[Info-vax] Encryption, Security (was: Re: What to do with my VAX.....)

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Fri Nov 20 10:52:59 EST 2020


On 2020-11-20 13:37:22 +0000, Simon Clubley said:

> What people like you and Phillip need to understand is that 
> vulnerabilities exist everywhere and the less popular the OS, the more 
> likely they are to be silently exploited until a security researcher 
> finally invests the time to probe the OS.

Security through obscurity. The obscurity of the whole platform, in 
this case. And I too expect that detailed investigations will find 
additional exploits, though the still-prevalent usage of unencrypted 
storage protocols and of DECnet and telnet and ftp can all make that 
extra investment unnecessary for many targets.

> VMS has many good features but it doesn't mean that you can ignore some 
> uncomfortable truths about security on VMS and claim there isn't a 
> problem on VMS simply because no-one has invested the time to find 
> those vulnerabilities yet.

Or somebody has found exploits, and has been quietly sitting on those 
exploits. That DEF CON SMG exploit a while back sure looked like 
somebody leaked an exploit from a cache of vulnerabilities somewhere.

Exploit usage and exploit value differs for rare systems, and for those 
systems that are ubiquitous. An OpenVMS botnet makes little sense, as 
there are so few around. There are presently just shy of 1300 OpenVMS 
systems connected and accessible via the internet, with others not 
directly accessible and maybe a few more accessible but sufficiently 
masking their own identity.  For a more ubiquitous system, use as a 
botnet or other mass exploitation becomes more interesting. Usage which 
then exposes the exploits.

General:

AES symmetric encryption brute force is beyond current known 
capabilities. Brute-force timescales where we could more quickly visit 
other stars with our current tech. This absent either side channel 
access to the software using the keys (faster, though 
processor-integrated AES support reduces the vulnerability to side 
channel access), or an error in a specific encryption implementation, 
or with a whole lot of known plaintext (still beyond slow). This being 
security by design, rather than obscurity. And if somebody does have a 
trapdoor in AES, they're not going to want that known.

TLS asymmetric encryption design errors and attacks, and TLS 
implementation errors, have been more prevalent, with TLS itself 
receiving updates. TLSv1.3 is current, earlier protocol implementations 
are known to have weaknesses. I would not recommend using anything 
prior to TLSv1.2. As vulnerabilities and exploits are identified, 
remediations are implemented.

OpenVMS has some support for AES and for TLS, but does not have a 
cryptographic framework that can isolate apps from and abstract the 
lower-level changes and updates, for those apps that do use AES or TLS. 
I'm here ignoring the long-abandoned CDSA, and referring to an 
abstraction above the current ENCRYPT and TLS APIs. And among other 
gaps, OpenVMS lacks a password store, a certificate store, integrated 
multi-factor authentication, cryptographic secure storage and 
encryption acceleration hardware, and full-device encryption support. 
Intel SGX secure enclave usage might be feasible once the OpenVMS x86 
port is available, but the whole SGX approach has been problematic for 
a while.

OpenVMS VAX security (tying back to the original question) is more 
problematic, as OpenVMS VAX predates the integration of AES support in 
the V8 range, and the TLS and SSH support for OpenVMS VAX is 
third-party where available. And the end of the HPE hobbyist licenses 
will split off those that want VAX from those that want a way to run 
OpenVMS on low-end hardware.



-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list