gets too late, I'm looking into closing some security holes
>in FTP, TELNET and Client Access.

One solution is to change your AS/400 security plan.  The basic plan is to
have no on-line profiles that have authority to change your data.  A Super
User owns the programs and data, and the programs adopt the authority they
need to run.  Your users have the authority to run the programs, but not to
the data files.  But, because the programs adopt enough authority, the
users can run the programs.

Users using FTP, TELNET, and CA can not do anything to your files!  Unless
you grant them specific authority, or create a 'playground' library for
file transfers.

Wayne Evans (?) has a video out (from Midrange?? Magazine) that describes
the technique, and the disadvantages of trying to plug the security holes
using exit programs, etc.

--paul E Musselman
PaulMmn@ix.netcom.com






>
>I'm aware of three vendor products:
>
>Powerlock (which looks like it will secure all three accesses without
>much complexity), Pentasafe (which looks like a more complicated
>solution) and the Alliance products from Townsend & Associates (which
>looks like it does not protect against the Client Access RMTCMD.
>
>I'd appreciate it if anyone could suggest any other packages and offer
>any recommendations or criticisms of any of these three.
>
>Thanks,
>
>Gord Hutchinson
>
>--
>Gord Hutchinson
>TST Overland Express
>ghutchinson@tstoverland.com
>905-212-6330
>fax: 905 602-8895



+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com
+---


This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2019 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].