[Info-vax] How would you load balance excess webserver traffic between multiple OpenVMS servers?
Chris Scheers
chris at applied-synergy.com
Tue Jan 12 17:46:05 EST 2021
In a similar vein, there was a bug in about the VMS 4.4 (4.6?) time
frame that allowed an unprivileged user to gain write access to SYSUAF.
I had a FORTRAN program that was about 20 lines long that could modify
any user record, including granting privileges.
Stephen Hoffman wrote:
> On 2021-01-12 13:52:49 +0000, Simon Clubley said:
>
>> If that's what you think security is all about in 2021 Bob, then you
>> simply don't have a clue about what is involved.
>
> Bob has an unshakable confidence in the validity of his one answer to
> any and all computing requirements: OpenVMS.
>
> That answer might have been ~feasible ~30 years ago.
>
> Tasks and requirements and expectations and competition and pricing and
> apps are all very different now.
>
>> BTW, you don't even have to go through security, you can go around it.
>> That's exactly what I did and all the protections and ACLs would have
>> made absolutely no difference.
>
> A local-privilege escalation is a local-privilege escalation. OpenVMS
> has had a few. I've attached one of the more famous (earlier) examples
> below.
>
> This is where jails / sandboxes and app isolation is expected. OpenVMS
> doesn't particularly isolate apps, and trying to use ACLs gets...
> interesting. I've had DECinspect break my configurations, when the
> lock-down tooling was used. (Back when DECinspect was in more common
> usage, too.) A fair chunk of work atop SEVMS would be required from VSI
> to add jails/sandboxes/isolation, particularly with integrity and
> signing—secure delivery is rather more involved when the apps themselves
> cannot be trusted to be free of malware and free of flaws. And then
> there's app auditing and app provisioning and app updates and a variety
> of other topics. Getting this all configured and going is the smaller
> part of the work too. Keeping this going and keeping this secure and
> apps current and isolated and secure is no small investment in time and
> tooling and focus.
>
> There's also little app development guidance available for writing
> secure apps for OpenVMS, which doesn't help. The security manual omits
> much that is expected of apps in this networked era.
>
>> To everyone else: I keep warning you about security researchers
>> possibly taking a serious interest in probing VMS at some point in the
>> future and about everything that could come from that.
>>
>> If Bob sets up some kind of conservative social networking environment
>> using VMS (which it is a poor choice for anyway), then that is
>> _exactly_ what is going to happen.
>
> Bob and the particular "maybe" project most recently now seems moot, as
> the "maybe" customer has reportedly acquired different hosting.
> Ignoring that for the moment, and reviewing some other of Bob's
> discussions for those that are unfamiliar...
>
> Bob has previously recommended replacing Microsoft Windows desktops with
> OpenVMS, had widely recommended OpenVMS be used within voting machinery,
> and now as a high-profile and contentious "maybe" hosting project.
>
> Could OpenVMS do these tasks? Given far too much budget and far too much
> time and far too much retraining and a whole lot of work prolly yes, but
> all that very far from economically and easily, and likely not securely.
>
> Desktop: Approximately no desktop apps and no Office compatibility and
> no two-factor and no modern browser for OpenVMS—that'd all have to be
> found or built or added.
>
> Embedded: Approximately no benefit and a whole lot of cost for embedded
> usage, and which fundamentally doesn't address the issues and risks
> involved with any embedded software.
>
> Web hosting: Little tooling is available for running a high-profile and
> contentious website and one with other issues as discussed in that
> thread as well as an app that is a DDoS and intelligence service target,
> and one that reportedly has problems with payment gateways and with
> getting their client apps onto the major app stores. Though Bob has the
> opportunity to create the necessary prototypes here, using real data
> from the "maybe" API.
>
> VSI has piles of work ahead with the x86-64 port. Little of which
> includes OpenVMS for desktop and updates to the apps and tooling that
> everybody* expects to have access to, little includes OpenVMS for
> embedded—seL4 was previously recommended for a secure host platform for
> embedded use though that too necessarily requires knowledge of and
> integration with election auditing (and approximately none of this
> addresses the issues Bob believes it would), and little includes OpenVMS
> for high-end web hosting and related services and which typically
> involves keeping a current Apache and related tooling and prolly nginx
> or other web server, as well as one or more application servers (Twisted
> and/or Tornado and/or Zend, etc), as well as Python. And for sites that
> can be subject rapid scaling, there'll be the need for tooling to keep
> OpenVMS current across a variable and potentially increasing number of
> hosts, to quickly deploy patches, for geographic server distribution for
> robustness and recovery and latency, log collection and analysis and
> intrusion detection, and that'd have to be locally written and/or
> acquired and integrated. Little of which includes app isolation, R^X,
> jails, etc. And that's all before we discuss the carrying costs of
> having hardware available for high or peak loads. Approximately none of
> which is in the plans, and all of which already exists on other
> platforms and products and apps that target these disparate markets. The
> x86-64 port will have some benefits around using hosting for added
> capacity and for peak loading, though that necessarily means hosting,
> and it means you'll have to expect insecure or hostile peers, though
> it's wise to assume your local networks also have hostile peers connected.
>
> Can OpenVMS do this stuff? Sure. Cost-effectively, and with a
> reasonable deployment timeline? Nope. VSI is working to address some of
> this, and particularly for existing OpenVMS customers. The folks running
> "maybe", not so much.
>
>
> Local-privilege escalation:
>
> OPERATING SYSTEM: VAX/VMS V2.1
> PRODUCT: VAX/VMS
> COMPONENT: LOGINOUT
>
>
> GRPNAM SECURITY HOLE IN LOGIN
>
> PROBLEM STATEMENT:
>
> The GRPNAM privilege is an evil demon, allowing the user to
> invoke its secret entrance for all manner of nefarious
> purposes not originally intended.
>
>
> RESPONSE FROM DEC:
>
> The great wizard VMS confronted the demon, raised his great
> oaken staff carved in ancient runes, and spoke the magic
> incantation:
> "$SETPRV IMAGEACTIVATIONENHANCEDPRIVILEGES $CMKRNL!!"
> There was a blinding flash of light and puff of smoke, and
> the demon, reduced to harmlessness, scurried off into the
> distance.
>
> Where his secret entrance had been was naught but a little
> pile of ashes, which the wind slowly drifted into letters
> spelling the words "FIXED IN V2.3".
>
>
--
-----------------------------------------------------------------------
Chris Scheers, Applied Synergy, Inc.
Voice: 817-237-3360 Internet: chris at applied-synergy.com
Fax: 817-237-3074
More information about the Info-vax
mailing list