Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

"Imitation is the sincerest form of television." -- The New Mighty Mouse


computers / comp.os.vms / Re: VMS VAX License for personal Microvax 3100 Model 40

SubjectAuthor
* VMS VAX License for personal Microvax 3100 Model 40Robert Grear
+* Re: VMS VAX License for personal Microvax 3100 Model 40Andy Burns
|`- Re: VMS VAX License for personal Microvax 3100 Model 40Subcommandante XDelta
+- Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
+* Re: VMS VAX License for personal Microvax 3100 Model 40David Wade
|`* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| +* Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| |`- Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| +* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| |`* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | +- Re: VMS VAX License for personal Microvax 3100 Model 40Scott Dorsey
| | +* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | |`* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | +* Re: VMS VAX License for personal Microvax 3100 Model 40chris
| | | |`* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | +* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | |`* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | | +- Re: VMS VAX License for personal Microvax 3100 Model 40Scott Dorsey
| | | | | `* Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |  `* Re: VMS VAX License for personal Microvax 3100 Model 40Andy Burns
| | | | |   +* Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |   |`* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |   | +* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | | |   | |+- Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | | |   | |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |   | `* Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |   |  `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |   |   `* Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |   |    `* Re: VMS VAX License for personal Microvax 3100 Model 40Chris Scheers
| | | | |   |     `* Re: VMS VAX License for personal Microvax 3100 Model 40Robert A. Brooks
| | | | |   |      +* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | | |   |      |`- Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | |   |      +* Re: VMS VAX License for personal Microvax 3100 Model 40Chris Scheers
| | | | |   |      |`* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | | |   |      | `- Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |   |      `- Re: DEC and software license tracking (was: Re: VMS VAX License for personal MicStephen Hoffman
| | | | |   `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | |    +- Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | | |    `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |     `* Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | | |      +* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |      |`* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | |      | +- Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | | |      | `- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |      `- Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | `- Re: VMS VAX License for personal Microvax 3100 Model 40chris
| | | +* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | |+* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||`* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | || `* Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | ||  `* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||   `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||    `* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||     `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||      +* Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | ||      |`* Re: VMS VAX License for personal Microvax 3100 Model 40Johnny Billquist
| | | ||      | `* Re: VMS VAX License for personal Microvax 3100 Model 40Robert A. Brooks
| | | ||      |  `* Re: VMS VAX License for personal Microvax 3100 Model 40Jan-Erik Söderholm
| | | ||      |   +* Re: VMS VAX License for personal Microvax 3100 Model 40Lee Gleason
| | | ||      |   |+* Re: VMS VAX License for personal Microvax 3100 Model 40Andy Burns
| | | ||      |   ||+* Re: VMS VAX License for personal Microvax 3100 Model 40Lee Gleason
| | | ||      |   |||`* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||      |   ||| `* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||      |   |||  +* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | ||      |   |||  |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   |||  `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||      |   |||   `* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||      |   |||    `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   |||     `* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | ||      |   |||      +- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   |||      `- Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | ||      |   ||`* Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | ||      |   || +- Re: VMS VAX License for personal Microvax 3100 Model 40Lee Gleason
| | | ||      |   || +* Re: VMS VAX License for personal Microvax 3100 Model 40Don North
| | | ||      |   || |+- Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||      |   || |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   || `- Re: VMS VAX License for personal Microvax 3100 Model 40Craig A. Berry
| | | ||      |   |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||      |    `- Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | ||      `* Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | ||       `- Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | |`* Re: VMS VAX License for personal Microvax 3100 Model 40Johnny Billquist
| | | | `* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | |  +* Re: VMS VAX License for personal Microvax 3100 Model 40Johnny Billquist
| | | |  |`* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | |  | +- Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | |  | `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | |  |  `* Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | |  |   `- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | |  `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | |   +- Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | |   +* Re: VMS VAX License for personal Microvax 3100 Model 40David Wade
| | | |   |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | |   `* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | |    +* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | |    |+* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | |    ||`* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | |    || `- Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | |    |`- Re: VMS VAX License for personal Microvax 3100 Model 40chris
| | | |    `* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | `* Re: VMS VAX License for personal Microvax 3100 Model 40Hans Bachner
| | `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| `* Re: VMS VAX License for personal Microvax 3100 Model 40Phillip Helbig (undress to reply
+- Re: VMS VAX License for personal Microvax 3100 Model 40El SysMan
`* Re: VMS VAX License for personal Microvax 3100 Model 40gah4

Pages:123456789
Re: VMS VAX License for personal Microvax 3100 Model 40

<62ec56e4$0$703$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24170&group=comp.os.vms#24170

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 4 Aug 2022 19:31:40 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com>
<tcc5ih$ues$1@news.misty.com> <tcgk0k$6eu$1@reader2.panix.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <tcgk0k$6eu$1@reader2.panix.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 42
Message-ID: <62ec56e4$0$703$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 8629e698.news.sunsite.dk
X-Trace: 1659655909 news.sunsite.dk 703 arne@vajhoej.dk/68.9.63.232:50512
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Thu, 4 Aug 2022 23:31 UTC

On 8/4/2022 10:10 AM, Dan Cross wrote:
> In article <tcc5ih$ues$1@news.misty.com>,
> Johnny Billquist <bqt@softjar.se> wrote:
>> On 2022-08-02 16:33, Dan Cross wrote:
>>> It boggles my mind that people think that an organization that
>>> has explicitly declined to work with the VAX (for the very valid
>>> reasons mentioned elsewhere in this thread) would care if a few
>>> hobbyists run an OS, 20 years out of maintenance, they can't
>>> issue licenses for anyway.
>>>
>>> Maybe those people have the inside track with someone at at VSI
>>> who has told them that this is as big a deal as they are making
>>> it out to be, but I find that doubtful.
>>
>> I doubt it's the talking point of the day for VSI. But never the less,
>> there is a point in observing how people behave in similar situations to
>> deduce how they might behave elsewhere.
>>
>> Bill did make a good point about the non-existence of hobbyist program
>> for the PDP-11 software, which allegedly is because people were
>> misbehaving. And VSI might look at how people behave around the VAX and
>> decide how they want to continue hobbyist stuff for the platforms they
>> have made releases for.
>
> The bottom line is that absent some definitive statement from
> VSI, this is all speculation.

True.

But the day it is no longer speculation then it is too late.

It is a risk.

You could certainly argue that people willing to take a risk on
their own behalf should be allowed to do so, but here the risk applies
to the entire community.

So people are not going to the casino and betting just their
own savings - people are going to the casino and betting their
own plus everybody elses savings.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<62ec5c8d$0$693$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24172&group=comp.os.vms#24172

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 4 Aug 2022 19:55:49 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcf7bh$2jb40$1@dont-email.me>
<jl1vv8Fd4o4U3@mid.individual.net> <tcgp5e$2rgld$1@dont-email.me>
<tcgvgp$2s3uo$1@dont-email.me> <tch4s6$2so50$1@dont-email.me>
<jl2pkkFhaltU1@mid.individual.net>
<940185de-a7a3-4b89-b7a6-36c62075af3an@googlegroups.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <940185de-a7a3-4b89-b7a6-36c62075af3an@googlegroups.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 55
Message-ID: <62ec5c8d$0$693$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 8629e698.news.sunsite.dk
X-Trace: 1659657357 news.sunsite.dk 693 arne@vajhoej.dk/68.9.63.232:51267
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Thu, 4 Aug 2022 23:55 UTC

On 8/4/2022 5:22 PM, abrsvc wrote:
> On Thursday, August 4, 2022 at 4:48:23 PM UTC-4, Bill Gunshannon wrote:
>>> On 8/4/2022 1:26 PM, Simon Clubley wrote:
>>>> On 2022-08-04, Dave Froble <da...@tsoft-inc.com> wrote:
>>>>> I asked from a moral perspective. So far I detect no sympathy for
>>>>> people who
>>>>> might be in a bad place. I for one find that sad.
>>>>
>>>> These days, it is the responsibility of the organisation which has
>>>> chosen to remain on an old out of support OS version (for whatever
>>>> reason) to make sure there is enough protection around that system
>>>> to protect it from future vulnerabilities.

>> He is right. This business has had plenty of time to
>> anticipate and correct the problem. The real question is why they
>> have chosen not to.

> I would take a different approach. If the system is working and
> working well in what seems to be a secure environment, why would I
> "upgrade" to a system that is more likely than not, less secure than
> what I have?
I do not see why you consider it "more likely than not".

Software that has been in production for some years tend to
have bugs including security bugs fixed.

But the focus on security has increased dramatically over
time so modern software has been designed with way more
focus on security than ancient software.

I think the realistic expectation for number of
security vulnerabilities as a function of software age
is f''(t)>0 with a minimum in the 3-5 year range.

> A backend system processing information sent over a single secure
> line from a front facing system where the environment is less secure
> works just fine. If there is no way to get to the backend system
> other than the pipe from the front end, where is the security hole?
> Could a malformed packet cause a problem, sure but compromise the
> data on the backend, not likely. In this case, it wouldn't make a
> difference how old the system is.
I believe the IT security history is full of stories about
systems with no access and then suddenly it turned out
there were access.

There is such a thing as insider threats.

> In the emulated environment, it is the host that has the security
> problems and not the OpenVMS system.

The host covers a few security problems, but the VMS system certainly
has to cover most security problems.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<ffb8b4ad-fa31-41dd-ac20-ee402f7152ean@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24173&group=comp.os.vms#24173

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a0c:8bd1:0:b0:474:92f4:3dd2 with SMTP id a17-20020a0c8bd1000000b0047492f43dd2mr3665214qvc.42.1659657454051;
Thu, 04 Aug 2022 16:57:34 -0700 (PDT)
X-Received: by 2002:ae9:d884:0:b0:6b6:3aad:a7d8 with SMTP id
u126-20020ae9d884000000b006b63aada7d8mr3368739qkf.419.1659657453910; Thu, 04
Aug 2022 16:57:33 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 4 Aug 2022 16:57:33 -0700 (PDT)
In-Reply-To: <tchhc4$2u1bv$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=2601:602:9700:4689:c16b:2a61:6daf:2ffb;
posting-account=gLDX1AkAAAA26M5HM-O3sVMAXdxK9FPA
NNTP-Posting-Host: 2601:602:9700:4689:c16b:2a61:6daf:2ffb
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com>
<62e9b4ec$0$699$14726298@news.sunsite.dk> <tcgk48$6eu$2@reader2.panix.com>
<jl2l5gFgk57U1@mid.individual.net> <tch9lh$2t7q8$1@dont-email.me>
<tch9ti$2t8e2$1@dont-email.me> <jl2p40Fh8boU1@mid.individual.net> <tchhc4$2u1bv$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <ffb8b4ad-fa31-41dd-ac20-ee402f7152ean@googlegroups.com>
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
From: gah...@u.washington.edu (gah4)
Injection-Date: Thu, 04 Aug 2022 23:57:34 +0000
Content-Type: text/plain; charset="UTF-8"
X-Received-Bytes: 2032
 by: gah4 - Thu, 4 Aug 2022 23:57 UTC

On Thursday, August 4, 2022 at 3:31:35 PM UTC-7, Don North wrote:

(snip)

> If you put those cans out by the street they become public domain.
> Unless you have locks on the cans. Not likely.
> If the trash company must enter your property to collect, then not.
> Redirect complaints to SCOTUS.

I know that is true for information contained in the trash.
I am not sure it is for things with physical value.

