RE: [U2] Uniobjects hack

2005-06-01 Thread Bjorn Behr
SNIP It's funny. D3 has the capability to assign a macro to any user who gets to tcl (or the debug prompt). Often this macro is either a login (again) or a logoff. Works great. U2 doesn't seem to have addressed this issue because their client base has never required it. Hopefully, now they

RE: [U2] Uniobjects hack

2005-06-01 Thread John Jenkins
ON.ERROR ON.ABORT (and remote verbs) JayJay snip It's funny. D3 has the capability to assign a macro to any user who gets to tcl (or the debug prompt). Often this macro is either a login (again) or a logoff. Works great. U2 doesn't seem to have addressed this issue because their client base

RE: [U2] Uniobjects hack (diverging into Outages I have known and loved)

2005-06-01 Thread John Jenkins
PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Frost, Bodo Sent: 01 June 2005 04:45 To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack JayJay, This combination just misses Level -1 (Minus One, or DefCon Dark Red): Pull the plug... :-D Cheers BJ --- u2-users mailing list u2

RE: [U2] Uniobjects hack

2005-06-01 Thread Piers Angliss
open with a sign telling people not to go in. Piers -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of John Jenkins Sent: 31 May 2005 23:42 To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack So what does this combination miss? --- u2-users

RE: [U2] Uniobjects hack

2005-06-01 Thread Bill Haskett
this information will always help. Thanks. :-) Bill -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Jenkins Sent: Wednesday, June 01, 2005 1:01 AM To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack ON.ERROR ON.ABORT (and remote

RE: [U2] Uniobjects hack

2005-05-31 Thread Piers Angliss
a hugely inviting route to hack the database, it needs better server-side authentication Piers -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of John Jenkins Sent: 30 May 2005 01:56 To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack Other

RE: [U2] Uniobjects hack

2005-05-31 Thread Les Hewkin
in theory of what might happen? Les -Original Message- From: Piers Angliss [mailto:[EMAIL PROTECTED] Sent: 31 May 2005 10:07 To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack JayJay, Reading between the lines I think you're saying a firewall could be a good idea I'm

RE: [U2] Uniobjects hack

2005-05-31 Thread Piers Angliss
2005 11:09 To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack I have been following this thread with great intrest. The issues seems to be that if someone has Excel, UniObjects and knows how U2 works that they can gain access to the data. Where are these people? Are they working

RE: [U2] Uniobjects hack

2005-05-31 Thread David Jordan
- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Piers Angliss Sent: Tuesday, 31 May 2005 9:35 PM To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack I agree it's unlikely, but it's something that needs to be considered I can't remember whether your branches

Re: [U2] Uniobjects hack

2005-05-31 Thread Ian Renfrew
@listserver.u2ug.org Sent: Tuesday, May 31, 2005 6:09 AM Subject: RE: [U2] Uniobjects hack I have been following this thread with great intrest. The issues seems to be that if someone has Excel, UniObjects and knows how U2 works that they can gain access to the data. Where are these people? Are they working

RE: [U2] Uniobjects hack Solution

2005-05-31 Thread David Jordan
An alternative method is looking at Single Sign On technologies. Single sign on technology would enable you to hide the username and password to UniVerse either through telnet, uniobjects or ODBC and all the user would know is the single logon which maybe tied to windows. Thus if someone tries

RE: [U2] Uniobjects hack

2005-05-31 Thread Les Hewkin
@listserver.u2ug.org Subject: Re: [U2] Uniobjects hack Even scarrier, if a person has telnet (almost definitely since its a OS supported application), a valid user id, password and knows how U2 works then they may be able to access data. No need to install UniObjects or purchase Excel. Depending

Re: [U2] Uniobjects hack

2005-05-31 Thread Don Kibbey
Bingo! Ian. If your users are good enough to hack together an application out of notepad, excel and uniobjects, then you've hired the wrong guy for that sales / counter job. Move him/her into the development group. Be carefull of over protecting your systems to the point they become more

RE: [U2] Uniobjects hack

2005-05-31 Thread David Jordan
to auditors when these questions are broached. Regards David Jordan -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Don Kibbey Sent: Tuesday, 31 May 2005 11:36 PM To: u2-users@listserver.u2ug.org Subject: Re: [U2] Uniobjects hack Bingo! Ian. If your users

