[Info-vax] What to do with my VAX.....
seasoned_geek
roland at logikalsolutions.com
Wed Nov 11 10:19:30 EST 2020
On Monday, November 2, 2020 at 4:08:04 AM UTC-6, Alexander Schreiber wrote:
> seasoned_geek <rol... at logikalsolutions.com> wrote:
> > On Saturday, October 17, 2020 at 9:10:35 AM UTC-5, Bill Gunshannon wrote:
> > There is absolutely no way of securing any system using *nix based
> > TCP/IP when it is connected to the Internet.
> That is, to say it politely, utter nonsense. Yes, securing a network service
> is a non-trivial exercise, because it requires more than just grabbing
> random code from the Internet, nailing it together and calling it done
> (e.g. the NodeJs and friends approach). You need to actually understand
> what your are trying to achieve, what you are doing, pay attention to
> security starting at the design stage and be competent. If you can't
> measure up to this, you have no business building network services.
>
> That is entirely doable and being demonstrated on a daily basis.
You mean they are breached on a daily basis. So often in fact they hardly make the news unless they set a new identity theft record.
> > Lots of places dusting off
> > old proprietary protocols for internal networks, putting one or two
> > sacrificial machines out on the Internet and only installing/allowing
> > the proprietary protocol between them and the internal network.
> Well, there are clueless idiots in charge everywhere:
> - Shannons Maxim applies ("The enemy knows the system.")
> - proprietary protocols means fewer people have looked at the design
> and implementation, it's less widely used, less stress tested and
> most likely has bugs that more commonly used services fixed ages
> ago
Like the Bash security breach exploited for ~25 years before being outted in public?
More information about the Info-vax
mailing list