[Info-vax] VMS Privileges Versus Linux Capabilities

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Tue Jun 21 11:20:07 EDT 2016


On 2016-06-21 12:29:17 +0000, RobertsonEricW said:

> On Thursday, June 16, 2016 at 8:06:43 PM UTC-4, Stephen Hoffman wrote:
> ...
>> SEVMS was the mandatory access control variant of OpenVMS: 
>> http://h71000.www7.hp.com/openvms/products/sevms/info.html
>> 
>> OpenVMS lacks sandboxes or jails or a BSD-style pledge() mechanism, 
>> among other constructs.
> 
> I did not get the impression that Security Enhanced VMS (SEVMS) was 
> supported by HP in recent years.

Hence "was".  SEVMS was retired (by DEC) prior to V7.  IIRC, V6.2 was 
the last release available.

> Which brings up the question: Does VSI support SEVMS or does it plan to 
> in the future?

Donno.   The market for multi-level security wasn't and hasn't been a 
very large one in recent years, and the product evaluations often 
entailed in selling into that market were detailed, tedious and 
comparatively expensive undertakings.

The core of the mandatory access control bits underneath SEVMS are 
(still) latent in OpenVMS.   The layered product added management 
interfaces, tools and utilities.

The effort entailed in hauling what SEVMS provided forward would range 
from trivial, to — for the addition and integration of potential 
features such as better multi-level support, sandboxing and jails and 
app stacking and app separation, PCSI integration, mandatory access 
control documentation integration, and the rest that would increasingly 
be expected — non-trivial.

Adding support for environments akin to what Haven and Intel SGX target 
would definitely be a project.  That's well outside what SEVMS 
provided.  But I digress.

As implemented, nobody in their right mind would want to use SEVMS, or 
any other traditional mandatory access control system for that matter.  
Some folks — certainly of their right mind — do have to use mandatory 
access controls, because of their environment and the sorts of data 
they have stored on their servers.  Mandatory access control security 
is not easy to manage, nor to use.

Sandboxing and jails and app stacking also diverge somewhat from what 
traditional SEVMS-style mandatory access controls traditionally 
provide.  As implemented, the amount of separation provided by SEVMS 
and its categories and labels masks wouldn't be sufficient — there 
aren't enough of those implemented in the current design, and you'd 
need something akin to lib$get_ef to allocate what is available.  If 
that's how VSI chose to implement those features, as part of adding 
container-related support.  (Using UUIDs in place of bitmasks and such 
is more of a hassle for the designers and developers, but also avoids 
some big hassles around allocation and coordination,)

In more recent times and closer to the market that SEVMS targeted, 
OpenVMS with SEVMS isn't anywhere near what the SeL4 evaluation process 
went through.  https://sel4.systems

There's a whole pile of infrastructure-level security work that OpenVMS 
would want or need before trying to sell on security, in any case.  And 
that's before getting to dusting off SEVMS and mandatory access 
controls.


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list