RE: [U2] Uniobjects hack

2005-05-31 Thread Ed Clark
because of security by obscurity. So it does happen. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Les Hewkin Sent: Tuesday, May 31, 2005 8:29 AM To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack Can we have a quick show of hands of those who

RE: **POSSIBLE SPAM**::RE: [U2] Uniobjects hack

2005-05-31 Thread Stevenson, Charles
From: Les Hewkin Can we have a quick show of hands of those who have had there U2 system hacked? I was accused of it once by a system administrator because I pointed out the security hole that I was then accused of wriggling through. This was the same system administrator who once ended up as

RE: [U2] Uniobjects hack

2005-05-31 Thread Piers Angliss
:[EMAIL PROTECTED] Behalf Of Les Hewkin Sent: 31 May 2005 14:29 To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack Can we have a quick show of hands of those who have had there U2 system hacked? I am not saying that it's not an issue, I am just curious. I do not know of it happening

Re: [U2] Uniobjects hack

2005-05-31 Thread Key Ally
Les, All the hacking I've seen has come through the front door - it has always been authorized people using the system in the way in which they were authorized. I've had senior executives who have sabotaged their own systems. - Chuck Les Hewkin wrote: Can we have a quick show of

RE: [U2] Uniobjects hack

2005-05-31 Thread Lettau, Jeff
needed to be fixed but nothing major. Jeffrey Lettau ERP Systems Manager polkaudio -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Les Hewkin Sent: Tuesday, May 31, 2005 9:29 AM To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack Can we

RE: [U2] Uniobjects hack

2005-05-31 Thread John Jenkins
So what does this combination miss? Level 1 --- 1. Use a firewall with a DMZ and reverse lookup so only designated client PCs can access specific systems (and audit) 2. User Public Key based application level authentication between VALID client applications and the server to permit valid

Re: [U2] Uniobjects hack

2005-05-31 Thread John Kent
enough to think they can get the information they require by doing it themselves.without going through the official menus. jak - Original Message - From: Les Hewkin [EMAIL PROTECTED] To: u2-users@listserver.u2ug.org Sent: Tuesday, May 31, 2005 7:39 PM Subject: RE: [U2] Uniobjects hack

RE: [U2] Uniobjects hack

2005-05-31 Thread David Jordan
. Should discourage the casual player. Regards David Jordan -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Kent Sent: Wednesday, 1 June 2005 8:43 AM To: u2-users@listserver.u2ug.org Subject: Re: [U2] Uniobjects hack Les, this is a situation i have

RE: [U2] Uniobjects hack

2005-05-29 Thread John Jenkins
Of course you could just stop anyone loading or using any development tools unless they are authorised to do so Making it a sackable offence usually works (I think that's a pink sheet for those on the western side of the Pond) Otherwise set the firewall to only accept connections on the

RE: [U2] Uniobjects hack

2005-05-29 Thread Stuart . Boydell
Did you mean to say carhacked? Mind you, having a finger dangling from your key-ring instead of rabbits foot would sure be a tip-off at key-parties. S What about the thieves who carjacked a Merc? Because it was biometrically started, they chopped off the driver's finger so they

Re: [U2] Uniobjects hack]

2005-05-28 Thread Steve Johnson
According to the IBM website, UOLOGIN must be a globally cataloged subroutine with two arguments. First argument is a return value. If set to zero, login is rejected and error code 80011 is returned. Second argument is input to the subroutine and contains the application name. Example:

Re: [U2] Uniobjects hack]

2005-05-28 Thread Ian Renfrew
: Saturday, May 28, 2005 3:27 AM Subject: Re: [U2] Uniobjects hack] According to the IBM website, UOLOGIN must be a globally cataloged subroutine with two arguments. First argument is a return value. If set to zero, login is rejected and error code 80011 is returned. Second argument is input

RE: [U2] Uniobjects hack

2005-05-27 Thread David Jordan
You might want to look at the article in the U2UG newsletter on security. http://u2ug.org/docs/20040919_U2UG_Newsletter.pdf that deals with this issue. With Universe a program can have higher access rights than the user. If a user gets to tcl they may not have access rights to update, enquire

