[Info-vax] One possible market for VMS: secure credit card

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Tue Mar 24 20:08:40 EDT 2015


On 2015-03-24 21:32:45 +0000, David Froble said:

> When I first took a look at OpenSSL, it was very confusing to me.  The 
> main reason is because whoever decided to implement it doesn't think 
> very much like me.  (Ok, get in your jabs now ...)

The OpenSSL API is certainly not the way I'd do it.   The LibreSSL fork 
<http://www.libressl.org> and some others are working on different 
implementations and APIs.  Apple has created their own transport 
library 
<https://developer.apple.com/library/ios/documentation/Security/Reference/secureTransportRef/index.html> 
for OS X and iOS.

Other pieces of this puzzle include CDSA and the general lack of any 
central certificate support on OpenVMS.

> If I was designing this stuff, I'd keep things separate.  
> Communications would be just that, communications.  Encryption also 
> would be self contained.  None of this mixing.  Nor do I have any idea 
> whether my method would have inherent security flaws.

Encryption and the network transport and the initial key-exchange 
negotiation are all aspects of the network connection, and each is 
necessary.   
<http://security.stackexchange.com/questions/65622/client-server-encryption-technique-explanation-tls-ecdhe-rsa-with-aes-128-gcm-s> 
 The negotiation — ECDHE, etc — and the encryption — AES-GCM, etc — are 
interlinked, and each has needed and will need updates as attacks 
evolve.   The newer encryption schemes implement what is called perfect 
forward security, which means that somebody that does get eventually 
access to the keys still can't easily recover the contents of 
previously-recorded encrypted comms.

> Now, if the encryption was a separate thing, DECnet, TCP/IP, and such 
> then would not need any security work.  It would be up to an 
> application to perform an encryption handshake, encrypt data, and the 
> communications would send and receive data, handshake, and such.

IPSec <https://en.wikipedia.org/wiki/IPsec> is all that and a bag of 
chips, at least with IP and DECnet over IP.  Alas, OpenVMS doesn't have 
that support yet.

> Maybe the above would be feasible for DECnet, since that most likely 
> would be VMS to VMS.

DECnet is a dead-end protocol, as much as I still find occasional use 
for it.  IP hasn't yet been integrated to the degree of DECnet.  If 
(when?) that integration happens within OpenVMS, I'd suspect most folks 
won't really miss DECnet all that much.

>  I fear it is not feasible for other communications, since the rest of 
> the world has already decided that communications and encryption will 
> be joined in a single product.

For now, that's usually SSL to start with, and hopefully eventually 
using IPSec.

> Nor am I adverse to building encryption into DECnet, and other things. 
> I've learned to conform to the rest of the world ....
> 
> But not C ....

Rust?


-- 
Pure Personal Opinion | HoffmanLabs LLC




More information about the Info-vax mailing list