1 Introduction
2 Ground Rules
Building a File System
3 File Systems
4 File Content Data Structure
5 Allocation Cluster Manager
6 Exceptions and Emancipation
7 Base Classes, Testing, and More
8 File Meta Data
9 Native File Class
10 Our File System
11 Allocation Table
12 File System Support Code
13 Initializing the File System
14 Contiguous Files
15 Rebuilding the File System
16 Native File System Support Methods
17 Lookups, Wildcards, and Unicode, Oh My
18 Finishing the File System Class
The Init Program
19 Hardware Abstraction and UOS Architecture
20 Init Command Mode
21 Using Our File System
22 Hardware and Device Lists
23 Fun with Stores: Partitions
24 Fun with Stores: RAID
25 Fun with Stores: RAM Disks
26 Init wrap-up
The Executive
27 Overview of The Executive
28 Starting the Kernel
29 The Kernel
30 Making a Store Bootable
31 The MMC
32 The HMC
33 Loading the components
34 Using the File Processor
35 Symbols and the SSC
36 The File Processor and Device Management
37 The File Processor and File System Management
38 Finishing Executive Startup
Users and Security
39 Introduction to Users and Security
40 More Fun With Stores: File Heaps
41 File Heaps, part 2
42 SysUAF
43 TUser
44 SysUAF API
Terminal I/O
45 Shells and UCL
46 UOS API, the Application Side
47 UOS API, the Executive Side
48 I/O Devices
49 Streams
50 Terminal Output Filters
51 The TTerminal Class
52 Handles
53 Putting it All Together
54 Getting Terminal Input
55 QIO
56 Cooking Terminal Input
57 Putting it all together, part 2
58 Quotas and I/O
UCL
59 UCL Basics
60 Symbol Substitution
61 Command execution
62 Command execution, part 2
63 Command Abbreviation
64 ASTs
65 Expressions, Part 1
66 Expressions, Part 2: Support code
67 Expressions, part 3: Parsing
68 SYS_GETJPIW and SYS_TRNLNM
69 Expressions, part 4: Evaluation
UCL Lexical Functions
70 PROCESS_SCAN
71 PROCESS_SCAN, Part 2
72 TProcess updates
73 Unicode revisted
74 Lexical functions: F$CONTEXT
75 Lexical functions: F$PID
76 Lexical Functions: F$CUNITS
77 Lexical Functions: F$CVSI and F$CVUI
78 UOS Date and Time Formatting
79 Lexical Functions: F$CVTIME
80 LIB_CVTIME
81 Date/Time Contexts
82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM
83 Lexical Functions: F$DELTA_TIME
84 Lexical functions: F$DEVICE
85 SYS_DEVICE_SCAN
86 Lexical functions: F$DIRECTORY
87 Lexical functions: F$EDIT and F$ELEMENT
88 Lexical functions: F$ENVIRONMENT
89 SYS_GETUAI
90 Lexical functions: F$EXTRACT and F$IDENTIFIER
91 LIB_FAO and LIB_FAOL
92 LIB_FAO and LIB_FAOL, part 2
93 Lexical functions: F$FAO
94 File Processing Structures
95 Lexical functions: F$FILE_ATTRIBUTES
96 SYS_DISPLAY
97 Lexical functions: F$GETDVI
98 Parse_GetDVI
99 GetDVI
100 GetDVI, part 2
101 GetDVI, part 3
102 Lexical functions: F$GETJPI
103 GETJPI
104 Lexical functions: F$GETSYI
105 GETSYI
106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD
107 Lexical function: F$PARSE
108 FILESCAN
109 SYS_PARSE
110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS
111 File Lookup Service
112 Lexical Functions: F$SEARCH
113 SYS_SEARCH
114 F$SETPRV and SYS_SETPRV
115 Lexical Functions: F$STRING, F$TIME, and F$TYPE
116 More on symbols
117 Lexical Functions: F$TRNLNM
118 SYS_TRNLNM, Part 2
119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY
120 Lexical functions: F$MESSAGE
121 TUOS_File_Wrapper
122 OPEN, CLOSE, and READ system services
UCL Commands
123 WRITE
124 Symbol assignment
125 The @ command
126 @ and EXIT
127 CRELNT system service
128 DELLNT system service
129 IF...THEN...ELSE
130 Comments, labels, and GOTO
131 GOSUB and RETURN
132 CALL, SUBROUTINE, and ENDSUBROUTINE
133 ON, SET {NO}ON, and error handling
134 INQUIRE
135 SYS_WRITE Service
136 OPEN
137 CLOSE
138 DELLNM system service
139 READ