RE: [U2] Uniobjects hack

2005-05-27 Thread Marc Harbeson
Of John Kent Sent: Friday, May 27, 2005 2:03 AM To: u2-users@listserver.u2ug.org Subject: Re: [U2] Uniobjects hack Steve, thanks for that jak - Original Message - From: Steve Johnson [EMAIL PROTECTED] To: u2-users@listserver.u2ug.org; U2UG u2-users@listserver.u2ug.org Sent: Friday

Re: [U2] Uniobjects hack

2005-05-27 Thread robwills_u2list
The ability to bypass application security using UniObjects has really got me thinking. In the absence of any suitable remedies and perhaps as a stop gap solution whilst a better solution is written, I would recommend the following: 1. As Martin said, make sure that you do not let UniObjects

Re: [U2] Uniobjects hack

2005-05-27 Thread Martin Phillips
How about using file level security, and common area in your subroutines. The problem remains that a user who can validly use the application must have access to these files and hence can open them and tinker in his own VB program. It all comes down to the fact that UV/Udt cannot tell the

RE: [U2] Uniobjects hack

2005-05-27 Thread David Jordan
The same issue applies for SQL access to UniVerse as it does for UniObjects. It is a problem for RDBMS. They get around by restricting access and only allowing updates through Stored Procedures which can have a different access level. UniVerse can do the same thing. Regards David Jordan

RE: [U2] Uniobjects hack

2005-05-27 Thread Glen B
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of [EMAIL PROTECTED] Sent: Friday, May 27, 2005 10:56 AM To: u2-users@listserver.u2ug.org Subject: Re: [U2] Uniobjects hack The ability to bypass application security using UniObjects has really got me

Re: [U2] Uniobjects hack {Unclassified}

2005-05-27 Thread Anthony W. Youngman
In message [EMAIL PROTECTED], HENDERSON MIKE, MR [EMAIL PROTECTED] writes Things will get better? No, things will get much, MUCH worse! When someone finds out my password, then to repair the security breach, I have to change my password. When someone finds out the magic number which is the

RE: [U2] Uniobjects hack

2005-05-27 Thread Bill Haskett
. :-) Bill -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Richard Taylor Sent: Friday, May 27, 2005 8:09 AM To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack [snipped] 2) Convert the account to an SQL schema. You can then attach file level

Re: [U2] Uniobjects hack

2005-05-27 Thread Key Ally
All, The BetterBetter committee (got an idea for an improvement or fix? email [EMAIL PROTECTED]) has been listening in and kicking this around. Here's what we've come up with so far: UniData *has* a UOlogin functionality which will allow you to vett the user and decide if they can

RE: [U2] Uniobjects hack

2005-05-27 Thread Richard Taylor
:[EMAIL PROTECTED] On Behalf Of Richard Taylor Sent: Friday, May 27, 2005 8:09 AM To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack [snipped] 2) Convert the account to an SQL schema. You can then attach file level security via the SQL user. Just remember to create a security

Re: [U2] Uniobjects hack

2005-05-27 Thread Martin Phillips
UniData *has* a UOlogin functionality which will allow you to vett the user and decide if they can connect as a UO connection. You could build most of what you want in there. We haven't tested it on UniVerse, but I have the PE and UO set up, so if no one gets to it by Monday, I'll test it

Re: [U2] Uniobjects hack

2005-05-27 Thread Key Ally
Martin, Not true. Using UOlogin, I could run a filter and only allow a subset of the valid user list access. That would stop people from using telnet ids as UO ids. If you expand this to lock out some accounts to ALL UO logins, you can draw a box around the UO user. Now, if you said

RE: [U2] Uniobjects hack

2005-05-27 Thread James Canale, Jr.
I have looked at all of the documentation that I have and can't find ANY reference to UOLOGIN, UOlogin, ... Is this documented anywhere? I tried to create a simple PROC (UniData 6.1PE) and it doesn't execute on login. The interesting thing is that if I create and direct catalog a program

RE: [U2] Uniobjects hack

2005-05-27 Thread James Canale, Jr.
Chuck, Thanks! Regards, Jim -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Key Ally Sent: Friday, May 27, 2005 7:08 PM To: u2-users@listserver.u2ug.org Subject: Re: [U2] Uniobjects hack James, Here's a link on the IBM site. http

RE: [U2] Uniobjects hack

2005-05-27 Thread Ken Wallis
because I'm a consultant not a VAR/End User is frustrating! :-( Cheers, Ken -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Key Ally Sent: Saturday, 28 May 2005 9:08 AM To: u2-users@listserver.u2ug.org Subject: Re: [U2] Uniobjects hack James, Here's

