[Info-vax] Next release of OpenVMS x86

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Fri Jul 10 13:37:29 EDT 2020


On 2020-07-10, Dave Froble <davef at tsoft-inc.com> wrote:
> On 7/10/2020 7:51 AM, IanD wrote:
>> I'm very well aware there is VSI management who are putting their
>> spin on things, I also don't like the fact that they publicly stated
>> VMS security as being the best, I think it is foolish. A statement
>> that they were not relying on VMS's solid track record in regards to
>> security would have been better in my view
>
> Ok, perhaps there could be possible vulnerabilities.  But, if they are 
> not exploited, for whatever reason, then they are not yet an issue.
>

There are always vulnerabilities to be found.

If you are lucky, they will be reported so they can be fixed.

If you are unlucky, they will be hoarded and silently used to compromise
systems.

IOW, just because _you_ have not heard of an exploit doesn't mean they
don't exist.

> Nothing is perfect.  And note, the claims do not say VMS is impervious, 
> just rather good.  Seems to me some work is happening to make it even 
> better.
>

Yes, VSI do pretty much claim the former. The claim from VSI management
is that VMS is the most secure operating system on the planet, which is
nonsense, especially when other operating systems have much more advanced
security capabilities.

For example, Linux has SELinux MAC security and VMS has nothing like that.

The seL4 microkernel has been formally verified.

VMS doesn't even have basic protections (by today's standards) such as ASLR.

So tell me David, do you agree with VSI management's statement and if so why ?

> So their claims don't bother me.  Until there are successful exploits, 
> it is secure.  Perhaps there will never be any successful exploits.
>

What would you call my DCL vulnerability ?

> Carefully note that any past exploits did not happen on the software VSI 
> is currently distributing.
>

https://vmssoftware.com/pdfs/security/2018/03/VSI_CVE-2017-17482.pdf

Note that the security vulnerability page mentioned in that PDF was
removed by VSI sometime around several months after that PDF was finally
released. Why VSI would go to the effort of doing that is beyond me.

>>
>> Let's not sink the VMS ship before it's had time to sail but I do
>> agree with you, it was silly to promote it's security virtues when
>> it's been many years since it's come under a modern microscope
>> analysis in regards to attacks and exploits
>
> Haven't seen any of those "modern microscopes" lately ....
>

That's nothing for you to be proud of David. You are not expected to
be a security expert but you should at least have a familiarity with
today's security issues and attack methods when you are writing software.

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.



More information about the Info-vax mailing list