HP OpenVMS Systems

Ask the Wizard
» 

HP OpenVMS Systems

OpenVMS information

» What's new on our site
» Upcoming events
» Configuration and buying assistance
» Send us your comments

HP OpenVMS systems

» OpenVMS software
» Supported Servers
» OpenVMS virtualization
» OpenVMS solutions and partners
» OpenVMS success stories
» OpenVMS service and support
» OpenVMS resources and information
» OpenVMS documentation
» Education and training

Quick Links

» Non-javascript page
» Ask the Wizard
» OpenVMS FAQ

Test Drive OpenVMS

» OpenVMS I64 test drive
» Java test drive

Other information resources available to you include:

» OpenVMS freeware
» ECO kits, software and hardware support, prior version support
» Alpha SRM, ARC, and AlphaBIOS firmware updates
» ENCOMPASS - HP user group
» OpenVMS software downloads, OpenVMS freeware CD-ROM
» OpenVMS firmware locations
» DECconnect passive adaptor charts
» Cables reference guide
» MicroVAX console commands
» OpenVMS student research

Select a topic below to see Questions Frequently Asked by partners

» Using the online documentation library(installing BNU from the asap SDK)
» Global sections(how to create and use.)
» xx$CREATE_BUFOBJ system service(usage)
» Ethernet address(methods of determination)
» Shareable images(cookbook approach to creating one)
» Sharing data/code at absolute addresses(a guide with examples)
» Determining the Alpha microprocessor
» Using GETSYI to get hardware status

Evolving business value

» Business Systems Evolution
» AlphaServer systems transition planning
» Alpha RetainTrust program

Related links

» HP Integrity servers
» HP Alpha systems
» HP storage
» HP software
» HP products and services
» HP solutions
» HP support
disaster proof
HP Integrity server animation
HP Integrity server animation
Content starts here

Ask the Wizard Questions

SYSUAF.DAT protection

The Question is:


Why is the protection of SYSUAF.LIS hard-coded in AUTHORIZE?

The following log fragment shows that AUTHORIZE disregards default
protection and also disregards protection of a previous version of SYSUAF.LIS

$ directory /protection sysuaf.lis
%DIRECT-W-NOFILES, no files found
$ show protection
  SYSTEM=NO ACCESS, OWNER=RWED, GROUP=NO ACCESS, WORLD=NO ACCESS
$ mcr authorize list /brief system
%UAF-I-LSTMSG1, writing listing file
%UAF-I-LSTMSG2, listing file SYSUAF.LIS complete
$ directory /protection sysuaf.lis

Directory GRPDSK:[C753330]

SYSUAF.LIS;1         (RWD,RWD,RW,)

Total of 1 file.
$ set protection=(g) sysuaf.lis
$ directory /protection sysuaf.lis

Directory GRPDSK:[C753330]

SYSUAF.LIS;1         (RWD,RWD,,)

Total of 1 file.
$ mcr authorize list /brief system
%UAF-I-LSTMSG1, writing listing file
%UAF-I-LSTMSG2, listing file SYSUAF.LIS complete
$ directory /protection sysuaf.lis

Directory GRPDSK:[C753330]

SYSUAF.LIS;2         (RWD,RWD,RW,)
SYSUAF.LIS;1         (RWD,RWD,,)

Total of 2 files.



The Answer is:


The reason is to prevent a prived user from unintentionally creating
a world-readable file containing sensitive information, either by
having world-read as an RMS default or by having a previous version
of the file with world-read protection.

This can be circumvented by placing an ACL granting the desired
access on a previous version of the file.