Among others, that was part of the BALCO steroids bust:
https://www.taipeitimes.com/News/sport/archives/2004/02/14/2003098779

Re: VMS VAX License for personal Microvax 3100 Model 40

<62ec5d38$0$693$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24174&group=comp.os.vms#24174

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 4 Aug 2022 19:58:44 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcf7bh$2jb40$1@dont-email.me>
<jl1vv8Fd4o4U3@mid.individual.net> <tcgp5e$2rgld$1@dont-email.me>
<tcgvgp$2s3uo$1@dont-email.me> <tch4s6$2so50$1@dont-email.me>
<jl2pkkFhaltU1@mid.individual.net>
<940185de-a7a3-4b89-b7a6-36c62075af3an@googlegroups.com>
<c3277042-1571-4340-be76-ceab4d19bc2bn@googlegroups.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <c3277042-1571-4340-be76-ceab4d19bc2bn@googlegroups.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 17
Message-ID: <62ec5d38$0$693$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 8629e698.news.sunsite.dk
X-Trace: 1659657528 news.sunsite.dk 693 arne@vajhoej.dk/68.9.63.232:51267
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Thu, 4 Aug 2022 23:58 UTC

On 8/4/2022 6:07 PM, gah4 wrote:
> On Thursday, August 4, 2022 at 2:22:37 PM UTC-7, abrsvc wrote:
>> In the emulated environment, it is the host that has the security problems and not the OpenVMS system. Odd, no?
>
> One of the more interesting, or maybe just more surprising, attacks is SQL injection.
>
> Many attacks convince a machine to run some executable code, but SQL injection is done at a higher level.

SQL injection and XSS injection are very common problems.

> I have had web sites return SQL error messages before, which is sort of funny.

:-)

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<62ec5edb$0$704$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24175&group=comp.os.vms#24175

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 4 Aug 2022 20:05:39 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tce5cq$16id$1@gioia.aioe.org> <62eadac0$0$701$14726298@news.sunsite.dk>
<tcge2u$2q741$4@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <tcge2u$2q741$4@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 40
Message-ID: <62ec5edb$0$704$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: deaf6edb.news.sunsite.dk
X-Trace: 1659657947 news.sunsite.dk 704 arne@vajhoej.dk/68.9.63.232:51693
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Fri, 5 Aug 2022 00:05 UTC

On 8/4/2022 8:29 AM, Simon Clubley wrote:
> On 2022-08-03, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> On 8/3/2022 11:48 AM, chris wrote:
>>> On 08/03/22 13:55, abrsvc wrote:
>>>> Running older versions of software that perform well for the task at
>>>> hand is not necessarily a problem.
>>>> Please note that VMS does NOT have the same problems that Windows does
>>>> in terms of viruses.  And the vulnerability that you seem to draw out
>>>> for every argument REQUIRES that the person already be logged in to
>>>> the VMS system in order to access it. Not the same as most of the
>>>> vulnerabilities reported for Windows.
>>>
>>> May have been true years ago, when vms ran on non X86 hardware, but
>>> not the case now. Unless vms has strong protections at system level,
>>> it could be just as vulnerable as any other X86 based system. Once an
>>> attacker with sufficient resources and time to get a X86 binary onto
>>> the system, all bets are off.
>>>
>>> X86 architecture is possibly the worst possible architecture to build
>>> a secure system with...
>>
>> The percentage of security vulnerabilities that has a directly
>> dependency on the ISA must very small.
>
> Well, in fairness to Chris, while he clearly has an ideological dislike
> for x86-64 for whatever reasons, this is also the architecture that has
> all the Intel Management Engine and other management stuff running on
> modern versions of that architecture.
>
> Stuff that runs underneath your operating system and can't be switched off.

ME are not really ISA specific.

ME is AFAIK only available for x86-64 chipsets.

But you could design an Alpha with ME - it comes with its
own CPU and OS.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<mailman.1.1659658224.674.info-vax_rbnsn.com@rbnsn.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24176&group=comp.os.vms#24176

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!news.mixmin.net!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!kishost2.serverpowered.net!not-for-mail
From: kemain.n...@gmail.com (Kerry Main )
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Thu, 4 Aug 2022 21:09:38 -0300
Lines: 70
Message-ID: <mailman.1.1659658224.674.info-vax_rbnsn.com@rbnsn.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tcf7bh$2jb40$1@dont-email.me> <jl1vv8Fd4o4U3@mid.individual.net>
<tcgp5e$2rgld$1@dont-email.me> <tchg04$7f6$1@reader2.panix.com>
<000401d8a85f$a79f15d0$f6dd4170$@gmail.com>
Mime-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Info: solani.org;
logging-data="346278"; mail-complaints-to="abuse@news.solani.org"
To: "'comp.os.vms to email gateway'" <info-vax@rbnsn.com>
Cancel-Lock: sha1:CB5pgYK1eS6Cam680tn/LDfWS0g=
X-Received: by 2002:a05:6214:76a:b0:476:f3d6:8eaa with SMTP id
f10-20020a056214076a00b00476f3d68eaamr3636018qvz.8.1659658179195;
Thu, 04 Aug 2022 17:09:39 -0700 (PDT)
X-Ham-Report: Spam detection software,
running on the system "kishost2.serverpowered.net",
has NOT identified this incoming email as spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
root\@localhost for details. Content preview: >
Content analysis details: (3.3 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
3.0 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.5000]
0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail
provider [kemain.nospam[at]gmail.com]
-0.0 SPF_PASS SPF: sender matches SPF record
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from
envelope-from domain
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
0.5 KAM_NUMSUBJECT Subject ends in numbers excluding current years
X-Antivirus-Status: Clean
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
h=from:to:references:in-reply-to:subject:date:message-id:mime-version
:content-transfer-encoding:content-language:thread-index;
bh=BxaeGrDbSD71AWkT68SYL+6Jp9JQrt6HeF7BzD4+2ew=;
b=K7rdpQhmb5gPf5oA6e72eT1jEMOfORmIfjQ/9s9/wDC99Zy5yoCkcHD+u8jfApwSKj
4KrDasuwHPC8rV9DLsxTmGxZhPQOw/b1IQPOkN3XuEDKKj+0P/RSRHO9dg/hd3suWYpM
R483i9vIyI48PEIlI/uwhlV1CD+/RziBvY04b5OqNiS6JnLFQxfgzMxstH671m/xCSJ+
1F/x4r+Yfyvkf/9inZirFDlt9GUZQynudHWLMaYaUjoYW55B21Yw+yKCRtuvo32YKJqg
s2ZUSyxySXG9y6edBlQjNIGPjPJZgsGoL9+vyw+bKqPXImph0Sfjyg4bD+5Or7Unt/RM
MUng==
X-Mailman-Original-Message-ID: <000401d8a85f$a79f15d0$f6dd4170$@gmail.com>
X-Spam-Status: No, score=3.3
X-Spam-Bar: +++
X-Google-Smtp-Source: AA6agR7cVRXD2suivLg2SXGd0n9Cd7rhmp5CCdJFarNATSY0BqlDfe3ZLA8/HAnHgjjM+DG1JXr0og==
Thread-Index: AQLNt5q05tNH4gYHrDu9W2RHDvFE8wHvrF/sApZkGroCjW3EZgDav+uAq3XYkZA=
List-Subscribe: <http://rbnsn.com/mailman/listinfo/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=subscribe>
X-Antivirus: AVG (VPS 220804-6, 2022-8-4), Outbound message
X-Gm-Message-State: ACgBeo03CWbts/jTkS6L5txsPBF6XsgieLSHsr2kSHAh9Hf45USBLX2z
FsCkN0RWwC8CzZ5ncm7zAofVrDlUo3E=
Content-Language: en-ca
List-Post: <mailto:info-vax@rbnsn.com>
X-Spam-Flag: NO
X-Spam-Score: 33
In-Reply-To: <tchg04$7f6$1@reader2.panix.com>
X-BeenThere: info-vax@rbnsn.com
X-Mailman-Version: 2.1.38
X-Mailer: Microsoft Outlook 16.0
X-User-ID: eJwFwYEBwCAIA7CXYKVlnjPR/n/CEkKp6RJVND3mROJgMnbH89ZexNxJF5b70NX4pFjHF/oBGwERAw==
Precedence: list
X-Mailman-Original-References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tcf7bh$2jb40$1@dont-email.me> <jl1vv8Fd4o4U3@mid.individual.net>
<tcgp5e$2rgld$1@dont-email.me> <tchg04$7f6$1@reader2.panix.com>
List-Archive: <http://rbnsn.com/pipermail/info-vax_rbnsn.com/>
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:from:to:references:in-reply-to:subject:date
:message-id:mime-version:content-transfer-encoding:content-language
:thread-index;
bh=BxaeGrDbSD71AWkT68SYL+6Jp9JQrt6HeF7BzD4+2ew=;
b=dNF6MEMl09sgB257kLjuJGlAhHv614vrvwpvTmSuwRvMnXH+kr5GGj72hjo5Ch6bF6
tgRpd3T++mmXCZXTu2JlhReZiuddgV6OPSFM15MoqH2zSymp6YAa/8IOQaiH8XIj6wn5
gxR6JGTrh264sdCTwUrjEWlQfrqSwb+OYxhR1PdPqsFj5diJW7soTutr06g5AK2pUTUd
iLUqTKVH6Cx3VynocCLldivgHdXWlKD6FKupVSnbFh+Ft8VwOqn79eroXaXhHahhqW9x
dwaIPq8CKptUPqSMxjftggAK2CH2zPLEUO9ts/qeWMJaNtxaZmWaOIyAR7l0HPLpOfIM
h4Og==
List-Help: <mailto:info-vax-request@rbnsn.com?subject=help>
List-Id: "comp.os.vms to email gateway" <info-vax.rbnsn.com>
List-Unsubscribe: <http://rbnsn.com/mailman/options/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=unsubscribe>
 by: Kerry Main - Fri, 5 Aug 2022 00:09 UTC

> -----Original Message-----
> From: Info-vax <info-vax-bounces@rbnsn.com> On Behalf Of Dan Cross via
> Info-vax
> Sent: August-04-22 7:08 PM
> To: info-vax@rbnsn.com
> Cc: Dan Cross <cross@spitfire.i.gajendra.net>
> Subject: Re: [Info-vax] VMS VAX License for personal Microvax 3100 Model
> 40
>
> In article <tcgp5e$2rgld$1@dont-email.me>, Dave Froble <davef@tsoft-
> inc.com> wrote:
> >[snip]
> >I asked from a moral perspective. So far I detect no sympathy for
> >people who might be in a bad place. I for one find that sad.
>
> The thing is, those folks are in a bad place whether they know it or not.
> Ancient versions of VMS probably have exploitable flaws that are known to
> state-level actors and others beyond the script-kiddies. Just because the
> operator of some application hosted on some ancient version of VMS
> doesn't know that doesn't make them safe. They may exist in a state of
> blissful ignorance and still be vulnerable.
>
> Now the calculus changes: is it better for the flaws to be known publicly
or
> not, given that they may exist and may be actively exploitable? Would you
> rather know you had terminal cancer? Is it moral for a doctor to tell
you?
>
> - Dan C.
>

Well, you can substitute OpenVMS in that statement with any OS. Lots of W2K8
and old versions of Linux, Solaris, AIX, HP-UX etc. around big datacenters
today.

The issue of old OS support is not specific to OpenVMS.

In many, likely most, OPS teams know the issues with old OS version support.

However - App vendors gone out of business, dropped App support,
knowledgeable staff long since retired / laid off .. just many of the
reasons why some Customers have App's on very old OS versions still running.

Yes, one might ask "why not spend the $'s into replacing that App?", but if
the Senior Mgrs have no budget, then OPS teams are left to protect that
environment with whatever tools they have e.g. put in firewall zone and
restrict flows and other means.

Unless one has spent time in OPS support dealing with on-the-floor
realities, one should not be to quick to criticize these folks.