140 Command Recall
141 RECALL
142 RUN
143 LIB_RUN
144 The Data Stream Interface
145 Preparing for execution
146 EOJ and LOGOUT
147 SYS_DELPROC and LIB_GET_FOREIGN
CUSPs and utilities
148 The I/O Queue
149 Timers
150 Logging in, part one
151 Logging in, part 2
152 System configuration
153 SET NODE utility
154 UUI
155 SETTERM utility
156 SETTERM utility, part 2
157 SETTERM utility, part 3
158 AUTHORIZE utility
159 AUTHORIZE utility, UI
160 AUTHORIZE utility, Access Restrictions
161 AUTHORIZE utility, Part 4
162 AUTHORIZE utility, Reporting
163 AUTHORIZE utility, Part 6
164 Authentication
165 Hashlib
166 Authenticate, Part 7
167 Logging in, part 3
168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN
169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME
170 LIB_SPAWN
171 CREPRC
172 CREPRC, Part 2
173 COPY
174 COPY, part 2
175 COPY, part 3
176 COPY, part 4
177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards
178 CREATESTREAM, STREAMNAME, and Set_Contiguous
179 Help Files
180 LBR Services
181 LBR Services, Part 2
182 LIBRARY utility
183 LIBRARY utility, Part 2
184 FS Services
185 FS Services, Part 2
186 Implementing Help
187 HELP
188 HELP, Part 2
189 DMG_Get_Key and LIB_Put_Formatted_Output
190 LIBRARY utility, Part 3
191 Shutting Down UOS
192 SHUTDOWN
193 WAIT
194 SETIMR
195 WAITFR and Scheduling
196 REPLY, OPCOM, and Mailboxes
197 REPLY utility
198 Mailboxes
199 BRKTHRU
200 OPCOM
201 Mailbox Services
202 Mailboxes, Part 2
203 DEFINE
204 CRELNM
205 DISABLE
206 STOP
207 OPCCRASH and SHUTDOWN
208 APPEND
Glossary/Index
Downloads
|
Authenticate, Part 7
We will finish up our discussion of Authenticate in this article. But first, we
need to handle something that I omitted from the system configuration script. Here is the
missing code:
$ write sys$output "Is this system a personal device that will only have a single"
$ inquire PC "user logged into it at a time? <YES>"
$ PC = f$edit(PC,"UPCASE,COLLAPSE")
$ PC = f$extract(PC,0,1)
$ if PC.es."N"
$ then
$ authorize default/prclm=8/prio=4/queprio=4/fillm=128/biolm=150/diolm=150
$ authorize default/astlm=300/tqelm=100/enqlm=4000/bytlm=128000/jtquota=4096
$ authorize default/wsdef=4096/wsquo=8192/wsextent=16384/pgflquo=256000
$ endif
What we are doing is determining how to configure default account settings. If we
do nothing, all accounts are created with no quotas or other resource limits. This
is usually desirable for a single-user system, but doesn't work out well for multi-user
systems where users may end up competing for limited resources. So we query the
user and if they indicate that this system will be used in a resource-sharing environment,
we will set the characteristics of the default account, which is the template for
all new accounts. These are the limits defined by VMS, so we will use them for
UOS. If the user indicates that this is a "personal" system, we leave the default account
set to no quotas. This can be altered at any point in the future by the administrator.
We don't do a lot of validation on what the user types. They are either answering with
"YES" or "NO", or they are non-technical and don't understand the question. If the
response is anything that doesn't start with "N" we will assume it is a Personal device.
Since, by definition, MFA can have multiple authentication steps, we will refer to
them by index when we need to specify which one we are referring to. The first is
index 0, the second is index 1, and so on. To remove one, the index must be specified
(if not provided, index 0 is assumed). Removing one essentially changes the indexes
of the following records. There were a couple of oversights in the previous AUTHORIZE
documentation. The following can be considered an addendum to the that documentation.
