[Info-vax] [Change topic] VMS systems botnets
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Mon Oct 31 09:18:59 EDT 2016
On 2016-10-28 12:32:04 +0000, Roy Omond said:
> Hoff, I'd appreciate if you could expand on this. How were these VMS
> systems acting as botnets ?
What, that OpenVMS as is commonly used and deployed can be or is
insecure, that rogue perl code can and does work on OpenVMS, and that
running badly down-revision network servers and network-related
libraries and cleartext network protocols won't end badly? That
various OpenVMS servers can be incorporated into spam and DDoS networks
trivially, due to the utterly inexplicable open-relay default, and the
severely down-revision network server software? I've cleaned up
various breached servers. Some were "just" used in reflection attacks
(NTP & DNS are popular here), some were relaying massive spam, some
were used in what I suspect were gaming DDoSes. Yes, some were
running rogue code. I have a list of hundred or so unpatched
vulnerabilities in OpenVMS and associated network services ranging from
remote code exploits to DoSes to information disclosures, and it isn't
hard to find those lists and those vulnerabilities. With some of the
OpenVMS sites still clinging to and still running insecure protocols
such as telnet, ftp and DECnet — and SCS, for that matter — even that
effort often isn't necessary. Most "firewall-protected" networks
probably aren't as secure as you think they are or want them to be,
which makes the traditional means of protecting OpenVMS — isolating the
servers from the Internet — problematic.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list