[Info-vax] Questions and observations about OpenVMS

Phillip Helbig undress to reply helbig at asclothestro.multivax.de
Sun Mar 7 15:29:33 EST 2021


In article <s2302h$sbd$1 at dont-email.me>, Simon Clubley
<clubley at remove_me.eisner.decus.org-Earth.UFP> writes: 

> > 1) DECnet - It has been said in the past that this is NOT a secure
> > mechanism and in reality its use has been discouraged.  The cases where it
> > is currently used (for my clients anyway) are only where there are networks
> > that are NOT connected to the outside world.  In these cases, security is
> > not as necessary as there is a gap to the outside world.  Here, the
> > connections for applications are through known pathways using the OpenVMS
> > systems as backends.  No direct "user" access other than the
> > administrators.
> 
> That works great until the local network gets compromised.

If the local network gets compromised, you likely have much bigger 
problems than insecure DECnet on that network.

> VMS Mail got altered a decade or two back to stop displaying some escape
> sequences in an email to stop them causing abuse. I don't know the details
> as they were never published in the notice I remember seeing.

Characters with ASCII codes higher than } are displayed as $.




More information about the Info-vax mailing list