[Info-vax] Desirable features for VMS
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Thu Jan 25 18:59:22 EST 2024
On 2024-01-25 20:20:09 +0000, Arne Vajhøj said:
> On 1/25/2024 8:21 AM, Simon Clubley wrote:
>> A random sample of things from Linux/Unix I would like to see in VMS:
>>
>> Mandatory Access Controls (my preference) or jails (Stephen's preference).
>
> The market want containers.
>
> I suspect that means Hoff jails with a marketing label of "container"
> instead of "jail".
Jails / sandboxes can be used as a component of containers, but—as I've
commented elsewhere—containers are far too reminiscent of licensing
arbitrage. Which can somewhat dampen vendor enthusiasm.
Getting a working jail / sandbox on OpenVMS is no small project, both
for VSI, and for the app developers adopting jails / sandboxes.
Still involved but smaller in scope would be some variation of the
pledge(2) mechanism. An aeon or two ago, I'd discussed that and the
related trade-offs with a then-VSI developer. Deets:
https://man.openbsd.org/pledge.2
What OpenVMS traditionally implements as system-wide stuff like
usernames doesn't map all that well.
Jails / sandboxes can be built upon some of the parts of mandatory
access controls, but I ~never want to have to use a system configured
for SEVMS-style MAC. Jails, sure. SEVMS-style MAC, not so much.
>
>> A shell with decent modern functionality such as:
>>
>> Proper command history retention and merging from multiple sessions
>> Easy searching of command history
>> Tab completion
>> Editing long command lines
>> Globbing
>
> +better control structures
> +better data types
>
> But I doubt it makes sense business wise.
>
> VMS got:
> * DCL for backwards compatibility
> * GNV bash for *nix compatibility
> * Python and Perl for more programmatic scripting
>
> Even though DCL2 or XDCL would be nice then I don't think it will
> increase VMS sale.
Likely not perceived as an increase sales. Though as happened with DII
COE, sometimes major customers will establish requirements here.
There are a lot of things in this same general category too, which is
the other side of facilitating and encouraging new adoptions.
>> Proper package management
>
> Traditional Linux package management at the OS level would
> be the wrong path. The result is a mess.
OpenVMS packaging and installation is already a spectacular mess, but
then I'm in a charitable mood today.
And the packaging ties into installation, upgrades, removal, app
isolation, startup, shutdown, code-signing, and jails / sandboxes.
Among other areas.
And any new scheme will have to contend with apps arriving via cargo,
nix, pip, cpan, or another installation system, as well.
> The right approach is package management at the application level.
>
> maven, nuget, pypi, npm, composer etc. not yum, dnf etc..
>
> For managing the truly OS stuff relative little is needed. PCSI2 or XPCSI.
>
> > and management of updates.
>
> An option for more automated updates of VMS would be nice.
It'll be nice to implement some of the many features that have become
common in the years since the existing 1988-era designs, yes.
>
>> Loadable and unloadable kernel modules, with device
>> driver/filesystem/etc functionality available from within these modules.
>
> Nice.
>
> But again I doubt it will increase VMS sale.
>
>> ASLR and KASLR support.
>
> That would probably come as part of ongoing security enhancements at
> some point in time.
Stack canaries might be easier.
>> Proper timezone management. (Everything is always UTC based, and your
>> timezone is merely a local session property with no effect on the
>> on-disk timestamps).
>
> Nice but tricky to implement without breaking stuff.
That's been the compatibility hobgoblin ~forever. The quadword format
is embedded all over the place. For some sites, switching to UTC as the
base works fine.
I've run OpenVMS servers set to UTC at various installations, too,
("Oh, that? Yeah. The server is in England." usually suffices.)
Downside is that saved dates can be off by a day pending a rewrite,
which can absolutely be a non-starter for some sites.
PS: The discussion of ASLR/KASLR and buffer-overflow protections
reminds me of this XPM exploit (whether it also hits XBM?) recently
discovered:
https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list