[Info-vax] Security, support and VMS, was: Re: A new VMS?
abrsvc
dansabrservices at yahoo.com
Mon May 3 14:12:47 EDT 2021
On Monday, 3 May 2021 at 12:28:34 UTC-4, Simon Clubley wrote:
> On 2021-05-03, David Turner <dtu... at islandco.com> wrote:
> > Well I was talking more about simple support. Not patching etc
> > There are a lot of customers out there happy and content with their
> > current status.
> > They just need a hand held when something goes wrong
> > I would say that goes for the majority of users out there.
> >
>
> Huh ??? The majority of VMS users don't care about keeping their
> systems up to date and fully patched ???
>
> I am having a hard time believing that...
>
> This isn't 20 years ago and anyone who acts like it is will find
> this out sooner or later.
>
> The thing about security is that you simply don't know if the
> next security issue that will affect you is just around the corner.
>
> Please tell me David is very wrong about this and that most VMS sites
> do consider themselves to be just as vulnerable as everyone else
> and take all the usual precautions as a result.
>
> If he is right about this, just think about what will happen when
> one of the security researchers decide to probe x86-64 VMS. Much of
> what they find, and they _will_ find vulnerabilities, will apply to
> earlier architectures as well.
>
> Simon.
>
> --
> Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
> Walking destinations on a map are further away than they appear.
If you take what you say to its full extent, than you would never see VAX/VMS V5.5 systems running today, nor Alpha V7.3-2 systems running today. I currently support both for more than 1 client each.
Yes, many OpenVMS systems remain at "known" levels for extended periods of time. This is one of the reasons for uptimes measured in years.
I would posit that until OpenVMS runs native on the hardware, the majority if not all
More information about the Info-vax
mailing list