[Info-vax] OpenVMS versus Windows/GE Telemetry Control Systems.

David Froble davef at tsoft-inc.com
Wed Jan 16 03:44:17 EST 2013


Bill Gunshannon wrote:
> In article <kd52bk$as$1 at dont-email.me>,
> 	David Froble <davef at tsoft-inc.com> writes:
>> Stephen Hoffman wrote:
>>> On 2013-01-15 20:27:19 +0000, Stephen Hoffman said:
>>>
>>>> On 2013-01-15 20:10:04 +0000, Bob Gezelter said:
>>>>
>>>>> I note that my published recommendation for nearly twenty years has 
>>>>> been to "air-gap" process control systems from the general corporate 
>>>>> network as well as the public Internet [citation: Computer Security 
>>>>> Handbook, 3rd Edition].
>>>> That approach is great.  In theory.  But the air gap is not always 
>>>> practical.   As Stuxnet showed, there are ways to jump the air gap, too.
>>> And not three minutes after posting that:
>>>
>>> http://arstechnica.com/security/2013/01/two-us-power-plants-infected-with-malware-spread-via-usb-drive/ 
>>>
>>>
>>>
>> I seem to recall that the USB ports on Alphas were not functional under 
>> VMS.  If that's correct, then another security notch for VMS ...
>>
>> :-)
> 
> So, in order to be safe you have to give up some convenience.

Did you miss the smiley ?

> And the same is true of any system.  Security people always walk a thin
> line between convenience and safety.

Maybe so, but it doesn't have to be that way.  I'd bet there are many 
people here on c.o.v that could come up with convient and safe methods 
for communications, software distribution, and such.

As a small example, I've implemented some socket communications.  The 
socket is basically an open port to the world.  But it's under program 
control, and what's coming in must meet expectations, or it's flushed 
and the connection dropped.  Are there ways to defeat such?  I have to 
say that I don't know, but, I really doubt it.

> And one simple, well published parameter and it is a non-threat to
> Windows systems as well.  Without completely giving up the USB port.

The general problem, as I see it, is that Microsoft knew that they'd 
more often than not be dealing with clueless computer illiterate people, 
and so you got things such as autorun which attempt to do things without 
much user interaction.  Such is everywhere in their software.  Real easy 
for a nefarious person to take advantage of.

So then users got used to all those neat little things that "just 
happen", and guess who won't buy software without all the gizmos.

I've never felt that law enforcement should go after "hackers".  They 
are performing a service.  Too bad people aren't learning ....



More information about the Info-vax mailing list