[Info-vax] VMS and security
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Tue Nov 8 16:28:25 EST 2022
On 2022-11-03 13:42:27 +0000, Simon Clubley said:
> On 2022-11-02, IanD <iloveopenvms at gmail.com> wrote:
>>
>> I would have thought VMS could leverage it's historical reputation in
>> security to give it an advantage against Linux at least, but I'm not
>> convinced it has done enough to ensure it's up to date in the modern
>> security landscape and it really needs to make sure it has it's ducks
>> all in a row and then some because any failure in the security arena
>> could/would end VMS chances of making a comeback
>
> Unfortunately, the idea of VMS security somehow being comparable to
> today's expected security standards is utterly delusional.
>
> Even Linux is _far_ in advance of what VMS offers.
Write a secure app with encrypted data storage, with secure key
management, with encrypted and authenticated connections checking
client and server certs, with IPv4 and IPv6 support, integrate the
results with LDAP, and with the OpenVMS system configuration such that
the app won't allow access all over if it's breached (e.g. sandboxing).
If the goals involve writing an app from before Y2K and with older
security requirements, or incrementally updating security in same,
sure, OpenVMS does fine. But... have y'all thought about how much is
missing from the programming concepts manual and the security manual,
and how much of what does exist for documentation is just scattered
around in mostly-unrelated OpenVMS and layered product manuals, or
sometimes in comments in files, or documentation at related websites?
Connecting using public key authentication using common root certs—the
Mozilla server root cert list, for instance—is itself more of a project
than it ever should be. Can this stuff be done with OpenVMS? Sure. But
there are myriad ways to screw it up. Too many subtle ways, too.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list