A person with the SECURITY privilege can enable
subsystems on a volume by using the /SUBSYSTEM qualifier on the MOUNT
command. By default, subsystems are enabled only on the system disk.
For other disks, you need to enable subsystems every time a volume
is mounted.
In the following example, a security administrator
uses the MOUNT command with the /SUBSYSTEM qualifier to enable the
processing of Subsystem ACEs on device DUA0. Assume that this disk
contains the subsystem with the identifier MEMBERS_SUBSYSTEM.
$MOUNT /SUBSYSTEM /SYSTEM DUA0: DOC WORK8
|
You can turn the processing of Subsystem ACEs on and off dynamically
with the DCL command SET VOLUME /SUBSYSTEM. This command is especially
useful for the system disk, which is not mounted using the MOUNT command.
Any person mounting a subsystem is responsible
for knowing what is on the volume being mounted. Without this knowledge,
an operator or system manager can inadvertently subvert system security.
For example, it is easy for a user with privileges on one cluster
to put an application holding a subsystem identifier on a volume and
then take the volume to a naive operator on another cluster and request
that it be mounted. Because the application holds an appropriate subsystem
identifier, it feigns membership in a subsystem for which it is unauthorized.
Therefore, mount volumes of only those users whom you trust, or thoroughly
search a volume for Subsystem ACEs before you mount it with subsystems
enabled.