1 Introduction
2 Ground Rules

Building a File System
3 File Systems
4 File Content Data Structure
5 Allocation Cluster Manager
6 Exceptions and Emancipation
7 Base Classes, Testing, and More
8 File Meta Data
9 Native File Class
10 Our File System
11 Allocation Table
12 File System Support Code
13 Initializing the File System
14 Contiguous Files
15 Rebuilding the File System
16 Native File System Support Methods
17 Lookups, Wildcards, and Unicode, Oh My
18 Finishing the File System Class

The Init Program
19 Hardware Abstraction and UOS Architecture
20 Init Command Mode
21 Using Our File System
22 Hardware and Device Lists
23 Fun with Stores: Partitions
24 Fun with Stores: RAID
25 Fun with Stores: RAM Disks
26 Init wrap-up

The Executive
27 Overview of The Executive
28 Starting the Kernel
29 The Kernel
30 Making a Store Bootable
31 The MMC
32 The HMC
33 Loading the components
34 Using the File Processor
35 Symbols and the SSC
36 The File Processor and Device Management
37 The File Processor and File System Management
38 Finishing Executive Startup

Users and Security
39 Introduction to Users and Security
40 More Fun With Stores: File Heaps
41 File Heaps, part 2
42 SysUAF
43 TUser
44 SysUAF API

Terminal I/O
45 Shells and UCL
46 UOS API, the Application Side
47 UOS API, the Executive Side
48 I/O Devices
49 Streams
50 Terminal Output Filters
51 The TTerminal Class
52 Handles
53 Putting it All Together
54 Getting Terminal Input
55 QIO
56 Cooking Terminal Input
57 Putting it all together, part 2
58 Quotas and I/O

UCL
59 UCL Basics
60 Symbol Substitution
61 Command execution
62 Command execution, part 2
63 Command Abbreviation
64 ASTs
65 Expressions, Part 1
66 Expressions, Part 2: Support code
67 Expressions, part 3: Parsing
68 SYS_GETJPIW and SYS_TRNLNM
69 Expressions, part 4: Evaluation

UCL Lexical Functions
70 PROCESS_SCAN
71 PROCESS_SCAN, Part 2
72 TProcess updates
73 Unicode revisted
74 Lexical functions: F$CONTEXT
75 Lexical functions: F$PID
76 Lexical Functions: F$CUNITS
77 Lexical Functions: F$CVSI and F$CVUI
78 UOS Date and Time Formatting
79 Lexical Functions: F$CVTIME
80 LIB_CVTIME
81 Date/Time Contexts
82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM
83 Lexical Functions: F$DELTA_TIME
84 Lexical functions: F$DEVICE
85 SYS_DEVICE_SCAN
86 Lexical functions: F$DIRECTORY
87 Lexical functions: F$EDIT and F$ELEMENT
88 Lexical functions: F$ENVIRONMENT
89 SYS_GETUAI
90 Lexical functions: F$EXTRACT and F$IDENTIFIER
91 LIB_FAO and LIB_FAOL
92 LIB_FAO and LIB_FAOL, part 2
93 Lexical functions: F$FAO
94 File Processing Structures
95 Lexical functions: F$FILE_ATTRIBUTES
96 SYS_DISPLAY
97 Lexical functions: F$GETDVI
98 Parse_GetDVI
99 GetDVI
100 GetDVI, part 2
101 GetDVI, part 3
102 Lexical functions: F$GETJPI
103 GETJPI
104 Lexical functions: F$GETSYI
105 GETSYI
106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD
107 Lexical function: F$PARSE
108 FILESCAN
109 SYS_PARSE
110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS
111 File Lookup Service
112 Lexical Functions: F$SEARCH
113 SYS_SEARCH
114 F$SETPRV and SYS_SETPRV
115 Lexical Functions: F$STRING, F$TIME, and F$TYPE
116 More on symbols
117 Lexical Functions: F$TRNLNM
118 SYS_TRNLNM, Part 2
119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY
120 Lexical functions: F$MESSAGE
121 TUOS_File_Wrapper
122 OPEN, CLOSE, and READ system services

UCL Commands
123 WRITE
124 Symbol assignment
125 The @ command
126 @ and EXIT
127 CRELNT system service
128 DELLNT system service
129 IF...THEN...ELSE
130 Comments, labels, and GOTO
131 GOSUB and RETURN
132 CALL, SUBROUTINE, and ENDSUBROUTINE
133 ON, SET {NO}ON, and error handling
134 INQUIRE
135 SYS_WRITE Service
136 OPEN
137 CLOSE
138 DELLNM system service
139 READ
140 Command Recall
141 RECALL
142 RUN
143 LIB_RUN
144 The Data Stream Interface
145 Preparing for execution
146 EOJ and LOGOUT
147 SYS_DELPROC and LIB_GET_FOREIGN