Regards,

Kerry Main
Kerry dot main at starkgaming dot com

--
This email has been checked for viruses by AVG antivirus software.
www.avg.com

Re: VMS VAX License for personal Microvax 3100 Model 40

<62ec6426$0$699$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24177&group=comp.os.vms#24177

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 4 Aug 2022 20:28:19 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcgmi4$2r7vv$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <tcgmi4$2r7vv$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 68
Message-ID: <62ec6426$0$699$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: deaf6edb.news.sunsite.dk
X-Trace: 1659659302 news.sunsite.dk 699 arne@vajhoej.dk/68.9.63.232:52603
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Fri, 5 Aug 2022 00:28 UTC

On 8/4/2022 10:53 AM, Mark Berryman wrote:
> On 8/3/22 11:30 AM, Simon Clubley wrote:
>> This isn't a discussion about the DCL vulnerability. It's a discussion
>> about what is likely to happen if security researchers take a serious
>> interest in probing VMS in general and find a series of vulnerabilities
>> which they then disclose in public after giving VSI time (about 3 months
>> usually) to fix the vulnerabilities.
>>
>> Your last sentence above is a perfect example of the mindset I am
>> warning about.
>
> Simon's assumption is that, because he found a vulnerability, there must
> be a multitude of other as yet undiscovered vulnerabilities lying in
> wait because VMS just hasn't seen the kind of security probing that
> other OSes have.  He makes this assumption clear in many of his posts.
>
> His assumption is unfounded.
>
> Simon has no idea what sort of security testing various organizations
> have done to VMS, especially by those that needed to have confidence in
> the platform's security before deploying it in a security-demanding
> environment.  He also has no idea of what security-related SPRs were
> sent to Digital, or of the issues that were found and fixed strictly
> internally.
>
> Having been a part of such testing, I think I have a better
> understanding of the situation than Simon does.  I will state here that
> such testing is why I have such definite opinions on running Multinet
> vs. TCPIP Services if one is concerned about security.  I really hope
> the version VSI is releasing addresses these issues.  I will also state
> that I have run VMS systems wide-open to the Internet, something I would
> not do with any other platform.  They invited attacks and definitely
> received them.  They were heavily probed but never penetrated even
> though they ran services that are typically vulnerable on other
> platforms such as web services (WASD, not Apache) and anonymous FTP.
> They even ran *gasp* DECnet (phase V).
>
> The truth is, there have been security issues found within VMS.  Some of
> them were never known by the public.  Once found, they tended to be
> fixed very quickly (which is all you can ask of any platform), which has
> not always been the case in other now more popular platforms.  However,
> the idea that VMS is a rickety platform just waiting to be exploited
> once security researchers "finally" start seriously probing it is just
> plain ridiculous.

It seems very plausible that DEC, to some extent Compaq and HP,
US DoD, NSA and a bunch of big companies that relied (or still
relying) on VMS did extensive security testing. That makes sense.

But it does not seem plausible that they tested VMS to the
same extent as Linux and Windows are beeing tested today. The
money and the people was not there (US DoD and NSA may have had
the money, but they had many other priorities).

The number of people involved in security research today is
huge. I don't know how many, but it must be in the tens of
thousands of people.

But no I do not expect those tens of thousands to get any
interest in VMS due to the arrival of VMS x86-64 or whatever
VSI web site contain. The money is still not there.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<mailman.2.1659659117.674.info-vax_rbnsn.com@rbnsn.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24178&group=comp.os.vms#24178

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!kishost2.serverpowered.net!not-for-mail
From: kemain.n...@gmail.com (Kerry Main )
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Thu, 4 Aug 2022 21:24:32 -0300
Lines: 94
Message-ID: <mailman.2.1659659117.674.info-vax_rbnsn.com@rbnsn.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcf7bh$2jb40$1@dont-email.me>
<jl1vv8Fd4o4U3@mid.individual.net> <tcgp5e$2rgld$1@dont-email.me>
<tcgvgp$2s3uo$1@dont-email.me> <tch4s6$2so50$1@dont-email.me>
<jl2pkkFhaltU1@mid.individual.net>
<940185de-a7a3-4b89-b7a6-36c62075af3an@googlegroups.com>
<62ec5c8d$0$693$14726298@news.sunsite.dk>
<000701d8a861$bc8f1f60$35ad5e20$@gmail.com>
Mime-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Injection-Info: solani.org;
logging-data="346699"; mail-complaints-to="abuse@news.solani.org"
To: "'comp.os.vms to email gateway'" <info-vax@rbnsn.com>
Cancel-Lock: sha1:pUV54oRiuhcqZeDamiFTs5qF7bQ=
X-Ham-Report: Spam detection software,
running on the system "kishost2.serverpowered.net",
has NOT identified this incoming email as spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
root\@localhost for details. Content preview: >
Content analysis details: (3.3 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
3.0 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.5000]
0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail
provider [kemain.nospam[at]gmail.com]
-0.0 SPF_PASS SPF: sender matches SPF record
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from
envelope-from domain
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
0.5 KAM_NUMSUBJECT Subject ends in numbers excluding current years
List-Subscribe: <http://rbnsn.com/mailman/listinfo/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=subscribe>
X-Mailman-Original-References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcf7bh$2jb40$1@dont-email.me>
<jl1vv8Fd4o4U3@mid.individual.net> <tcgp5e$2rgld$1@dont-email.me>
<tcgvgp$2s3uo$1@dont-email.me> <tch4s6$2so50$1@dont-email.me>
<jl2pkkFhaltU1@mid.individual.net>
<940185de-a7a3-4b89-b7a6-36c62075af3an@googlegroups.com>
<62ec5c8d$0$693$14726298@news.sunsite.dk>
X-Google-Smtp-Source: AA6agR78hraNDgV/6VN0hhZYcy6dTN50O2SJrXW3bULwIh8lb7gJAOhbgxHuonBL0T1pqVsn6eXR3w==
X-Antivirus: AVG (VPS 220804-6, 2022-8-4), Outbound message
X-Spam-Flag: NO
X-Mailer: Microsoft Outlook 16.0
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
h=from:to:references:in-reply-to:subject:date:message-id:mime-version
:content-transfer-encoding:content-language:thread-index;
bh=htFk4h2KfzATShZO6Gn/ZTIBAmuiQgI7GP7XRXX4dhI=;
b=RGVtU5XaSFJH51O38i38TZ1NpXjEIsw9pb2kttv9yvQXff+Jo9DefHQ0c7rUGXf01I
GLsas3o5dB0SE4iNPdnOeR6LwE5deKsYtZdAX1SdjZbBisoubN6w3mR3YFXGDphvoa2z
SXZru0vG4+8J/BGaJ1cttnWiwlLdfHaZoeLiA09uc2E8AlLVkTucIrd4vb0wBtxeN3fE
AiTVwG5zcFj0ULeJE+diLSWMOJtNKlFldrM53ox/Pcss3FY1CceHUy5srkAH2YOmcm72
Rs66zUzBdB+fEUFeSDS6LlKDgPtCHYXUbgz/VyFdHehFl5Dw8NDWnefti1FRD2/HWeEF
zOPA==
X-Gm-Message-State: ACgBeo3JAfuWxrdiVSZk/wNstUgIUkUerDN08zCmROcgjTwANNcXWDLe
b8PAqCocZuu644ciDE3chpYhoi3EJJY=
X-Mailman-Version: 2.1.38
X-Received: by 2002:a05:622a:189f:b0:339:db74:c2cf with SMTP id
v31-20020a05622a189f00b00339db74c2cfmr4046341qtc.396.1659659073154;
Thu, 04 Aug 2022 17:24:33 -0700 (PDT)
List-Id: "comp.os.vms to email gateway" <info-vax.rbnsn.com>
X-BeenThere: info-vax@rbnsn.com
X-Antivirus-Status: Clean
Content-Language: en-ca
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:from:to:references:in-reply-to:subject:date
:message-id:mime-version:content-transfer-encoding:content-language
:thread-index;
bh=htFk4h2KfzATShZO6Gn/ZTIBAmuiQgI7GP7XRXX4dhI=;
b=I8eXO6pnTuUkC+ucNJwHAl4n/9z3wgMivTpcxr0oH5PNjbhMX2r/LiU2nKIHHpVmR1
yCFxIn5VQjfp9FGlEqwXkZz96r3WdjoY2pvlcUuGYcth6FKhMLHi/P2sYE6DbU3KT9F6
yQBxyrgmioK3cb+jBQogrWCSO3lXe7YOkfrsphHAGf4sUbcHIZRFZgv/i2a5qiiLUQZy
kUPN6s8cZI2QPIYATkz4hkfMfn9ncSMOTGsYjwiB0tF1BuTuQwWEm9yzOPaJj0jnDra9
7BSvobvwWgE62/+5gsFNbkYjj2DHfzaKNcYfTMTdEFGlXUbS+w+780zJvY7iDQ4Ws5Ty
QdSw==
X-Spam-Score: 33
Thread-Index: AQLNt5q05tNH4gYHrDu9W2RHDvFE8wGad23yAik/tVIBsNT9gAFHSxDXAMgXvMkCPTM4nQFS7zqLAe+sX+wClmQaugKNbcRmAruDf0YBfbnmxQI68hjaAdEdohkCcyACZarOUabg
List-Help: <mailto:info-vax-request@rbnsn.com?subject=help>
List-Archive: <http://rbnsn.com/pipermail/info-vax_rbnsn.com/>
List-Unsubscribe: <http://rbnsn.com/mailman/options/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=unsubscribe>
List-Post: <mailto:info-vax@rbnsn.com>
X-Mailman-Original-Message-ID: <000701d8a861$bc8f1f60$35ad5e20$@gmail.com>
X-Spam-Status: No, score=3.3
X-User-ID: eJwNycEBwCAIA8CVQEIq4wjC/iPY+54blfWBTvj4LNmGYyklp2/EX87GhMjKknvoDR2m1m5kPRZzEU8=
Precedence: list
X-Spam-Bar: +++
In-Reply-To: <62ec5c8d$0$693$14726298@news.sunsite.dk>
 by: Kerry Main - Fri, 5 Aug 2022 00:24 UTC

> -----Original Message-----
> From: Info-vax <info-vax-bounces@rbnsn.com> On Behalf Of Arne Vajhøj
> via Info-vax
> Sent: August-04-22 8:56 PM
> To: info-vax@rbnsn.com
> Cc: Arne Vajhøj <arne@vajhoej.dk>
> Subject: Re: [Info-vax] VMS VAX License for personal Microvax 3100 Model
> 40
>
> On 8/4/2022 5:22 PM, abrsvc wrote:
> > On Thursday, August 4, 2022 at 4:48:23 PM UTC-4, Bill Gunshannon wrote:
> >>> On 8/4/2022 1:26 PM, Simon Clubley wrote:
> >>>> On 2022-08-04, Dave Froble <da...@tsoft-inc.com> wrote:
> >>>>> I asked from a moral perspective. So far I detect no sympathy for
> >>>>> people who might be in a bad place. I for one find that sad.
> >>>>
> >>>> These days, it is the responsibility of the organisation which has
> >>>> chosen to remain on an old out of support OS version (for whatever
> >>>> reason) to make sure there is enough protection around that system
> >>>> to protect it from future vulnerabilities.
>
> >> He is right. This business has had plenty of time to
> >> anticipate and correct the problem. The real question is why they
> >> have chosen not to.
>
> > I would take a different approach. If the system is working and
> > working well in what seems to be a secure environment, why would I
> > "upgrade" to a system that is more likely than not, less secure than
> > what I have?
> I do not see why you consider it "more likely than not".
>
> Software that has been in production for some years tend to have bugs
> including security bugs fixed.
>
> But the focus on security has increased dramatically over time so modern
> software has been designed with way more focus on security than ancient
> software.
>
> I think the realistic expectation for number of security vulnerabilities
as a
> function of software age is f''(t)>0 with a minimum in the 3-5 year range.
>
> > A backend system processing information sent over a single secure line
> > from a front facing system where the environment is less secure works
> > just fine. If there is no way to get to the backend system other than
> > the pipe from the front end, where is the security hole?
> > Could a malformed packet cause a problem, sure but compromise the data
> > on the backend, not likely. In this case, it wouldn't make a
> > difference how old the system is.
> I believe the IT security history is full of stories about systems with no
access
> and then suddenly it turned out there were access.
>
> There is such a thing as insider threats.
>
> > In the emulated environment, it is the host that has the security
> > problems and not the OpenVMS system.
>
> The host covers a few security problems, but the VMS system certainly has
> to cover most security problems.
>
> Arne
>

While any virtual OS certainly needs to be able to protect itself, one of
the big disadvantages of virtual systems is the increased ADDITIONAL
security risks posed by the virtual platform.

