1 Introduction
2 Ground Rules

Building a File System
3 File Systems
4 File Content Data Structure
5 Allocation Cluster Manager
6 Exceptions and Emancipation
7 Base Classes, Testing, and More
8 File Meta Data
9 Native File Class
10 Our File System
11 Allocation Table
12 File System Support Code
13 Initializing the File System
14 Contiguous Files
15 Rebuilding the File System
16 Native File System Support Methods
17 Lookups, Wildcards, and Unicode, Oh My
18 Finishing the File System Class

The Init Program
19 Hardware Abstraction and UOS Architecture
20 Init Command Mode
21 Using Our File System
22 Hardware and Device Lists
23 Fun with Stores: Partitions
24 Fun with Stores: RAID
25 Fun with Stores: RAM Disks
26 Init wrap-up

The Executive
27 Overview of The Executive
28 Starting the Kernel
29 The Kernel
30 Making a Store Bootable
31 The MMC
32 The HMC
33 Loading the components
34 Using the File Processor
35 Symbols and the SSC
36 The File Processor and Device Management
37 The File Processor and File System Management
38 Finishing Executive Startup

Users and Security
39 Introduction to Users and Security
40 More Fun With Stores: File Heaps
41 File Heaps, part 2
42 SysUAF
43 TUser
44 SysUAF API

Terminal I/O
45 Shells and UCL
46 UOS API, the Application Side
47 UOS API, the Executive Side
48 I/O Devices
49 Streams
50 Terminal Output Filters
51 The TTerminal Class
52 Handles
53 Putting it All Together
54 Getting Terminal Input
55 QIO
56 Cooking Terminal Input
57 Putting it all together, part 2
58 Quotas and I/O

UCL
59 UCL Basics
60 Symbol Substitution
61 Command execution
62 Command execution, part 2
63 Command Abbreviation
64 ASTs
65 Expressions, Part 1
66 Expressions, Part 2: Support code
67 Expressions, part 3: Parsing
68 SYS_GETJPIW and SYS_TRNLNM
69 Expressions, part 4: Evaluation

UCL Lexical Functions
70 PROCESS_SCAN
71 PROCESS_SCAN, Part 2
72 TProcess updates
73 Unicode revisted
74 Lexical functions: F$CONTEXT
75 Lexical functions: F$PID
76 Lexical Functions: F$CUNITS
77 Lexical Functions: F$CVSI and F$CVUI
78 UOS Date and Time Formatting
79 Lexical Functions: F$CVTIME
80 LIB_CVTIME
81 Date/Time Contexts
82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM
83 Lexical Functions: F$DELTA_TIME
84 Lexical functions: F$DEVICE
85 SYS_DEVICE_SCAN
86 Lexical functions: F$DIRECTORY
87 Lexical functions: F$EDIT and F$ELEMENT
88 Lexical functions: F$ENVIRONMENT
89 SYS_GETUAI
90 Lexical functions: F$EXTRACT and F$IDENTIFIER
91 LIB_FAO and LIB_FAOL
92 LIB_FAO and LIB_FAOL, part 2
93 Lexical functions: F$FAO
94 File Processing Structures
95 Lexical functions: F$FILE_ATTRIBUTES
96 SYS_DISPLAY
97 Lexical functions: F$GETDVI
98 Parse_GetDVI
99 GetDVI
100 GetDVI, part 2
101 GetDVI, part 3
102 Lexical functions: F$GETJPI
103 GETJPI
104 Lexical functions: F$GETSYI
105 GETSYI
106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD
107 Lexical function: F$PARSE
108 FILESCAN
109 SYS_PARSE
110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS
111 File Lookup Service
112 Lexical Functions: F$SEARCH
113 SYS_SEARCH
114 F$SETPRV and SYS_SETPRV
115 Lexical Functions: F$STRING, F$TIME, and F$TYPE
116 More on symbols
117 Lexical Functions: F$TRNLNM
118 SYS_TRNLNM, Part 2
119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY
120 Lexical functions: F$MESSAGE
121 TUOS_File_Wrapper
122 OPEN, CLOSE, and READ system services

UCL Commands
123 WRITE
124 Symbol assignment
125 The @ command
126 @ and EXIT
127 CRELNT system service
128 DELLNT system service
129 IF...THEN...ELSE
130 Comments, labels, and GOTO
131 GOSUB and RETURN
132 CALL, SUBROUTINE, and ENDSUBROUTINE
133 ON, SET {NO}ON, and error handling
134 INQUIRE
135 SYS_WRITE Service
136 OPEN
137 CLOSE
138 DELLNM system service
139 READ
140 Command Recall
141 RECALL
142 RUN
143 LIB_RUN
144 The Data Stream Interface
145 Preparing for execution
146 EOJ and LOGOUT
147 SYS_DELPROC and LIB_GET_FOREIGN

