[Info-vax] Still no IPSEC for TCP/IP services?

Bob Koehler koehler at eisner.nospam.encompasserve.org
Thu May 24 10:00:04 EDT 2012


In article <4fbd426d$0$32182$c3e8da3$40d4fd75 at news.astraweb.com>, JF Mezei <jfmezei.spamnot at vaxination.ca> writes:
> Bob Koehler wrote:
> 
>>    VMS is highly secure, capable of hard real-time, easy to use, and
>>    easy to keep secure.
> 
> 
> How many years did it take the VMS management to block that gaping POP
> and IMAP security holes ?

   Since POP and IMAP secuity holes were not part of VMS, but part of
   one of the available TCP/IP stacks, your question addresses an issue
   the I don't have.

> Have they plugged all the security vulnerabilities for the old DNS
> server on VMS  ?

   Same.

> Yes, there was a time when VMS was highly secure, but the introduction
> of middleware that had far lower security standards and the lack of
> fixing it makes VMS no longer secure.

   See above.

> It is worth nothing that something like Linux ends up with same
> vulnerabilities since they use the same Bind and other middleware except
> they fix it within weeks.

   Not all vendors implement BIND versions by simply compiling the
   shipped reference implementation.




More information about the Info-vax mailing list