Copy Link
Add to Bookmark
Report

Phrack Inc. Volume 05 Issue 45 File 15

eZine's profile picture
Published in 
Phrack Inc
 · 5 years ago

  

==Phrack Magazine==

Volume Five, Issue Forty-Five, File 15 of 28

****************************************************************************

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Some Helpful VAX/VMS utilities

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Introduction :
^^^^^^^^^^^^
This article contains a brief introduction to some not so often used
utilities, found on the Virtual Address eXtentions/ Virtual Memory System or
better known to us as the VAX/VMS.

Please note that this file is meant for the so called VMS "newbies". It gives
an insight to the processes that are running in the different "Hibernation"
states on VMS, quite similar to the background processes running on UNIX and
its clones. If you have "extensive" experience on VMS as a systems programmer
or a SysOp, you might want to skip it !!

Portions of this file are taken from the ever blabbering VMS HELP, which is
where many of us, myself included, learn about the VAX/VMS. VMS has lots of
secrets. Locations of "hidden" files are a very well kept secret, known
not even to the SysOp but only to the system programmer.

Ok.... Lets get started...


SHOW SYSTEM :
^^^^^^^^^^^
This command ($Show system) will display information about the
status of the processes running on the system.
There are various options to this command, some of which are listed below.


/BATCH /CLUSTER /FULL /NETWORK /NODE /OUTPUT
/PROCESS /SUBPROCESS




1. $ SHOW SYSTEM

VAX/VMS 5.4 on node DARTH 19-APR-1990 17:45:47.78 Uptime 2 21:53:59
Pid Process Name State Pri I/O CPU Page flts Ph.Mem
27400201 SWAPPER HIB 16 0 0 00:29:52.05 0 0
27401E03 DOCBUILD LEF 4 37530 0 00:05:47.62 96421 601
27402604 BATCH_789 LEF 4 3106 0 00:00:48.67 4909 2636 B
27401C05 BATCH_60 LEF 6 248 0 00:00:06.83 1439 1556 B
27400207 ERRFMT HIB 8 6332 0 00:00:41.83 89 229
27400208 CACHE_SERVER HIB 16 2235 0 00:00:05.85 67 202
27400209 CLUSTER_SERVER HIB 8 4625 0 00:22:13.28 157 448
2740020C JOB_CONTROL HIB 10 270920 0 01:07:47.88 5163 1384
2740020D CONFIGURE HIB 9 125 0 00:00:00.53 104 264
.
.
.
27400E8D Sir Lancelot LEF 5 226 0 00:00:07.87 4560 697
2740049A Guenevere LEF 4 160 0 00:00:02.69 534 477
27401EA0 BATCH_523 CUR 4 4 17470 0 03:25:49.67 8128 5616 B
274026AF GAWAIN CUR 6 4 14045 0 00:02:03.24 20032 397
274016D5 GAHERIS LEF 6 427 0 00:00:09.28 5275 1384
27401ED6 knight_1 HIB 5 935 0 00:00:10.17 3029 2204 S
274012D7 BATCH_689 LEF 4 49216 0 00:14:18.36 7021 3470 B
274032D9 DECW$MAIL LEF 4 2626 0 00:00:51.19 4328 3087 B
274018E3 SERVER_0021 LEF 6 519 0 00:00:07.07 1500 389 N
274016E8 NMAIL_0008 HIB 4 10955 0 00:00:55.73 5652 151
274034EA MORDRED LEF 4 2132 0 00:00:23.85 5318 452
274022EB S. Whiplash CUR 6 4 492 0 00:00:12.15 5181 459
274018EF DwMail LEF 5 121386 0 00:28:00.97 7233 4094
27401AF0 EMACS$RTA43 LEF 4 14727 0 00:03:56.54 8411 4224 S
27400CF4 TRISTRAM HIB 5 25104 0 00:06:07.76 37407 1923
274020F5 Morgan LEF 7 14726 0 00:02:10.74 34262 1669
27400CF6 mr. mike LEF 9 40637 0 00:05:15.63 18454 463

The information in this example includes the following:

o Process identification (PID) code-A 32-bit binary value that
uniquely identifies a process.

o Process name-A 1- to 15-character string used to identify a
process.

o Process state-The activity level of the process, such as COM
(computing), HIB (hibernation), LEF (local event flag) wait,
or CUR (if the process is current). If a multiprocessing
environment exists, the display shows the CPU ID of the
processor on which any current process is executing.

