[Info-vax] OpenVMS books

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Mon Jul 31 13:12:37 EDT 2017


On 2017-07-30 00:48:38 +0000, Kerry Main said:

>> 
>> -----Original Message-----
>> From: Info-vax [mailto:info-vax-bounces at rbnsn.com] On Behalf Of
>> Simon Clubley via Info-vax
>> Sent: July 25, 2017 2:20 PM
>> To: info-vax at rbnsn.com
>> Cc: Simon Clubley <clubley at remove_me.eisner.decus.org-Earth.UFP>
>> Subject: Re: [Info-vax] OpenVMS books
>> 
>> As soon as some security researchers spent the time to find out a 
>> little _something_ about VMS internals, they discovered pure VMS 
>> vulnerabilities (ie: SMG) which the earlier researchers had missed.
>> 
>> The low figures could simply mean that to date no-one has been 
>> motiviated enough recently to learn enough about VMS internals in order 
>> to be able to probe it for vulnerabilities using modern probing 
>> techniques.
> 
> Or.. since we doing the "lets do some pure 100% speculating", the 
> alternate speculating might be that the security researchers tried to 
> hack recent (not 15+ year old UCX bugs) versions of OpenVMS and they 
> gave up trying


I have accrued a list of several hundred CVEs that I suspect or that I 
know apply to OpenVMS and various LPs.    I track security 
notifications as part of helping me understand attacks and to help 
customers manage their servers.  (A number of these CVEs were acquired 
from lists of Linux CVEs that have been occasionally referenced here in 
comp.os.vms, too.)

But for many of these sites, there's little point in the effort when 
the operating system still offers and many folks are still using 
telnet, FTP and DECnet with OpenVMS, too.

VSI is moving forward on some of the security issues that have been 
reported here, and VSI IP will certainly address a number of CVEs, 
though there are other issues discussed here that are more involved and 
far more complex to resolve.   Downside is that this security treadmill 
doesn't ever end.   As one popular comment goes: "servers are 'secured' 
like lawns are 'mowed'".

VSI clearly has a whole lot on their plans and their development 
schedules, too.    Security is one part of that plan and those 
schedules, but there's other fundamental work that is necessary for 
OpenVMS and not the least of which is the x86-64 port.   In the 
interim, some of the security work can continue to be deferred by 
informing folks to isolate certain traffic on private networks for 
OpenVMS servers or other similar remediations, though that sort of 
server and network isolation is increasingly difficult to sustain.





-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list