[Info-vax] VMS internals design, was: Re: BASIC and AST routines

John Doppke jdoppke at gmail.com
Sun Nov 28 09:13:17 EST 2021


On Saturday, November 27, 2021 at 12:46:16 AM UTC-5, Andrew Commons wrote:
> I've been watching this thread with a mixture of amusement and horror. The 
> triggering thread regarding AST routines was equally enlightening. In 
> fact if I ever feel the urge to start a thread here I will probably make 
> the subject line something like this: 
> 
> <My Topic>, was: Re: Something Simon Clubley felt strongly about 
> 
> Purely curiosity to see if it stopped forking :) 
> 
> So, for Simon...
> >> One of the biggest mistakes made is that DEC went to the trouble of 
> >> implementing a 4-mode architecture and then completely blew how it was 
> >> used.
> Well, a bit like Intel implementing a 4-mode architecture and then having 
> Microsoft completely blow how it is used? 
> 
> Note that the OS/2 update that Cutler and Co were originally hired to work 
> on used 3 of the modes. When Windows looked like becoming a success then 
> it switched to a Windows upgrade instead. Gates wanted it to run on 
> consumer hardware, so things got dropped. There are still 4 modes available 
> and I'm sure VSI are using them.
> >> That 4-mode architecture could have provided some really truly radical 
> >> internal security separation within VMS, but once you are in any of the 
> >> 3 inner modes, you can get to any of the other inner modes so all those 
> >> extra modes were wasted from a security isolation point of view.
> Put your money where your mouth is. Prove it. Post examples that show a 
> fundamental flaw rather than an Ooops in a single privileged program.
> >> In case you are wondering, you can escalate from supervisor mode because 
> >> DCL has access to the privileges of the programs it runs even though it 
> >> doesn't actually need them. That kind of thing should have stayed within 
> >> the kernel so DCL never sees those privileges.
> If this was such a huge fundamental problem I would expect masses of 
> vulnerability reports. Where are they? Post examples. 
> 
> When a program runs in a privileged context then those writing the program 
> obviously need to exercise care. Ideally you enable/disable privileges 
> in a Just In Time basis and, obviously, when you are operating in a mode 
> higher than the originating mode any inputs from the lower mode must be 
> treated with caution. Failing to do this on one occasion does not invalidate 
> the security model. 
> 
> I will now scrub my cookies and history back to bedrock which I recommend 
> after logging in to anything Google related.

Every time I see these posts I think "My God, what have I started?"



More information about the Info-vax mailing list