[Info-vax] Problem with Filezilla connecting to OpenVMS

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Mon Dec 10 00:26:05 EST 2018


On 2018-12-10 04:07:32 +0000, Kerry Main said:

> The OpenVMS Customers you are talking about are, in most cases, very 
> seasoned and experienced professionals. They take their roles serious.

Based on the direct feedback I've received from a number of attendees 
at the various OpenVMS security sessions I've presented in recent 
years—and while the attendees most definitely take their roles 
seriously—there's not much in the way of security-related information 
around OpenVMS, and around the sorts of shenanigans that are arising in 
networks.  And the feedback received after presenting to these rooms 
full of those seasoned and experienced OpenVMS professionals?  More 
than a few of the attendees later commented that they'd had their eyes 
opened at what's going on.  And the OpenVMS doc here is severely 
lacking, at best.

And if anyone here is hypothetically dealing with a staff that is very 
familiar with OpenVMS security and with general system and app and 
network security issues, it is still foolhardy not to confirm each and 
every security issue found.  The technical staff might or might not 
realize the specific risk or specific exposure even exists.  For 
whoever might find the issue, they don't want to end up owning the 
fallout from a previously-unrecognized exposure, either.  Log the 
concern or the vulnerability in the issue tracker, or in the 
communications, or whatever the appropriate channel might be.  Then the 
seasoned and experienced OpenVMS professionals—or the folks that have 
taken over management and operations of the servers when the original 
OpenVMS staff all retired, as also happens—can make the appropriate 
local decisions and trade-offs.

And this all also presumes that the management folks involved are 
playing on the level.  Most do, of course.  But some management folks 
can seek to shift blame away from themselves and their decisions and 
their organizations.  Or to recoup losses.  Which means paper trails.

I'd like to continue as we had been able to operated in the previous 
millennium in terms of server and network and data security, but that's 
increasingly not an option.  VSI has substantial work ahead here too, 
with security-related work within OpenVMS, and with reworked or wholly 
new documentation and training, seeking to better secure and better 
educate app developers, users, and administrators.



-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list