Note that the SHOW SYSTEM command examines the processes on
the system without stopping activity on the system. In this
example process information changed during the time that the
SHOW SYSTEM command collected the data to be displayed. As
a result, this display includes two processes, named GAWAIN
and S. Whiplash, with the state CUR on the same CPU, CPU ID
6 in the example.

o Current priority-The priority level assigned to the process
(the higher the number, the higher the priority).

o Total process I/O count-The number of I/O operations
involved in executing the process. This consists of both
the direct I/O count and the buffered I/O count.

o Charged CPU time-The amount of CPU time that a process has
used thus far.

o Number of page faults-The number of exceptions generated by
references to pages that are not in the process's working
set.

o Physical memory occupied-The amount of space in physical
memory that the process is currently occupying.

o Process indicator-Letter B indicates a batch job; letter
S indicates a subprocess; letter N indicates a network
process.

o User identification code (UIC)-An 8-digit octal number
assigned to a process. This number is displayed only if the
/FULL qualifier is specified.



2. $ SHOW SYSTEM /CLUSTER


VAX/VMS V5.4 on node APPLE 19-APR-1990 09:09:58.61 Uptime 0 2:27:11
Pid Process Name State Pri I/O CPU Page flts Ph. Mem
31E00041 SWAPPER HIB 16 0 0 00:00:02.42 0 0
31E00047 CACHE_SERVER HIB 16 58 0 00:00:00.26 80 36
31E00048 CLUSTER_SERVER CUR 9 156 0 00:00:58.15 1168 90
31E00049 OPCOM HIB 7 8007 0 00:00:33.46 5506 305
31E0004A AUDIT_SERVER HIB 9 651 0 00:00:21.17 2267 22
31E0004B JOB_CONTROL HIB 10 1030 0 00:00:11.02 795 202

.
.

The SHOW SYSTEM command in this example shows all processes on
all nodes of the cluster.


3. $ SHOW SYSTEM /NODE=NEON
VAX/VMS V5.4 on node NEON 19-APR-1990 09:19:15.33 Uptime 0 02:29:07
Pid Process Name State Pri I/O CPU Page flts Ph. Mem
36200041 SWAPPER HIB 16 0 0 00:00:12.03 0 0
36200046 ERRFMT HIB 8 263 0 00:00:05.89 152 87
36200047 CACHE_SERVER CUR 16 9 0 00:00:00.26 80 51
36200048 CLUSTER_SERVER CUR 8 94 0 00:00:30.07 340 68
36200049 OPCOM HIB 6 2188 0 00:02:01.04 1999 177
3620004A AUDIT_SERVER HIB 10 346 0 00:00:10.42 1707 72
.
.
.


The SHOW SYSTEM command in this example shows all processes on
the node NEON.


----- X -----

So now that we beat the SHOW SYSTEM command to death, lets take on another
command. Hmmm..let's see..Ahhhaaaa the MONITOR SYSTEM !!!!!

This is a pretty neat command and one of my favorite "play" commands. Don't
get me wrong, there's a lot to be learned from "play" commands like these.
It really gives us some useful information. The reason why I like this
utility is because it gives a GRAPHICAL representation of the
data given by the SHOW SYSTEM. I would have included a short example
of the graphics, but not everyone receiving this article would be running
VMS on a terminal with ANSI emulation. So, if you want to see the ANSI
graphics, follow my instructions...


