HP3000-L Archives

October 1998, Week 4

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
John Korb <[log in to unmask]>
Reply To:
John Korb <[log in to unmask]>
Date:
Tue, 27 Oct 1998 11:25:12 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (188 lines)
The Navy uses a modified system message catalog (set 2, messages 6005 and
6006).  By putting the logon message in the message catalog they are
guaranteed
that the message will be displayed even if the operator changes the WELCOME
message.  Also, while the Navy's login message is quite long (standard DOD
warning), the message catalog accomodates it quite well.  To give you some
idea
of its size, I've displayed the login message with following WELCOME message
(begins "Notice:") below.

CDA9:Hello Manager/xxxxxxxx.Sys/xxxxxxxx
******************************* (CDA9) ********************************
    WARNING ** CAUTION ** WARNING ** CAUTION ** WARNING ** CAUTION

THIS IS A DEPARTMENT OF DEFENSE COMPUTER SYSTEM.  THIS COMPUTER
SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS AND NETWORK DEVICES
(SPECIFICALLY INCLUDING INTERNET ACCESS), ARE PROVIDED ONLY FOR
AUTHORIZED U.S. GOVERNMENT USE.  DOD COMPUTER SYSTEMS MAY BE MONITORED
FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THAT THEIR USE IS
AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION
AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES,
SURVIVABILITY AND OPERATIONAL SECURITY.  MONITORING INCLUDES ACTIVE
ATTACKS BY AUTHORIZED DOD ENTITIES TO TEST OR VERIFY THE SECURITY OF
THIS SYSTEM.  DURING MONITORING, INFORMATION MAY BE EXAMINED,
RECORDED, COPIED AND USED FOR AUTHORIZED PURPOSES.  ALL INFORMATION,
INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT OVER THIS SYSTEM MAY
BE MONITORED.  USE OF THIS DOD COMPUTER SYSTEM, AUTHORIZED OR
UNAUTHORIZED, CONSTITUTES CONSENT TO MONITORING OF THIS SYSTEM.
UNAUTHORIZED USE MAY SUBJECT YOU TO CRIMINAL PROSECUTION.  EVIDENCE OF
UNAUTHORIZED USE COLLECTED DURING MONITORING MAY BE USED FOR
ADMINISTRATIVE, CRIMINAL OR ADVERSE ACTION.  USE OF THIS SYSTEM
CONSTITUTES CONSENT TO MONITORING FOR THESE PURPOSES.

    WARNING ** CAUTION ** WARNING ** CAUTION ** WARNING ** CAUTION
***********************************************************************

Notice:
CDA9 (this system) will be shut down for a reboot at 4:00 PM EST
today.  The system should be back up by 4:30 PM.  Please log off
prior to 4:00 PM.

Thank you.

CDA9[1]:

------------------
When modifying the system message catalog there are a couple of gotcha's to be
aware of.

1) Remember to use the proper continuation characters.
2) Use a record size of 72 bytes.  80 sometimes works, but sometimes it
   doesn't.
3) Don't put a continuation character ("&" or "%") in column 72 - it
   almost always causes a problem.
4) Some existing messages will cause you grief when you try to run MAKECAT
   against the catalog file.  Generally, the messages MAKECAT will object
   to are those in which there is a continuation line which begins with
   a number.
5) You must use MAKECAT,BUILD to install the catalog, then make a new
   SLT.
6) Before running MAKECAT,BUILD, make sure there are no errors in the
   new catalog.  Due to a bug in MPE/iX, you only get one attempt with
   MAKECAT,BUILD without having to reboot the system.

With dozens of systems, the Navy's system message catalogs have several other
messages changed in addition to the login messages shown above.  The messages
are modified to include the system name so that users connected to several
systems at a time can tell where they are and in the case of TELL and WARN
messages, which system the message came from.  Below is a portion of the
modified catalog showing most of the messages we modified.  Following those
messages is a listing of the login and logout messages we replaced showing the
original messages which we commented out and the new messages (with
continuation characters) we inserted.

8 FROM CDA9 OPERATOR: !
9 NMEV#100@230 CDA9 OPERATOR WARNING: !
53 (CDA9) ENTER GROUP (!) PASSWORD:
54 (CDA9) ENTER ACCOUNT (!) PASSWORD:
55 (CDA9) ENTER USER (!) PASSWORD:
80  (CDA9) CAN'T INITIATE NEW SESSIONS NOW
1402 (CDA9) EXPECTED HELLO, :JOB, :DATA, OR (CMD) AS LOGON.(CIERR 1402)
3 (CDA9) FROM/!/!
61 USER: #!      (IN BREAK, CDA9 SYSTEM)
70 USER: #!      (NOT IN BREAK, CDA9 SYSTEM)
76 USER: #!       (IN PROGRAM, CDA9 SYSTEM)

