[Info-vax] Anti-virus ?
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Thu Aug 10 14:37:51 EDT 2023
On 2023-08-10 14:47:12 +0000, Bob Gezelter said:
> On Thursday, August 10, 2023 at 3:47:18 AM UTC-4, Niels S. Eliasen wrote:
>> Hello Believe it or not... but was asked by a customer yesterday: "What
>> anti-virus software exist on OpenVMS ?" Anyone that has knowledge of
>> such a product for OpenVMS ?...
> Niels,
That's going to be an interesting quest.
There's little add-on anti-malware for OpenVMS, with the DECdetect
product (later known as "POLYCENTER System Integrity Checker") being
long retired, and probably then sold off. DECinspect was deprecated
long ago, and some of its security recommendations were... problematic.
Some third-party might have an add-on scanner or related, but I'd tend
to be skeptical about that.
The usual preferred source for these sorts of malware-scanning and
security-scanning products would be VSI, and AFAIK they have none
available. Check with VSI to see what they recommend, of course.
If you don't yet have VSI OpenVMS and VSI layered product app versions
installed and in use, that's going to be an issue you'll want to
address, too.
> First item, to the best of my knowledge there has never been an OpenVMS
> virus, as the term is used in the Windows/Mac/linux world.
I wish that fiction would die, Bob. Yes, there have been classic
viruses on OpenVMS. They are exceedingly rare, but have existed. U Mass
Amherst had a DCL virus wandering around many years ago, IIRC. WANK was
a well-known worm involving DECnet. Those sorts of malware
threats—viruses, worms, etc—are also not the threats most OpenVMS sites
will ever meet. OpenVMS usage is so tiny, nobody is going to bother to
open distribute classic worms or classic self-replicating malware,
though they might distribute it through a breach at various providers
including VSI and some other entities. There are some really good ways
to do that distribution, too.
That written, some of the more modern security practices such as
monitoring outbound network activity from OpenVMS servers, and simply
blocking and alarming various sorts of traffic, for instance, are very
much applicable to local security.
Remote monitoring tools have been around, though those are mostly
open-source add-on tools:
https://groups.google.com/g/comp.os.vms/c/JwPp_iGtkLw/m/3E_RAchfBQAJ
There is (or was?) a Zabbix port around, for instance. VSI IIRC had a
syslog (or syslogng?) port, too.
> If you check the industry databases of known vulnerabilities, e.g., CVE
> , it is rare for OpenVMS to be mentioned. There have been
> vulnerabilities referencing OpenVMS, generally involving OpenSource
> software ported to OpenVMS, e.g., the year 2028 issue for Unix style
> 32-bit dates.
It is rare for OpenVMS to be mentioned because OpenVMS is only rarely
used, and because the OpenVMS vendors didn't and generally don't log
and don't track CVEs.
There have been repeated CVEs involving a couple of packages found on
various OpenVMS configurations, but those CVEs were never listed for
OpenVMS. I reproduced some of the posted exploits for one of the
add-ons against OpenVMS (SMH, which is tied into SNMP), but didn't
bother reporting as the vendor had retired the SMH app on OpenVMS. The
Log4J mess (CVE-2021-44228, CVE-2021-45046) also hit some OpenVMS
configurations. There are others.
2028 (specifically 31-Dec-2028) will break some security-relevant stuff
for existing installations—this effects DEC, Compaq, HP, and HPE
versions, and not VSI versions—but I'd suspect that was not your (Bob)
intended reference. 2038 and not 2028 for the signed 32-bit time_t
overflow, and 2038 AFAIK was not a CVE. 2038 was explicitly outside the
OpenVMS Y2K checks too, so I'd tend to expect the possibility of some
issues arising there.
> Common pathways used by malware to infect systems are also not as
> prevalent on OpenVMS as on platforms where web browsers are commonly
> used.
I've dealt with a half dozen or so OpenVMS breaches, and most were
targeted though some configuration weakness or another, through
data-protection errors, or by insiders.
> Holes in underlying processor firmware and virtualizations are a
> hazard, but I not recall any Windows anti-virus product addressing that
> class of exploits. All mitigations involving processor timings are
> typically remediated by "not doing that". I admit that I do not believe
> that "not doing that" is not a good solution in any context.
> Simon's question concerning "data at rest" is a valid concern, but can
> be addressed by using appropriately configured storage devices.
OpenVMS support for protecting data at rest past the built-in AES
product is weak at best, and support for protecting data in motion is
also weak, and certificate support is just hilariously sad, and
vendor-provided password and certificate storage and related
protections are entirely missing.
Basically, writing secure apps on OpenVMS is a royal pain in the arse,
this having worked on OpenVMS and on other platforms. I'd expect most
installations—OpenVMS or otherwise—don't bother with that work until
and unless some audit or some external linkage requires fixes or
waivers, too.
Whether you want to open up a configuration and app security review,
past answering the mostly-non-existent add-on anti-malware question?
PS: OpenVMS is well-positioned for running an OpenVMS install read-only
with the WRITABLESYS write-locked system disk support, but I'd not
expect to see more general use of that—past CD and DVD media—appear as
a security enhancement anytime soon.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list