Qualifiers:
/DELETE{=index}
Delete the authorization record with the specified index. If index is not provided,
the first (or only) authorization record is deleted.
The previously documented /AUTHORIZE switch is how an authentication method (record)
is added to an account. Following are more authentication options that should have been
included in the documentation. Note that the PWDMIX option was a mistake and is
replaced by the CASEINSENSITIVE option (since the default should be that passwords
are case-sensitive).
|LIFETIME=deltatime
This option defines the interval between password expirations. For instance, the
following would set the password to expire 30 days after the last change:
|LIFETIME=+30
|CASEINSENSITIVE
This option defines that the password is to be treated as case-insensitive.
|DIALUP
This option defines that the authentication method applies only to dial-up connections.
|REMOTE
This option defines that the authentication method applies only to remote connections.
Note that if neither DIALUP or REMOTE access types are specified, the authentication
method is assumed to be general (actually Interactive since Batch and Network don't
use MFA).
var Authentication_List : TList ;
function Process_Authentication( C : string ) : string ;
var Auth : TAuthentication_Method ;
Has_Parameter : boolean ;
I : integer ;
IL : CommonUT.TInteger_List ;
Index : int64 ;
Client, P, S : string ;
SRB : TSRB ;
begin
// Process authentication deletion switches...
IL := CommonUT.TInteger_List.Create ;
while( Parse_Switch( 'DEL|ETE', '', C, P ) = 1 ) do
begin
if( P = '' ) then
begin
UUI.Show_Error( AUTH_MISOPT, 'Missing authentication option' ) ;
exit ;
end ;
if( not trystrtoint( P, I ) ) then
begin
UUI.Show_Error( AUTH_INVOPT, 'Invalid authentication option' ) ;
exit ;
end ;
if( I < 0 ) then
begin
UUI.Show_Error( AUTH_INVIND, 'Invalid authentication index' ) ;
exit ;
end ;
end ;
The Process_Authentication function processes authentication method
specifications and deletion switches. We iterate through all /DELETE switches and
build a list of the specified indexes, exiting if there is an error (missing index
or invalid index).
IL.Sort( -1 ) ;
for I := IL.Count - 1 downto 0 do
begin
if( ( IL[ I ] < 0 ) or ( IL[ I ] >= Authentication_List.Count ) ) then
begin
UUI.Show_Error( AUTH_INVIND, 'Invalid authentication index' ) ;
exit ;
end ;
Authentication_List.Delete( IL[ I ] ) ;
end ;
IL.Free ;
Next we sort the list and iterate through it backwards, deleting appropriate authentication
methods from the Authentication_List list, which is created from a user
account as we will see below. We process backwards through the sorted indexes because
if we process in the other direction, each deletion will change the index of the following
indexes. If any invalid indexes are found, we exit with an error. We process through
all the /DELETE switches before we process any authentication switches, since it makes
no sense that a user would delete any authentications specified on the same command
line.
// Process authentication switches...
while( Parse_Switch( 'AU|THENTICATION', '', C, P ) = 1 ) do
begin
Auth := TAuthentication_Method.Create ;
if( P = '' ) then
begin
P := 'password|' ; // Default to a password with no special prompt
end ;
I := pos( '|', P + '|' ) ;
S := lowercase( copy( P, 1, I - 1 ) ) ;
P := copy( P, I + 1, length( P ) ) ;
I := pos( '|', P + '|' ) ;
Client := copy( P, 1, I - 1 ) ;
P := copy( Client, I + 1, length( P ) ) ;
if( S = 'password' ) then
begin
Auth.Typ := UAM_Password ;
end else
begin
Auth.Typ := UAM_Auth ;
end ;
Auth.Description := Client ;
The items in the specification are delimited by vertical bars (|).
If the first item is "password", it is treated as a password method specification,
otherwise it is treated as the name of an authentication program. The optional second
item is either the password prompt (for a password specification) or a description
(for program names). We create and begin to set up the authentication information.
