skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to beginning of appendix: Running an OpenVMS System in a C2 EnvironmentRunning an OpenVMS System in a C2 Environment
go to previous page: Introduction to C2 SystemsIntroduction to C2 Systems
go to next page: Checklist for Generating a C2 SystemChecklist for Generating a C2 System
end of book navigation links

Trusted Computing Base (TCB) for C2 Systems  



The federal government's evaluation of a computer system measuresthe trusted computing base (TCB) againstthe criteria summarized in Definition of the C2 Environment. The TCB is a combination of computer hardware andan operating system that enforces a security policy.

Hardware in the TCB  

The architectural design of VAX processors prevent competingprograms from interfering with the data of another program. VAXhardware prevents one program from interfering with the memory ofanother program.

The security features described in this guide apply to anyVAX processor in the evaluated hardware configurations and to allsupported mass storage and communications devices. The FinalEvaluation Report, Digital Equipment Corporation, OpenVMS VAX andSEVMS Version 6.1 provides a full listing of the evaluatedhardware.

Software in the TCB  

In OpenVMS operating systems, the TCB encompasses much ofthe operating system. It includes the entire executive and filesystem, all other system components that do not execute in usermode (such as device drivers, RMS, and DCL), most system programsinstalled with privilege, and a variety of other utilities used bysystem managers to maintain data relevant to the TCB.

As a convenience to customers, the OpenVMS operating systemships with more than the base operating system. The software packageincludes save sets and supportive images for layered products typicallyrun on OpenVMS operating systems. Yet only the base operating systemwas evaluated as a C2 system. Layered products, such as DECwindowssoftware and Display PostScript® support,were not part of the evaluation. For this reason, the C2 ratingdoes not extend to OpenVMS VAX systems running the software listedin Software Not Included in the C2-Evaluated System. The exclusionof these software components in no way implies they are insecure;it only means that they were not part of the evaluated system. Afterthe introduction of any such software, the base system must be accreditedfor its particular usage.

Table 1   Software Not Included in the C2-Evaluated System
Software Function Description
DECwindowssoftware
Windowing interface
DECwindows is a layered product.Although DECwindows has been designed to meet the C2 requirements,it has not been evaluated.
DECdns distributedname service
Client support
DECdns software requiresserver software, which is a layered product. A cluster can make DECnetconnections independently of DECdns.
HP DECamdssoftware
Monitoringand diagnostics
HP DECamds software is outside thedomain of the evaluated configuration.
LASTport andLASTport/DISK protocols
Protocol support
HP's Infoserver products,which are outside the security domain of a clustered system, dependon these protocols.
LAT protocol
Protocol support
The LAT protocol is usedfor connections to DECserver terminal servers, which are outsidethe domain of the evaluated configuration.
DECnet/OSIFull Names
Protocol support
Support of the use of DECnet/OSI (PhaseV) node names within the OpenVMS operating system. Use of this featureis not in the C2 evaluated configuration.
HSM (HierarchialShelving Manager)
Storage Support
File Shelving is a layered product.Use of the File Shelving facility (HSM) is not supported in theC2 evaluated configuration.
MME (MediaManagement Extension)
Client Support
Media Management Extension (MME)allows the use of storage media programs. Use of media managementis outside of the domain of the C2 evaluated configuration.
OpenVMS ManagementStation

The OpenVMS Management Stationprovides PC-based system management tools for OpenVMS. The OpenVMS ManagementStation has not been validated in a C2 evaluated configuration.
Access control strings
File access on a remotenode
You should use proxy accounts insteadof access control strings in an evaluated configuration.

Protecting Objects  

The OpenVMS operating system controls access to objects thatcontain information. Protected objects include ODS-2 or ODS-5 diskfiles, common event flag clusters, devices, all group and systemglobal sections, logical name tables, queues, resource domains,and ODS-2 or ODS-5 disk volumes. The capability object and the securityclass object enjoy full discretionary access protection but theyare not objects according to the C2 evaluation criteria.

