[Info-vax] CLI editing, was: Re: VMS - Virtual Terminals - A security risk way back yonder OR was that an Old Wives Tale ?

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Sat Feb 13 19:16:57 EST 2016


On 2016-02-13 22:28:09 +0000, David Froble said:

> To be a bit fair, there have been numerous methods for connecting 
> terminals to VAX systems.  I omit mentioning Alpha and IA64 because by 
> the time they came out most terminal access was LAT or TelNet or other 
> network connections.
> 
> RS232
> Current loop
> LAT
> TCP/IP
> 
> and perhaps more.
> 
> So yeah, it's understandable that terminal driver has been set up to 
> handle lots of different connection methods.
> 
> I'm going to guess that any serial lines still in use would not be for 
> terminals, but other devices.  But what do I know?
> 
> With VMS in a server mode, the existing stuff works for me.


Open your white wall to the Book of I/O Abuse, and partake of the 
elegant and simple programming interface, with nary a hint of arcana 
nor complexity present anywhere in the design.

Do recall that this trivial I/O processing happens entirely in a device 
driver and more than a little at IPL context, and of course marvel at 
the classic décclassé-and-port-whine driver organization.

But compatibility means that there's not a bit-bulldozer built nor a 
blockchain strong enough to drag the carcass of the terminal driver out 
to that giant excavation that's been dug out behind the woodshed.

To much is dependent on and inextricably tied into this mess.

But you're right, what's out there works for now, and there're a 
comparative dearth of engineering staffers to port and to overhaul and 
to update OpenVMS without taking on swamp-draining missions.

VSI may well decide to bury all of this OpenVMS stuff behind remote 
access and remote debuggers, behind TLS connections, and increasingly 
treat the operating system as an embedded solution.




-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list