CUSPs and utilities
148 The I/O Queue
149 Timers
150 Logging in, part one
151 Logging in, part 2
152 System configuration
153 SET NODE utility
154 UUI
155 SETTERM utility
156 SETTERM utility, part 2
157 SETTERM utility, part 3
158 AUTHORIZE utility
159 AUTHORIZE utility, UI
160 AUTHORIZE utility, Access Restrictions
161 AUTHORIZE utility, Part 4
162 AUTHORIZE utility, Reporting
163 AUTHORIZE utility, Part 6
164 Authentication
165 Hashlib
166 Authenticate, Part 7
167 Logging in, part 3
168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN
169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME
170 LIB_SPAWN
171 CREPRC
172 CREPRC, Part 2
173 COPY
174 COPY, part 2
175 COPY, part 3
176 COPY, part 4
177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards
178 CREATESTREAM, STREAMNAME, and Set_Contiguous
179 Help Files
180 LBR Services
181 LBR Services, Part 2
182 LIBRARY utility
183 LIBRARY utility, Part 2
184 FS Services
185 FS Services, Part 2
186 Implementing Help
187 HELP
188 HELP, Part 2
189 DMG_Get_Key and LIB_Put_Formatted_Output
190 LIBRARY utility, Part 3
191 Shutting Down UOS
192 SHUTDOWN
193 WAIT
194 SETIMR
195 WAITFR and Scheduling
196 REPLY, OPCOM, and Mailboxes
197 REPLY utility
198 Mailboxes
199 BRKTHRU
200 OPCOM
201 Mailbox Services
202 Mailboxes, Part 2
203 DEFINE
204 CRELNM
205 DISABLE
206 STOP
207 OPCCRASH and SHUTDOWN
208 APPEND

Glossary/Index


Downloads

Hashlib

In the previous article, we talked about security issues, and documented the Hashlib routines that we will use to protect the passwords saved in SYSUAF.DAT. In this article, we will briefly look at the Hashlib code itself.

unit HashLib ;

interface

uses // UOS...
  _UOS ; // TSRB

function HASH_Hash( Index, Source, Target, Key, LResult : int64 ) : int64 ;
function HASH_Count : integer ;
function HASH_Name( Index, SRB : int64 ) : int64 ;
function HASH_Index( Name, Res : int64 ) : int64 ;
function HASH_Default : integer ;

      // Hashing algorithms...
const Hash_Plaintext = 0 ;
      Hash_MD5 = 1 ; // "Secure"
      Hash_SHA1 = 2 ; // "Secure"
      Hash_SHA224 = 3 ; // "Secure"
      Hash_SHA256 = 4 ; // Secure
      Hash_SHA384 = 5 ; // Secure
      Hash_SHA512 = 6 ; // Secure
      Hash_HMAC_MD5 = 7 ; // Secure
      Hash_HMAC_SHA1 = 8 ; // Secure
      Hash_HMAC_SHA256 = 9 ; // Secure
      Hash_HMAC_SHA512 = 10 ; // Secure
      Hash_Checksum = 11 ; // Error checking
      Hash_XOR8 = 12 ; // Error checking
      Hash_XOR16 = 13 ; // Error checking
      Hash_XOR32 = 14 ; // Error checking
      Hash_CRC16 = 15 ; // Error checking
      Hash_CRC32 = 16 ; // Error checking
      Hash_Adler32 = 17 ; // Error checking
      Hash_ELF = 18 ; // Hashtable
      Hash_Knuth = 19 ; // Hashtable
This is the interface of the Hashlib unit. The constants indicate the default hash algorithms that are provided with UOS, although additional algorithms can be provided. Hash algorithms fall into three general categories: secure, error checking, and hashtable. It should be noted that some of the secure hashes are not, in fact, secure (those with "secure" quoted). For instance, MDA was secure when it was first developed, but has since fallen prey to the increasing power of modern processors plus online databases of MDA hashes that essentially render it useless for security purposes. Similar things happened to SHA1 and SHA224. Note also that error checking and hashtable hashes are not considered secure.

Now, you may ask yourself why we would include non-secure hashes in Hashlib. The reason is that Hashlib is used for more than security. The error checking hashes, for instance, are used to verify that data has not become corrupted. And the hashtable hashes are used for data structure support (such as for dictionaries in Python). Hashlib simply collects all of these algorithms into one place. If you are concerned with security, make sure you only use a secure hash. Even the hashes that once were secure, but no longer are, may be useful in non-security-related applications.

uses // Delphi...
     Sysutils, // Lowercase

     // Fundamentals 4.00...
     cHash,

     // UOS...
     UOS_Util ;

var Hash_Algorithms : TStringList ;


function HASH_Default : integer ;

begin
    Result := Hash_SHA384 ;
end ;
The cHash unit contains the actual hash algorithms, which we will not be covering here. You can look this code up on the internet or look at it in the next UOS source release. Hash_Algorithms contains the installed hash algorithm names.

