[Info-vax] What to do with my VAX.....
seasoned_geek
roland at logikalsolutions.com
Fri Nov 20 07:35:20 EST 2020
On Wednesday, November 11, 2020 at 6:16:54 PM UTC-6, Arne Vajhøj wrote:
> On 11/11/2020 11:52 AM, seasoned_geek wrote:
> > On Tuesday, November 3, 2020 at 8:24:16 PM UTC-6, Arne Vajhøj wrote:
> >> On 10/18/2020 7:33 PM, seasoned_geek wrote:
> >>> On Sunday, October 18, 2020 at 12:34:14 PM UTC-5, Grant Taylor
> >>> wrote:
> >>>> On 10/18/20 3:17 AM, seasoned_geek wrote:
> >
>
> But I hope that server installation does not rely on those.
> Having a system protect itself is not as good as having
> another system in front.
A very large number are, that is why there is so much documentation on how to set it up.
>
> > Even when one has a firewall in a router, PASSTHROUGH PORTS ARE ENABLED for many things.
> Hopefully all ports inbound are closed.
They generally cannot be.
> > A firewall is not taking a free-form XML/whatever "open" Internet
> > message and chopping it down into a fixed field length fixed record
> > width message for a queue. This means the people stuffing a billing
> > characters or some other nonsense into that free format message to
> > trigger an overrun so they can perform an SQL injection or some other
> > hack physically can't happen. When someone tries to move a billion
> > characters into a COBOL PIC X(25) field, what happens? The first 25
> > characters make it and the rest land in the bit bucket.
> Protocol conversion is sometimes used.
>
> But then it will typical be:
>
> --firewall--protocol conversion--firewall--backend system
>
> For the same reason as firewall in front of system is better
> than "software firewall" on system. Better isolation - less risk
> in case something bad happens in the protocol conversion.
>
> And stuffing into fixed length format is totally insufficient
> as data validation.
Nobody said it was data validation. It is protection. By itself it stops 100% of the data overrun exploits and an extremely high number of SLQ injection techniques. I won't say all because I cannot be certain there isn't one that can do it within the 35 characters allowed for a street address line.
> > You are completely incorrect about Security by Obscurity as well. ALL
> > ENCRYPTION is security by obscurity. Period.
> Not by the definition of security by obscurity commonly used.
Not by _your_ definition.
Encryption is simply bragging about the size of the forest one is about to hide a tree in, falsely believing the tree cannot be found.
AGILE is not software engineering. It is so far from software engineering it cannot even mail a letter to software engineering, yet _your_ definition of software engineering allows for it.
Chanting the mantra of "no known vulnerabilities" does not make something secure.
More information about the Info-vax
mailing list