HP OpenVMS Guide to System Security |
Security for the User |
Using the System Responsibly |
|
|
| |
Logging Out Without Compromising System Security
Log out when you leave your office even for a brief period of time. If you have performed remote logins, you must log out of each node. The following sections describe security considerations for logging out of specific types of terminals or sessions.
Clearing Your Terminal Screen ![]()
You may want to clear your screen each time you log out from
a terminal to ensure that your user name, node name, and operating
system are not revealed to anyone else. If you are logging out after
a remote login, the name of the node to which you return (the local
node) is also revealed. If you access multiple accounts remotely
(over the network), the final sequence of logout commands reveals
all the nodes and user names that are accessible to you on each
node (excluding the name of the furthest node reached). To those
who can recognize the operating system from the prompt or a logout
message, these displays also reveal the operating system.
At some sites, it may be important to leave nothing but the logout message on your screen, as follows:
After the screen clears, the cursor is positioned at the top of the screen, next to the DCL prompt. Enter the DCL command LOGOUT at the prompt. The only information remaining after you log out is your logout command and the logout completion message, for example:
$LOGOUTRDOGWOOD logged out at 14-AUG-2001 19:39:01.43
Disposing of Hardcopy Output ![]()
After you log out from a hardcopy terminal, properly remove,
file, or dispose of all hardcopy output that might reveal sensitive
information. Your security administrator should provide direction
on preferred procedures. Many sites use paper shredders or locked
receptacles for this purpose. Handle output that you plan to save just
as carefully.
You should also dispose of hardcopy output if the system fails before you log out. In addition, if you will not be present when the system is initialized, turn your terminal off.
Removing Disconnected Processes ![]()
The system automatically removes your disconnected processes
after a certain interval. You can conserve system resources, however,
if you directly log out of any disconnected processes, as follows:
Breaking the Connection to a Dialup Line ![]()
Your security administrator may ask you to break the connection
to a dialup line when you log out. If you anticipate no further
immediate use of the line, use the LOGOUT command with the /HANGUP
qualifier. The /HANGUP qualifier directs the system to automatically
break the connection to the dialup line after you log out.
| The effectiveness of the /HANGUP qualifier depends on how your system manager configures your modem line and how the line connects to the computer. It does not work on lines connected to a terminal server. |
This practice also saves resources by reducing the required number of dialup lines.
Turning Off a Terminal ![]()
If your site has moderate or high security requirements, your
security administrator may ask you to turn off your terminal after
logging out. This resets terminal characteristics and clears memory
buffers. Some Trojan horse attacks use hardware frame buffers and
the answerback capabilities that are built into newer terminals.
On VAX systems, users working in a C2 environment must turn off their terminals. (C2 is a United States government rating of the security of an operating system. Running an OpenVMS System in a C2 Environment describes its requirements.)
|
|