[Info-vax] What would you miss if DECnet got the chop? Was: "bad select 38" (OpenSSL on VMS)
Dirk Munk
munk at home.nl
Sun Sep 18 04:35:25 EDT 2016
Paul Sture wrote:
> On 2016-09-17, David Froble <davef at tsoft-inc.com> wrote:
>> Stephen Hoffman wrote:
>>>
>>> I'd be seriously tempted to announce the deprecation and eventual
>>> removal of DECnet, for that matter.
>>
>> Booo! Hisssss!
>>
>> Ok, we know it's not secure. Run at your own risk.
>>
>> I'm guessing that DECnet users use it only in house, for FAL and such, so if the
>> in house environment is secure, then security isn't an issue for DECnet.
>>
>> If it's not going to take up time and effort, then why kill it off?
>>
>> I personally find it can be useful.
>>
>> It sure is handy when you need to shutdown and re-start TCP/IP on a remote (but
>> in house) system.
>
> I'd certainly miss one or two things that DECnet does:
>
> o - the ability to do a SET HOST 0 /LOG= to get a log / audit trail of software
> installations and configuration sessions. Yes, many terminal emulators can
> do logging, but those logs aren't on the target system.
>
> o - using DECnet as a means of placing BACKUP savesets on another node, and
> restoring them from other nodes (where 'other' can be either local or
> remote).
>
> o - DECnet tasks. Useful but I haven't seen many customers use these.
>
> o - FAL
>
First of all, which DECnet do you mean? DECnet Phase IV should have
been abandoned years ago, DECnet Phase V has been the successor for
years now, but many DECnet users are just to plain lazy to learn how it
works. They took a look at the UI, concluded that is was very different
from the NCP commands of Phase IV, and just gave up. Or are they too
stupid to understand it?
Has no one ever noticed the analogy between Windows and VMS in this
respect? Windows uses Netbios over IP the same way VMS can use DECnet
Phase V over IP. Or have you ever heard of Microsoft abandoning Netbios
in favour of plane IP stuff like FTP etc. ?
Besides DECnet we also have cluster traffic. It is also insecure. So
let's just abandon VMS clusters as well???
DECnet and cluster traffic can both use IP for transport. How to make
that traffic very secure? It is so simple, use IPsec! But when I
proposed that in this forum, it was made very clear that I'm an idiot to
propose the only way to encrypt IP traffic that has an real
architectural idea behind it, instead of the many hobby solutions like
SSL, SSH etc.
But again, you must make an afford to implement IPsec, and we don't want
to do that. Quick and dirty solutions that are prone to lots of
maintenance on the application level are much and much better. Thinking
in layers, whereby encryption is part of the network and has nothing to
do with applications, idiotic.
So yes, you can use all the nice features DECnet has to offer, but no
one cares to deal with these days. And you can use it in a safe way as
well. Oh yeah, and remember, DECnet is deeply embedded in VMS, VMS was
build around the idea of networking with DECnet. You do remember how
full VMS file specifications looks?
node::disk:{directory}file.extension.version
It start with node::
Try that with plain IP.
Some one recently wrote a article about the status of IPv6, and about
the status of RFC's . It was shocking to read what an enormous mess it
is. That is the problem with IP, it is one enormous out of hand hobby
project with lots of overlapping poorly defined 'standards' that are
really no standards at all (!!). It is exactly what we should not have
in times that well structured security and dependable network
communication is of the utmost importance.
More information about the Info-vax
mailing list