MONITOR

Invokes the VMS Monitor Utility (MONITOR) to monitor classes of
system-wide performance data at a specified interval. It produces
three types of optional output:

o Recording file
o Statistical terminal display
o Statistical summary file

You can collect data from a running system or from a previously created
recording file.

You can execute a single MONITOR request, or enter MONITOR interactive
mode to execute a series of requests. Interactive mode is entered when
the MONITOR command is issued with no parameters or qualifiers.

A MONITOR request can be terminated by pressing CTRL/C or CTRL/Z. CTRL/C
causes MONITOR to enter interactive mode; CTRL/Z returns to DCL.


The MONITOR Utility is described in detail in the VMS Monitor Utility
Manual.

Format:
MONITOR class-name[,...]

There are quite a few different options available for the MONITOR utility.
We are not going to get into too much detail about each option, but I will
take the time to discuss a few. The different options for MONITOR are....

ALL_CLASSES CLUSTER DECNET DISK DLOCK FCP
FILE_SYSTEM_CACHE IO LOCK MODES MSCP_SERVER
PAGE POOL PROCESSES RMS SCS STATES SYSTEM
TRANSACTION VECTOR
/BEGINNING /BY_NODE /COMMENT /DISPLAY /ENDING /FLUSH_INTERVAL
/INPUT /INTERVAL /NODE /RECORD /SUMMARY /VIEWING_TIME
/ALL /AVERAGE /CPU /CURRENT /FILE /ITEM /MAXIMUM


MONITOR Parameter class-name[,...]

Specifies one or more classes of performance data to be monitored.
The available class-names are:

ALL_CLASSES All MONITOR classes.
CLUSTER Cluster wide information.
DECNET DECnet-VAX statistics.
DISK Disk I/O statistics.
DLOCK Distributed lock management statistics
FCP File system primitive statistics.
FILE_SYSTEM_CACHE File system caching statistics.
IO System I/O statistics.
LOCK Lock management statistics.
MODES Time spent in each of the processor modes.
MSCP_SERVER MSCP Server statistics
PAGE Page management statistics.
POOL Space allocation in the nonpaged dynamic pool.
PROCESSES Statistics on all processes.
RMS VMS Record Management Services statistics
SCS System communication services statistics.
STATES Number of processes in each scheduler state.
SYSTEM System statistics.
TRANSACTION DECdtm services statistics.
VECTOR Vector Processor scheduled usage.


MONITOR

/ALL

Specifies that a table of current, average, minimum, and maximum
statistics is to be included in display and summary output.

/ALL is the default for all class-names except MODES, STATES and
SYSTEM. It may not be used with the PROCESSES class-name.


---- X ----

Well, I hope this little file helps a few people out, by providing them
with a better understanding of the background processes running on the system
and by providing a better perception of the amount of CPU and I/O time taken
by each process.




DARTH VADER


P.S : Look for a file on ACL (Access Control Listing) in the near future.

------------------------------------------------------------------------------

----------------------------
VAX/VMS AUTHORIZATION SYSTEM
----------------------------

Introduction:
------------

Well, since Phrack issues containing VMS articles are pretty rare I will
examine in deep the authorization sub-system on VAXes.

Keep in mind that I will take under consideration that you are probably
under some new VMS version (5.5-X). If you are on some older VMS, don't
worry, commands are the same, just some flags and display was added on
later versions. The knowledge of the authorization sub-system is of great
importance for a VAX hacker since he must keep himself an access to the
system, and this is the right way to do it.

Also keep in mind that this is just a practical guide oriented to a hacker's
needs and was done to be understandable by and useable by everybody,
even those who are not so familiar with VMS. That's why I included some
references to VMS filesystem, privileges, etc.

AUTHORIZE:
---------

The authorization subsystem is the one that will let you create accounts
under the VMS operating system. The command you need to execute is the:

SYS$SYSTEM:AUTHORIZE.EXE

What do you need to execute that program ?