<snip>

6005 &
******************************* (CDA9) ********************************%
    WARNING ** CAUTION ** WARNING ** CAUTION ** WARNING ** CAUTION %
 %
THIS IS A DEPARTMENT OF DEFENSE COMPUTER SYSTEM.  THIS COMPUTER %
SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS AND NETWORK DEVICES %
(SPECIFICALLY INCLUDING INTERNET ACCESS), ARE PROVIDED ONLY FOR %
AUTHORIZED U.S. GOVERNMENT USE.  DOD COMPUTER SYSTEMS MAY BE MONITORED %
FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THAT THEIR USE IS %
AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION %
AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES, %
SURVIVABILITY AND OPERATIONAL SECURITY.  MONITORING INCLUDES ACTIVE %
ATTACKS BY AUTHORIZED DOD ENTITIES TO TEST OR VERIFY THE SECURITY OF %
THIS SYSTEM.  DURING MONITORING, INFORMATION MAY BE EXAMINED, %
RECORDED, COPIED AND USED FOR AUTHORIZED PURPOSES.  ALL INFORMATION, %
INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT OVER THIS SYSTEM MAY %
BE MONITORED.  USE OF THIS DOD COMPUTER SYSTEM, AUTHORIZED OR %
UNAUTHORIZED, CONSTITUTES CONSENT TO MONITORING OF THIS SYSTEM.  %
UNAUTHORIZED USE MAY SUBJECT YOU TO CRIMINAL PROSECUTION.  EVIDENCE OF %
UNAUTHORIZED USE COLLECTED DURING MONITORING MAY BE USED FOR %
ADMINISTRATIVE, CRIMINAL OR ADVERSE ACTION.  USE OF THIS SYSTEM %
CONSTITUTES CONSENT TO MONITORING FOR THESE PURPOSES.%
 %
    WARNING ** CAUTION ** WARNING ** CAUTION ** WARNING ** CAUTION %
***********************************************************************
$ 6006 !.%
$ HP3000  Release:!   User Version:!%
$ MPE/iX  HP31900 !  Copyright Hewlett-Packard 1987.%
$ All rights reserved.
6006 %
******************************* (CDA9) ********************************%
    WARNING ** CAUTION ** WARNING ** CAUTION ** WARNING ** CAUTION %
 %
THIS IS A DEPARTMENT OF DEFENSE COMPUTER SYSTEM.  THIS COMPUTER %
SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS AND NETWORK DEVICES %
(SPECIFICALLY INCLUDING INTERNET ACCESS), ARE PROVIDED ONLY FOR %
AUTHORIZED U.S. GOVERNMENT USE.  DOD COMPUTER SYSTEMS MAY BE MONITORED %
FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THAT THEIR USE IS %
AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION %
AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES, %
SURVIVABILITY AND OPERATIONAL SECURITY.  MONITORING INCLUDES ACTIVE %
ATTACKS BY AUTHORIZED DOD ENTITIES TO TEST OR VERIFY THE SECURITY OF %
THIS SYSTEM.  DURING MONITORING, INFORMATION MAY BE EXAMINED, %
RECORDED, COPIED AND USED FOR AUTHORIZED PURPOSES.  ALL INFORMATION, %
INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT OVER THIS SYSTEM MAY %
BE MONITORED.  USE OF THIS DOD COMPUTER SYSTEM, AUTHORIZED OR %
UNAUTHORIZED, CONSTITUTES CONSENT TO MONITORING OF THIS SYSTEM.  %
UNAUTHORIZED USE MAY SUBJECT YOU TO CRIMINAL PROSECUTION.  EVIDENCE OF %
UNAUTHORIZED USE COLLECTED DURING MONITORING MAY BE USED FOR %
ADMINISTRATIVE, CRIMINAL OR ADVERSE ACTION.  USE OF THIS SYSTEM %
CONSTITUTES CONSENT TO MONITORING FOR THESE PURPOSES.%
 %
    WARNING ** CAUTION ** WARNING ** CAUTION ** WARNING ** CAUTION %
***********************************************************************
$ 6007 CPU=!. Connect=!. !.
6007 CPU Seconds Used: !%
Connect Minutes Used: !%
CDA9 Session Ended !
6009 JOB !.
6010 Job number = #j!.
$ 6011 CPU sec. = !.  elapsed min. = !.  !.
6011 CPU Seconds Used: !%
Elapsed Time (Minutes): !%
CDA9 Job Ended !

Hope this helps!

John


At 10/27/98 05:45 AM , Mike Nicholson wrote:
>Hello all,
>
>We've recently implemented a pre-logon screen on our HP-UX machines which
>gives a warning regarded unauthorised access etc..
>
>Is there a way this can be acheived on MPE? . Is there a process that is
>called just before the system prompt is displayed that can be interrupted &
>a message inserted?
>
>Thanks in advance for any info,
>
>Mike
>
>
>
>
>Mike Nicholson
>email: [log in to unmask]
>tel: (+32) 2 6416850
>gsm: 075 90 51 65
>

--------------------------------------------------------------
John Korb                            email: [log in to unmask]
Innovative Software Solutions, Inc.

The thoughts, comments, and opinions expressed herein are mine
and do not reflect those of my employer(s), or anyone else.

ATOM RSS1 RSS2