[Info-vax] Anti-virus ?

Dave Froble davef at tsoft-inc.com
Mon Aug 14 10:15:17 EDT 2023


On 8/14/2023 8:39 AM, Simon Clubley wrote:
> On 2023-08-11, Dave Froble <davef at tsoft-inc.com> wrote:
>> On 8/11/2023 1:35 PM, Simon Clubley wrote:
>>>
>>> Linux is mainly a server operating system as is VMS.
>>>
>>> Many attacks occur through server-based components in addition to
>>> client-based components.
>>>
>>> The difference is that Linux has various industry-standard protections,
>>> including the third-party protections mentioned, that VMS does not.
>>>
>>> Oh, and BTW, judging by the fact Eisner has needed to be rebooted multiple
>>> times over the years due to various services locking up presumably due to
>>> attacks, I have little confidence that VMS in general would be robust
>>> within an actively hostile environment.
>>>
>>
>> Ok, I'm not about to declare VMS "hack-proof".  I doubt anything is.
>>
>> However, I'm going to call "bullshit" on Simon's statements.
>>
>> Having had VMS "lock up" in the past, not due to any attacks, Simon's snide
>> commend about Eisner is just plain bullshit.  Too many times I've seen "resource
>> wait mode" that never recovers.  Only a re-boot would clear the problem.  Was
>> that "an attack"?
>>
>
> If it's something that can be triggered by a non-privileged user, or even
> worse, an unauthenticated user, then yes it absolutely most certainly is.

I'm not sure what causes that particular problem, nor am I aware if it is still 
a problem.  My only point was that not all issues are outside attacks.

It is NOT, as far as I know, triggered by a user.

> It's called a Denial of Service attack and those are _very_ much CVE
> material.
>
> Also, no server operating system, especially "the world's most secure
> operating system" should be locking up due to resource wait conditions
> the number of times that you imply above it is.

Not seen it for years.  Only mentioned it as an example.

> Now, about Eisner. My comments are _not_ snide, but based on what has
> been going on over the last few years.
>
> Every so often, Eisner's network services (including SSH) simply stop
> working. Sometimes, basic stuff such as ICMP continues to work, but
> anything involving process creation is utterly stuffed.
>
> The now-standard routine is that one of us users posts on the Eisner
> mailing list that Eisner is stuffed again, at which point VSI reboots it.
>
> Eisner should be an absolutely golden opportunity for VSI to find issues
> in a real world situation and then fix them in VMS so that VMS becomes
> more robust for everyone. In Eisner, VSI is exposing to the real world
> the operating system that VSI themselves are producing and selling.
>
> Instead, Eisner has been locking up in the same way for years, so either
> VSI can't find the external causes that's resulting in it locking up, or
> it finds an issue, fixes it, but then another way of locking up VMS
> comes along.

Eisner, last I heard, runs on an Alpha DS20.  Not a platform that VSI can spend 
much or any time on.  x86 is their future, at this time.  So, yeah, I can 
understand "just reboot the damn thing".

>> None of Simon's "industry standard protections" protects against anything other
>> than some (not all) attacks.  I wish he'd stop insinuating that they solve all
>> problems, and that there must be problems without them.
>>
>
> Stop lying about what I have said in this matter David.

Lying?  Maybe perception.

> I have never said they solve all problems, but just that they are extra
> layers that need to be defeated. I have also said that without these
> extra layers it's easier to compromise a system.

Well, it seems all you ever mention.  And I'll agree, extra layers, whatever 
they are, can be a good thing.


-- 
David Froble                       Tel: 724-529-0450
Dave Froble Enterprises, Inc.      E-Mail: davef at tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA  15486



More information about the Info-vax mailing list