READ/WRITE PRIVS over SYSUAF.DAT
EXECUTE PRIVS over SYS$SYSTEM:AUTHORIZE.EXE

How can you check if you got all needed to start creating accounts ?

DIR SYS$SYSTEM:AUTHORIZE.EXE/FULL

Directory SYS$SYSROOT:[SYSEXE] <----- Directory you are listing

AUTHORIZE.EXE;1 File ID: (2491,5,0)
Size: 164/165 Owner: [SYSTEM] <---- Owner is Sys Manager
Created: 20-JUL-1990 08:30:34.18 <------- Creation Date of program
Revised: 17-AUG-1992 09:45:36.31 (4) <------ Last modification over program
Expires: <None specified> <---- No expiration, will last for ever
Backup: <No backup recorded>
File organization: Sequential
File attributes: Allocation: 165, Extend: 0, Global buffer count: 0
No version limit, Contiguous best try
Record format: Fixed length 512 byte records <--- record organization
Record attributes: None
RMS attributes: None
Journaling enabled: None
File protection: System:RWED, Owner:RWED, Group:R, World: <---- (*)
Access Cntrl List: None
Total of 1 file, 164/165 blocks.

(*) This is the field that will tell if you are authorized to execute the
program. In this case if you own a privileged account you
can run it. That doesn't mean that you will be able to view/modify
any account found on the SYSUAF.DAT. But 95 % of the time any user
can execute the AUTHORIZE program even if you don't have READ privilege
on the SYS$SYSTEM directory. That means that if you do a :

DIR SYS$SYSTEM

and you find that you don't have the privilege to view the files contained
in that directory you may still be able to execute the AUTHORIZATION
subsystem, of course, you have a real low chance of getting the SYSUAF.DAT
read or modified.

If you find that the authorize program cannot be executed a good method is
to send it UUENCODED from another VAX where you *DO* have at least read access
to SYS$SYSTEM:AUTHORIZE.EXE . If you are working on the X-25's you can send
it via PSI mailing. If you are on the Internet, just send it using the
normal mail routing method to the user on the VAX you want the AUTHORIZE.EXE
to get executed by. Once you get it just UUDECODE it and place it in your
SYS$LOGIN directory and execute it!.

The authorize will work as a module, and won't try to overlay any other module
to make it work correctly. If you can run the authorize you should receive :

"UAF>" prompt.

THE SYSUAF.DAT:
--------------

The SYSUAF.DAT is the most important file of the authorization subsystem.
All the accounts are stored here with their :

- PASSWORDS (encrypted)
- ENVIRONMENT
- DIR
- privileges
- RIGHTS OVER THE FILES
... and more

The SYSUAF.DAT is somehow like the /etc/passwd file on Unix OS.
Under UNIX you can take the password file and with an editor add yourself
an account or modify an existing one without problem. Well this is not
possible under VMS. You need a program that knows SYSUAF.DAT record structure
(like AUTHORIZE) to take action over accounting system.

The main difference is that the SYSUAF.DAT is not a PLAIN TEXT FILE, its
a binary file structured to be read only by the AUTHORIZE program.
Another main difference is that is not world readable, can usually be only
read from high privileged accounts or from accounts which can override
system protection flags (will talk about this later).

The SYSUAF.DAT can be found in the same directory as the AUTHORIZE.EXE
program, the SYS$SYSTEM. You will usually find a few versions of this file
but normally with the same protections as the working one.
What can be interesting is that you can usually find files produced by the
output of the LIST command (under AUTHORIZE) which can be WORLD readable where
you will have all the accounts listed with the OWNER/DIR/PRIVS..etc. That will
help you a lot to try to hack some accounts if you still can't run authorize.
Those files are called normally: SYSUAF.LIS, and you might find more than
just one of them. Of course try to get the latest one since the older
ones will contain some expired/deleted accounts.

