[Info-vax] OpenVMS x64 Atom project

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Fri Jun 4 14:09:23 EDT 2021


On 2021-06-04, ultr... at gmail.com <ultradwc at gmail.com> wrote:
>
> So are you saying that OpenVMS security features and 3 layer security doesn't work, or that they were compromised due
> to poor or no security implementation?
>

If you are referring to KESU access above, then, when it comes to security,
VMS has exactly 2 layers; a single user-mode outer layer and a single
inner-mode inner layer with the single inner layer split across 3 hardware
layers.

> Or are these holes being introduced by your garbage c programs not terminated properly producing buffer overflow holes?
>

All new code in VMS is written in C. This is better than what came before
because the only two things worse than C for writing secure code are
assembly language and BLISS.

And before all you BLISS users jump on me for that, even C has much more
functionality than BLISS does when it comes writing code that allows the
compiler to find data type errors and other similar errors at compile time.

> If OpenVMS security features such as ACLs work PROPERLY,  running live or backend to some junk linux box that gets compromised
> should not affect a properly configured OpenVMS box.

I take it you missed the recent comments about ransomware on VMS ?

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.



More information about the Info-vax mailing list