[Info-vax] What would you miss if DECnet got the chop? Was: "bad select 38" (OpenSSL on VMS)
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Mon Sep 19 10:35:46 EDT 2016
On 2016-09-18 07:18:38 +0000, Paul Sture said:
> I'd certainly miss one or two things...
Nobody here — nobody — wants to have to rework their existing
application code. Ask that question of anyone around, and you will
get the obvious and expected answer.
A better question is... If you're overhauling an existing or doing a
wholly new application on OpenVMS, what features of OpenVMS do you plan
to use or want to use? What existing features would you not plan to
use?
The use of DECnet — wonderful old protocol, that — just isn't on that
list for the vast majority of sites. Yes, a few of you have a PDP-11
or some other weird hardware stashed somewhere. Good on you. You're
not the future of any operating system. DECnet is simply not going to
be used in any substantial application updates, and not for new
application designs and deployments.
There are more than a few areas of OpenVMS that really need help, too.
DECnet isn't one of those areas, but any effort spent on those old
areas such as DECnet — testing, qualification, kitting, securing,
whatever — is effort that could go to new work and new testing and new
features for those folks that are moving forward.
Those of you with existing applications? If any of you have DECnet or
telnet or ftp or otherwise — and claim you believe in OpenVMS security
— please stop deluding yourselves. Because that's what you are doing.
Go get your VT52 terminals powered up and fire up your TECO editor or
whatever your chosen interface, and start working to get your
applications and your code over to TLS and secure connections and IPv6.
Unfortunately in current OpenVMS, getting TLS and IPv6 working involves
much more effort than it should be and is much less integrated than
DECnet ever was, which should tell you something about how OpenVMS has
been backsliding.
Even given infinite resources, some code has to go away. Some
judicious and carefully-handled code has to go away. There is some
code that is an anchor impeding progress. Failure to remove runt or
deprecated or problematic APIs inevitably produces a ginormous and
unmaintainable and un-documentable and un-securable morass — whether
it's an application or an operating system.
Yes, customers will have to rework some of their code for better
security or better features. There's just no way around that. The
cost of creating compatibility eventually and inevitably goes to
infinity, and — as I have pointed to specific cases here in comp.os.vms
before — the desire for compatibility can block all changes in areas
that really need to be changed to better secure the platform. You can
delude yourself into believing the password hash is secure — and it's
way too fast to be secure — or that VAX C code isn't buggy and unstable
and quite possibly insecure — or any number of other issues in older
APIs and older code. There are specific things that need to be
changed that can't be changed without breaking compatibility, or that
deprecation will produce better results in actively-maintained and new
code.
If you can't rework your application code, then stay on a long-term
support release or — as more than a few folks have done over the years
— simply fall off of support entirely.
Catering to the folks that aren't reworking their code — whether for
good and valid reasons, or just because it's been abandoned — just
holds back OpenVMS and the rest of the folks that are able and willing
to do that. And it saddles the folks that can rework their code with
the added costs and complexities and difficulties. Have you looked at
doing 64-bit addressing on OpenVMS? It's a marvelous design that
provides compatibility, and makes new 64-bit work much more effort than
it should be. But I digress.
VSI can either do what's been done for the last years and cater
exclusively to the existing installed base — likely lucrative for a
while, but we all know where that ends — or they can internalize and
adopt the leadership role they already possess where they want to take
OpenVMS and where they want or need to improve OpenVMS and start to
work toward and start to tell us that story. Clinging to old APIs and
insecure network protocols like DECnet and telnet and ftp and
preserving the current and unintegrated IP and bad IPv6 support is not
the future of any viable operating system platform. OpenVMS can
either cater to folks with old legacy apps — probably a decent
business, at least for a few years — or VSI can get going toward a
modern operating system with modern features, modern capabilities,
marketing, and drag the apps forward...
Well, you get the picture...
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list