[Info-vax] Next release of OpenVMS x86
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Mon Jul 20 15:00:51 EDT 2020
On 2020-07-20 17:47:55 +0000, Simon Clubley said:
> 2 vulnerabilities that came to public attention in recent years, not
> the number of vulnerabilities found and fixed and which may not even
> have had CVEs assigned.
There have been various security fixes over the years.
Most did not have CVEs.
I distinctly remember seeing a crash report that was posted, and that
looked to be exploitable. That got fixed. No CVE for that.
CVE comparisons across platforms are patently absurd, and for multiple reasons.
And vendor-initiated CVE comparisons, when the vendor doesn't request
and doesn't issue CVEs for their own security fixes, is a questionable
look.
> BTW, didn't VMS V6 go through a major hardening exercise to fix a
> number of security weaknesses ?
V6.0 was the last round of security enhancements; that was the Class B1
and Class C2 integration work, with other security enhancements.
CDSA came along too, and has seemingly now overstayed, and digital
certificate support needs to finish arriving and to start integrating.
App isolation, and app and system automation, and hosted server
operations, and remote installs, will all bring along new requirements.
There's another round or three of security feature updates waiting for VSI.
> DECnet has also had successful attacks against it in times gone past.
Outside of under- or un-maintained legacy apps and the frozen-forever
configurations, DECnet should not be in use. Nor should telnet. Nor
ftp.
That these and similarly-insecure protocols are still around and in the
default install config is hilarious for "the world's most secure
operating system".
> Network printers are still used on internal networks to print
> documents. That doesn't stop them from also being used to attack the
> rest of the internal network if they get compromised.
Yep. And the internal networks are far less internal than they once were.
> Are you sure ? It [possible IP vulnerabilities] might actually be the
> other way around.
I've chased some nice security-related messes over recent years, and
including a couple of OpenVMS servers were, for instance, getting
buried by NTP reflection attacks and DDoS shenanigans.
With the NTP vulnerability, OpenVMS was busy, and the network link got
full. That got patched.
And the continued existence of unencrypted and password-exposing email
POP/IMAP network connections isn't auspicious, if we're quibbling about
cleartext protocols.
And as for portability, I was playing Whac-A-Mole with a user and a
perl DoS tool that was running on OpenVMS, targeting others. Worked
fine on OpenVMS, too.
And the available tooling options increase with x86-64, even if the
exploits aren't usually all that portable. Perl DoS tools and such
aside.
> Don't forget that VMS doesn't even have ASLR let alone KASLR.
There's other work waiting here, too.
Try isolating an app against a latent vulnerability, even if it's an
app that's believed non-malicious, What's involved here is hand-tweaked
coding. And the isolation options are limited.
And necessary details such as app-specific usernames are still
system-wide, and with the "fun" of coordinating UIC allocations,
coordinating those wonderful personality logical names, and a host of
other subtle details.
1980s-style management and manual coordination was nice, but it's
really hard to automate that. And it's limited, with the sorts of
shenanigans our servers are now encountering.
> SELinux has stuff like this built in:
>
> https://en.wikipedia.org/wiki/Security-Enhanced_Linux
SEVMS is mostly latent. B&L-style security is approximately unusable
for most folks and most apps, though. And does little to address
app-level security, when it's the apps that are increasingly untrusted,
or increasingly vulnerable.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list