[Info-vax] OpenVMS versus Windows/GE Telemetry Control Systems.

Bob Gezelter gezelter at rlgsc.com
Tue Jan 15 15:10:04 EST 2013


On Tuesday, January 15, 2013 1:46:39 PM UTC-5, John Wallace wrote:
> On Jan 15, 5:57 pm, Simon Clubley <clubley at remove_me.eisner.decus.org-
> 
> Earth.UFP> wrote:
> 
> > On 2013-01-15, David Froble <da... at tsoft-inc.com> wrote:
> 
> >
> 
> >
> 
> >
> 
> > > As for the case of the original poster, the Alpha systems are running
> 
> > > today, and will continue to run until something breaks.  Given the
> 
> > > history of DEC hardware, it should normally be expected to run for a
> 
> > > long time yet.  Individual pieces can and do break, and then it's a
> 
> > > question of whether there is any recourse to fixing or replacing the
> 
> > > failed equipment.  In most cases, fixing or replacing is far less costly
> 
> > > than a migration of the system to something else.  In business decisions
> 
> > > should be based on a cost / benefit ratio.
> 
> >
> 
> > I wonder why people only consider hardware breaking instead of also
> 
> > considering software breaking.
> 
> >
> 
> > In this Internet connected world, software can break just as hard as
> 
> > hardware when a security exploit is discovered and can be a _lot_ harder
> 
> > to fix than a simple hardware failure.
> 
> >
> 
> > If you have a hardware failure, you can just replace your board or
> 
> > component and resume normal service. OTOH, if someone finds a protocol
> 
> > vulnerability or stack/server coding error in the software you are
> 
> > running, you are dead in the water until either you find a workaround
> 
> > or your code base is fixed either by you or your vendor.
> 
> >
> 
> > Current mainstream platforms may have issues, but you can have more
> 
> > confidence that either a workaround or fix will be available in short
> 
> > order for any active exploit that makes it into the public domain for
> 
> > those platforms.
> 
> >
> 
> > I've gone through several cycles of getting Internet related components
> 
> > fixed under VMS and the fixes took a lot longer than I would be comfortable
> 
> > with if the problem in question had been a active exploit.
> 
> >
> 
> > Simon.
> 
> >
> 
> > --
> 
> > Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
> 
> > Microsoft: Bringing you 1980s technology to a 21st century world
> 
> 
> 
> 
> 
> Maybe.
> 
> 
> 
> Stuxnet was quietly working its way around Window boxes for a long
> 
> while (maybe a year?) before it got serious attention. Ignorance is
> 
> not necessarily bliss. If folks haven't yet looked into Stuxnet or its
> 
> successors (eg Duqu), there's no time like the present, and the
> 
> Wikipedia article on Stuxnet isn't a bad start, although for further
> 
> reading I'd recommend Ralph Langner and maybe Symantec.

Simon,

I note that my published recommendation for nearly twenty years has been to "air-gap" process control systems from the general corporate network as well as the public Internet [citation: Computer Security Handbook, 3rd Edition].

- Bob Gezelter, http://www.rlgsc.com




More information about the Info-vax mailing list