[Info-vax] OpenVMS Security (was Re: VSI strategy for OpenVMS)
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Thu Sep 16 10:36:17 EDT 2021
On 2021-09-15 23:07:41 +0000, <kemain.nospam at gmail.com> said:
> It will be interesting to see if OpenVMS runs into this same challenge
> not that it will soon be released on X86-64.
That's less about x86-64 hardware itself, and more about the wider
availability of hardware for folks wishing to run OpenVMS, and to then
examine platform security, and sometimes-imprudent security claims.
~None of the open-source code incorporated into OpenVMS is maintained
at current.
ISC BIND, Apache HTTP, Samba, OpenSSL, etc.
AFAIK, none gets pushed upstream. (ISC was surprised to learn that
OpenVMS incorporated BIND.)
AFAIK, none have gotten (valid) CVEs logged against OpenVMS, which is
why CVE counts and related cross-platform comparisons are problematic.
The Common Data Security Architecture (CDSA) implementation was
effectively deprecated an aeon or two ago, and somewhat more recently
was actually officially deprecated:
> DISCONTINUATION OF PROJECT. This project will no longer be maintained
> by Intel. Intel will not provide or guarantee development of or support
> for this project, including but not limited to, maintenance, bug fixes,
> new releases or updates. Patches to this project are no longer accepted
> by Intel. If you have an ongoing need to use this project, are
> interested in independently developing it, or would like to maintain
> patches for the community, please create your own fork of the project.
>
> ====>Due to the age of the code, the cryptography should not be used in
> any new products.<====
>
> This repository may be deleted on or after June 30, 2020.
>
> CDSA is a security middleware specification and reference
> implementation that is open source, cross-platform, interoperable,
> extensible, and freely exportable
Among closed-source apps, some holes known in SMH were verified to work
against SMH on OpenVMS, though SMH is unlikely to be a focus of any
substantial new VSI work, it's still home to various SNMP (SNMPv2!)
MIBs.
And DECnet should have been explicitly deprecated years ago. Not that
there was ever a great migration path provided.
VSI folks have been making progress here—all discussions of imprudent
VSI marketing claims aside—though the efforts and the investments
involved in keeping current will never slow.
And the above does not apply to OpenVMS-unique security issues, which
can and have existed. More just waiting for somebody to fuzz the APIs,
as I suspect happened with that SMG bug.
TL;DR: Don't run a flat internal address space, seriously consider
enabling external authentication, do firewall your OpenVMS servers, and
look for and be aware of and work to remove any insecure protocol usage
(telnet, ftp, DECnet, SCS, etc) by apps active on your OpenVMS servers.
We all get free penetration tests. Whether we also get the findings
reports?
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list