[Info-vax] Still no IPSEC for TCP/IP services?
Bob Koehler
koehler at eisner.nospam.encompasserve.org
Thu May 24 10:00:04 EDT 2012
In article <4fbd426d$0$32182$c3e8da3$40d4fd75 at news.astraweb.com>, JF Mezei <jfmezei.spamnot at vaxination.ca> writes:
> Bob Koehler wrote:
>
>> VMS is highly secure, capable of hard real-time, easy to use, and
>> easy to keep secure.
>
>
> How many years did it take the VMS management to block that gaping POP
> and IMAP security holes ?
Since POP and IMAP secuity holes were not part of VMS, but part of
one of the available TCP/IP stacks, your question addresses an issue
the I don't have.
> Have they plugged all the security vulnerabilities for the old DNS
> server on VMS ?
Same.
> Yes, there was a time when VMS was highly secure, but the introduction
> of middleware that had far lower security standards and the lack of
> fixing it makes VMS no longer secure.
See above.
> It is worth nothing that something like Linux ends up with same
> vulnerabilities since they use the same Bind and other middleware except
> they fix it within weeks.
Not all vendors implement BIND versions by simply compiling the
shipped reference implementation.
More information about the Info-vax
mailing list