ADSM-L

Re: Password visibility in the client command line

1997-01-21 03:44:25
Subject: Re: Password visibility in the client command line
From: John O'Neall <jon AT IN2P3 DOT FR>
Date: Tue, 21 Jan 1997 09:44:25 +0100
I know of at least one application (not ADSM) which can read the password on
standard input, so you can do

cat file_containing_password | command

and ps -edf doesn't show the password.  'Course you want to have a
super-protected local file to store the password, but we don't think
that's a problem, since we don't allow ordinary users to log on to the
ADSM server machine anyway.

Hope this can give IBM an idea.  John

--------------------------------------------------------------
John O'Neall                     e-mail:  jon AT in2p3 DOT fr
John O'Neall                     e-mail:  jon AT in2p3 DOT fr
Centre de Calcul de l'IN2P3      phone:   +33 (0)4 78 93 08 80
Villeurbanne, France             fax:     +33 (0)4 78 94 30 54

On Mon, 20 Jan 1997, James Purdon wrote:

> Hi,
>   The security risk of ADSM password exposure by ps is as follows:
>
>         Knowing the password of a node allows you to spoof the node,
>         and extract any file you want.
>
>         Say I have an account on host AIXbox, which has files that I cannot
>         access but is backed up by dsmc -password=whatever.  I can use the
>         NODENAME AIXbox option to rename a host which I do control and use
>         the password to complete the spoof!  I then get access to all the
>         files on AIX box.
>
> We use the "Passwordacces generate" option to avoid this problem  (which
> causes other problems that we have decided to live with).  It would be
> nice if there was a dsmc internal command to specify the password (not
> "set password", which changes it).
>
>
> Jim
>