CUSPs and utilities
148 The I/O Queue
149 Timers
150 Logging in, part one
151 Logging in, part 2
152 System configuration
153 SET NODE utility
154 UUI
155 SETTERM utility
156 SETTERM utility, part 2
157 SETTERM utility, part 3
158 AUTHORIZE utility
159 AUTHORIZE utility, UI
160 AUTHORIZE utility, Access Restrictions
161 AUTHORIZE utility, Part 4
162 AUTHORIZE utility, Reporting
163 AUTHORIZE utility, Part 6
164 Authentication
165 Hashlib
166 Authenticate, Part 7
167 Logging in, part 3
168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN
169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME
170 LIB_SPAWN
171 CREPRC
172 CREPRC, Part 2
173 COPY
174 COPY, part 2
175 COPY, part 3
176 COPY, part 4
177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards
178 CREATESTREAM, STREAMNAME, and Set_Contiguous
179 Help Files
180 LBR Services
181 LBR Services, Part 2
182 LIBRARY utility
183 LIBRARY utility, Part 2
184 FS Services
185 FS Services, Part 2
186 Implementing Help
187 HELP
188 HELP, Part 2
189 DMG_Get_Key and LIB_Put_Formatted_Output
190 LIBRARY utility, Part 3
191 Shutting Down UOS
192 SHUTDOWN
193 WAIT
194 SETIMR
195 WAITFR and Scheduling
196 REPLY, OPCOM, and Mailboxes
197 REPLY utility
198 Mailboxes
199 BRKTHRU
200 OPCOM
201 Mailbox Services
202 Mailboxes, Part 2
203 DEFINE
204 CRELNM
205 DISABLE
206 STOP
207 OPCCRASH and SHUTDOWN
208 APPEND

Glossary/Index


Downloads

System configuration

On system startup, the first process created is directed to run UCL, using the startup.ucl command file. Upon a new install, this file is a copy of the sysconfig.ucl file. After configuration, the startup.ucl file is overwritten with the necessary startup commands. If the user aborts with control-Y, the file isn't updated and the user can run it manually or just restart the system to run the configuration file again.

In the future, we will have additional items in the sysconfig file, but for now, here is what it looks like:

$ !
$ ! UOS System configuration script. V1.0
$ !
$ValidateName:
$ subroutine
$     i=0
$Validate1:
$     if i.lt.f$length(p1)
$     then
$         c=f$extract(p1,i,1)
$         i=i+1
$         if f$locate(c,"0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz").eq.f$length(p1) then p1=""
$         goto Validate1
$     endif
$ endsubroutine
$ !               
This routine is used to validate node and user account names to ensure they have only alphanumeric characters. The value to check is placed in the symbol P1. If, during the check, an invalid character is found, the symbol is set to null, which indicates to the calling code that there was a problem.

$ !
$ write sys$output "Starting system configuration at ", F$CVTIME("absolute",,)
$ !
$ write sys$output "If this computer will be accessed from a network or will be part of a cluster,"
$ write sys$output "you must provide a node name for it.  This name must consist of only alphanumeric"
$ write sys$output "characters. If you do not wish to give this system a node name, press the ENTER key."
$QueryNodeName:
$ inquire NodeName "Node name for this computer "
$ NodeName=f$edit(NodeName, "TRIM")
$ if NodeName.nes.""
$ then
$    p1=NodeName
$    call ValidateName
$    if p1.eq.""
$    then
$        write sys$output "Node name is invalid"
$        goto QueryNodeName
$    endif
$ endif
$ !
First we need to ask the user for a node name for this computer. We provide a bit of descriptive text to help guide a non-expert. We use the validation routine and loop back if the name was invalid and non-null. Note that we trim the name, just in case a stray space made it into the name.

$ write sys$output "We must create a system administrator account for this computer.  This account will"
$ write sys$output "have the privileges necessary to perform certain operations that should not normally"
$ write sys$output "be done by users.  It should only be used in special circumstances so that"
$ write sys$output "inadvertant use of malware won't compromise security.  You will have a chance to"
$ write sys$output "create a standard user account after we create the administrator account.  The"
$ write sys$output "name should be alphanumeric characters only."
$QueryAdminName:
$ inquire NodeName "Administrator account name"
$ AdminName=f$edit(AdminName, "TRIM")
$ if f$length(AdminName).eq.0
$ then
$    write sys$output "You must create an administrator account"
$    goto AdminUserName
$ endif
$ p1=AdminName
$ call ValidateName
$ if p1.eq.""
$ then
$    write sys$output "Administrator account name is invalid"
$    goto QueryAdminName
$ endif
Next we prompt for the name of the administrator account, which cannot be null, and we use the validation routine to verify that it is alphanumeric.

$ !
$ write sys$output "Enter the password to use for the administrator account.  This password should be easy"
$ write sys$output "for you to remember, but not easy for someone else to guess.  Iit must be at least 8"
$ write sys$output "characters long and for best results it should not be an actual word, and should"
$ write sys$output "contain both letters and numerals."
$QueryAdminPassword:
$ set terminal/local_echo
$ inquire AdminPassword "Password for administrator account"
$ set terminal/nolocal_echo
$ AdminPassword=f$edit(AdminPassword,"TRIM")
$ if f$length(AdminPassword).lt.8
$ then
$    write sys$system "The password must be at least eight characters in length."
$    goto QueryAdminPassword
$ endif
$ set terminal/local_echo
$ inquire AdminPassword2 "Verify the password for the administrator account by re-entering it"
$ set terminal/nolocal_echo
$ if AdminPassword.nes.AdminPassword2
$ then
$    write syste$output "The passwords don't match.  Please try again."
$    goto QueryAdminPassword
$ endif
Now we prompt for a password for the admin account and verify that it is at least 8 characters in length. We also prompt the user to validate it by entering it a second time. This is because we disable echo before prompting via the SET TERM command, which we will cover in the future.