To check what privilege you have over the SYSUAF.DAT issue :

DIR SYS$SYSTEM:SYSUAF.DAT/FULL

Directory SYS$COMMON:[SYSEXE]
SYSUAF.DAT;1 File ID: (228,1,0)
Size: 183/183 Owner: [SYSTEM]
Created: 20-JUL-1990 08:30:21.50
Revised: 14-JAN-1994 03:33:27.75 (34812) <--- Last Creation/Modification
Expires: <None specified>
Backup: <No backup recorded>
File organization: Indexed, Prolog: 3, Using 4 keys
In 3 areas
File attributes: Allocation: 183, Extend: 3, Maximum bucket size: 3
Global buffer count: 0, No version limit
Contiguous best try
Record format: Variable length, maximum 1412 bytes
Record attributes: None
RMS attributes: None
Journaling enabled: None
File protection: System:RWED, Owner:RWED, Group:R, World: (*)
Access Cntrl List: None

Total of 1 file, 183/183 blocks.

In this case, if you are under a standard user account you won't be
able to READ or/and WRITE the SYSUAF.DAT. So when you will execute the
AUTHORIZE program, it will quit and kick you back to shell.
IF you have World : R, you will be able to LIST/SHOW accounts.
IF you have World : RW, you will be able to CREATE/MODIFY accounts.

But if you happen to have SYSPRIV you will be able CREATE/MODIFY the
SYSUAF.DAT at your pleasure! Since you can override the system protection
that has been imposed over that file. Of course, if you have SETPRV
privilege you have ALL privilege, and you can do whatever you want
with the VAX.

Privileges needed to CREATE/MODIFY accounts :

Process privileges:
*SETPRV may set any privilege bit
Explanation: With this only you can assign yourself all the privileges you
need with a SET PROC/PRIVS=ALL.

*SYSPRV may access objects via system protection
Explanation: If you have this one you will be able to read the SYSUAF.DAT.

*BYPASS may bypass all object access controls
Explanation: If you have this one you can read the SYSUAF.DAT since
all the objects (ie:files) will be made accessible to you. I suggest that
if you happen to have some problems, change the files access flags to
let it be WORLD (you) readable/writable. So use :

SET FILE/PROT=(w:rwed) SYS$SYSTEM:SYSUAF.DAT

*READALL may read anything as the owner
Explanation: Well this is obvious, SYSUAF.DAT will be read without problems
but of course you won't be able to CREATE/MODIFY accounts to your pleasure.
At least you can LIST/SHOW all the accounts as deep as you want.

Entering AUTHORIZE:
------------------
Once you've executed AUTHORIZE you will receive its main prompt:

RUN SYS$SYSTEM:AUTHORIZE

UAF>

UAF stands for User Authorization File.

First of all you will first need to get a list of all the accounts on the
system with some of their settings also. To do this issue the command:

UAF>SHOW USERS/BRIEF

Owner Username UIC Account Privs Pri Directory

ALLIN1V24CREATED A1$XFER_IN [660,1] Normal 4 Disuser
ALLIN1V24CREATED A1$XFER_OUT [660,2] Normal 4 Disuser
JOHN_FAVORITE JFAVORITE [300,2] LEDGER Devour 4 DEV$DUA2
:[ABDURAHMAN]

IBRAHIM ALBHIR ALBHIR [60,111] GOTVOT Normal 4 DUA2:[ALB
HIR]

ALGHAMDI ALGHAMDI [300,1] LEDGER Normal 4 DUA2:[ALG
HAMDI]

ALHAJAJ ALHAJAJ [325,3] BUDGET Devour 4 GOTDEV$DU
A2

Explanation:

1) Owner: Owner of the account

2) Username: This is the guy's login name

3) UIC: User Identification Code. This serves to the OS to recognize you and
rights you have over files, directory, etc.

4) Account: This is to let the operator know what the group is
that owns/manages the account.

5) Pri: don't worry about it.

6) Directory: This is the account HOME directory. Where the owner of the
account will work on.

After you have captured the output of the SHOW command you can start
trying to create yourself some accounts by modifying some already existing
ones (which I suggest strongly).

