[Info-vax] VSI strategy for OpenVMS

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Sat Sep 18 12:29:46 EDT 2021


On 2021-09-18 02:28:16 +0000, abrsvc said:

>> 
>> 
>> Everyone here knows about the DCL CVE and the fact it was directly  
>> exploitable on VAX and Alpha (and causes a crash on Itanium, so it was 
>> an open question about whether someone with sufficient skills and 
>> knowledge could do mischief on Itanium).
>> 
>> What you may have forgotten is that a few months before that, I had 
>> found another way to crash DCL by stuffing the recall buffer full of 
>> binary data. That earlier attempt also caused a crash, but it was not 
>> exploitable so nobody had to worry about it from a system compromise 
>> point of view.
>> Simon.
>> 
>> --
>> Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
>> Walking destinations on a map are further away than they appear.
> 
> But,  both cases required being logged into an account correct?
> 
> This is different that an external attach not requiring access.
> 
> So answer this:  If OpenVMS is running on a VM and the VM is 
> compromised, is the problem with OpenVMS or with the VM?

Yes. When a VM is compromised, blame for the problem can be placed both 
within OpenVMS (for not detecting the issue) and the VM (for the 
compromise).

The VM is compromised, so QED.

OpenVMS hasn't gotten around to implementing secure boot, so cannot yet 
verify platform integrity.

https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-secure-boot 


(This as differentiated from the platform verifying that the operating 
system should be permitted to boot, and which VSI has occasionally 
discussed.)

OpenVMS started out in the we-can-trust-the-hardware era, and even 
without a hypervisor—"bare metal"—that assumption of trust is 
increasingly suspect.

> If OpenVMS is running on bare metal, would you expect external vulnerabilities?

Have you met iLO?

OpenVMS sites on HPE Integrity servers in the default configuration 
remain vulnerable to CVE-2013-4786. Which never got fixed. To avoid 
exposing your OpenVMS servers to this wonderful little remote-capable 
brute-force, VLAN or segmentation and/or firewall your OpenVMS servers, 
and preferably disable the feature MP:CM> sa -lanipmi d

That ain't the only one around, either. Down-revision and 
known-vulnerable cryptography still exists within iLO 2, as the iLO 
hardware itself was reportedly insufficiently capable for the 
implementation of newer cryptography.

Intel AMT has had its share of "fun", too. CVE-2020-0594 and 
CVE-2020-0595, among others.

And that's before any discussions of RCE flaws in OpenVMS itself. SMH 
had its share of flaws, for instance.

In general, "bare metal" is becoming a quaint concept. This given how 
many processors and how many disparate puddles of firmware lurk. These 
embedded within the server processor itself (AMT, etc), and variously 
embedded elsewhere within a modern server. Or elsewhere such as in your 
database or your testing and continuous integration.

As for fun with VMs, two recent rotate-your-credentials flaws in Azure.

https://www.theregister.com/2021/09/09/azure_container_flaw/

And anybody using Travis CI should rotate their credentials, too.

Rotating your credentials on OpenVMS is—once you start looking beyond 
SYSUAF and at the DECnet task passwords in the Phase IV database, and 
at Apache credentials, and at the strewn-about ssh and SSL/TLS private 
keys, and at iLO and its certificates, soon iDRAC and AMT—a project of 
some scope and scale, too. I'd be surprised if many of the folks around 
here could reasonably manage that credentials rotation, given what's 
involved and where these can now lurk. (This gets back to my earlier 
comments around password and credentials and certificate stores, and 
FDE, around updating the security manual and the programming concepts 
manual for this millennium, and a variety of other work.)

More of this "fun" will be arising, too. Various OpenVMS sites are 
looking to host their OpenVMS x86-64 servers. Yes, some sites 
absolutely won't host their OpenVMS servers, whether for legal or 
technical or other reasons. But many will. Maybe not production, but 
the build and test servers might be hosted.  q.v. Travis CI flaw.

OpenVMS didn't have a good way to reach into the iLO to look around for 
configuration problems or issues. It'll be interesting to see what sort 
of OpenVMS diagnostics might be available for x86-64 hardware 
configuration settings, as well as for hardware errors and other 
lower-level details. Vendor tie-ins are probably further down the list 
of projects at VSI right now, but maybe we'll eventually see some 
support for customizing OpenVMS for specific hardware akin to the 
probably-long-forgotten "SHIP kit" support for retrofitting drivers.

Ah, well. Pruning down your app and server and network and trust 
configuration is an obvious strategy, not that there are guidelines 
published for that, for system administrators or for app developers or 
for security reviews. And the hardware defaults can surprise the 
unwary, such as with iLO and IPMI. Pretty sure that assuming that the 
devs and the administrators will always do the right thing and will 
never make mistakes—assuming all _know_ what to do, which is suspect—is 
what got us into this mess, though. Mistakes happen. Plan for it. 
Доверяй, но проверяй.


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list