As example, just a sample reference:
<https://www.vmware.com/ca/security/advisories.html>

And semi-related - there are many VMWare environments in DC's still running
really old versions of VMWare. This includes old versions of VMWare Tools
(VMware mgmt. process running on each virtual host).

Regards,

Kerry Main
Kerry dot main at starkgaming dot com

--
This email has been checked for viruses by AVG antivirus software.
www.avg.com

Re: VMS VAX License for personal Microvax 3100 Model 40

<62ec6553$0$691$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24179&group=comp.os.vms#24179

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 4 Aug 2022 20:33:15 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tcf7bh$2jb40$1@dont-email.me> <jl1vv8Fd4o4U3@mid.individual.net>
<tcgp5e$2rgld$1@dont-email.me> <tchg04$7f6$1@reader2.panix.com>
<000401d8a85f$a79f15d0$f6dd4170$@gmail.com>
<mailman.1.1659658224.674.info-vax_rbnsn.com@rbnsn.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <mailman.1.1659658224.674.info-vax_rbnsn.com@rbnsn.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 30
Message-ID: <62ec6553$0$691$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: deaf6edb.news.sunsite.dk
X-Trace: 1659659603 news.sunsite.dk 691 arne@vajhoej.dk/68.9.63.232:53024
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Fri, 5 Aug 2022 00:33 UTC

On 8/4/2022 8:09 PM, Kerry Main wrote:
> Well, you can substitute OpenVMS in that statement with any OS. Lots of W2K8
> and old versions of Linux, Solaris, AIX, HP-UX etc. around big datacenters
> today.
>
> The issue of old OS support is not specific to OpenVMS.

And it is not just old OS.

Old databases. Old application servers. Old compilers/libraries/runtimes.

> In many, likely most, OPS teams know the issues with old OS version support.
>
> However - App vendors gone out of business, dropped App support,
> knowledgeable staff long since retired / laid off .. just many of the
> reasons why some Customers have App's on very old OS versions still running.
>
> Yes, one might ask "why not spend the $'s into replacing that App?", but if
> the Senior Mgrs have no budget, then OPS teams are left to protect that
> environment with whatever tools they have e.g. put in firewall zone and
> restrict flows and other means.
>
> Unless one has spent time in OPS support dealing with on-the-floor
> realities, one should not be to quick to criticize these folks.

Definitely not fair to blame OPS.

The responsibility belongs to senior management.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<mailman.3.1659662048.674.info-vax_rbnsn.com@rbnsn.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24180&group=comp.os.vms#24180

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!usenet.goja.nl.eu.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!kishost2.serverpowered.net!not-for-mail
From: kemain.n...@gmail.com (Kerry Main )
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Thu, 4 Aug 2022 22:13:24 -0300
Lines: 125
Message-ID: <mailman.3.1659662048.674.info-vax_rbnsn.com@rbnsn.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcgmi4$2r7vv$1@dont-email.me>
<62ec6426$0$699$14726298@news.sunsite.dk>
<000b01d8a868$8fe982a0$afbc87e0$@gmail.com>
Mime-Version: 1.0
Content-Type: text/plain;
charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Injection-Info: solani.org;
logging-data="397515"; mail-complaints-to="abuse@news.solani.org"
To: "'comp.os.vms to email gateway'" <info-vax@rbnsn.com>
Cancel-Lock: sha1:+Sgwl0cRpHUlA0wPP+GAX1rHzpI=
In-Reply-To: <62ec6426$0$699$14726298@news.sunsite.dk>
X-Mailman-Original-References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcgmi4$2r7vv$1@dont-email.me>
<62ec6426$0$699$14726298@news.sunsite.dk>
X-Mailman-Original-Message-ID: <000b01d8a868$8fe982a0$afbc87e0$@gmail.com>
X-Received: by 2002:a05:620a:1706:b0:6b9:234:f735 with SMTP id
az6-20020a05620a170600b006b90234f735mr3584725qkb.623.1659662004944;
Thu, 04 Aug 2022 18:13:24 -0700 (PDT)
X-Gm-Message-State: ACgBeo3j1iqAIXzcLn27tdv8bRwHEOH9PiBynxBXXGLEIWJQFjojRk0f
LyqtWJp4/51SWxDQENtsrwn7wifTq6w=
List-Id: "comp.os.vms to email gateway" <info-vax.rbnsn.com>
X-Spam-Bar: +++
Thread-Index: AQLNt5q05tNH4gYHrDu9W2RHDvFE8wGad23yAik/tVIBsNT9gAFHSxDXAMgXvMkCPTM4nQFS7zqLAfArV54BEcS1lKtErahw
List-Post: <mailto:info-vax@rbnsn.com>
X-Spam-Status: No, score=3.3
X-Spam-Flag: NO
List-Help: <mailto:info-vax-request@rbnsn.com?subject=help>
Content-Language: en-ca
X-Mailer: Microsoft Outlook 16.0
X-Google-Smtp-Source: AA6agR5Iopl0rHardXd3+JSwtCigGZocTZjgEdAkZ1RxErIrDi1odPdAtpAjzpWl+rS5UjsF/njqfg==
X-Mailman-Version: 2.1.38
List-Subscribe: <http://rbnsn.com/mailman/listinfo/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=subscribe>
X-Ham-Report: Spam detection software,
running on the system "kishost2.serverpowered.net",
has NOT identified this incoming email as spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
root\@localhost for details. Content preview: >
Content analysis details: (3.3 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
3.0 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.5000]
0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail
provider [kemain.nospam[at]gmail.com]
-0.0 SPF_PASS SPF: sender matches SPF record
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from
envelope-from domain
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
0.5 KAM_NUMSUBJECT Subject ends in numbers excluding current years
List-Unsubscribe: <http://rbnsn.com/mailman/options/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=unsubscribe>
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:from:to:references:in-reply-to:subject:date
:message-id:mime-version:content-transfer-encoding:content-language
:thread-index;
bh=PE54H/vG7ZCBzpHLqgrbx10jm1IA5SHxIW1QMEa7Jko=;
b=WESIdr9nT/SDuHS0k0GIIveu3DzMcv9w9tdOixGVgmEWwieX+Y4udgn/HFbvUkPgwV
g/FKHv6z6PzM3FDKLnhFtg3M5K4h2aU8slSn0UmbALuEgGhqGyd2FqhvZKA3f8wjwhb1
FedVLdiORr4PSlwz7G49kma+EDwlsfCHOyDOyKRAweFAXpYl1wSbG8OjeOKJuKEbD9jU
ueGBYiNUCjS7wa8e2l7SfKt7D4Rs7wsaZ0r1r4rfhFfTeB/asuG4T/OIM5+1Z7OIZl1D
RUfRqziL1XpE1n7bEWGTETIUcWLxfT4TjOCQDDgpZG2aXmB8AEN6jPyOhtOQfml3fG8p
fBjg==
X-Spam-Score: 33
List-Archive: <http://rbnsn.com/pipermail/info-vax_rbnsn.com/>
X-Antivirus: AVG (VPS 220804-6, 2022-8-4), Outbound message
Precedence: list
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
h=from:to:references:in-reply-to:subject:date:message-id:mime-version
:content-transfer-encoding:content-language:thread-index;
bh=PE54H/vG7ZCBzpHLqgrbx10jm1IA5SHxIW1QMEa7Jko=;
b=GCNAqWkjh7mPAuAbCAZDRZ+i5eahqrddxb45Nm8tDY4Ujg/A2ibHr5QM3Y6ADzBFQF
DQj+7f0viUMziptO/b6p11JN2ZDYPmq7ilnJq1ll/sYmNZfJf8cT3oa/HyG1eq8sbkil
o6OSl5b6Qyh1Z+gcPWAVuDW3/w9TpHUdLTXZezBYR4JFcBqAX8UgEV+jihcPnneGlBJY
37iDB0hiv766i8YrVpOB1Z+r7P1iTsAWBKwGPSLoIyHke0BGYciqd+pOnF3gvXBFuU6P
DycvNxrGGcCHDpsrP/vCzGmOhDtcWhlP7OM2Av78xZy35LsZ+lWw8UVgkLuptzHqde2B
Uu2g==
X-Antivirus-Status: Clean
X-BeenThere: info-vax@rbnsn.com
X-User-ID: eJwFwYEBgDAIA7CXnLQUzgEm/59gQvPjIzgdXK4D+x6OJtVVwSzrJ86YLCpvbgAt4NONrvkBEuMRFQ==
 by: Kerry Main - Fri, 5 Aug 2022 01:13 UTC

> -----Original Message-----
> From: Info-vax <info-vax-bounces@rbnsn.com> On Behalf Of Arne Vajhøj
> via Info-vax
> Sent: August-04-22 9:28 PM
> To: info-vax@rbnsn.com
> Cc: Arne Vajhøj <arne@vajhoej.dk>
> Subject: Re: [Info-vax] VMS VAX License for personal Microvax 3100 Model
> 40
>
> On 8/4/2022 10:53 AM, Mark Berryman wrote:
> > On 8/3/22 11:30 AM, Simon Clubley wrote:
> >> This isn't a discussion about the DCL vulnerability. It's a
> >> discussion about what is likely to happen if security researchers
> >> take a serious interest in probing VMS in general and find a series
> >> of vulnerabilities which they then disclose in public after giving
> >> VSI time (about 3 months
> >> usually) to fix the vulnerabilities.
> >>
> >> Your last sentence above is a perfect example of the mindset I am
> >> warning about.
> >
> > Simon's assumption is that, because he found a vulnerability, there
> > must be a multitude of other as yet undiscovered vulnerabilities lying
> > in wait because VMS just hasn't seen the kind of security probing that
> > other OSes have. He makes this assumption clear in many of his posts.
> >
> > His assumption is unfounded.
> >
> > Simon has no idea what sort of security testing various organizations
> > have done to VMS, especially by those that needed to have confidence
> > in the platform's security before deploying it in a security-demanding
> > environment. He also has no idea of what security-related SPRs were
> > sent to Digital, or of the issues that were found and fixed strictly
> > internally.
> >
> > Having been a part of such testing, I think I have a better
> > understanding of the situation than Simon does. I will state here
> > that such testing is why I have such definite opinions on running
> > Multinet vs. TCPIP Services if one is concerned about security. I
> > really hope the version VSI is releasing addresses these issues. I
> > will also state that I have run VMS systems wide-open to the Internet,
> > something I would not do with any other platform. They invited
> > attacks and definitely received them. They were heavily probed but
> > never penetrated even though they ran services that are typically
> > vulnerable on other platforms such as web services (WASD, not Apache)
> and anonymous FTP.
> > They even ran *gasp* DECnet (phase V).
> >
> > The truth is, there have been security issues found within VMS. Some
> > of them were never known by the public. Once found, they tended to be
> > fixed very quickly (which is all you can ask of any platform), which
> > has not always been the case in other now more popular platforms.
> > However, the idea that VMS is a rickety platform just waiting to be
> > exploited once security researchers "finally" start seriously probing
> > it is just plain ridiculous.
>
> It seems very plausible that DEC, to some extent Compaq and HP, US DoD,
> NSA and a bunch of big companies that relied (or still
> relying) on VMS did extensive security testing. That makes sense.
>
> But it does not seem plausible that they tested VMS to the same extent as
> Linux and Windows are beeing tested today. The money and the people was
> not there (US DoD and NSA may have had the money, but they had many
> other priorities).
>
> The number of people involved in security research today is huge. I don't
> know how many, but it must be in the tens of thousands of people.
>
> But no I do not expect those tens of thousands to get any interest in VMS
> due to the arrival of VMS x86-64 or whatever VSI web site contain. The
> money is still not there.
>
> Arne
>

re: past Customers putting OpenVMS through the ringer from a security perspective..