Protecting DataChapter 4 and Descriptions of Object ClassesChapter 5 describeobject protection and explain how the operating system providestemplate profiles so all new objects have UICs, protection codesand, possibly, ACLs. Establishing an Inheritance Scheme for Files"Establishing an Inheritance Scheme for Files" onpage 78, Providing a Default Protection Code for a Directory StructureSee "Providing a Default Protection Codefor a Directory Structure" on page 85, and Setting Default Protection and Ownership, in particular,explain how to set default protection for newly created objects.

The default protections assigned to global section and mailboxobjects are less restrictive than those assigned to other objects.This is due to the fact that certain software products assume thatmailbox and global section objects are created, by default, withthe less restrictive protections. You can modify the template profilesfor these objects so they have more stringent protection, but dokeep in mind that some software products may be adversely affected.

To change the default protection, you need to modify boththe template profile for the object and any existing object. Forexample, the following command modifies the MAILBOX template forthe device class:

$ SET SECURITY/CLASS=SECURITY_CLASS/PROFILE=TEMPLATE=MAILBOX -_$ /PROTECTION=(S:RWPL,O:RWPL,G,W) DEVICE
The operating system applies this value to all new mailboxes.The protection on each existing mailbox still has to be made morerestrictive using the SET SECURITY command. For example:
$ SET SECURITY/CLASS=DEVICE -_$ /PROTECTION=(S:RWPL,O:RWPL,G,W) mailbox_name
The default object protections specified in security templatessurvive system shutdown and reboot, so rebooting the system automaticallyensures that all objects created after the reboot are created withthe new default protections unless an object's creator specifiesan alternate protection.

Protecting the TCB  

The code and data that make up the OpenVMS TCB reside in filesand, in part, in the address space of the running operating system.They are protected by the use of file access controls and memorypage protection. Memory page protection is set up by the operatingsystem as it executes and is normally not of concern to the systemmanager.

Protecting Files  

The files that make up the TCB are correctly protected whenthe operating system is installed; however, sufficiently privilegedusers can alter the protection. Protection for OpenVMS System Files of this guide describes the correct file protectionof operating system files.

When installing an OpenVMS operating system, avoid modifyingany system files except those specific to your site. You want tomaintain the security of the base operating system.

Privileges for Trusted Users  

Certain privileges allow the holder to bypass normal fileand memory access controls directly or indirectly and, therefore,must not be granted to persons other than the system manager, securityadministrator, or other trusted users. Privileges in four categoriesare appropriate only for trusted users: Objects, All, System, andGroup. Refer to OpenVMS Privileges forthe privileges belonging to each of these categories. The privileges themselvesare described in detail in Assigning Privileges.

Privileges in the Objects and All categories allow the holderto violate the isolation of the TCB from untrusted users. Privilegesin the System category allow the holder to interfere with normalsystem operation and cause denial of service, but they do not allowthe holder to actually violate object access controls. Some privilegesin the System category also allow access controls to be ultimatelybypassed.

Privileges in the Group category permit the holder to interferewith the operations of others in the same group. The GRPPRV privilege,in particular, permits the holder to violate normal access controlswithin that holder's group because it grants access (through thesystem field of the protection code) to objects owned by subjectssharing the same group UIC.

All trusted users should be familiar with all the effectsof any operations they perform. In particular, they need to knowall software products an operation might use because a trusted user's privilegescan allow untrusted software to perform operations that OpenVMSsecurity policy would otherwise preclude.

Privileges for Untrusted Users  

Untrusted users can hold any privilege in the Normal and Devourcategory with the exception of GRPNAM. Exercise caution in grantingprivileges from the Devour category, however, for they permit theholder to consume resources without limit, thereby causing possibledenial of service and interference with the operations of otherusers on the system. Privileges for Untrusted Users lists privileges allowed to untrusted users.

