[Info-vax] Is HP's TCP/IP Services for OpenVMS vulnerable?

Michael T. Davis DAVISM at ecr6.ohio-state.edu
Sat Aug 20 11:10:58 EDT 2011


In article <0ff9dbc7-09ea-4f2f-840a-8196c92fc914 at b9g2000prd.googlegroups.com>,
Rod <rregier at dymaxion.ca> writes:

>> "Michael T. Davis" <DAV... at ecr6.ohio-state.edu> wrote in messagenews:j2bh=
>na$r7e$1 at news1.cse.ohio-state.edu...
>> > We're running...
>>
>> > =A0HP TCP/IP Services for OpenVMS Alpha Version V5.6 - ECO 3
>> > =A0on an AlphaServer DS15 running OpenVMS V8.3
>
>You can also get a modest jump on security issues by upgrading to the
>current production release of the OpenVMS IP stack, which is 5.7 ECO
>2.
>
>I'm running it on some systems including SSH usage w/o serious
>operational issues.

	The "powers that be" here are basically just going by what Nessus
tells them, and it bases this on the hello banner from the server.  We don't
have a support contract, but we do have access to newer releases.  So, is
there a newer release version wherein the SSH server reports a version of at
least 3.2.2?

Regards,
Mike
--
                                         | Manager for Networking, Admin.
         Michael T. Davis (Mike)         | & Research Computing: CBE/MSE
 http://www.ecr6.ohio-state.edu/~davism/ |   The Ohio State University
                                         |   197 Watts, (614) 292-6928
              ** E-mail is the best way to contact me **



More information about the Info-vax mailing list