[Info-vax] DNFS1ACP using 100% of CPU
Sum1
not at here.com
Sat Oct 12 20:36:06 EDT 2013
On 2013-10-13 00:00:33 +0000, JF Mezei said:
> On 13-10-12 13:34, Stephen Hoffman wrote:
>
>> You're correct that VMS is not a mass-market security target.
>
> Botnets/hackers tend to look for vulnerabilities without really checking
> the OS type. For instance, a BIND vulnerability is tested on any server
> that responds to port 53.
>
> As such, VMS is not any more immune to attempts than any other OS.
>
> Where there is a huge difference is that VMS runs ancient versions of
> open source stuff like BIND and those versions do not contain the many
> security fixes that have since been issued and thus the VMS version
> remains vulnerable to those problems.
>
>
> Whereas Linux tends to be vulnerable for a couple of weeks before
> patches are available, VMS remains vulnerable for years.
>
> A good port scanner will let you know what services OS-X is offering,
> and you can block unwanted ones at the router level or disable those
> services on OS-X.
Hi JF
Everything is behind a router and a firewall. Only port 80 is exposed
on OpenVMS. Nothing is running except WASD, files are served by
(dodgy!) NFS which OSX provides as read-only. It has been like this
for many years and I have seen attacks and scans come and go, but
nothing in VMS TCP/IP or the WASD application or VMS seems to respond
incorrectly. I am comfortable that WASD is secure, I am *not*
comfortable that Apache is. I have functionality, albeit recently
dodgy NFS performance, and security and I am not constantly looking for
new patches to apply to Apache, PERL, PHP etc. It is almost
set-and-forget, it runs, people get their pages and nothing
successfully attacks it.
It is an extremely simple setup without any attempt to make it pretty,
flashy, drop-down anything…all just static pages served from read-only
NFS sources.
Something may be vulnerable, but only port 80 is exposed and the
underlying supporting infrastructure seems to be sound. Having done
this elsewhere on OSX, it takes more effort, maintenance and vigilence
:)
More information about the Info-vax
mailing list