[Info-vax] WASD startup and shareable images
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Mon Jul 8 16:31:59 EDT 2019
On 2019-07-08 19:39:04 +0000, Dave Froble said:
> On 7/8/2019 1:59 PM, Simon Clubley wrote:
>> Regardless of what some people might tell you, VMS is just like any
>> other operating system when it comes to vulnerabilities.
>
> Actually, that could be a good thing.
>
> Hobby usage is not suppose to be used for commercial and such purposes.
> Therefore, what is lost if the system is compromised? If the intrusion
> method is recognized, future protection against such could be
> implemented.
>
> Recovery is as simple as an image restore of the disk.
>
> Everyone does do image backups, right?
Assuming the breach is isolated and hasn't been extended through the
user's whole network. Some folks aren't good at network isolation, and
aren't good at locking down local network traffic, though.
And assuming the folks didn't use the OpenVMS box for DDoS and other
shenanigans. There have been some quite persistent folks fond of using
DDoS tools on OpenVMS to hose other folks elsewhere on the network. To
my then-surprise, some of the available DDoS tools do directly work on
OpenVMS and without modifications, too.
And that's ignoring the mess that reflection attacks and other dreck
have caused for network usage and for other sites on the 'net, due in
no small part to down-revision server software on OpenVMS. The OpenVMS
NTP server was very popular for folks conducting reflection attacks.
Then there's the insecure connections, such that a remote access into
OpenVMS may well compromise the access credentials necessary. I've had
my Wi-Fi traffic captured some years ago. Sitting in a then-HP
senior-level security presentation, as well as again in a session
presented by Whitman and other senior then-HP folks.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list