[Info-vax] Kernel Transplantation

Mark Berryman mark at theberrymans.com
Mon Jan 22 14:40:14 EST 2024


On 1/22/24 6:12 AM, Simon Clubley wrote:
> On 2024-01-20, Mark Berryman <mark at theberrymans.com> wrote:
>> On 1/19/24 11:44 AM, Simon Clubley wrote:
>>> On 2024-01-19, Mark Berryman <mark at theberrymans.com> wrote:
>> .
>> .
>> .
>>>>> Because that command is being run in the same process as the EVL listener
>>>>> it will not help constrain an attacker. This is because all an attacker
>>>>> needs to do in their shellcode is to reenable those privileges.
>>>>
>>>> IIRC, you managed to crash EVL using an insecure setup.  Crashing a
>>>> process is much different that convincing a process to run bogus code
>>>> and, of course, simply crashing EVL causes its process to exit.
>>>>
>>>
>>> By "insecure setup", you mean using a network stack as supplied out of
>>> the box by a vendor selling "the world's most secure operating system" ?
>>
>> No, by insecure setup I mean you allowed an untrusted host, and one not
>> running DECnet, access to another host's DECnet stack.
>>
> 
> Oh, I see Mark. So you mean just like every public node on the Internet is
> supposed to handle without instantly falling over ? :-) (And which gets
> fixed when something unexpected is found ?)
Most likely, every public node on the Internet is behind a firewall, 
which severely limits what packets can reach a given node and, depending 
on the quality of the firewall, the nature of those packets (i.e. good 
firewalls can detect and reject malformed packets).

Sadly, when an IP-based attack makes it through the firewall and into a 
host, the host typically does worse than "fall over".  It lets the 
attacker in where the attacker can then do all kinds of nefarious 
things.  This is often not detected until long after the fact.  If there 
has ever been a successful attack from an external source on a VMS 
system that allowed the attacker to muck around on that system, I am not 
aware of it.  Are you?

The purpose of a firewall is to protect the IP stack of the hosts behind 
it.  I merely suggested a couple of ways one can firewall one's DECnet 
traffic, and thereby protect that stack.  Nothing unusual or exceptional 
about it.

I ran a VMS host fully exposed to the Internet with DECnet phase V on it 
for years without issue.  It was a honeypot so it wanted to see as many 
attack attempts as possible.  It was running WASD instead of Apache so 
none of the attacks on the web port succeeded and none of the attacks on 
the ports used by DECnet ever caused an issue.  So, real word 
experience, not guess work.  And, no, I wouldn't try this with any other 
platform.

Mark Berryman




More information about the Info-vax mailing list