Note that this is in a loop so that we process all authentication specifications
in the command line.
while( P <> '' ) do
begin
I := pos( '|', P + '|' ) ;
S := lowercase( copy( P, 1, I - 1 ) ) ;
if( S = '' ) then
begin
continue ;
end ;
I := pos( '=', S ) ;
Has_Parameter := I > 0 ;
Client := '' ;
if( Has_Parameter ) then
begin
if( I = length( S ) ) then // Equal sign was last character with nothing following it
begin
Has_Parameter := False ;
end ;
Client := copy( S, I + 1, length( S ) ) ;
S := copy( S, 1, I - 1 ) ;
end ;
P contains the parameters for this authentication specification. We
loop until we have processed everything in the parameter string. Each time through
this loop, we locate the next item (delimited by vertical bars) and grab the parameter
if specified.
if( MinMatch( 'algorithm', S, 1 ) ) then
begin
if( not Has_Parameter ) then
begin
Client := inttostr( Hash_Default ) ;
end ;
if( not trystrtoint( Client, I ) ) then
begin
Set_String( Client, SRB ) ;
if( Hash_Index( int64( @Index ), int64( @SRB ) ) <> 0 ) then
begin
UUI.Show_Error( AUTH_INVALG, 'Invalid algorithm' ) ;
exit ;
end ;
I := Index ;
end ;
if( ( I < 0 ) or ( I > Hash_Count - 1 ) ) then
begin
UUI.Show_Error( AUTH_INVALG, 'Invalid algorithm' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Encoding := I ;
end else
if( MinMatch( 'caseinsensitive', S, 1 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Flags := Auth.Flags or UAMF_PwdMix ;
end else
if( MinMatch( 'dialup', S, 3 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Access_Type := UAT_Dialup ;
end else
if( MinMatch( 'dispwddic', S, 7 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Flags := Auth.Flags or UAMF_DisPwdDic ;
end else
if( MinMatch( 'dispwdhis', S, 7 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Flags := Auth.Flags or UAMF_DisPwdHis ;
end else
if( MinMatch( 'expired', S, 1 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Flags := Auth.Flags or UAMF_Expired ;
end else
if( MinMatch( 'forcechange', S, 1 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Flags := Auth.Flags or UAMF_ForceChange ;
end else
if( MinMatch( 'generate', S, 4 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Flags := Auth.Flags or UAMF_Generate ;
end else
if( MinMatch( 'genpwd', S, 4 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Flags := Auth.Flags or UAMF_GenPwd ;
end else
if( MinMatch( 'lifetime', S, 2 ) ) then
begin
if( not Has_Parameter ) then
begin
UUI.Show_Error( AUTH_MISOPT, 'Missing authentication option' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Lifetime := BINTIM( Client ) ;
if( Auth.Lifetime = 0 ) then
begin
UUI.Show_Error( AUTH_INVLIFE, 'Invalid lifetime' ) ;
exit ;
end ;
end else
if( MinMatch( 'lockpwd', S, 2 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Flags := Auth.Flags or UAMF_LockPwd ;
end else
if( MinMatch( 'minimum', S, 1 ) ) then
begin
if( not Has_Parameter ) then
begin
UUI.Show_Error( AUTH_MISOPT, 'Missing authentication option' ) ;
exit ;
end ;
if( not trystrtoint( Client, I ) ) then
begin
UUI.Show_Error( AUTH_INVOPT, 'Invalid authentication option' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.MinLength := I ;
end else
if( MinMatch( 'password', S, 2 ) ) then
begin
if( not Has_Parameter ) then
begin
UUI.Show_Error( AUTH_MISOPT, 'Missing authentication option' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Auth := Client ;
end else
if( MinMatch( 'remote', S, 1 ) ) then
begin
if( Has_Parameter ) then
begin
UUI.Show_Error( AUTH_NOOPT, 'Authentication option takes no parameter' ) ;
exit ;
end ;
if( Auth.Typ = UAM_Auth ) then
begin
UUI.Show_Error( AUTH_INCOMP, 'Incompatible options' ) ;
exit ;
end ;
Auth.Access_Type := UAT_Remote ;
end else
begin
UUI.Show_Error( AUTH_INVOPT, 'Invalid authentication option' ) ;
exit ;
end ;
end ; // while( P <> '' )
There are three types of items that we process: 1) Those who take no parameters, 2) those
that require a parameter, and 3) those whose parameters are optional. In the first
case, if a parameter is specified, we exit with an error. In the second case, if
no parameter is specified, we exit with an error. Of course, if we don't recognize
an item, we also exit with an error. Most items are specific to passwords and we
exit with an error if this is a UAM_Auth type of item. Each item with a parameter
is validated and we exit on error. In the case of specifying the password hashing
algorithm, we also verify that a valid hash index/name is provided. If a non-integer
value is provided, we see if we can convert it to an index. If not, or if an invalid
integer index is provided, we exit with an error. Once the item, and any associated parameter, make
it through the gauntlet of validations, we set the appropriate flag or authorization
method value.
