[Info-vax] OpenVMS x64 Atom project
Simon Clubley
clubley at remove_me.eisner.decus.org-Earth.UFP
Fri Jun 4 14:09:23 EDT 2021
On 2021-06-04, ultr... at gmail.com <ultradwc at gmail.com> wrote:
>
> So are you saying that OpenVMS security features and 3 layer security doesn't work, or that they were compromised due
> to poor or no security implementation?
>
If you are referring to KESU access above, then, when it comes to security,
VMS has exactly 2 layers; a single user-mode outer layer and a single
inner-mode inner layer with the single inner layer split across 3 hardware
layers.
> Or are these holes being introduced by your garbage c programs not terminated properly producing buffer overflow holes?
>
All new code in VMS is written in C. This is better than what came before
because the only two things worse than C for writing secure code are
assembly language and BLISS.
And before all you BLISS users jump on me for that, even C has much more
functionality than BLISS does when it comes writing code that allows the
compiler to find data type errors and other similar errors at compile time.
> If OpenVMS security features such as ACLs work PROPERLY, running live or backend to some junk linux box that gets compromised
> should not affect a properly configured OpenVMS box.
I take it you missed the recent comments about ransomware on VMS ?
Simon.
--
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.
More information about the Info-vax
mailing list