RE: [U2] Uniobjects hack

2005-05-27 Thread Dave S
is frustrating! :-( Cheers, Ken -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Key Ally Sent: Saturday, 28 May 2005 9:08 AM To: u2-users@listserver.u2ug.org Subject: Re: [U2] Uniobjects hack James, Here's a link on the IBM site. h.x=50Search.y=11Search

RE: [U2] Uniobjects hack

2005-05-26 Thread colin.alfke
The most secure way would be to turn off the service. :) Of course, there are a couple of different ways a determined, advanced user could do to get access. Colin Alfke Calgary, Canada -Original Message- From: John Kent Does anyone have any suggestions on how to contain an advanced

Re: [U2] Uniobjects hack

2005-05-26 Thread Don Kibbey
Twiddle the PAM config file if your on unix so that services don't go through the user login process. Send them off to something else... I don't know of anyway to keep them out of a Windows system though. --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit

RE: [U2] Uniobjects hack

2005-05-26 Thread David Wolverton
] [mailto:[EMAIL PROTECTED] On Behalf Of Don Kibbey Sent: Thursday, May 26, 2005 8:36 AM To: u2-users@listserver.u2ug.org Subject: Re: [U2] Uniobjects hack Twiddle the PAM config file if your on unix so that services don't go through the user login process. Send them off to something else... I don't

Re: [U2] Uniobjects hack

2005-05-26 Thread Martin Phillips
This is a hole in the Uniobjects security. A user who has a valid username and password to access a Uniobjects application can write his own VB program to do almost anything; modify files, write VOC entries, upload, compile and run programs. Using o/s security is fine but the user will have

RE: [U2] Uniobjects hack

2005-05-26 Thread Tony Gravagno
Well, let's not put this all on UO. Almost all of the connectivity tools in our market were written without any thought of security. It's generally assumed that if you have a valid password to the system that you are authorized to use whatever means available to get in. What I don't like is

RE: [U2] Uniobjects hack

2005-05-26 Thread gerry-u2ug
Of Tony Gravagno Sent: Thursday, May 26, 2005 02:14 PM To: u2-users@listserver.u2ug.org Subject: RE: [U2] Uniobjects hack Well, let's not put this all on UO. Almost all of the connectivity tools in our market were written without any thought of security. It's generally assumed that if you have

RE: [U2] Uniobjects hack

2005-05-26 Thread Brian Leach
Just because this is a wider problem doesn't mean that UO shouldn't be called on it. So how would you go about it? UO is a tool for developers. As such, it's strength is that it is able to do anything a developer needs it to do. It is clean client/server middleware and so it can't launch a

Re: [U2] Uniobjects hack

2005-05-26 Thread Martin Phillips
So how can it tell the difference between a legitimate connection from a controlled application, and an illegitimate connection from e.g. a piece of VBScript hacked into notepad? The easy answer is that it cannot. We had to think very hard about this when we designed the equivalent of

Re: [U2] Uniobjects hack

2005-05-26 Thread fft2001
PROTECTED] To: u2-users@listserver.u2ug.org Sent: Thu, 26 May 2005 11:13:48 -0700 Subject: RE: [U2] Uniobjects hack Well, let's not put this all on UO. Almost all of the connectivity tools in our market were written without any thought of security. It's generally assumed that if you have a valid

RE: [U2] Uniobjects hack

2005-05-26 Thread Tony Gravagno
To answer both questions about unauthorized client access and then about encryption: Brian wrote: The only way is to add a new security layer to the server. I think the way to do this on the client side (wherever the UO DLL is kept and a connection initiated) is to have a separate DLL which

RE: [U2] Uniobjects hack {Unclassified}

2005-05-26 Thread HENDERSON MIKE, MR
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tony Gravagno Sent: Friday, 27 May 2005 12:15 To: u2-users@listserver.u2ug.org Subject: RE: [U2] UniObjects hack [snip] Gerry wrote: If you're not worried about every shmoe with a password

Re: [U2] Uniobjects hack

2005-05-26 Thread Steve Johnson
How about running a monitor program constantly in the background. It monitors all new logins to U2. The new login process must send a sleeping pill to the monitor within a short time after login -- short being relative to your system performance. If the monitor doesn't receive this sleeping pill