|
|
Logging Out Without Compromising System Security
Log out when you leave your office even for a brief periodof time. If you have performed remote logins, you must log out ofeach node. The following sections describe security considerationsfor logging out of specific types of terminals or sessions.
Clearing Your Terminal Screen
You may want to clear your screen each time you log out froma terminal to ensure that your user name, node name, and operatingsystem are not revealed to anyone else. If you are logging out aftera remote login, the name of the node to which you return (the localnode) is also revealed. If you access multiple accounts remotely(over the network), the final sequence of logout commands revealsall the nodes and user names that are accessible to you on eachnode (excluding the name of the furthest node reached). To thosewho can recognize the operating system from the prompt or a logoutmessage, these displays also reveal the operating system.
At some sites, it may be important to leave nothing but thelogout message on your screen, as follows:
After the screen clears, the cursor is positioned at the topof the screen, next to the DCL prompt. Enter the DCL command LOGOUTat the prompt. The only information remaining after you log outis your logout command and the logout completion message, for example:
$
LOGOUT
RDOGWOOD logged out at 14-AUG-2001 19:39:01.43
Disposing of Hardcopy Output
After you log out from a hardcopy terminal, properly remove,file, or dispose of all hardcopy output that might reveal sensitiveinformation. Your security administrator should provide directionon preferred procedures. Many sites use paper shredders or lockedreceptacles for this purpose. Handle output that you plan to save justas carefully.
You should also dispose of hardcopy output if the system failsbefore you log out. In addition, if you will not be present whenthe system is initialized, turn your terminal off.
Removing Disconnected Processes
The system automatically removes your disconnected processesafter a certain interval. You can conserve system resources, however,if you directly log out of any disconnected processes, as follows:
Breaking the Connection to a Dialup Line
Your security administrator may ask you to break the connectionto a dialup line when you log out. If you anticipate no furtherimmediate use of the line, use the LOGOUT command with the /HANGUPqualifier. The /HANGUP qualifier directs the system to automaticallybreak the connection to the dialup line after you log out.
The effectiveness of the /HANGUP qualifier depends onhow your system manager configures your modem line and how the lineconnects to the computer. It does not work on lines connected toa terminal server. |
This practice also saves resources by reducing the requirednumber of dialup lines.
Turning Off a Terminal
If your site has moderate or high security requirements, yoursecurity administrator may ask you to turn off your terminal afterlogging out. This resets terminal characteristics and clears memorybuffers. Some Trojan horse attacks use hardware frame buffers andthe answerback capabilities that are built into newer terminals.
On VAX systems, users working in a C2 environment must turnoff their terminals. (C2 is a United States government rating ofthe security of an operating system. Running an OpenVMS System in a C2 Environment describes its requirements.)
|
|