Authentication_List.Add( Auth ) ;
end ; // if( Parse_Switch( 'AU|THENTICATION', '', C, P ) = 1 )
Result := C ;
end ; // Process_Authentication
Finally, we add the authentication method we built in the parameter loop to
Authentication_List . Process_Authentication is called
from the TAuth_Responder.Callback for the processing of the ADD, DEFAULT,
MODIFY, and COPY commands.
// Gather up authentication records...
for I := 0 to User.Authentication_Count - 1 do
begin
UAuth := User.Authentication[ I ] ;
Auth := TAuthentication_Method.Create ;
Auth.Typ := UAuth.Typ ;
Auth.Expiration := UAuth.Expiration ;
Auth.Access_Type := UAuth.Access_Type ;
Auth.Auth := User.Grab_String( UAuth.Auth ) ;
Auth.Flags := UAuth.Flags ;
Auth.Description := User.Grab_String( UAuth.Description ) ;
Auth.Encoding := UAuth.Encoding ;
Auth.Lifetime := UAuth.Lifetime ;
Auth.Last_Change := UAuth.Last_Change ;
Authentication_List.Add( Auth ) ;
Auth.Free ;
//TODO: Create GUI for this...
end ;
This code is added to the end of the Update_User_UI function. It iterates
through the given user's authentications and adds them to Authentication_List .
Note that we copy from the TUAF_Authentication value returned from the
user instance to a TAuthentication_Method instance that we store in the list. The
reason is that TUAF_Authentication contains pointers to internal UAF strings
rather than actual strings (note the use of Grab_String to get the actual
strings). Other than that, the TUAF_Authentication structure is the
same as the TAuthentication_Method class.
I didn't want to bog things down with GUI support for authentication records - we
will deal with that in the far future - so we simply include a TODO comment where that
code would go.
while( User.Authentication_Count > 0 ) do // Delete old auth records...
begin
User.Delete_Authentication( 0 ) ;
end ;
for I := 0 to Authentication_List.Count - 1 do // Add new/current auth records...
begin
User.Add_Authentication( TAuthentication_Method( Authentication_List[ I ] ) ) ;
end ;
This code is added to the end of the Update_User_From_UI function to
update the user from our local authentication method list. First we delete all authentications
already assigned to the user, then we add the methods from Authentication_List .
if( U.Authentication_Count > 0 ) then
begin
Do_Write( '' ) ;
Do_Write( 'Authentication:' ) ;
for I := 0 to U.Authentication_Count - 1 do
begin
Temp := '' ;
if( Auth.Access_Type <> 0 ) then
begin
case Auth.Access_Type of
UAT_Batch: Temp := ' (batch)' ;
UAT_Interactive: Temp := ' (interactive)' ;
UAT_Network: Temp := ' (network)' ;
UAT_Remote: Temp := ' (remote)' ;
UAT_Dialup: Temp := ' (dialup)' ;
end ;
end ;
Do_Write( inttostr( I ) + ':' + Temp ) ;
Auth := U.Authentication[ I ] ;
if( Auth.Typ = UAM_Password ) then
begin
Do_Write( ' Password: ********' ) ;
Temp := ' ' ;
Set_String( Temp, SRB ) ;
HASH_Name( Auth.Encoding, int64( @SRB ) ) ;
Temp := trim( Temp ) ;
if( Temp <> '' ) then
begin
Do_Write( ' Hash: ' + Temp ) ;
end ;
Temp := U.Grab_String( Auth.Description ) ;
if( Temp <> '' ) then
begin
Do_Write( ' Password prompt: ' + Temp ) ;
end ;
if( ( Auth.Flags and UAMF_Generate ) <> 0 ) then
begin
Do_Write( ' Force generated password' ) ;
end ;
if( Auth.Expiration = 0 ) then
begin
Do_Write( ' No expiration' ) ;
end else
begin
Do_Write( ' Expires: ' + ASCTIM( Auth.Expiration ) ) ;
Do_Write( ' Lifetime: ' + ASCTIM( Auth.Lifetime ) ) ;
if( Auth.Last_Change = 0 ) then
begin
Do_Write( ' Never changed' ) ;
end else
begin
Do_Write( ' Last changed: ' + ASCTIM( Auth.Last_Change ) ) ;
end ;
end ;
end else
begin
if( Auth.Expiration = 0 ) then
begin
Do_Write( ' No expiration' ) ;
end else
begin
Do_Write( ' Expires: ' + ASCTIM( Auth.Expiration ) ) ;
end ;
Temp := U.Grab_String( Auth.Auth ) ;
Do_Write( ' Authentication client: ' + Temp ) ;
Temp := U.Grab_String( Auth.Description ) ;
if( Temp <> '' ) then
begin
Do_Write( ' (' + Temp + ')' ) ;
end ;
end ;
Do_Write( '' ) ;
