Solutions Newsletter - Summer 2006 - Volume 11 Issue 2

Process Software's Nigerian Email Scammer Research Makes Headlines back to top

Process Software published its first in a series of articles documenting the infamous Nigerian email scam. The article includes how it works, who is behind it, and why it has been so successful at defrauding victims for over a decade. Several media outlets have contacted us for interviews on this fascinating subject. You can see us on a replay of a live TV interview on the Jim Pillsbury show along with several articles by going to http://www.process.com/precisemail/inthenews.html

Read the second in a series of articles on Exposing Nigerian Email Scammers back to top

The second article in the series on Exposing Nigerian Email Scammers has just been posted to our website. In this article, see how a scammer known as Mr. Zakaharenko seeks our help with a 100 million dollar transaction. A Process Software engineer responded to this offer by impersonating a naïve email user hoping to receive personal financial gain. http://www.process.com/techsupport/Exposing_419_2.pdf

Process Software Roadmap Update back to top

PMDF v6.3 is now shipping. The new release includes support for Integrity, Solaris 10, and LDAP authentication against Active Directory. Planning for the next release is currently under way.

PreciseMail Anti-Spam Gateway v2.4 will be released in the September timeframe. Beta testing will begin in late July. The following new features are planned for this release:

A beta sign-up form will be posted to our website as well as sent to the "pmas-announce" list in a few weeks.

MultiNet v5.2 will be released in Q1 2007. The beta test will begin in Q4 2006. The following new features are planned for this release:

SSH for OpenVMS v2.3 and TCPware SSH new feature eco will be released in Q1 2007. The following new features are planned for this release:

TCPware 5.8 will be released in Q2 2007. Beta is scheduled to begin in Q1 2007. The following new features are planned for this release:

VMS Authentication Module Now Supports LDAP back to top

Process Software’s VMS Authentication Module provides an added layer of security for protecting mission critical applications running on OpenVMS. The first authentication method introduced several months ago was RSA SecurID Agent. Now organizations can access an LDAP database securely from their OpenVMS systems on Alpha v6.2 or higher, VAX v7.3 or higher, or Integrity v8.2 or higher. For a free trial, send an email with your requirements to sales@process.com or call (508)879-6994.

Process Software Website Enhancement Plans back to top

Look for improvements and new services on our website in the coming months including RSS feed product announcements, discussion groups, and Podcasts. We will also be upgrading our technical support web pages with better navigation and search capabilities.

SSH Solutions Update back to top

Process Software provides leading edge SSH solutions in TCPware, MultiNet, and SSH for OpenVMS. You will find updated information such as an SSH Feature comparison (vs. HP’s SSH solution on OpenVMS), a Quick Reference Guide, and a Technical Solution Overview at http://www.process.com/tcpip/sshsolutions.html

Survey Response - How customers use MultiNet and TCPware back to top

In our last issue of the Solutions Newsletter, we asked you to complete a survey which included a question on which MultiNet and TCPware features you currently use. Here are the responses:

Events back to top
Patch Corner back to top

Check out the recommended patch list on our website. Here is a list for the past 60 days:

MultiNet v5.1
1. KERNEL-UPDATE-092 - Correct an error that can cause a system crash
Release date - May 11

2. SSH-030_A051 - Assorted fixes
Release date - June 2

MultiNet v5.0
ssh-060_A050
- Assorted fixes
Release date - June 2

MultiNet v4.4
ssh-120_a044 - Assorted fixes
Release date - June 2

TCPware v5.7-2
1. NETCP V572P010 - Correct IP-over-DECNET failure
Release date - April 20

2. SSH_V572P020 - Assorted fixes
Release date - June 2

TCPware v5.6-2
ssh_v562p090 - Assorted fixes
Release date - June 2

SSH for OpenVMS v2.2
SSHVMS-030_A022 -
Assorted fixes
Release date - June 2

PMDF v6.3 - June 1
In an attempt to resolve the various issues that have been reported with PMDF V6.3 on VMS/Alpha with running out of quota and RMS-F-BUG, etc, we have rebuilt PMDF V6.3 for VMS/Alpha only with the UPCALLS flag turned off.

This kit is available on our ftp site. Please contact Process support for download instructions.

FAQs back to top

PreciseMail Anti-Spam Gateway

Q. What ports need to be open for PreciseMail Anti-Spam Gateway to work?

A. Open TCP ports between 8050 and 8100 for outgoing access to updates.pmas.process.com

PMDF

Q. All of PMDF received mail needs to be archived for future retrieval in case of litigation? Is there any way to do that?

A. The MESSAGE-SAVE-COPY mapping table can be used to make copies of mail as it is removed from channels if you are running PMDF on OpenVMS, Solaris, or Tru64 UNIX. Customers can then run batch jobs nightly to ZIP and move it all off the system.

Q. Can I prevent the PMDF mail gateway from delivering mail to our exchange server while PMDF still receives incoming mail by stopping the dedicated channel or by some other means?

A. On VMS, you can do that by defining the logical PMDF_HOLD to specify the channel(s) you want to hold/stop:

 $ define/system/exec pmdf_hold channelname 

On all platforms you can add the "slave" keyword to the channel that is delivering mail to Exchange.

Q. Is there a tool to trace a particular message in the PMDF mail log?

A. Use the LOG_CONDENSE utility. It scans the MAIL.LOG file, combining the two or more lines, which describe a single message into a single one-line summary.

You can find the LOG_CONDENSE utility in the PMDF System Manager's Guide, Chapter 32 (Monitoring).