To create an account issue the following command :

CREATE JOHN/DIR=JOHNS_DIR/DEVICE=SYS$USER/PASSWORD=JOHNS_PASSWORD
/ACCESS=(DIALUP,NETWORK)/PRIVS=(NETMBX,TMPMBX)/DEFPRIVS=(NETMBX,TMPMBX)
/ACCOUNT=USERS/OWNER=JOHN

Effects of this command:

Will create a user called JOHN which will log under the JOHNS_DIR directory,
who will have just normal user privileges (TMPMBX/NETMBX) who, when listed,
will appear to be as part of the group name USERS and the account's owner
will be JOHN.

After you issue this command a NEW UIC will be added to the RIGHTSLIST.DAT
file being assigned to your user.

Explanation:

DIR: can be any directory name you saw on the system. Of course if you are
not using all the privileges, check that its READ/WRITE-able
so you won't have problems at login.

DEVICE: is where the DIR can be found. That means that you have to tell in
which physical/logical device that directory will be found. Since VAXes will
have at least 1 or 2 magnetic supports you must say on which one the directory
can be found. Normally they already have some logical names assigned like
SYS$USER,SYS$SYSTEM,SYS$SPECIFIC,SYS$MANAGER, etc.

PASSWORD: is the password you want for the account which will never be shown
to anyone, so use whatever one you like.

ACCESS: tells the system from where you will authorize logins for this
account. For example I'm sure you've seen this message:

Username: BACKUP
Password:
Cannot login from this source.

Well this is the result of an account being setup with the DIALUP flags in
the access field as NODIALUP.

So if u want to give the account all kind of access just use :
ACCESS=ALL

and this will authorize all login sources for the account.

PRIVS: will setup the privileges on the named account. If you just want it
to be a normal user account use TMPMBX,NETMBX. If you want it to be
a super-user account you can use ALL. But this is not the right way
if you don't want your account to get discovered fast.

Valid Process privileges:

CMKRNL may change mode to kernel
CMEXEC may change mode to exec
SYSNAM may insert in system logical name table
GRPNAM may insert in group logical name table
ALLSPOOL may allocate spooled device
DETACH may create detached processes
DIAGNOSE may diagnose devices
LOG_IO may do logical i/o
GROUP may affect other processes in same group
ACNT may suppress accounting messages
PRMCEB may create permanent common event clusters
PRMMBX may create permanent mailbox
PSWAPM may change process swap mode
ALTPRI may set any priority value
SETPRV may set any privilege bit
TMPMBX may create temporary mailbox
WORLD may affect other processes in the world
MOUNT may execute mount acp function
OPER may perform operator functions
EXQUOTA may exceed disk quota
NETMBX may create network device
VOLPRO may override volume protection
PHY_IO may do physical i/o
BUGCHK may make bug check log entries
PRMGBL may create permanent global sections
SYSGBL may create system wide global sections
PFNMAP may map to specific physical pages
SHMEM may create/delete objects in shared memory
SYSPRV may access objects via system protection
BYPASS may bypass all object access controls
SYSLCK may lock system wide resources
SHARE may assign channels to non-shared devices
GRPPRV may access group objects via system protection
READALL may read anything as the owner
SECURITY may perform security functions

Check the last section on tips on creating accounts.

ACCOUNT: this is pretty useless and is just for displaying purposes at the
SHOW USER under authorize.

OWNER: This field is also used just at SHOW time but keep in mind to use
an owner that won't catch the eye of the system manager.

You can use the MODIFY command the ame as you used the CREATE. The only
difference is that no account will be created but ALL types of modifications
will affect the specified account.

You can use the LIST command to produce an output of the accounts to a file.
Use this command as you use the SHOW one.

Of course, the authorize sub-system is so huge you can actually set hours of
login for users, expirations, disk quotas, etc., but this is not the purpose
of this article.

Tips to create accounts:
-----------------------
First of all, what I suggest strongly is to MODIFY accounts not to CREATE
new ones. Why this? Well, new account names can jump out at the operator
and he will kick you off the system very soon.