end ; // for I := 0 to U.Authentication_Count - 1
end ; // if( U.Authentication_Count > 0 )
This code is added to the end of the Show_Report function. It displays
each of the authentication methods for the user.
Next, we need to add the support for the system password. We need a place to store
this password and SYSUAF.DAT seems the most logical place. However, there is nothing
specific in that file structure for storing a separate system password. Fortunately, we do have
a place where we can save it. Since the Startup account can never be logged into - it is
only used on system startup - we can use it to store the system password (as the
Startup account's password). This has some ramifications. First, the administrator
can set the system password by changing the Startup account system password or by
use of the MODIFY/SYSTEM_PASSWORD switch, since they both
have the same effect. Second, because all of the MFA capabilities of a standard
account are available on the Startup account, we could implement MFA for system
authentication, in addition to whatever authentication is used for each user account. This
is something VMS doesn't support, so we are diverging slightly from the VMS specification.
Since the system startup forces a login to Startup, the system will not require
authentication on startup, but it will for all other logins. Just be sure to consider
the issues we talked about two articles ago: too much security can lead to a less
secure system.
if( Parse_Switch( 'SY|STEM_PASSWORD', '', C, P ) = 1 ) then
begin
Abort := True ; // No further processing
if( Switch_Present( C ) > 0 ) then // This switch cannot be combined with others
begin
UUI.Show_Error( AUTH_MISMAT, 'Mismatched switches' ) ;
exit ;
end ;
P := trim( P ) ;
U := Get_User( 1 ) ;
The code is added to the beginning of the MODIFY command handling to process the
MODIFY/SYSTEM_PASSWORD switch. Frankly, I think this should have been done with a
separate command rather than using a switch on MODIFY. But the VMS designers didn't
ask me. So, we follow our specification and implement it the same way. Since
UOS offers MFA, this switch is a rather blunt object to use - and a more refined degree
of control is allowed by directly manipulating the authentication methods associated with the
Startup account. But, again, for compatibility sake, we provide this means of control.
In this code,
we see if /SYSTEM_PASSWORD was specified. If so, we set the Abort flag
so that the processing ends as soon as we exit. Next, we validate that no other switches
are present (all other switches are incompatible with this one), and exit with an
error if there are any. Then we trim the password so that trailing/leading spaces
are not incorporated into the password. Finally, we get the Startup user (index 1).
if( P = '' ) then // Remove system password
begin
while( U.Authentication_Count > 0 ) do
begin
U.Delete_Authentication( 0 ) ;
end ;
end else
begin
Count := 0 ;
for I := 0 to U.Authentication_Count - 1 do
begin
Auth := U.Authentication[ I ] ;
if( Auth.Typ = UAM_Password ) then
begin
if( Auth.Access_Type = UAT_Access ) then
begin
inc( Count ) ;
end ;
U.Change_Password( I, P, Hash_Default ) ;
end ;
end ;
if( Count = 0 ) then // No password authentication found, so add one
begin
AuthM.Typ := UAM_Password ;
AuthM.Auth := P ;
AuthM.Access_Type := UAT_Access ;
AuthM.Flags := 0 ;
AuthM.Encoding := Hash_Default ;
AuthM.Last_Change := LIB_Get_Timestamp ;
U.Add_Authentication( AuthM )
end ;
end ;
exit ;
end ;
At this point, there are two options: 1) the specified password is null, meaning that we
remove the system password, or 2) a password is provided, meaning that we are setting
the system password. In the case of removing the system password using this switch,
all authentication methods associated with the Startup account are deleted - not just
any password(s) - and we exit. This behavior most closely matches what happens when
used on VMS (in the case of a SFA password, it is identical).
If a password is provided, it could mean that a password is being added or an existing
one is being changed. We loop through all authentication methods, changing any passwords
that we encounter. In order to make this work as closely to VMS as possible, given
the extended capabilities of UOS, we keep track of any password items that are general
access (UAT_Access). If none are found (for instance, if there are no authentication
items associated with Startup), we add a new general access password item. If there
is a single general access authentication method consisting of a password, the effect
will be identical to what happens on VMS. If MFA is used, the consequence should
hopefully be somewhat intuitive.
procedure TUser.Change_Password( Index : integer ; Pass : string ;
Hash : integer ) ;
var Auth : TUAF_Authentication ;
Old : int64 ;
SS : TStore_String ;
begin
if( ( Index < 0 ) or ( Index >= Authentication_Count ) ) then
begin
exit ; // Invalid auth index
end ;
if( ( Hash < 0 ) or ( Hash >= Hash_Count ) ) then
begin
exit ; // Invalid hash index
end ;
Auth := Authentication[ Index ] ;
if( Auth.Typ <> UAM_Password ) then
begin
exit ; // Not a password method
end ;
Old := Auth.Auth ;
Auth.Encoding := Hash ;
if( ( Auth.Flags and UAMF_CaseInsensitive ) <> 0 ) then
begin
Pass := lowercase( Pass ) ;
end ;
Pass := Encode_Password( Pass, Hash ) ;
SS := Create_Store_String( _SysUAF, Pass ) ;
Auth.Auth := SS.Address ;
SS.Free ;
Authentication[ Index ] := Auth ;
Delete_Store_String( _SysUAF, Old ) ;
end ;
This method has been added to TUser to change the password for a specific
authentication index. First we verify that the auth index and hash index are valid
or else we exit with an error. Next, we get the specified authentication record
and verify that it is a password authentication record. If not, we exit. Otherwise,
we encode the password with the specified hash and then set the encoding to match
the hash index, delete the old password string, create the new one, and update
the authentication record. If the UAMF_CaseInsensitive flag is set,
we normalize the password to lowercase.
Note the order we do things in the code - this is important
to avoid data corruption if the process is aborted before it completes. We delete
the old password string only after we've updated the authentication record. If we
delete the old password and then the authentication record isn't updated, we would have
a pointer to a location in the SYSUAF file that is no longer a valid string. This
could cause all kinds of issues, as is common with errant pointers, including data
corruption of the SYSUAF file.
function Encode_Password( P : string ; Hash : integer ) : string ;
var Source, Target : TSRB ;
LResult : int64 ;
begin
while( length( Result ) < 64 ) do
begin
Result := Result + P ;
end ;
LResult := length( Result ) ;
Set_String( Result, Target ) ;
Set_String( P, Source ) ;
while( LResult = length( Result ) ) do
begin
Result := Result + P ;
Set_String( Result, Target ) ;
HASH_Hash( int64( @Hash ), int64( @Source ), int64( @Target ),
int64( @Source ), int64( @LResult ) ) ;
end ;
setlength( Result, LResult ) ;
end ;
This function is simply a Pascal wrapper for calls to Hashlib to encode a password
string. Note that the password is passed both as the plaintext and as the key text.
In cases where the chosen hash algorithm takes no key, the key parameter is ignored.
If the returned length (LResult ) is equal to the length of Result ,
we extend the length of the result and try again until we are sure that we have the
whole ciphertext.
In the next article, we will look at changes to the LOGIN utility to handle
authentication.
Copyright © 2022 by Alan Conroy. This article may be copied
in whole or in part as long as this copyright is included.
|