SSH – MultiNet, TCPware, and SSH for OpenVMS

Q. I need to set up the SFTP2 transfer to work from a batch job. I'm not seeing an equivalent to the /PASSWORD qualifier that we were using with normal FTP and the documentation doesn't seem to speak to the issue. Is there a recommended methodology for supplying the password in batch mode?

A. Password authentication cannot be used by SSH, SFTP, or SCP when in batch mode. You will have to use a non-interactive authentication method, most likely public key authentication. To set up public key authentication you will need to create a key pair -

 $ multinet sshkeygen/ssh2/keys=[.ssh2]corbett/nopass
   Generating 1024-bit dsa key pair
   8 .oOo.oOo.ooO
   Key generated.
   1024-bit dsa, corbett@darth.process.com, Tue Apr 18 2006 12:48:50
   Private key saved to [.SSH2]CORBETT
   Public key saved to [.SSH2]CORBETT.pub

You can create an identification. file in the [.ssh2] directory, or edit the existing one and add an idkey line to it. This instructs the client to use the key specified during authentication -

 $ create [.ssh2]identification.
   idkey corbett
 <ctl-z>

Copy the public key to the server. I use scp in the example below -

 $ scp [.ssh2]corbett.pub "corbett@gondor.process.com::corbett.pub"
   Keyboard-interactive:
   Password:
   corbett.pub | 747B | 0.7 kB/s | TOC: 00:00:01 | 100%

You then have to configure the server to use the public key for authentication. If you are using our server you would put the .pub file in the user's [.ssh2] subdirectory and then add a key line to the [.ssh2]authorization. file like the following -

key corbett.pub

If it is a Unix server and is running an OpenSSH server then the key will have to be converted. Here is an example using SSH to convert the key that was just sent over and append it to the user's authorized_keys file -

 $ ssh "corbett@gondor.process.com" ssh-keygen -i -f corbett.pub >> .ssh/authorized_keys
   Keyboard-interactive:
   Password:
   Authentication successful.

The ssh-keygen command might be different depending on the version of the OpenSSH software. Check the man pages for the specific option to convert the key to the OpenSSH format. In the example above it is the -i option:

-i This option will read an unencrypted private (or public) key
file in SSH2-compatible format and print an OpenSSH compatible
private (or public) key to stdout. ssh-keygen also reads the
SECSSH Public Key File Format. This option allows importing
keys from several commercial SSH implementations.

Now you can use SSH, SFTP, or SCP commands without using a password -

 $ ssh "corbett@gondor.process.com" date
   Authentication successful.
   Tue Apr 18 14:47:40 EDT 2006

To use SFTP in a command procedure you will probably want to use the /batchfile= qualifier and put the SFTP commands in there. For example -

 $ create sftp.take
   get file.log
   rm file.log
 <Ctl-z>
   $ sftp/batch_file=sftp.take "corbett@gondor.process.com"
   sftp> get file.log
   file.log | 25B | 0.0 kB/s | TOC: 00:00:01 | 100%
   sftp> rm file.log
   sftp> exit
     

MultiNet

Q. How do I setup HOST BASED authentication so that any user can SSH without using a password? This is system based authentication rather than user based.

A. You should already have HOST keys on your system if SSH has been started and working.

1. On the client system you should have:

 "MULTINET_SSH2_HOSTKEY_DIR" = "MULTINET_SPECIFIC_ROOT:[MULTINET.SSH2.HOSTKEYS]" 
   $   dir MULTINET_SSH2_HOSTKEY_DIR 
   Directory MULTINET_SPECIFIC_ROOT:[MULTINET.SSH2.HOSTKEYS] 
   HOSTKEY.;1 HOSTKEY.PUB;1 

These are your HOST keys.

2. Copy the public key (HOSTKEY.PUB) to the server and place it where the logical below points:

 "MULTINET_SSH2_KNOWNHOSTS_DIR" = "MULTINET_SPECIFIC_ROOT:[MULTINET.SSH2.KNOWNHOSTS]" 
   $   dir MULTINET_SSH2_KNOWNHOSTS_DIR 
   Directory MULTINET_SPECIFIC_ROOT:[MULTINET.SSH2.KNOWNHOSTS] 
   HOSTKEY.PUB;1 

3. Make a copy of the public key (HOSTKEY.PUB) into the format of: clienthostname_domain_ssh-dss.pub. So in the case where my system name is NODENAME.PROCESS.COM you see the result below:

 $ dir MULTINET_SSH2_KNOWNHOSTS_DIR 
     Directory MULTINET_SPECIFIC_ROOT:[MULTINET.SSH2.KNOWNHOSTS] 
     NODENAME_PROCESS_COM_SSH-DSS.PUB;1       HOSTKEY.PUB;1 

4. On the server add HOSTBASED to your authentication methods into SSH2_DIR:SSHD2_CONFIG.:

AllowedAuthentications hostbased, publickey, password 

5. On the server add the DNS name of the client to MULTINET:HOSTS.EQUIV:

 $ type hosts.equiv 
     nodename.process.com 

Contacting Process Software

E-mail:
info@process.com - General information
sales@process.com - Sales
international@process.com - International Sales information
support@process.com - Technical Support
careers@process.com - Human Resources
webmaster@process.com - Webmaster

Phone/Fax/Address:
U.S.A./Canada - (800)722-7770

International - (508)879-6994

Fax - (508)879-0042

Mail:
959 Concord Street
Framingham, MA 01701-4682


Home > Newsletters > Summer 2006 - Volume 11 Issue 2

Search: