[Info-vax] VMS and MFA?

Arne Vajhøj arne at vajhoej.dk
Fri Aug 21 17:29:21 EDT 2020


On 8/20/2020 9:54 PM, Dave Froble wrote:
> On 8/20/2020 6:22 PM, geze... at rlgsc.com wrote:
>> The OS security mechanisms are outside of the applications control. If 
>> set properly, applications have no choice. An application bug in a 
>> non-privileged, user state application cannot cause a cascading 
>> security hazard.
>>
>> In effect, bounds checking and applications-resident security is the 
>> equivalent of instructing your 3-year old "Do not touch the stove.". 
>> OS security measures are putting a card key lock on the door to the 
>> kitchen. Whether the toddler adheres to the instruction or not, they 
>> are not getting into the kitchen without the card key.
> 
> It's all design and programming.  Why give greater trust to something 
> included in an OS?  That's a false trust.
> 
> Software not part of an OS distribution can be every bit as secure, and 
> sometimes more so.  It is quite often more useful.
> 
> I sense bigotry.  That's Ok, if one wishes to place their trust in that 
> manner.  But I will suggest that it may be more work, and significantly 
> less useful than software designed and implemented for specific needs.

It is mostly a matter about specialization.

The OS vendor may have 1 person working full time on this specific
security aspect.

The 10000 ISV's supporting the OS may each have 1 person working mostly
on the business application and 20 hours per year on the security
aspect.

In most cases the dedicated specialist will do better.

> I can state that in over 40 years of users, not once has my menu 
> software had security violations.  Not saying it cannot, just that it 
> has not.  It also does a rather good job meeting the requirements.

Strictly speaking you only know that nobody has been caught
breaking the system or has found a way and told you.

:-)

Arne





More information about the Info-vax mailing list