$ !
$ write sys$output "Now we will create an account for normal use of this computer.  The name for this"
$ write sys$output "account should be alphanumeric characters only."
$QueryUserName:
$ inquire UserName "Name of user account"
$ UserName=f$edit(UserName,"TRIM")
$ if f$length(UserName).eq.0
$ then
$    write sys$output "You must create a user account"
$    goto QueryUserName
$ endif
$ p1=UserName
$ call ValidateName
$ if p1.eq.""
$ then
$    write sys$output "User account name is invalid"
$    goto QueryUserName
$ endif
$ if f$edit(AdminName,"COLLAPSE,LOWERCASE").eqs.f$edit(UserName,"COLLAPSE,LOWERCASE")
$ then
$    write sys$output "User account name must be different than the adminstrator account name."
$    goto QueryUserName
$ endif
$ !
$ write sys$output "Enter the password to use for the ",  UserName, " account.  This password should be"
$ write sys$output "easy for you to remember, but not easy for someone else to guess.  It must be at"
$ write sys$output "least 8 characters long, and for best results it should not be an actual word,"
$ write sys$output " and should contain both letters and numerals."
$QueryUserPassword:
$ set terminal/local_echo
$ inquire UserPassword "Password for the ", UserName, " account"
$ set terminal/nolocal_echo
$ UserPassword=f$edit(UserPassword,"TRIM")
$ if f$length(UserPassword).lt.8
$ then
$    write sys$system "The password must be at least eight characters in length."
$    goto QueryUserPassword
$ endif
$ set terminal/local_echo
$ inquire UserPassword2 "Verify the password for the ", UserName, " account by re-entering it"
$ set terminal/nolocal_echo
$ if UserPassword.nes.UserPassword2
$ then
$    write sys$output "The passwords don't match.  Please try again."
$    goto QueryUserPassword
$ endif

Next we prompt for a non-admin user, and password. This is almost exactly the same code used for the admin account above. One additional feature is that we verify that the user name is not the same as the admin name.

$ !
$ ! Handle node name
$ !
$ open file "sys$system:startup.ucl"
$ write file "$! UOS System Startup"
$ if f$length(NodeName).gt.0
$ then
$    set node 'NodeName
$    write file "$ set node 'NodeName"
$ endif
$ write file "$ eoj"
$ close file
$ !
$ ! Create accounts
$ !
$ authorize add 'AdminName/password='AdminPassword/privileges=(ALL)
$ authorize add 'UserName/password='UserPassword/privileges=(TMPMBX,NETMBX)
$ exit
Once we have collected the information from the user, we use it to configure the system. First, we overwrite the startup.ucl file. If a node name was provided, we use the SET NODE command to update the node name, and we write that command to the new startup.ucl file. Note that if no node was specified, the only effect is to create an empty startup.ucl file - which is what we want (the next startup will do nothing since we've already been set up). We will discuss the SET NODE command in an article to follow. I say it is an empty file, but there is always an EOJ command at the end so that the startup process logs out when it is finished - regardless of how much other stuff is in the file.

Finally, we create the system administration and user accounts. Node that the administrator account is given all privileges, while the user account is given TMPMBX and NETMBX, which are the two privileges necessary for basic UOS usage. Those two privileges would not be given to a captive account used in a public kiosk, but pretty much any other user will need them.

It should be noted that this is a bare minimal set up, and we will be adding more in the future, as mentioned above. But even a full-blown configuration wouldn't set up every last account that might be needed, nor would it set custom options even for the users it does set up. These customizations (such as additional authentication methods, for instance) can be done by the system administrator after the initial configuration. The intention here is for a basic UOS installation that provides a secure, usuable set-up that doesn't require extensive technical knowledge on the behalf of the user (consider a home user setting up UOS on his family computer). Obviously someone setting up a super-secure government computer would have to have a level of technical expertise to take advantage of all the security features of UOS.

It should also be obvious that a user can compromise a system quite easily, despite how secure it is at the start. For instance, they could use the administrator account while downloading content from unsafe web sutes. Or they could choose obvious passwords, or give them out to others. Or they could grant all users all privileges. The list could go on and on, but you get the point. It will be our challenge to design the rest of the UOS utilities such that users don't often feel the need to use the admin account or give other accounts full privileges in order to do their day-to-day tasks on UOS.

Of final note, I was tempted to have the script log the user out when it finished, but as they may well be addtional set up that requires privileges we will leave the user logged-in. He can log into his normal account manually or upon the next system reboot.

In the next article, we will look at the SET TERM CUSP.

 

Copyright © 2022 by Alan Conroy. This article may be copied in whole or in part as long as this copyright is included.