The best way I think is to get a non-used account, change its privileges
and change the password and use it!.

First of all try to find a never-logged account or at least one account
whose last log comes from few months ago. From the UAF prompt just
do a SH USER/FULL and check out the dates that appear in the *Last Login*
record. If this happens to be a very old one then it can be marked as
valid to take control of. Of course you have to find a non used account
since you will have to change the account's password.

Check the flags field also. This flags can really bother you:

Captive (worst one!)
Ctly (ctrl-y deactivated)
Restricted (OS does more checks than normal)
DisUser (ACCOUNT IS NOT ENABLED!!!)

I suggest you take out all the flag's fields.
just issue: MODIFY JOHN/FLAGS=(NOCAPTIVE,NOCTLY,NORESTRICED,NODISUSER)
If you find an account that is DisUser I suggest not to own it since the
DisUser flags will take on when listing the accounts. If system manager
sees an account that was OFF now ON..well it's a bit suspicious don't
you think ?

Check if the FIELD account is being used. If not own this one since it
already has ALL privileges and will not look suspicious at all. Just change
its password. (FIELD is the account normally used by Digital Engineers
to check the VAX).

Remember to check also that DIALUP access is permitted or you won't be able
to login your account.

Once you've chosen the perfect account you can now change its password.
Issue: MODIFY JOHN/PASSWORD=MY_PASSWORD. (John is the account name you found)

After you finished just type CTRL-Z and to exit. If you happen to logoff
without exiting AUTHORIZE, don't worry. Changes to SYSUAF.DAT are done
instantly when the command finishes its execution.

One other advice, under SHELL if you happen to have SECURITY privilege
Issue: SET AUDIT/ALARM/DISABLE=(AUTHORIZE)

If you don't do this, each time you run AUTHORIZE, modified accounts will be
logged into OPERATOR.LOG so remember to do so.

After playing a bit with AUTHORIZE you won't have much problems understanding
it. Hope you have PHUN! ;-)

------------------------------------------------------------------------------

$ ! FACILITY: Mailback (MAILBACK.COM)
$ !
$ ! ABSTRACT: VAXVMS to VAXVMS file transfer, using the VAX/PSI_MAIL
$ ! utility of VAXPSI, over an X.25 link.
$ !
$ ! ENVIRONMENT: VAX/VMS operating system.
$ !
$! -------------------------------------------------------------------
$ saved_verify := 'f$verify(0)'
$ set noon
$ ws = "write sys$output"
$ ws ""
$ ws " MAILBACK transfer utility V1.0 (via Backup and PSI_Mail) 21-May-1990"
$ ws ""
$!
$ if f$logical("debug").nes."" then set verify
$ ask_p1:
$ if P1.eqs."" then read/prompt="MailBack> Send or Receive (S/R) : " -
sys$command P1
$ P1 = f$edit(P1, "UPCASE,COMPRESS,TRIM")
$!
$!
$ if P1.EQS."" then exit 1+0*f$verify(saved_verify)
$ if P1.EQS."R" then goto receive_file
$ if P1.nes."S" then goto ask_P1
$! -------------------------------------------------------------------
$!
$! Sending File(s)
$! ===============
$ if P2.eqs. "" then -
read/prompt="MailBack> Recipient mail address (PSI%nnn::user) : " -
sys$command P2
$ if P2.eqs."" then exit 1+0*f$verify(saved_verify)
$!
$!
$ if P3.eqs."" then read/prompt="MailBack> File(s) : " sys$command P3
$!
$ ws "MailBack> ... Backuping the file(s) ..."
$ Backup/nolog 'P3' sys$scratch:mailbck.tmp/sav/block=2048
$!
$ ws "MailBack> ... Converting format ..."
$ convert/fdl=sys$input sys$scratch:mailbck.tmp sys$scratch:mailbck.tmp
record
carriage_control carriage_return
$!
$ ws "MailBack> ... Sending a (PSI_)mail ..."
$ on warning then goto error_sending
$ mail/subject="MAILBACK Backup-File" -
/noself sys$scratch:mailbck.tmp 'P2'
$ ws "MailBack> ... SEND command SUCCESSfully completed."
$!
$ fin_send:
$ delete = "delete"
$ delete/nolog/noconfirm sys$scratch:mailbck.tmp;,;
$ exit 1+0*f$verify(saved_verify)
$!
$ Error_sending:
$ ws "MailBack> Error detected while sending the mail ; ..."
$ ws "MailBack> ... Fix the problem, then retry the whole procedure."
$ goto fin_send
$! -------------------------------------------------------------------
$!
$! Inbound File(s) Processing
$! ==========================
$receive_file:
$!
$ if P2.eqs."" then -
read/prompt="MailBack> Destination directory (<CR>= []) : " sys$command P2
$ if P2.eqs."" then p2 ="[]"
$!
$!
$!
$ if P3.eqs."" then -
read/prompt="MailBack> Mail file (<CR>= default mail file) : " -
sys$command P3
$ gosub build_file
$ ws "MailBack> ... Extracting a (PSI_)mail from the NEWMAIL folder ..."
$ define/exec sys$output nl: ! ped 18-May-90 (wipe out mail displays)