In approx. 2005 timeframe, the Shanghai Stock Exchange dropped their previous mission critical trading platform for what they called their "Next Generation" trading platform that was based on an OpenVMS Integrity based multi-site cluster. Disclosure - I do not know if this platform is still in place or not.

Btw, at the time, some predicted the Shanghai Stock Exchange might eventually replace the NYSE in terms of WW importance.

Does anyone think this next generation trading platform based on OpenVMS Integrity was not put through many, many security scenarios before this final decision was made?

Reference:
<https://blog.csdn.net/bjoker/article/details/1890554>
<https://community.hpe.com/t5/Operating-System-OpenVMS/OpenVMS-in-China/td-p/4655695#.YuxphxzMJhE>

Btw, it was kind of ironic, but the OS environment supporting their old platform that OpenVMS replaced was HP-UX. 😊

Course, at the time, HP internal politics meant that this big "Integrity win" could not be marketed much (HP-UX was the "golden child"), but that was the state of HP OS religion at the time.

Ah well, water under the bridge stuff ..

Regards,

Kerry Main
Kerry dot main at starkgaming dot com

--
This email has been checked for viruses by AVG antivirus software.
www.avg.com

Re: VMS VAX License for personal Microvax 3100 Model 40

<6d074c62-c54b-45bc-9ebc-8ce8cb11e757n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24181&group=comp.os.vms#24181

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:ac8:590f:0:b0:33c:7e5c:5042 with SMTP id 15-20020ac8590f000000b0033c7e5c5042mr4310995qty.465.1659669035661;
Thu, 04 Aug 2022 20:10:35 -0700 (PDT)
X-Received: by 2002:ac8:5e51:0:b0:31f:4765:b2ef with SMTP id
i17-20020ac85e51000000b0031f4765b2efmr4230787qtx.634.1659669035475; Thu, 04
Aug 2022 20:10:35 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 4 Aug 2022 20:10:35 -0700 (PDT)
In-Reply-To: <62ec56e4$0$703$14726298@news.sunsite.dk>
Injection-Info: google-groups.googlegroups.com; posting-host=123.255.63.188; posting-account=9D9SDwoAAACnifBr_Q9Flw5yKJJnd5rB
NNTP-Posting-Host: 123.255.63.188
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com>
<tcc5ih$ues$1@news.misty.com> <tcgk0k$6eu$1@reader2.panix.com> <62ec56e4$0$703$14726298@news.sunsite.dk>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <6d074c62-c54b-45bc-9ebc-8ce8cb11e757n@googlegroups.com>
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
From: dgsof...@gmail.com (David Goodwin)
Injection-Date: Fri, 05 Aug 2022 03:10:35 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 3746
 by: David Goodwin - Fri, 5 Aug 2022 03:10 UTC

On Friday, August 5, 2022 at 11:31:51 AM UTC+12, Arne Vajhøj wrote:
> On 8/4/2022 10:10 AM, Dan Cross wrote:
> > In article <tcc5ih$ues$1...@news.misty.com>,
> > Johnny Billquist <b...@softjar.se> wrote:
> >> On 2022-08-02 16:33, Dan Cross wrote:
> >>> It boggles my mind that people think that an organization that
> >>> has explicitly declined to work with the VAX (for the very valid
> >>> reasons mentioned elsewhere in this thread) would care if a few
> >>> hobbyists run an OS, 20 years out of maintenance, they can't
> >>> issue licenses for anyway.
> >>>
> >>> Maybe those people have the inside track with someone at at VSI
> >>> who has told them that this is as big a deal as they are making
> >>> it out to be, but I find that doubtful.
> >>
> >> I doubt it's the talking point of the day for VSI. But never the less,
> >> there is a point in observing how people behave in similar situations to
> >> deduce how they might behave elsewhere.
> >>
> >> Bill did make a good point about the non-existence of hobbyist program
> >> for the PDP-11 software, which allegedly is because people were
> >> misbehaving. And VSI might look at how people behave around the VAX and
> >> decide how they want to continue hobbyist stuff for the platforms they
> >> have made releases for.
> >
> > The bottom line is that absent some definitive statement from
> > VSI, this is all speculation.
> True.
>
> But the day it is no longer speculation then it is too late.
>
> It is a risk.
>
> You could certainly argue that people willing to take a risk on
> their own behalf should be allowed to do so, but here the risk applies
> to the entire community.
>
> So people are not going to the casino and betting just their
> own savings - people are going to the casino and betting their
> own plus everybody elses savings.

Its not a risk. The community license is necessary for the viability
of OpenVMS as a platform. If VSI takes it away that's them saying
they see no future for OpenVMS and therefore no need to increase
the number of people with OpenVMS skills.

And if there is no future for OpenVMS then those temporary
community licenses are going away sooner or later whether people
use VAX/VMS without a license or not.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tci1pq$32791$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24182&group=comp.os.vms#24182

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Thu, 4 Aug 2022 23:11:53 -0400
Organization: A noiseless patient Spider
Lines: 78
Message-ID: <tci1pq$32791$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com>
<62e9b4ec$0$699$14726298@news.sunsite.dk> <tcgk48$6eu$2@reader2.panix.com>
<tcgq7u$2rj79$2@dont-email.me> <tch52b$2so50$2@dont-email.me>
<jl2mimFgquoU2@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 5 Aug 2022 03:11:54 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="65f7c19227848ad970f6f629b33d3b49";
logging-data="3218721"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18MDsJAcmKcSBAc6xFMwRxt5dxS06t1Wyk="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:4lkSp6zAJ5kUtknaV9+c51plz3w=
In-Reply-To: <jl2mimFgquoU2@mid.individual.net>
 by: Dave Froble - Fri, 5 Aug 2022 03:11 UTC

On 8/4/2022 3:56 PM, Bill Gunshannon wrote:
> On 8/4/22 15:01, Dave Froble wrote:
>> On 8/4/2022 11:56 AM, Dave Froble wrote:
>>> On 8/4/2022 10:12 AM, Dan Cross wrote:
>>>> In article <62e9b4ec$0$699$14726298@news.sunsite.dk>,
>>>> Arne Vajhøj <arne@vajhoej.dk> wrote:
>>>>> On 8/2/2022 10:33 AM, Dan Cross wrote:
>>>>>> In article <tc1d87$tnl$1@news.misty.com>,
>>>>>> Johnny Billquist <bqt@softjar.se> wrote:
>>>>>>> On 2022-07-26 13:32, Dan Cross wrote:
>>>>>>>> But again, why should VSI care? They have nothing to do
>>>>>>>> with VAX. If people started doing this for Alpha, Itanium
>>>>>>>> or x86, I could see it since VSI has interest in those
>>>>>>>> platforms. But VAX is explicitly out of their domain.
>>>>>>>
>>>>>>> I should point out that VSI have nothing to do with VAX out of choice.
>>>>>>> They could technically make a VAX release if they wanted to. They do
>>>>>>> have the rights, and the code.
>>>>>>
>>>>>> A fair point, but regardless, they have chosen not to care.
>>>>>>
>>>>>> It boggles my mind that people think that an organization that
>>>>>> has explicitly declined to work with the VAX (for the very valid
>>>>>> reasons mentioned elsewhere in this thread) would care if a few
>>>>>> hobbyists run an OS, 20 years out of maintenance, they can't
>>>>>> issue licenses for anyway.
>>>>>>
>>>>>> Maybe those people have the inside track with someone at at VSI
>>>>>> who has told them that this is as big a deal as they are making
>>>>>> it out to be, but I find that doubtful.
>>>>>
>>>>> It is quite common to suspect that people known to be willing to
>>>>> break one law is more willing to break another law.
>>>>>
>>>>> Most people would not let their daughter go on a date with
>>>>> a convicted bank robber - even though the daughter is obviously
>>>>> not a bank.
>>>>
>>>> This is very much a strawman. A better analogy might be, if
>>>> someone picks something out of the trash and gets it working
>>>> again, is that technically theft?
>>>>
>>>> - Dan C.
>>>>
>>>
>>> Yes !!!
>>>
>>
>> Uh, not yes as in it is theft. Yes as in a great example. I should re-read
>> what I type several times before hitting the SEND button.
>>
>
> Sorry Dave, you were right the first time. It is theft and
> has been upheld by the courts in most states.
>
> bill
>

Ok, theft from whom?

The people who put something out as trash?
The trash haulers?
The landfill?

How about referring me to some of those cases. Cause I'm flat not believing you.

Any judge who would rule like that deserves what the current supreme court
deserves, impeachment.

The very thought is preposterous.

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VMS VAX License for personal Microvax 3100 Model 40

<tci28k$3285v$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24183&group=comp.os.vms#24183

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Thu, 4 Aug 2022 23:19:47 -0400
Organization: A noiseless patient Spider
Lines: 78
Message-ID: <tci28k$3285v$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcf7bh$2jb40$1@dont-email.me>
<jl1vv8Fd4o4U3@mid.individual.net> <tcgp5e$2rgld$1@dont-email.me>
<tcgvgp$2s3uo$1@dont-email.me> <tch4s6$2so50$1@dont-email.me>
<tch8ge$2t2kk$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 5 Aug 2022 03:19:49 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="65f7c19227848ad970f6f629b33d3b49";
logging-data="3219647"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19r39YyAl6U/qveA+tb9xwM040jDTDV+sw="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:sbD0ot/RbfgMcN7D6+/CzWYjsE8=
In-Reply-To: <tch8ge$2t2kk$1@dont-email.me>
 by: Dave Froble - Fri, 5 Aug 2022 03:19 UTC

On 8/4/2022 4:00 PM, Simon Clubley wrote:
> On 2022-08-04, Dave Froble <davef@tsoft-inc.com> wrote:
>> On 8/4/2022 1:26 PM, Simon Clubley wrote:
>>> On 2022-08-04, Dave Froble <davef@tsoft-inc.com> wrote:
>>>>
>>>> David and Simon insist on making other people's decisions for them. Sort of
>>>> "devil take the hindmost" if their solutions are not followed. Even if there
>>>> are some who might be aware, publishing the problem will insure many will then
>>>> know about it. And it might be totally unknown, until David/Simon publish it to
>>>> the entire world.
>>>>
>>>
>>> No, Simon believes in following industry-standard protocols, which are
>>> give the vendor 3 months to fix it and then reveal the details.
>>>
>>> In the same way as it has become socially unacceptable to smoke in an
>>> office environment, it has now become socially unacceptable for a vendor
>>> not to fix a confirmed vulnerability within a reasonable amount of time.
>>
>> Simon, what part of VAX/VMS V5.2.??? didn't you understand. Perhaps you need
>> some reading lessons?
>>
>> Simon, WHAT VENDOR?
>>
>> VSI doesn't do VAX, nor V5.???
>> HPe doesn't do VMS
>>
>> You just keep on with your standard rhetoric, whether it makes any sense or not.
>>
>>> This is a good thing.
>>>
>>> Oh, and vulnerabilities very rarely exist only on one specific out of
>>> support point release. They generally exist across of range of supported
>>> and unsupported OS versions.
>>
>> You choose to ignore the specific question.
>>
>
> Because the specific question doesn't make any sense and shows a lack
> of understanding about how security research is done.

The question wasn't about hackers, it was about an old version of VMS.

You refuse to answer the question as asked.

> No security researcher looking for vulnerabilities in general would
> start with a decades old version of VMS. They would start with the
> current version and look for vulnerabilities in that version.
>
> If they find something, they may choose to look at older versions to see
> if it's in those versions as well, but it's the vendor's responsibility
> to determine how far back a vulnerability goes.
>
> The only time I can think of a security researcher looking at a specific
> decades old version is if they have been commissioned to do so by
> a client and then it's the client that sets the ground rules about
> disclosure.
>
>>>
>>> These days, it is the responsibility of the organisation which has
>>> chosen to remain on an old out of support OS version (for whatever
>>> reason) to make sure there is enough protection around that system
>>> to protect it from future vulnerabilities.
>>
>> And from the likes of you, I guess ...
>>
>
> That's extremely uncalled for David and I would like an apology for that.

When you start to have some compassion for victims ...

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VMS VAX License for personal Microvax 3100 Model 40

<3533d9f0-0f96-4b51-a5e5-ea36cb64eca2n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24184&group=comp.os.vms#24184

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:2548:b0:6b6:113d:34fd with SMTP id s8-20020a05620a254800b006b6113d34fdmr3663307qko.132.1659670701541;
Thu, 04 Aug 2022 20:38:21 -0700 (PDT)
X-Received: by 2002:a05:622a:311:b0:31e:eb37:cbef with SMTP id
q17-20020a05622a031100b0031eeb37cbefmr4260169qtw.130.1659670701349; Thu, 04
Aug 2022 20:38:21 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border-2.nntp.ord.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 4 Aug 2022 20:38:21 -0700 (PDT)
In-Reply-To: <tci28k$3285v$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=123.255.63.188; posting-account=9D9SDwoAAACnifBr_Q9Flw5yKJJnd5rB
NNTP-Posting-Host: 123.255.63.188
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcf7bh$2jb40$1@dont-email.me>
<jl1vv8Fd4o4U3@mid.individual.net> <tcgp5e$2rgld$1@dont-email.me>
<tcgvgp$2s3uo$1@dont-email.me> <tch4s6$2so50$1@dont-email.me>
<tch8ge$2t2kk$1@dont-email.me> <tci28k$3285v$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <3533d9f0-0f96-4b51-a5e5-ea36cb64eca2n@googlegroups.com>
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
From: dgsof...@gmail.com (David Goodwin)
Injection-Date: Fri, 05 Aug 2022 03:38:21 +0000
Content-Type: text/plain; charset="UTF-8"
Lines: 75
 by: David Goodwin - Fri, 5 Aug 2022 03:38 UTC

On Friday, August 5, 2022 at 3:19:51 PM UTC+12, Dave Froble wrote:
> On 8/4/2022 4:00 PM, Simon Clubley wrote:
> > On 2022-08-04, Dave Froble <da...@tsoft-inc.com> wrote:
> >> On 8/4/2022 1:26 PM, Simon Clubley wrote:
> >>> On 2022-08-04, Dave Froble <da...@tsoft-inc.com> wrote:
> >>>>
> >>>> David and Simon insist on making other people's decisions for them. Sort of
> >>>> "devil take the hindmost" if their solutions are not followed. Even if there
> >>>> are some who might be aware, publishing the problem will insure many will then
> >>>> know about it. And it might be totally unknown, until David/Simon publish it to
> >>>> the entire world.
> >>>>
> >>>
> >>> No, Simon believes in following industry-standard protocols, which are
> >>> give the vendor 3 months to fix it and then reveal the details.
> >>>
> >>> In the same way as it has become socially unacceptable to smoke in an
> >>> office environment, it has now become socially unacceptable for a vendor
> >>> not to fix a confirmed vulnerability within a reasonable amount of time.
> >>
> >> Simon, what part of VAX/VMS V5.2.??? didn't you understand. Perhaps you need
> >> some reading lessons?
> >>
> >> Simon, WHAT VENDOR?
> >>
> >> VSI doesn't do VAX, nor V5.???
> >> HPe doesn't do VMS
> >>
> >> You just keep on with your standard rhetoric, whether it makes any sense or not.
> >>
> >>> This is a good thing.
> >>>
> >>> Oh, and vulnerabilities very rarely exist only on one specific out of
> >>> support point release. They generally exist across of range of supported
> >>> and unsupported OS versions.
> >>
> >> You choose to ignore the specific question.
> >>
> >
> > Because the specific question doesn't make any sense and shows a lack
> > of understanding about how security research is done.
> The question wasn't about hackers, it was about an old version of VMS.
>
> You refuse to answer the question as asked.
> > No security researcher looking for vulnerabilities in general would
> > start with a decades old version of VMS. They would start with the
> > current version and look for vulnerabilities in that version.
> >
> > If they find something, they may choose to look at older versions to see
> > if it's in those versions as well, but it's the vendor's responsibility
> > to determine how far back a vulnerability goes.
> >
> > The only time I can think of a security researcher looking at a specific
> > decades old version is if they have been commissioned to do so by
> > a client and then it's the client that sets the ground rules about
> > disclosure.
> >
> >>>
> >>> These days, it is the responsibility of the organisation which has
> >>> chosen to remain on an old out of support OS version (for whatever
> >>> reason) to make sure there is enough protection around that system
> >>> to protect it from future vulnerabilities.
> >>
> >> And from the likes of you, I guess ...
> >>
> >
> > That's extremely uncalled for David and I would like an apology for that.
> When you start to have some compassion for victims ...

What if this hypothetical security hole is being actively exploited but the
user has no idea because, as far as they know, there is no security hole?

Keeping the security flaw secret doesn't stop it from being exploited, it
just makes it easier for anyone who knows about the flaw to exploit it
while making it harder for organisations running older versions to
protect their systems. No one wins by pretending the flaw doesn't exist.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tci780$32j3s$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24185&group=comp.os.vms#24185

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 5 Aug 2022 00:44:48 -0400
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <tci780$32j3s$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcf7bh$2jb40$1@dont-email.me>
<jl1vv8Fd4o4U3@mid.individual.net> <tcgp5e$2rgld$1@dont-email.me>
<tcgvgp$2s3uo$1@dont-email.me> <tch4s6$2so50$1@dont-email.me>
<jl2pkkFhaltU1@mid.individual.net>
<940185de-a7a3-4b89-b7a6-36c62075af3an@googlegroups.com>
<c3277042-1571-4340-be76-ceab4d19bc2bn@googlegroups.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 5 Aug 2022 04:44:48 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="65f7c19227848ad970f6f629b33d3b49";
logging-data="3230844"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/W05f202LmsBZX43JHqGZAhc7pkFQu9UI="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:Lcy+C5yttnrgvC7CDKMFUYUug1c=
In-Reply-To: <c3277042-1571-4340-be76-ceab4d19bc2bn@googlegroups.com>
 by: Dave Froble - Fri, 5 Aug 2022 04:44 UTC

On 8/4/2022 6:07 PM, gah4 wrote:
> On Thursday, August 4, 2022 at 2:22:37 PM UTC-7, abrsvc wrote:
>
> (snip)
>
>> In the emulated environment, it is the host that has the security problems and not the OpenVMS system. Odd, no?
>
> One of the more interesting, or maybe just more surprising, attacks is SQL injection.

Only if one is using and processing SQL ...

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcj1gk$34t5l$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24188&group=comp.os.vms#24188

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 5 Aug 2022 12:13:08 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <tcj1gk$34t5l$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com> <tce5cq$16id$1@gioia.aioe.org> <62eadac0$0$701$14726298@news.sunsite.dk> <tcge2u$2q741$4@dont-email.me> <62ec5edb$0$704$14726298@news.sunsite.dk>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 5 Aug 2022 12:13:08 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="16145e8ef889620f2192744193aab0f7";
logging-data="3306677"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19RU1DTs2gqY25i4JVipvyKICpvzjnW/Q4="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:5e/WF3R7q9/TJRvNeb5jcPkKbEQ=
 by: Simon Clubley - Fri, 5 Aug 2022 12:13 UTC

On 2022-08-04, Arne Vajhøj <arne@vajhoej.dk> wrote:
> On 8/4/2022 8:29 AM, Simon Clubley wrote:
>>
>> Well, in fairness to Chris, while he clearly has an ideological dislike
>> for x86-64 for whatever reasons, this is also the architecture that has
>> all the Intel Management Engine and other management stuff running on
>> modern versions of that architecture.
>>
>> Stuff that runs underneath your operating system and can't be switched off.
>
> ME are not really ISA specific.
>
> ME is AFAIK only available for x86-64 chipsets.
>

Unfortunately, AMD has its own version as well: :-(

https://en.wikipedia.org/wiki/AMD_Platform_Security_Processor

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcj212$34t5l$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24189&group=comp.os.vms#24189

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 5 Aug 2022 12:21:55 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <tcj212$34t5l$2@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com> <tcebao$2c4e5$1@dont-email.me> <tcgmi4$2r7vv$1@dont-email.me> <62ec6426$0$699$14726298@news.sunsite.dk> <000b01d8a868$8fe982a0$afbc87e0$@gmail.com> <mailman.3.1659662048.674.info-vax_rbnsn.com@rbnsn.com>
Injection-Date: Fri, 5 Aug 2022 12:21:55 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="16145e8ef889620f2192744193aab0f7";
logging-data="3306677"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/ANvso/RgX/UlUmalTPtXcqav+NLl6kSY="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:R1ZXSLDRubsX1lkDniCNnJjS+yA=
 by: Simon Clubley - Fri, 5 Aug 2022 12:21 UTC

On 2022-08-04, Kerry Main <kemain.nospam@gmail.com> wrote:
>
> re: past Customers putting OpenVMS through the ringer from a security perspective..
>
> In approx. 2005 timeframe, the Shanghai Stock Exchange dropped their previous mission critical trading platform for what they called their "Next Generation" trading platform that was based on an OpenVMS Integrity based multi-site cluster. Disclosure - I do not know if this platform is still in place or not.
>
> Btw, at the time, some predicted the Shanghai Stock Exchange might eventually replace the NYSE in terms of WW importance.
>
> Does anyone think this next generation trading platform based on OpenVMS Integrity was not put through many, many security scenarios before this final decision was made?
>

The problem with that argument Kerry is that we now know there is at
least one major security flaw they missed.

How many more did they miss ?

(Although my version of the exploit only caused a process crash on
Itanium, the underlying flaw was still there in Itanium VMS, so if
you are relying on those stock exchange audits to say that VMS has
been audited, it's reasonable to ask why they didn't discover this
flaw and it's reasonable to ask what else they may have missed.)

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcja6t$1cae$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24191&group=comp.os.vms#24191

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!jazQyxryRFiI4FEZ51SAvA.user.46.165.242.75.POSTED!not-for-mail
From: chris-no...@tridac.net (chris)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 05 Aug 2022 15:41:33 +0100
Organization: Aioe.org NNTP Server
Message-ID: <tcja6t$1cae$1@gioia.aioe.org>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com> <62e9b4ec$0$699$14726298@news.sunsite.dk> <tcgk48$6eu$2@reader2.panix.com> <tcgq7u$2rj79$2@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="45390"; posting-host="jazQyxryRFiI4FEZ51SAvA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (X11; SunOS sun4u; rv:10.0.2) Gecko/20120216 Thunderbird/10.0.2
X-Notice: Filtered by postfilter v. 0.9.2
 by: chris - Fri, 5 Aug 2022 14:41 UTC

On 08/04/22 16:56, Dave Froble wrote:
> On 8/4/2022 10:12 AM, Dan Cross wrote:
>> In article <62e9b4ec$0$699$14726298@news.sunsite.dk>,
>> Arne Vajhøj <arne@vajhoej.dk> wrote:
>>> On 8/2/2022 10:33 AM, Dan Cross wrote:
>>>> In article <tc1d87$tnl$1@news.misty.com>,
>>>> Johnny Billquist <bqt@softjar.se> wrote:
>>>>> On 2022-07-26 13:32, Dan Cross wrote:
>>>>>> But again, why should VSI care? They have nothing to do
>>>>>> with VAX. If people started doing this for Alpha, Itanium
>>>>>> or x86, I could see it since VSI has interest in those
>>>>>> platforms. But VAX is explicitly out of their domain.
>>>>>
>>>>> I should point out that VSI have nothing to do with VAX out of choice.
>>>>> They could technically make a VAX release if they wanted to. They do
>>>>> have the rights, and the code.
>>>>
>>>> A fair point, but regardless, they have chosen not to care.
>>>>
>>>> It boggles my mind that people think that an organization that
>>>> has explicitly declined to work with the VAX (for the very valid
>>>> reasons mentioned elsewhere in this thread) would care if a few
>>>> hobbyists run an OS, 20 years out of maintenance, they can't
>>>> issue licenses for anyway.
>>>>
>>>> Maybe those people have the inside track with someone at at VSI
>>>> who has told them that this is as big a deal as they are making
>>>> it out to be, but I find that doubtful.
>>>
>>> It is quite common to suspect that people known to be willing to
>>> break one law is more willing to break another law.
>>>
>>> Most people would not let their daughter go on a date with
>>> a convicted bank robber - even though the daughter is obviously
>>> not a bank.
>>
>> This is very much a strawman. A better analogy might be, if
>> someone picks something out of the trash and gets it working
>> again, is that technically theft?
>>
>> - Dan C.
>>
>
> Yes !!!
>

I was expecting a smiley there David, but there wasn't one ^-)...

Chris

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcjau1$1rqr$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24192&group=comp.os.vms#24192

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!jazQyxryRFiI4FEZ51SAvA.user.46.165.242.75.POSTED!not-for-mail
From: chris-no...@tridac.net (chris)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 05 Aug 2022 15:53:53 +0100
Organization: Aioe.org NNTP Server
Message-ID: <tcjau1$1rqr$1@gioia.aioe.org>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com> <tce5cq$16id$1@gioia.aioe.org> <62eadac0$0$701$14726298@news.sunsite.dk> <tcge2u$2q741$4@dont-email.me> <62ec5edb$0$704$14726298@news.sunsite.dk> <tcj1gk$34t5l$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="61275"; posting-host="jazQyxryRFiI4FEZ51SAvA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (X11; SunOS sun4u; rv:10.0.2) Gecko/20120216 Thunderbird/10.0.2
X-Notice: Filtered by postfilter v. 0.9.2
 by: chris - Fri, 5 Aug 2022 14:53 UTC

On 08/05/22 13:13, Simon Clubley wrote:
> On 2022-08-04, Arne Vajhøj<arne@vajhoej.dk> wrote:
>> On 8/4/2022 8:29 AM, Simon Clubley wrote:
>>>
>>> Well, in fairness to Chris, while he clearly has an ideological dislike
>>> for x86-64 for whatever reasons, this is also the architecture that has
>>> all the Intel Management Engine and other management stuff running on
>>> modern versions of that architecture.
>>>
>>> Stuff that runs underneath your operating system and can't be switched off.
>>
>> ME are not really ISA specific.
>>
>> ME is AFAIK only available for x86-64 chipsets.
>>
>
> Unfortunately, AMD has its own version as well: :-(
>
> https://en.wikipedia.org/wiki/AMD_Platform_Security_Processor
>
> Simon.
>

The problem with that, of course, is that the internals are
not fully disclosed, so cannot be fully secured. Should be
some way to disable it, but no way to tell how it interacts
with the rest of the system. A glaring security hole, but
no doubt some government agencies have the full story and
how to compromise it...

Chris

Re: VMS VAX License for personal Microvax 3100 Model 40

<mailman.4.1659713637.674.info-vax_rbnsn.com@rbnsn.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24193&group=comp.os.vms#24193

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!kishost2.serverpowered.net!not-for-mail
From: kemain.n...@gmail.com (Kerry Main )
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 5 Aug 2022 12:33:12 -0300
Lines: 85
Message-ID: <mailman.4.1659713637.674.info-vax_rbnsn.com@rbnsn.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcgmi4$2r7vv$1@dont-email.me>
<62ec6426$0$699$14726298@news.sunsite.dk>
<000b01d8a868$8fe982a0$afbc87e0$@gmail.com>
<mailman.3.1659662048.674.info-vax_rbnsn.com@rbnsn.com>
<tcj212$34t5l$2@dont-email.me>
<000301d8a8e0$ad0a8c80$071fa580$@gmail.com>
Mime-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Info: solani.org;
logging-data="428504"; mail-complaints-to="abuse@news.solani.org"
To: "'comp.os.vms to email gateway'" <info-vax@rbnsn.com>
Cancel-Lock: sha1:Cwpp7spPofwVzpqHXnrx6eVhjYw=
X-Mailman-Version: 2.1.38
X-Spam-Score: 33
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
h=from:to:references:in-reply-to:subject:date:message-id:mime-version
:content-transfer-encoding:content-language:thread-index;
bh=5P20gyMxgru/MzEJuowwyIQKAImosfONgr9c29rqBUI=;
b=nVcknHVvUwGtqHfefYAWiFd5FxPZ1x8pLEmTs/L9XcZjrpMooqihV/ox97voQRj+uu
BYademuaNZ9vwA51k4heOTt46y6nk0bxJhpBv75qrn9091kyvQ+qgP0m0Cu10LgjnKS/
6lvyzb4+UwhZ31mGDeVUN4MkzO+LBp+5TZgatWnShFecLL4E5+Z/jTHzIepDHNiDMNqx
j90AewSC1tVj2P3a7sNtFLikLOfzJpB5L+Ue6cOrtiBSXfKwueI/sHCdx1ffd4SyWZtj
LskHWiBjiflL+7HP5+JGlBy06Gb+gLxSgbEtrDu395XNXKdH5VOl7i0izkSjeIctFXL3
n21A==
X-BeenThere: info-vax@rbnsn.com
X-Antivirus-Status: Clean
In-Reply-To: <tcj212$34t5l$2@dont-email.me>
Content-Language: en-ca
X-Ham-Report: Spam detection software,
running on the system "kishost2.serverpowered.net",
has NOT identified this incoming email as spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
root\@localhost for details. Content preview: >
Content analysis details: (3.3 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
3.0 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.5000]
-0.0 SPF_PASS SPF: sender matches SPF record
0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail
provider [kemain.nospam[at]gmail.com]
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from
envelope-from domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
0.5 KAM_NUMSUBJECT Subject ends in numbers excluding current years
-0.0 T_SCC_BODY_TEXT_LINE No description available.
List-Archive: <http://rbnsn.com/pipermail/info-vax_rbnsn.com/>
X-Gm-Message-State: ACgBeo06+PamIt6NtjnDEYrA+swGrPM5Uy5RZ1J6thd3sz/rgXtHC+nO
TeM/GUUDke4HjjihJYXs6YrR3beihD0=
X-Google-Smtp-Source: AA6agR7tqNsi+uqBuWBArpvJdpJOKZ+pYiQkjX7dhMffcS8ui9Ksdz/QHgBCIrYSYLRVj4FVuQEIWw==
X-Spam-Bar: +++
X-Spam-Status: No, score=3.3
X-Mailman-Original-References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcgmi4$2r7vv$1@dont-email.me>
<62ec6426$0$699$14726298@news.sunsite.dk>
<000b01d8a868$8fe982a0$afbc87e0$@gmail.com>
<mailman.3.1659662048.674.info-vax_rbnsn.com@rbnsn.com>
<tcj212$34t5l$2@dont-email.me>
X-User-ID: eJwNx8kBwDAIA7CZuAyMQxK8/witfgqD4KYj4MGg2akWzx2qsXRFF3PxT473PKbmO9zo1an9ABzlEZw=
List-Post: <mailto:info-vax@rbnsn.com>
List-Id: "comp.os.vms to email gateway" <info-vax.rbnsn.com>
Precedence: list
X-Received: by 2002:a05:620a:19a9:b0:6b6:4f9c:fc24 with SMTP id
bm41-20020a05620a19a900b006b64f9cfc24mr5447361qkb.252.1659713593577;
Fri, 05 Aug 2022 08:33:13 -0700 (PDT)
List-Help: <mailto:info-vax-request@rbnsn.com?subject=help>
Thread-Index: AQLNt5q05tNH4gYHrDu9W2RHDvFE8wGad23yAik/tVIBsNT9gAFHSxDXAMgXvMkCPTM4nQFS7zqLAfArV54BEcS1lAE4YC5tAijv3uoCdy/nQasWxHAQ
List-Subscribe: <http://rbnsn.com/mailman/listinfo/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=subscribe>
X-Antivirus: AVG (VPS 220805-2, 2022-8-5), Outbound message
X-Spam-Flag: NO
X-Mailer: Microsoft Outlook 16.0
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:from:to:references:in-reply-to:subject:date
:message-id:mime-version:content-transfer-encoding:content-language
:thread-index;
bh=5P20gyMxgru/MzEJuowwyIQKAImosfONgr9c29rqBUI=;
b=ENl1wJIRmgew6DMGnwMTt4+Sjg6f0IfcddfheFH5z0SDQDKBlC8OtQkrgi5+weTbYk
zyqZP9jfWmU/iHLXnWgRNye+W89y39PouPnBMIrW4z2tggNSp/dwYTdFHQ7nnqNfi3VW
gjIA2EpPstpQdBc2A4RxdHPbI+wi7ZXdka3phdIIS8q+c12FCIJz2fF3aKPSVmF5cnbL
CSUZ8C7FaJhtoT6xa0suaLcev0KxZ5Tt+lLrdTmw/8SsE0zO3ouukAol9+0L+x688AiM
s6BXAa3IGh08E/AqPjtIfIlU/BHcYXpOtMnOqOkx4P3fMNOcpEwpRd/DhZB7dR+6W8ZY
jg4Q==
List-Unsubscribe: <http://rbnsn.com/mailman/options/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=unsubscribe>
X-Mailman-Original-Message-ID: <000301d8a8e0$ad0a8c80$071fa580$@gmail.com>
 by: Kerry Main - Fri, 5 Aug 2022 15:33 UTC

> -----Original Message-----
> From: Info-vax <info-vax-bounces@rbnsn.com> On Behalf Of Simon Clubley
> via Info-vax
> Sent: August-05-22 9:22 AM
> To: info-vax@rbnsn.com
> Cc: Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP>
> Subject: Re: [Info-vax] VMS VAX License for personal Microvax 3100 Model
> 40
>
> On 2022-08-04, Kerry Main <kemain.nospam@gmail.com> wrote:
> >
> > re: past Customers putting OpenVMS through the ringer from a security
> perspective..
> >
> > In approx. 2005 timeframe, the Shanghai Stock Exchange dropped their
> previous mission critical trading platform for what they called their
"Next
> Generation" trading platform that was based on an OpenVMS Integrity
> based multi-site cluster. Disclosure - I do not know if this platform is
still in
> place or not.
> >
> > Btw, at the time, some predicted the Shanghai Stock Exchange might
> eventually replace the NYSE in terms of WW importance.
> >
> > Does anyone think this next generation trading platform based on
> OpenVMS Integrity was not put through many, many security scenarios
> before this final decision was made?
> >
>
> The problem with that argument Kerry is that we now know there is at least
> one major security flaw they missed.
>
> How many more did they miss ?
>
> (Although my version of the exploit only caused a process crash on
Itanium,
> the underlying flaw was still there in Itanium VMS, so if you are relying
on
> those stock exchange audits to say that VMS has been audited, it's
> reasonable to ask why they didn't discover this flaw and it's reasonable
to ask
> what else they may have missed.)
>
> Simon.
>

So, just because you found a hole (that was subsequently fixed), you infer
there are still major issues with "how many more did they miss?"

However, the same can be stated for every OS platform.

History has shown that every OS platform will eventually have security
issues that will need to be fixed. No OS platform is 100% secure.

None.

As far as "relying on those stock exchange audits to say that VMS has been
audited" ...

I never stated this. I simply provided this as one example of a highly
mission critical Customer environment that, in the 2005 timeframe, did
thoroughly analyze the OpenVMS platform.

After this review, the Stock Exchange dropped their old HP-UX trading
platform and adopted OpenVMS Integrity in a active-active multi-site config
as their Next Generation trading platform.

Regards,

Kerry Main
Kerry dot main at starkgaming dot com

--
This email has been checked for viruses by AVG antivirus software.
www.avg.com

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcjkf5$38nic$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24194&group=comp.os.vms#24194

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 5 Aug 2022 17:36:37 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 35
Message-ID: <tcjkf5$38nic$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com> <tcebao$2c4e5$1@dont-email.me> <tcgmi4$2r7vv$1@dont-email.me> <62ec6426$0$699$14726298@news.sunsite.dk> <000b01d8a868$8fe982a0$afbc87e0$@gmail.com> <mailman.3.1659662048.674.info-vax_rbnsn.com@rbnsn.com> <tcj212$34t5l$2@dont-email.me> <000301d8a8e0$ad0a8c80$071fa580$@gmail.com> <mailman.4.1659713637.674.info-vax_rbnsn.com@rbnsn.com>
Injection-Date: Fri, 5 Aug 2022 17:36:37 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="16145e8ef889620f2192744193aab0f7";
logging-data="3432012"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX199J13CVQHfofJxeq6LoQLHxhcLcrwhkUo="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:ufJqSqRaujc94qqfUPXRtXPpQt4=
 by: Simon Clubley - Fri, 5 Aug 2022 17:36 UTC

On 2022-08-05, Kerry Main <kemain.nospam@gmail.com> wrote:
>
> So, just because you found a hole (that was subsequently fixed), you infer
> there are still major issues with "how many more did they miss?"
>
> However, the same can be stated for every OS platform.
>

I completely agree Kerry. Unfortunately, there are those who believe that
absence of probing is somehow the same thing as there being no more flaws
to find.

> History has shown that every OS platform will eventually have security
> issues that will need to be fixed. No OS platform is 100% secure.
>
> None.
>

Agreed.

> As far as "relying on those stock exchange audits to say that VMS has been
> audited" ...
>
> I never stated this. I simply provided this as one example of a highly
> mission critical Customer environment that, in the 2005 timeframe, did
> thoroughly analyze the OpenVMS platform.
>

Not directly, but that's what you came across as strongly implying.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcjs2j$nc$1@panix2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24195&group=comp.os.vms#24195

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.panix2.panix.com!panix2.panix.com!not-for-mail
From: klu...@panix.com (Scott Dorsey)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: 5 Aug 2022 19:46:27 -0000
Organization: Former users of Netcom shell (1989-2000)
Lines: 19
Message-ID: <tcjs2j$nc$1@panix2.panix.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <62ec5edb$0$704$14726298@news.sunsite.dk> <tcj1gk$34t5l$1@dont-email.me> <tcjau1$1rqr$1@gioia.aioe.org>
Injection-Info: reader2.panix.com; posting-host="panix2.panix.com:166.84.1.2";
logging-data="1116"; mail-complaints-to="abuse@panix.com"
 by: Scott Dorsey - Fri, 5 Aug 2022 19:46 UTC

chris <chris-nospam@tridac.net> wrote:
>
>The problem with that, of course, is that the internals are
>not fully disclosed, so cannot be fully secured. Should be
>some way to disable it, but no way to tell how it interacts
>with the rest of the system. A glaring security hole, but
>no doubt some government agencies have the full story and
>how to compromise it...

The x86_64 architecture really isn't documented inside at all, so things like
the management processor which starts up and initializes the CPU (and which
appears to be able to do a lot more) and the firmware built into that
management processor are pretty much undocumented. Some folks have managed
to reverse-engineer the 8051-like management engine in 1980s x86 processors
but everyone suspects that we have come a long way.
--scott

--
"C'est un Nagra. C'est suisse, et tres, tres precis."

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcjv4m$1ef$1@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24196&group=comp.os.vms#24196

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 5 Aug 2022 20:38:46 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <tcjv4m$1ef$1@reader2.panix.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tcge2u$2q741$4@dont-email.me> <62ec5edb$0$704$14726298@news.sunsite.dk> <tcj1gk$34t5l$1@dont-email.me>
Injection-Date: Fri, 5 Aug 2022 20:38:46 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="1487"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Fri, 5 Aug 2022 20:38 UTC

In article <tcj1gk$34t5l$1@dont-email.me>,
Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
>On 2022-08-04, Arne Vajh�j <arne@vajhoej.dk> wrote:
>> On 8/4/2022 8:29 AM, Simon Clubley wrote:
>>>
>>> Well, in fairness to Chris, while he clearly has an ideological dislike
>>> for x86-64 for whatever reasons, this is also the architecture that has
>>> all the Intel Management Engine and other management stuff running on
>>> modern versions of that architecture.
>>>
>>> Stuff that runs underneath your operating system and can't be switched off.
>>
>> ME are not really ISA specific.
>>
>> ME is AFAIK only available for x86-64 chipsets.
>>
>
>Unfortunately, AMD has its own version as well: :-(
>
>https://en.wikipedia.org/wiki/AMD_Platform_Security_Processor

Yup. At the moment, not much you can do about the PSP, though
once it's trained DRAM and loaded the code that runs at the x86
reset vector, you can pretty much turn it off and ignore it.

- Dan C.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tck0f2$ced$1@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24197&group=comp.os.vms#24197

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 5 Aug 2022 21:01:22 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <tck0f2$ced$1@reader2.panix.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tcj212$34t5l$2@dont-email.me> <000301d8a8e0$ad0a8c80$071fa580$@gmail.com> <mailman.4.1659713637.674.info-vax_rbnsn.com@rbnsn.com>
Injection-Date: Fri, 5 Aug 2022 21:01:22 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="12749"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Fri, 5 Aug 2022 21:01 UTC

In article <mailman.4.1659713637.674.info-vax_rbnsn.com@rbnsn.com>,
Kerry Main <kemain.nospam@gmail.com> wrote:
>[snip]
>So, just because you found a hole (that was subsequently fixed), you infer
>there are still major issues with "how many more did they miss?"

Yes, absolutely. Of course. We know from decades of software
engineering research that the presence of bugs tends to indicate
more bugs in the affected system; the exact classification of
those bugs is immaterial.

>However, the same can be stated for every OS platform.
>
>History has shown that every OS platform will eventually have security
>issues that will need to be fixed. No OS platform is 100% secure.
>
>None.

Yes. Precisely why people _should_ audit VMS. Either they find
bugs that are then fixed, or they don't. In either case, you've
learned something useful.

>As far as "relying on those stock exchange audits to say that VMS has been
>audited" ...
>
>I never stated this. I simply provided this as one example of a highly
>mission critical Customer environment that, in the 2005 timeframe, did
>thoroughly analyze the OpenVMS platform.
>
>After this review, the Stock Exchange dropped their old HP-UX trading
>platform and adopted OpenVMS Integrity in a active-active multi-site config
>as their Next Generation trading platform.

That's great. But that doesn't mean that there are not security
bugs lurking in VMS. Entirely new categories of security bugs
have been discovered since 2005.

- Dan C.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tck0oi$ced$2@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24198&group=comp.os.vms#24198

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Fri, 5 Aug 2022 21:06:26 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <tck0oi$ced$2@reader2.panix.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tchg04$7f6$1@reader2.panix.com> <000401d8a85f$a79f15d0$f6dd4170$@gmail.com> <mailman.1.1659658224.674.info-vax_rbnsn.com@rbnsn.com>
Injection-Date: Fri, 5 Aug 2022 21:06:26 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="12749"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Fri, 5 Aug 2022 21:06 UTC

In article <mailman.1.1659658224.674.info-vax_rbnsn.com@rbnsn.com>,
Kerry Main <kemain.nospam@gmail.com> wrote:
>> Cc: Dan Cross <cross@spitfire.i.gajendra.net>
>> In article <tcgp5e$2rgld$1@dont-email.me>, Dave Froble <davef@tsoft-
>> inc.com> wrote:
>> >[snip]
>> >I asked from a moral perspective. So far I detect no sympathy for
>> >people who might be in a bad place. I for one find that sad.
>>
>> The thing is, those folks are in a bad place whether they know it or not.
>> Ancient versions of VMS probably have exploitable flaws that are known to
>> state-level actors and others beyond the script-kiddies. Just because the
>> operator of some application hosted on some ancient version of VMS
>> doesn't know that doesn't make them safe. They may exist in a state of
>> blissful ignorance and still be vulnerable.
>>
>> Now the calculus changes: is it better for the flaws to be known publicly
>or
>> not, given that they may exist and may be actively exploitable? Would you
>> rather know you had terminal cancer? Is it moral for a doctor to tell
>you?
>
>Well, you can substitute OpenVMS in that statement with any OS. Lots of W2K8
>and old versions of Linux, Solaris, AIX, HP-UX etc. around big datacenters
>today.

Yes, you surely could.

>The issue of old OS support is not specific to OpenVMS.

No, not at all.

>In many, likely most, OPS teams know the issues with old OS version support.

Well, only if someone has done the work to find the issues, and
that is what is under discussion here.

>However - App vendors gone out of business, dropped App support,
>knowledgeable staff long since retired / laid off .. just many of the
>reasons why some Customers have App's on very old OS versions still running.

No arguments there, but I'm not sure I understand the relevance
to whether it's morally correct or not to look for
vulnerabilities in OpenVMS.

>Yes, one might ask "why not spend the $'s into replacing that App?", but if
>the Senior Mgrs have no budget, then OPS teams are left to protect that
>environment with whatever tools they have e.g. put in firewall zone and
>restrict flows and other means.

Well if I was one of those operations folks, I's sure what to
know where the potential problems I had to look out for were
lurking.

>Unless one has spent time in OPS support dealing with on-the-floor
>realities, one should not be to quick to criticize these folks.

I don't believe anyone was. A question of morality was raised,
and the answer (as in many questions of morality) is nuanced.

- Dan C.


computers / comp.os.vms / Re: VMS VAX License for personal Microvax 3100 Model 40

Pages:123456789
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor