[Info-vax] New VSI Roadmap (yipee!)

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Sun Mar 1 10:03:07 EST 2015


On 2015-03-01 02:06:32 +0000, Kerry Main said:

> Imho, it should be possible to release a well architected & well-tested 
> 
> commodity OS product in the future (ok, OpenVMS) which does not 
> 
> require many monthly security patches.

Outside of devops, security beyond that required by regulation is 
seldom interesting.   Worse, if security gets in the way, it gets 
bypassed or disabled.   seL4 and selinux aside, and the occasional 
marketing of some security features to the more technical folks, 
security is not typically a central feature in a product sale.   For 
many folks, if it's got AV, it's good enough.  Even if the AV provides 
the equivalent security of waving a rubber chicken over the box, using 
the specific counter-clockwise waving procedure described in appendix A.

>From what I've seen of it, security is third or fourth or fifth or 
lower on the usual pick list for a volume platform, after data and 
application compatibility, and affordability, and familiarity, and 
ease-of-use, and (yes) perception.

> Can you imagine bringing your Toyota or Ford car in every month to have 
> fixes applied so you can use this product safely?

If I paid little or nothing for the car as compared with the resources 
that went into building and shipping it, yes.  I'd expect ads, and 
specific Toyota fuel and Ford fuel requirements, and that I'd need to 
purchase my travel mugs from sketchy street booths or from the 
manufacturer, and that driving at highway speeds might require an 
in-dash purchase, too.

> As mentioned in an earlier reply, this might include contracting state
> 
> of the art security hackers / companies under NDA to review / hack 
> 
> code before it is released or similar strategy.

There are folks that provide that service.   The best of the folks are 
actually skilled attackers, and have all techniques available to them.  
Most are running standard tools, and usually aren't seeding the parking 
lot with target-logo USB drives with enticing software containing 
customized malware.   As mentioned upstream, defenders have to cover 
everything.  More than a few places lack the budget for an effective 
defense, beyond applying patches.   Attackers need but one 
vulnerability, whether that hole is old or new.  Some of the attackers 
have budgets massively beyond any of the defenders.

> I just do not believe the current model of patch-n-pray is sustainable.

It's unpleasant, but is entirely sustainable, until there is a better 
alternative that still gets the job done.  Even a better alternative 
still involves patches.  Ignoring that VMS lacks the necessary APIs and 
the applications and the compatibility and the distributed management 
tools and the deployment tools and the x86-64 support and the 
compatibility with the existing staff expectations, VMS has already 
been in the patch-of-the-month club for anybody using OpenSSL, so 
you're right back into the quagmire.   Worse, Apache SSL from the SWS 
V2.2 update 2 kit is 0.9.8w from 23-Apr-2012, and that's rather far 
back.  Again, I see no solution here.

> I also do not accept that as a platform gets more popular it automatically
> 
> means more security issues magically appear. This is the banks vs. corner
> 
> stores analogy.

We'll disagree there, then — more complex configurations and more 
pieces and parts means more vulnerabilities, and — even with a good 
team — scheduling and market pressures and increasingly complex 
software can and variously does lead to bugs, too.  Maybe not all that 
many bugs in the classic VMS kernel, but there's a whole lot of 
open-source code around, a whole lot of add-on (privileged) code, and 
there'll be more of it all on VMS in time, should VMS become 
ubiquitous.    VMS was built for an environment were everything 
installed was considered trusted.  The mechanisms for VMS signed kits 
are the first break from that trust, and there'll need to be much more 
suspicion about what's installed and running in the future.

This effort also likely means adding UAC / Gatekeeper defenses, and 
jails or sandboxes or Qubes capabilities to keep the applications 
relatively contained, and ASLR and canaries, and developer-signed 
application distributions, potentially an application store, and better 
patch notification and secure and encrypted patch distribution and 
easier installation mechanisms, and configurable firewalls, and 
distributed event logging, and encrypted cluster transports and the 
retirement of DECnet and telnet and ftp, and encrypted SNMPv3 
management, and authenticated network connections, faster mechanisms 
for porting updates to OpenSSL and Apache and core open-source tools, 
updates to compilers that flag (for instance) strlen() and strcpy() and 
strcat() and such, and central and per-user certificate storage, and 
other security-related features, and whatever other useful 
defensive-security ideas arise in the next five or ten years while VSI 
is beavering away on the port and on these and more likely on other and 
more-directly-revenue-producing projects.  Even with a good development 
team, some of these security upgrades will be found to have 
security-relevant bugs, too.

TL;DR: Give me a viable alternative to the patch-of-the-month club, and I'm in.



-- 
Pure Personal Opinion | HoffmanLabs LLC




More information about the Info-vax mailing list