[Info-vax] Is HP's TCP/IP Services for OpenVMS vulnerable?
Michael T. Davis
DAVISM at ecr6.ohio-state.edu
Sat Aug 20 11:10:58 EDT 2011
In article <0ff9dbc7-09ea-4f2f-840a-8196c92fc914 at b9g2000prd.googlegroups.com>,
Rod <rregier at dymaxion.ca> writes:
>> "Michael T. Davis" <DAV... at ecr6.ohio-state.edu> wrote in messagenews:j2bh=
>na$r7e$1 at news1.cse.ohio-state.edu...
>> > We're running...
>>
>> > =A0HP TCP/IP Services for OpenVMS Alpha Version V5.6 - ECO 3
>> > =A0on an AlphaServer DS15 running OpenVMS V8.3
>
>You can also get a modest jump on security issues by upgrading to the
>current production release of the OpenVMS IP stack, which is 5.7 ECO
>2.
>
>I'm running it on some systems including SSH usage w/o serious
>operational issues.
The "powers that be" here are basically just going by what Nessus
tells them, and it bases this on the hello banner from the server. We don't
have a support contract, but we do have access to newer releases. So, is
there a newer release version wherein the SSH server reports a version of at
least 3.2.2?
Regards,
Mike
--
| Manager for Networking, Admin.
Michael T. Davis (Mike) | & Research Computing: CBE/MSE
http://www.ecr6.ohio-state.edu/~davism/ | The Ohio State University
| 197 Watts, (614) 292-6928
** E-mail is the best way to contact me **
More information about the Info-vax
mailing list