1 Introduction 2 Ground Rules Building a File System 3 File Systems 4 File Content Data Structure 5 Allocation Cluster Manager 6 Exceptions and Emancipation 7 Base Classes, Testing, and More 8 File Meta Data 9 Native File Class 10 Our File System 11 Allocation Table 12 File System Support Code 13 Initializing the File System 14 Contiguous Files 15 Rebuilding the File System 16 Native File System Support Methods 17 Lookups, Wildcards, and Unicode, Oh My 18 Finishing the File System Class The Init Program 19 Hardware Abstraction and UOS Architecture 20 Init Command Mode 21 Using Our File System 22 Hardware and Device Lists 23 Fun with Stores: Partitions 24 Fun with Stores: RAID 25 Fun with Stores: RAM Disks 26 Init wrap-up The Executive 27 Overview of The Executive 28 Starting the Kernel 29 The Kernel 30 Making a Store Bootable 31 The MMC 32 The HMC 33 Loading the components 34 Using the File Processor 35 Symbols and the SSC 36 The File Processor and Device Management 37 The File Processor and File System Management 38 Finishing Executive Startup Users and Security 39 Introduction to Users and Security 40 More Fun With Stores: File Heaps 41 File Heaps, part 2 42 SysUAF 43 TUser 44 SysUAF API Terminal I/O 45 Shells and UCL 46 UOS API, the Application Side 47 UOS API, the Executive Side 48 I/O Devices 49 Streams 50 Terminal Output Filters 51 The TTerminal Class 52 Handles 53 Putting it All Together 54 Getting Terminal Input 55 QIO 56 Cooking Terminal Input 57 Putting it all together, part 2 58 Quotas and I/O UCL 59 UCL Basics 60 Symbol Substitution 61 Command execution 62 Command execution, part 2 63 Command Abbreviation 64 ASTs 65 Expressions, Part 1 66 Expressions, Part 2: Support code 67 Expressions, part 3: Parsing 68 SYS_GETJPIW and SYS_TRNLNM 69 Expressions, part 4: Evaluation UCL Lexical Functions 70 PROCESS_SCAN 71 PROCESS_SCAN, Part 2 72 TProcess updates 73 Unicode revisted 74 Lexical functions: F$CONTEXT 75 Lexical functions: F$PID 76 Lexical Functions: F$CUNITS 77 Lexical Functions: F$CVSI and F$CVUI 78 UOS Date and Time Formatting 79 Lexical Functions: F$CVTIME 80 LIB_CVTIME 81 Date/Time Contexts 82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM 83 Lexical Functions: F$DELTA_TIME 84 Lexical functions: F$DEVICE 85 SYS_DEVICE_SCAN 86 Lexical functions: F$DIRECTORY 87 Lexical functions: F$EDIT and F$ELEMENT 88 Lexical functions: F$ENVIRONMENT 89 SYS_GETUAI 90 Lexical functions: F$EXTRACT and F$IDENTIFIER 91 LIB_FAO and LIB_FAOL 92 LIB_FAO and LIB_FAOL, part 2 93 Lexical functions: F$FAO 94 File Processing Structures 95 Lexical functions: F$FILE_ATTRIBUTES 96 SYS_DISPLAY 97 Lexical functions: F$GETDVI 98 Parse_GetDVI 99 GetDVI 100 GetDVI, part 2 101 GetDVI, part 3 102 Lexical functions: F$GETJPI 103 GETJPI 104 Lexical functions: F$GETSYI 105 GETSYI 106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD 107 Lexical function: F$PARSE 108 FILESCAN 109 SYS_PARSE 110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS 111 File Lookup Service 112 Lexical Functions: F$SEARCH 113 SYS_SEARCH 114 F$SETPRV and SYS_SETPRV 115 Lexical Functions: F$STRING, F$TIME, and F$TYPE 116 More on symbols 117 Lexical Functions: F$TRNLNM 118 SYS_TRNLNM, Part 2 119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY 120 Lexical functions: F$MESSAGE 121 TUOS_File_Wrapper 122 OPEN, CLOSE, and READ system services UCL Commands 123 WRITE 124 Symbol assignment 125 The @ command 126 @ and EXIT 127 CRELNT system service 128 DELLNT system service 129 IF...THEN...ELSE 130 Comments, labels, and GOTO 131 GOSUB and RETURN 132 CALL, SUBROUTINE, and ENDSUBROUTINE 133 ON, SET {NO}ON, and error handling 134 INQUIRE 135 SYS_WRITE Service 136 OPEN 137 CLOSE 138 DELLNM system service 139 READ 140 Command Recall 141 RECALL 142 RUN 143 LIB_RUN 144 The Data Stream Interface 145 Preparing for execution 146 EOJ and LOGOUT 147 SYS_DELPROC and LIB_GET_FOREIGN CUSPs and utilities 148 The I/O Queue 149 Timers 150 Logging in, part one 151 Logging in, part 2 152 System configuration 153 SET NODE utility 154 UUI 155 SETTERM utility 156 SETTERM utility, part 2 157 SETTERM utility, part 3 158 AUTHORIZE utility 159 AUTHORIZE utility, UI 160 AUTHORIZE utility, Access Restrictions 161 AUTHORIZE utility, Part 4 162 AUTHORIZE utility, Reporting 163 AUTHORIZE utility, Part 6 164 Authentication 165 Hashlib 166 Authenticate, Part 7 167 Logging in, part 3 168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN 169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME 170 LIB_SPAWN 171 CREPRC 172 CREPRC, Part 2 173 COPY 174 COPY, part 2 175 COPY, part 3 176 COPY, part 4 177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards 178 CREATESTREAM, STREAMNAME, and Set_Contiguous 179 Help Files 180 LBR Services 181 LBR Services, Part 2 182 LIBRARY utility 183 LIBRARY utility, Part 2 184 FS Services 185 FS Services, Part 2 186 Implementing Help 187 HELP 188 HELP, Part 2 189 DMG_Get_Key and LIB_Put_Formatted_Output 190 LIBRARY utility, Part 3 191 Shutting Down UOS 192 SHUTDOWN 193 WAIT 194 SETIMR 195 WAITFR and Scheduling 196 REPLY, OPCOM, and Mailboxes 197 REPLY utility 198 Mailboxes 199 BRKTHRU 200 OPCOM 201 Mailbox Services 202 Mailboxes, Part 2 203 DEFINE 204 CRELNM 205 DISABLE 206 STOP 207 OPCCRASH and SHUTDOWN 208 APPEND Glossary/Index Downloads |
Introduction to Users and Security
Introduction We need more than a user name, however. We need a means of authenticating a user when they want to access the system. "Authentication" is simply some means of verifying that a person is the user that they claim to be. The simplest method of authentication (and oldest) is a password or pass phrase. In theory, only the actual person and the computer know the password and, therefore, if the user provides the correct password, that proves that they are authorized to access the computer as that user. In practice, passwords are often shared, written down (and subsequently stolen), or are easily guessed. So there are other means of authentication. UOS supports other authentication methods, which we will discuss in the future. For now, we will limit ourselves to passwords.
Some older operating system provided no security - such as CP/M, MSDOS, the original UNIX (from which Linux derives), or the original version of Windows. In the case of UNIX and Windows, security was added as an afterthought, which created some deciedly unelegant implementations - and no small amount of pain for users. Adding security after the fact is a good way to create unsecure systems that are easy to break into. UOS involves security from the start to make it secure. Security "holes" (means of bypassing security protections) can be created by actions of the system administrator or by software. We cannot prevent an administrator from creating holes in security, but we can offer guidance, secure defaults, and otherwise make it difficult for him to create such holes - especially important on a personal system where the owner isn't likely knowledgeable about security issues. So we will be discussing security in most of the articles to follow, as it applies to the topic at hand. But in the next few articles we will lay the foundation for all following user and security issues.
User names and IDs
Flags, Creator, Owner, and ACL are all used for security. First, let's consider the Owner value. This is the User ID for the owner of the file. We only have 8 bytes for storing a user with the file, and a username can be longer than that. So, UOS associates an integer value with each user name. In fact, UOS operates solely based upon the user ID. The name is simply to make it easier on the humans that use the system. We will discuss how that association is done later. However, to prevent confusion, all user IDs and user names are unique. User names can consist of alphanumeric characters, dollar signs ($), and underscores (_). There is, essentially, no limit on their length, but they must be at least one character in length. When a user creates a file, the file is automatically assigned to his user ID code (UIC). The owner of the file, by default, can do just about anything he wants with that file - read, write, change, delete, shrink, extend, etc. However, some of these actions may require some additional security checks. For instance, extending the size of a file may not be permitted if the user has exceeded his quota of space on a given store. We will discuss these issues as they come up. The lowest UICs (usually 1-7, but that can be customized) are system UICs and are given special consideration. For instance, a system UIC is allowed to log in on the system console even if logins are disabled. We will discuss other special circumstances as they come up. A UIC of 0 indicates no ownership, and is never seen on a file. Pre-defined user accounts:
ACL is a pointer to an optional allocation chain consisting for Access Control List data (discussed later in this article).
File protection
The categories are abbreviated as S, O, G, and W. A full protection specification is a comma-delimited list where each item is a category followed by a colon and the access types. For instance "S:RWE,O:RW,G:R,W:D" would indicate that system has read, write, and execute, while the owner has read and write, group has read-only, and world has delete access. As mentioned above, upon creation, the owner is given RWED access to the file.
Access Control Lists It isn't only files that have access permissions. All system resources accessible outside of the kernel have access permissions as well. For instance, the symbol tables that we talked about in article 35 have protection codes (and possibly ACLs). By default, all users have read access to the symbol tables, but most users have write access only to their job and process tables. As we continue these articles, we will come across other resources that have protection as well.
Privileges
Obviously, if any user can grant themselves privileges, the system isn't secure. The most important rule in regard to how UOS handles privileges is that a user cannot grant privileges to any object that are greater than the privileges he has. For instance, a program can create sub-processes. These new processes can be granted any privileges that the user running the program has, but they cannot be granted privileges that the creator process doesn't have. The one exception to the rule is that the SETPRV privileges allows a process to grant additional privileges to itself or another process. Obviously, this is a dangerous privilege and is only granted to a couple trusted CUSPs. It is possible, however, for a user to grant privileges to a exectuable such that any user that runs the executable will have those privileges while the program is running, even if the user running the program doesn't have those privileges. Certain CUSPs have such privileges in order to perform functions on behalf of a user without otherwise sufficient privileges.
Let's consider an example of how this all works. Assume that user Fred is responsible for making weekly backups of all the files that have changed that week. He is granted READALL privilege so he can make backup copies of any changed file on the system. However, he only wants this privilege while doing the backup. Thus, he runs without that privilege until he does the backup. At that point, he elevates his current privileges to include READALL and then executes the backup utility. The backup program has BYPASS privilege, but drops this from the process' effective privileges so that user can only read files that he has access to (normally a user can only backup files that he has read access to - the backup program doesn't know that Fred has READALL privilege). However, once the file has been backed up, the backup program elevates the effective privileges to include BYPASS so that it can set the Last Backup field in the file header. Then it lowers itself back to the process' current privileges. If the program left BYPASS on all the time, then it would be granted access to all files which would allow any user to use the backup program to make copies of files that he wouldn't otherwise be privy to. Of course, if the user's current privileges included BYPASS, then the program would run with BYPASS all the time, but that would be okay since the user can already bypass file protections. When the program stops executing, the effective privileges are reset to the Current privileges and the Program privileges value is cleared, thus resetting the effective privileges to the current process privileges. Note that VMS uses a different mechanism than UOS for assigning privileges to executable files. In UOS, this is a special kind of entry in the ACL. We will, more often than not, follow the VMS implementation of various features (although not the precise data structure layout), but sometimes we will diverge since we are more concerned with UOS being functionally equivalent than being a clone.
So, from where do privileges originally derive? If nothing can elevate privileges beyond what it already has, how can any user be granted any privileges whatsoever? The Startup user has all privileges automatically granted to it when UOS is installed. The system startup is always run under the auspices of the Startup user. The first time system startup runs, the process creates a System account that also has all privileges. It also creates one or more user accounts that are granted some subset of privileges (or none at all). To summarize, all security ultimately depends upon the protections and privileges granted to users. Since all UOS activities (after Kernel startup) are ultimately the result of user actions, we consolidate both user and security-related code in the USC (User and Security Component) - user accounts and security are essentially the same thing. Much of the code that we will discuss in the next few articles will be in, or related to, the USC. In the next article, we will discuss the File Heap, which is how we will implement the user authorization file. Copyright © 2017 by Alan Conroy. This article may be copied in whole or in part as long as this copyright is included. |