[Info-vax] Anti-virus ?

Brian Schenkenberger mail at SendSpamHere.ORG
Tue Aug 15 11:36:51 EDT 2023


On 2023-08-14 11:12:32 +0000, Johnny Billquist said:

> On 2023-08-12 12:59, plugh wrote:
>> On Saturday, August 12, 2023 at 3:41:28 AM UTC-7, Johnny Billquist wrote:
>>> On 2023-08-11 19:35, Simon Clubley wrote:
>>>> Oh, and BTW, judging by the fact Eisner has needed to be rebooted multiple
>>>> times over the years due to various services locking up presumably due to
>>>> attacks, I have little confidence that VMS in general would be robust
>>>> within an actively hostile environment.
>>> I think you are misinterpreting some data, as well as making some
>>> assumptions that I don't think are correct.
>>> 
>>> By the way, I have an RSX system publicly on the internet, and it's
>>> totally without firewalls, and on 24/7. Mainly to actually harden it.
>>> But it's basically running stable without any issues since many years.
>>> 
>>> So much for "hostile environment" being such a big problem. (Although I
>>> should admit that I don't have some of the fancy services that are easy
>>> to exploit...)
>>> 
>>> Johnny
>> 
>> It's that last part that is quite important these days. It's all about 
>> services now, as communication is so important. So much of this 
>> security stuff was known by Digital, such knowledge has simply been 
>> left to rot.
> 
> Oh. But it's not that I don't have any services... I do have some. But 
> I guess it's a combination of me really into writing services that ever 
> execute something passed in, with the assumption that it will look 
> fine. I completely abhor the REST paradigm. It's such a poor idea from 
> the start. (I don't start ranting about people who embrace it...)
> The other part being that RSX is such an odd system to start with that 
> pretty close to nobody even cares to try and figure out how to actually 
> exploit anything. They are just running various scripts and tools that 
> tries to exploit usual, well known issues in various services.
> 
> It's actually a very good way of finding out what issues are the most 
> common ones. I get plenty of probes for things in wordpress for 
> example. So that one seems popular (and bad). Netgear seems to also 
> have some popular exploits. Then apparently just badly setup CGI stuff 
> in general.
> 
> Examples:
> 
> . GET /wp-login.php
> 
> (seems to be just lots of these probing if wordpress is running on the 
> host, so lots of variations on this one...)

ERROR 404
We're sorry but it looks like you're lost.
The requested paged does not exist.




More information about the Info-vax mailing list