$ if P3.eqs."" then goto normal_get
$ define/nolog new_mail_file 'p3'
$ define/user sys$command sys$input
$ set message/nofacility/noseverity/notext/noident
$ mail
set file new_mail_file
select NEWMAIL
sear MAILBACK Backup-File
extract/NOHEADER out_file
$ deassign new_mail_file
$ goto clean
$ if P3.nes."" then p2 ="[]"
$!
$!
$ normal_get:
$ define/user sys$command sys$input
$ set message/nofacility/noseverity/notext/noident
$ mail
select NEWMAIL
sear MAILBACK Backup-File
extract/NOHEADER out_file
$!
$ clean:
$ deassign sys$output !
$ set message/facility/severity/text/ident
$ if f$search("out_file") .eqs. "" then goto nomessage
$ on warning then goto error_conv
$ ws "MailBack> ... Converting format ..."
$ convert/fdl=sys$input out_file out_file /pad=%x00
record
format fixed
carriage_control none
size 2048
$!
$ ws "MailBack> ... Restoring file(s) from the backup saveset ..."
$ on warning then goto error_back
$ backup/nolog out_file/save 'P2'*.*
$!
$ delete = "delete"
$ delete/nolog/noconfirm 'file';,;
$ ws "MailBack> ... RECEIVE command SUCCESSfully completed."
$!
$ finish_r:
$ deassign out_file
$ exit 1+0*f$verify(saved_verify)
$! -------------------------------------------------------------------
$ error_conv:
$ ws "MailBack> " + -
"An error occurred during the fdl convert of the extracted mail ;"
$ ws "MailBack> ... the file ''file' corresponds to " + -
$ ws "MailBack> ... the message extracted from Mail."
$ goto finish_r
$!
$ error_back:
$ ws "MailBack> An error occurred during the file restore phase with BACKUP ;"
$ ws "MailBack> ... the file ''file' corresponds to "
$ ws "MailBack> " + -
"... the message extracted from Mail, converted as a backup Saveset."
$ delete/nolog/noconfirm 'file';-1
$ goto finish_r
$!
$ nomessage:
$ ws "MailBack> No mail message has been found in the NEWMAIL folder."
$ goto finish_r
$!
$Build_file: ! Build a unique (temporary) file_name
$file = "sys$scratch:mail_" + f$cvtime(f$time(),,"month")+ -
f$cvtime(f$time(),,"day") + f$cvtime(f$time(),,"hour")+ -
f$cvtime(f$time(),,"minute")+ f$cvtime(f$time(),,"second") + ".tmp"
$define/nolog out_file 'file'
$return

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT