[Info-vax] Why not reimplement SEVMS into x86 OpenVMS?
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Mon Nov 21 19:22:46 EST 2022
On 2022-11-21 23:58:10 +0000, Single Stage to Orbit said:
> On Mon, 2022-11-21 at 15:27 -0500, Stephen Hoffman wrote:
>> OpenVMS is bad at isolating compromised apps. It's sorta-kinda possible
>> if the local folks are good at this stuff and expend some effort
>> messing about with ACLs on all sorts of stuff within the app, but still
>> comparatively limited. And it's very easy to miss something. Absent MAC
>> security, an app can expose its own data, or can potentially perform
>> various unintended-by-the-developer activities at run-time. The latter
>> is the sort of stuff that usuallyy gets blocked by pledge() calls, or
>> jails/sandboxes.
>
> If OpenVMS can support nested virtualisation on x86_64, I guess it
> could be possible to run OpenVMS within OpenVMS, opening the
> possibility to isolate applications from each other.
>
> I can do it with Linux and VirtualBox, running Windows 11 as a guest,
> with Virtualbox installed in it, running windows 10 in it as another
> guest. Turtles all the way down ...
VSI is only supporting virtualized use at present and not native boot,
which makes nesting OpenVMS {or whatever} atop OpenVMS atop {supported
hypervisor} a somewhat less than appealing configuration.
There's no OpenVMS Hyper-VSI 😉 or BHyVSI 😉 support or similar listed
in the roadmap, and I'd expect to see native boot before the arrival of
an integrated hypervisor.
Booting a guest still doesn't isolate damage from arising within a
particular subsystem, though it does save some on hardware when
compared with the classic app-per-box design.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list