Table 2   Privileges for Untrusted Users
Category Privilege Activity Permitted
Normal
NETMBX TMPMBX
Create network connectionsCreate temporary mailbox
Devour
ACNT ALLSPOOL BUGCHK EXQUOTAPRMCEB PRMGBL PRMMBX SHMEM
Disable accounting Allocate spooled devicesMake bugcheck error log entries Exceed disk quotas Create/deletepermanent common event flag clusters Create permanent global sectionsCreate permanent mailboxes Create/delete structures in shared memory

Physical Security  

Physical and environmental securityare critical to the secure operation of the system. Allphysical components of the TCB require adequate protection, or unauthorizedpeople can jeopardize the system's security. Because the followingpractices and features jeopardize the security of the TCB, theymust not be used in a C2 environment:

Configuring a C2 System  

This section discusses C2 constraints on the use of OpenVMSfeatures. It includes the following topics:

Keeping Individuals Accountable  

The proper use of names, UICs, and passwords ensures thatindividual accountability is enforced by the OpenVMS operating system.As a general practice, HP recommends that you use generated passwordson privileged accounts. Because the following practices and featuresresult in the loss of individual accountability, they must not beused in a C2 environment:

Managing the Auditing Trail  

The security-auditing system lets you track security-relevantactivity on the system provided you manage it correctly. To followa trail of activity in the audit logs, you must have complete andaccurate records. Security event messages can be recorded in thesecurity audit log file and on any terminal designated to receive security-classevent messages. Because the following practices jeopardize a site'sability to track security-relevant events in the system, they mustnot be used in a C2 environment:

Reusing Objects  

Before allocating memory or protected objects like volumesand devices to new users, sites must ensure that they are free ofold data. The memory management subsystem protects against the reuseof system memory pages, and it cannot be defeated. Because the followingpractices jeopardize the clearing of old data from volumes and terminalsbefore reallocation, they must not be followed in a C2 environment:

HP recommends that sites clear printers between jobs to ensurethat print jobs do not interfere with one another. A security administratorcan reset printers automatically at the start or end (or both) ofeach job by associating a device control library with the printqueue. Consult the documentation supplied with your printer to determinethe appropriate reset sequence, and then refer to the HPOpenVMS System Manager's Manual for directions on addingthat sequence to a library and associating the library with thequeue.

Configuring Clusters  

All valid cluster configurations, when configured as commonenvironment clusters, fully support the OpenVMS security features.Because the following practices and features result in the lossof a common environment cluster, they must not be used in a C2 environment.


NoteOpenVMS clusters can consist of VAX and Alpha nodes.

Starting Up and Operating the System  

A C2 system is the shipped system that has been configuredaccording to the guidelines in this appendix. When configuring yoursystem, you must observe the following guidelines:

ForcingImmediate Reauthentication of a Specified Subject After a Changein Access Rights  

A system or security administrator may force untrusted subjects to reauthenticatethemselves at any time. This might be necessary when the subject'saccess rights have been modified. The procedure is as follows and canbe performed only by a trusted subject.


NoteThis procedure assumes that there are no privilegedapplications present on the system that would enable an untrusteduser to create a detached process.

Additionally, this procedure is not suitable for forcing reauthenticationof trusted or privileged users, or where privileged applicationsare used. In these cases, a system reboot is required to adequatelyforce reauthentication.


  1. Make the changesto the subject's authorization record in the authorization file.
  2. Obtain the owner's UIC of the subject from the authorizationfile.
  3. Enter the SYSMAN utility.
  4. Use the SYSMAN utility to identify all processesowned by the subject.

    1. In an OpenVMSCluster environment, set the SYSMAN environment clusterwide. Ifyou are not in an OpenVMS Cluster environment, skip this step.
    2. Use SYSMAN DO SHOW SYSTEM/FULL to obtain a listingof all processes on the system or OpenVMS cluster. This commandalso lists the owner UIC and system PID of each process. Record thisinformation.
  5. From SYSMAN, stop every process on every systemthat is owned by the subject.

    Note: Any process created by the subject after Step 4 is boundby the new access rights and does not need to be deleted. Therefore,this is not a recursive procedure.

    1. In the OpenVMSCluster environment, set the SYSMAN environment to point to onlyone node. If you are not in the OpenVMS Cluster environment, skipthis step.
    2. For each process on the system to be deleted, identifythe PID from Step 2 and use the SYSMAN DO STOP/ID=pid command tostop the job.
    3. Repeat Steps a and b until all desired processeson all nodes of the cluster have been stopped.

go to previous page: Introduction to C2 SystemsIntroduction to C2 Systems
go to next page: Checklist for Generating a C2 SystemChecklist for Generating a C2 System