On VMS the password hashing algorithm can be chosen, but it defaults to the Purdy hash algorithm (actually several variations of it over the years). I don't have access to the code for that particular hashing scheme, so we'll choose something different for UOS. The Hash_Default service returns the index of the UOS default scheme. For now, this is hard-coded. SHA384 is, at the time of this writing, considered a secure hashing scheme. That is, it would take an unreasonable amount of time to break it using current technology. It must be understood, however, that this may not be sufficient in the future. When it happens that SHA384 is no longer considered secure, we will have to change the default to something better. Why not make the default SHA512 right now to stave off that day for longer? Because the larger the hash result, the longer the algorithm takes to run. On a single-user personal computer, this might not be a concern, but on a timesharing system or VPS - one in which many login requests happen via LOGIN or network connections - the extra time it takes to hash data with SHA512 may unacceptably impact system performance. You generally want to run the fastest hash that is secure. However, in high security installations, one may be perfectly willing to trade some performance for the additional security. It is up to the system admin to make that determination when assigning passwords to users. Granted, an admin could choose a less secure hash if desired. But UOS always defaults to a secure configuration. Thus, SHA384 is the default for now.

One other thing to note: eventually even SHA512 may become insecure. This is why UOS has an open architecture where additional algorithms can be installed in the future if/when it becomes necessary. We can never get rid of existing algorithms because any password stored with them will require us to be able to hash a value for comparison using the same hash that hashed the original password, even if we've changed the default. That is, UOS is always backwards-compatible.

function HASH_Hash( Index, Source, Target, Key, LResult : int64 ) : int64 ;

var K, S : string ;

begin
    if( ( Index < 1 ) or ( Index >= Hash_Algorithms.Count - 1 ) ) then
    begin
        Result := HASHLIB_Invalid_Hash ;
        exit ;
    end ;
    if( ( Target = 0 ) or ( Source = 0 ) ) then
    begin
        Result := HASHLIB_No_Data ;
        exit ;
    end ;
    Result := 0 ;
    S := Get_String( PSRB( Source )^ ) ;
    K := Get_String( PSRB( Key )^ ) ;
    case Index of
    .
    .
    .
    end ; // Note: plain text just falls through to here
    if( PSRB( Target ).Length < length( S ) ) then
    begin
        Result := UOSErr_Buffer_Overflow ;
        setlength( S, PSRB( Target ).Length ) ;
    end ;
    if( LResult <> 0 ) then
    begin
        PInt64( LResult )^ := length( S ) ;
    end ;
    Set_String( S, PSRB( Target )^ ) ;
end ; // HASH_Hash
This routine gets the key and data strings from the passed pointers, validates them and the passed index, and exits on error. Otherwise, the data is hashed and returned to the caller, with a check for overflow of the receiving buffer. Note that we have excluded the actual hashing code, because it dosen't really add anything. It simply makes calls to the cHash unit to do the appropriate hash. Again, you can look at the code next time we do a release, if you really want to see it.

function HASH_Count : integer ;

begin
    Result := Hash_Algorithms.Count ;
end ;
The count of hashing algorithms matches the count of items in the Hash_Algorithms list, since it is non-sparse.

function HASH_Name( Index, SRB : int64 ) : int64 ;

var S : string ;

begin
    if( Index = 0 ) then
    begin
        Result := HASHLIB_Invalid_Hash ;
        exit ;
    end ;
    Index := Pinteger( pointer( Index ) )^ ;
    if( ( Index < 0 ) or ( Index >= Hash_Algorithms.Count - 1 ) ) then
    begin
        Result := HASHLIB_Invalid_Hash ;
        exit ;
    end ;
    Result := 0 ;
    S := Hash_Algorithms[ Index ] + #0 ;
    if( PSRB( Target ).Length < length( S ) ) then
    begin
        Result := UOSErr_Buffer_Overflow ;
        setlength( S, PSRB( Target ).Length ) ;
    end ;
    Set_String( S, PSRB( SRB )^ ) ;
end ;
This sevice returns the algorithm name for a given index. If no pointer to an index is passed, we exit with an error. If the index given is outside of the valid range we also exit with an error. Otherwise we grab the name from the string list, append a null, and then write it to the destination buffer passed to us - preventing any overflow if necessary (and returning a warning if there would have been an overflow).

function HASH_Index( Name, Res : int64 ) : int64 ;

var I : integer ;
    S : string ;

begin
    if( Name = 0 ) then
    begin
        Result := HASHLIB_Invalid_Hash ;
        exit ;
    end ;
    Result := 0 ;
    S := lowercase( Get_String( PSRB( Name )^ ) ) ;
    for I := 1 to Hash_Count - 1 do
    begin
        if( S = lowercase( Hash_Algorithms[ I ] ) ) then
        begin
            move( I, PInteger( Res )^, sizeof( I ) ) ;
            exit ;
        end ;
    end ;
    Result := HASHLIB_Invalid_Hash ;
end ;
This service does the inverse of the previous service: it returns the index for a given algorithm name.

In the next article, we will finish up our coverage of the Authorize utility.

 

Copyright © 2022 by Alan Conroy. This article may be copied in whole or in part as long as this copyright is included.