[Info-vax] SAMBA and Ransomeware

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Mon Jul 17 10:48:57 EDT 2017


On 2017-07-16 22:15:35 +0000, Scott Dorsey said:

> =?UTF-8?Q?Arne_Vajh=c3=b8j?=  <arne at vajhoej.dk> wrote:
>> On 7/16/2017 3:26 PM, Scott Dorsey wrote:
>>> Stephen Hoffman  <seaohveh at hoffmanlabs.invalid> wrote:
>>>> Ned Pile of the Microsoft SMB team has repeatedly stated that running 
>>>> SMB 1 is very bad, and needs to stop.  Here's a longer write-up on that 
>>>> topic:
>>>> 
>>>> https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
>>>> 
>>>> Samba 3.6 and later support SMB 2 (from 2011) and Samba 4.3 added SMB 
>>>> 3.1.1 (2015).   The OpenVMS CIFS port is based on 3.0.28a.   So... 
>>>> there's no way around using SMB 1 with the current Samba port.
>>> 
>>> This is true and unfortunate.
>>> 
>>> Some of the issue here is that the SMB protocol really wasn't designed 
>>> for security, and Microsoft over the years has tacked more and more 
>>> stuff on it to improve security and availability.  We can expect that 
>>> they will continue to do this in the future.

SMB 1 wasn't secure.   It's also ancient.    DECnet and SCS are also 
old.   And insecure.    Current SMB does rather better here.   DECnet 
really needs to be overhauled or deprecated and removed, and SCS needs 
work, and we increasingly can't depend on internal networks to be 
trusted and secure.

>>> This means that SMB is a moving target, and any attempt at supporting 
>>> SMB is going to require constant attention and a lot of updating.  
>>> There is no way around that I fear.

We're not going back to the 1990s or early 2000s era.   We have to work 
within the constraints and the environment we have.   That means no SMB 
1, no DECnet, no telnet, no ftp, and hoping we end-users can keep SCS 
private until and unless we get a secure and authenticated replacement.


>> Like web browsers, web servers, browser plugins, JavaScript engines, 
>> SSL libraries, application servers, CMS'es, mail servers and a ton of 
>> other stuff.
> 
> Like some of that stuff, yeah.  But most of that stuff I don't want on 
> a server in the first place.  And the stuff I do want on a server, I 
> want to fight to make as stable as possible.  But an SMB server 
> inherently cannot be.


I'd like stable servers, too.   But I know we won't ever have that.   
OpenVMS servers are routinely badly down-revision with Apache, no TLS 
for Mail, and issued with other services including the ISC BIND port 
and such.  VSI is addressing some of these, but it's inherently a 
moving target.   Given we won't ever have stable servers — not what we 
had five or ten or more years ago — what does that mean for our OpenVMS 
servers?   It means... We'll have to patch our servers.  Faster.  We'll 
have to be able to roll our upgrades for uptime.   It means we'll have 
to isolate those services into sandboxes to contain damage.   Better 
backups.  Firewalls.  VPN servers.  The ability to apply kernel patches 
without reboot akin to Linux; with fewer reboots, and with easier 
application and server designs allowing rolling upgrades or whatever.  
That might be rolling upgrades in-box using VMs or across multiple 
boxes using SCSv2 and newer and easier rolling-upgrade APIs, or 
whatever.   Our app designs stink, and the OpenVMS APIs are really 
primitive, but I digress.

> The web browser is an excellent analogy, though...  and it's a reason 
> why  I don't want to see a serious web browser on VMS.  It takes up far 
> too much support effort for the gain it provides.

I don't expect we'll see one, but we will see REST and HTTP clients and 
HTTP and HTTPS servers on OpenVMS, and those are vulnerable, too.   
Again, we can live in the past, with the pleasantly dangerous delusion 
that "OpenVMS is secure", or we can migrate to more secure versions of 
OpenVMS — VSI is working on that — and to security features and 
processes and upgrades which better contend with our current 
environment.   Or we can migrate to other platforms which do provide 
support for the environment we are in now.   We're not in the Y2K era 
any more.   Security and authentication and increasingly automated 
tools are what we're all working with and contending with, attackers 
and defenders both.

Again: we can live in and can desire and seek Y2K-era security and 
long-term server stability and the rest of the uptime era, or we can 
deal with the environment we have now, with the need to deploy patches 
more quickly, and prepare for the environment we're clearly headed 
toward.   Wrist watches commonly have more capacity and more 
performance than most of the VAX servers.   For those folks here that 
are fond of disparaging or ranting about Microsoft or other vendors, 
please do look at what they're doing, what they have available now, and 
what they're working on.  Microsoft and Linux and other choices are far 
more competitive than they once were, far more secure, and are far 
ahead of OpenVMS in various areas.   The sorts of areas that show up on 
RFPs and bid requests, too.   Times and requirements and environments 
all change.   We either change, or we and our apps and our servers 
retire in place.

In this case, that means newer Samba or a replacement SMB server 
package, or use of WebDAV or other alternative protocols, or shuttering 
the OpenVMS servers at the sites that require services OpenVMS can no 
longer provide or can no longer provide securely.   Going toward 
embedded and emulated and static and eventual replacement, and not 
coming back, and not getting new deployments and upgrades.

We're headed for 2022 and 2027, and not back to Y2K.


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list