[Info-vax] Security, support and VMS, was: Re: A new VMS?

Phillip Helbig undress to reply helbig at asclothestro.multivax.de
Mon May 3 14:22:58 EDT 2021


In article <s6p8bg$d6m$1 at dont-email.me>, Simon Clubley
<clubley at remove_me.eisner.decus.org-Earth.UFP> writes: 

> Huh ??? The majority of VMS users don't care about keeping their
> systems up to date and fully patched ???
> 
> I am having a hard time believing that...

Do you have some numbers?

Keep in mind that some customers can only rarely reboot, and some 
patches require a reboot.  Maybe the system is on a private network and 
security is just not an issue.  I don't sleep in a suit of armour to 
slightly increase my chances of survival should armed robbers break 
into my home.

> This isn't 20 years ago and anyone who acts like it is will find
> this out sooner or later.

If later is long after the machines have been retired, then not patching 
was the correct decision.

> Please tell me David is very wrong about this and that most VMS sites
> do consider themselves to be just as vulnerable as everyone else
> and take all the usual precautions as a result.

My guess is that most sites won't disclose the information.

> If he is right about this, just think about what will happen when
> one of the security researchers decide to probe x86-64 VMS. Much of
> what they find, and they _will_ find vulnerabilities, will apply to
> earlier architectures as well.

If x86-64 VMS becomes widespread enough that the black hats develop an 
interest in it, then we can celebrate.




More information about the Info-vax mailing list