Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Be careful when a loop exits to the same place from side and bottom.


computers / comp.os.vms / Re: VMS VAX License for personal Microvax 3100 Model 40

SubjectAuthor
* VMS VAX License for personal Microvax 3100 Model 40Robert Grear
+* Re: VMS VAX License for personal Microvax 3100 Model 40Andy Burns
|`- Re: VMS VAX License for personal Microvax 3100 Model 40Subcommandante XDelta
+- Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
+* Re: VMS VAX License for personal Microvax 3100 Model 40David Wade
|`* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| +* Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| |`- Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| +* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| |`* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | +- Re: VMS VAX License for personal Microvax 3100 Model 40Scott Dorsey
| | +* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | |`* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | +* Re: VMS VAX License for personal Microvax 3100 Model 40chris
| | | |`* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | +* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | |`* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | | +- Re: VMS VAX License for personal Microvax 3100 Model 40Scott Dorsey
| | | | | `* Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |  `* Re: VMS VAX License for personal Microvax 3100 Model 40Andy Burns
| | | | |   +* Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |   |`* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |   | +* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | | |   | |+- Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | | |   | |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |   | `* Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |   |  `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |   |   `* Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |   |    `* Re: VMS VAX License for personal Microvax 3100 Model 40Chris Scheers
| | | | |   |     `* Re: VMS VAX License for personal Microvax 3100 Model 40Robert A. Brooks
| | | | |   |      +* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | | |   |      |`- Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | |   |      +* Re: VMS VAX License for personal Microvax 3100 Model 40Chris Scheers
| | | | |   |      |`* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | | |   |      | `- Re: VMS VAX License for personal Microvax 3100 Model 40gah4
| | | | |   |      `- Re: DEC and software license tracking (was: Re: VMS VAX License for personal MicStephen Hoffman
| | | | |   `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | |    +- Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | | |    `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |     `* Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | | |      +* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |      |`* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | |      | +- Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | | |      | `- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | | |      `- Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | | `- Re: VMS VAX License for personal Microvax 3100 Model 40chris
| | | +* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | |+* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||`* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | || `* Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | ||  `* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||   `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||    `* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||     `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||      +* Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | ||      |`* Re: VMS VAX License for personal Microvax 3100 Model 40Johnny Billquist
| | | ||      | `* Re: VMS VAX License for personal Microvax 3100 Model 40Robert A. Brooks
| | | ||      |  `* Re: VMS VAX License for personal Microvax 3100 Model 40Jan-Erik Söderholm
| | | ||      |   +* Re: VMS VAX License for personal Microvax 3100 Model 40Lee Gleason
| | | ||      |   |+* Re: VMS VAX License for personal Microvax 3100 Model 40Andy Burns
| | | ||      |   ||+* Re: VMS VAX License for personal Microvax 3100 Model 40Lee Gleason
| | | ||      |   |||`* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||      |   ||| `* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||      |   |||  +* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | ||      |   |||  |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   |||  `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||      |   |||   `* Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||      |   |||    `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   |||     `* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | ||      |   |||      +- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   |||      `- Re: VMS VAX License for personal Microvax 3100 Model 40abrsvc
| | | ||      |   ||`* Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | ||      |   || +- Re: VMS VAX License for personal Microvax 3100 Model 40Lee Gleason
| | | ||      |   || +* Re: VMS VAX License for personal Microvax 3100 Model 40Don North
| | | ||      |   || |+- Re: VMS VAX License for personal Microvax 3100 Model 40Simon Clubley
| | | ||      |   || |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   || `- Re: VMS VAX License for personal Microvax 3100 Model 40Craig A. Berry
| | | ||      |   |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | ||      |   `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | ||      |    `- Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | ||      `* Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | ||       `- Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | |`* Re: VMS VAX License for personal Microvax 3100 Model 40Johnny Billquist
| | | | `* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | |  +* Re: VMS VAX License for personal Microvax 3100 Model 40Johnny Billquist
| | | |  |`* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | |  | +- Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | |  | `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | |  |  `* Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | |  |   `- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | |  `* Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | |   +- Re: VMS VAX License for personal Microvax 3100 Model 40David Goodwin
| | | |   +* Re: VMS VAX License for personal Microvax 3100 Model 40David Wade
| | | |   |`- Re: VMS VAX License for personal Microvax 3100 Model 40Arne Vajhøj
| | | |   `* Re: VMS VAX License for personal Microvax 3100 Model 40Dan Cross
| | | |    +* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | |    |+* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | |    ||`* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | |    || `- Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| | | |    |`- Re: VMS VAX License for personal Microvax 3100 Model 40chris
| | | |    `* Re: VMS VAX License for personal Microvax 3100 Model 40Bill Gunshannon
| | | `* Re: VMS VAX License for personal Microvax 3100 Model 40Hans Bachner
| | `* Re: VMS VAX License for personal Microvax 3100 Model 40Dave Froble
| `* Re: VMS VAX License for personal Microvax 3100 Model 40Phillip Helbig (undress to reply
+- Re: VMS VAX License for personal Microvax 3100 Model 40El SysMan
`* Re: VMS VAX License for personal Microvax 3100 Model 40gah4

Pages:123456789
Re: VMS VAX License for personal Microvax 3100 Model 40

<tcbcqr$l22$3@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24058&group=comp.os.vms#24058

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Tue, 2 Aug 2022 14:37:15 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <tcbcqr$l22$3@reader2.panix.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc0ljh$3gipc$3@dont-email.me> <tc12et$3i5gm$1@dont-email.me> <tc16i1$3iirh$3@dont-email.me>
Injection-Date: Tue, 2 Aug 2022 14:37:15 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="21570"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Tue, 2 Aug 2022 14:37 UTC

In article <tc16i1$3iirh$3@dont-email.me>,
Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
>[snip]
>However, you may not like the results if a bunch of highly skilled
>researchers suddenly descend on an operating system that has had
>relatively little probing compared to other operating systems.

I honestly don't understand this. Surely there'd be an initial
flurry of activity as they found low-hanging security fruit and
it was patched, but the result in the medium- to long-term would
be a significantly more robust and secure operating system.

Why would that be a problem?

- Dan C.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcbqoo$1lh1v$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24069&group=comp.os.vms#24069

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Tue, 2 Aug 2022 18:35:04 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 70
Message-ID: <tcbqoo$1lh1v$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc0ljh$3gipc$3@dont-email.me> <tc12et$3i5gm$1@dont-email.me> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
Injection-Date: Tue, 2 Aug 2022 18:35:04 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="5cbc9aea468073d7db9847811c944be7";
logging-data="1754175"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19rMGmHELRiiti5aMuo+BzHa6Q75BchaMk="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:LnR/IDO3V127r9mL4CUei0Jz/c0=
 by: Simon Clubley - Tue, 2 Aug 2022 18:35 UTC

On 2022-08-02, Dan Cross <cross@spitfire.i.gajendra.net> wrote:
> In article <tc16i1$3iirh$3@dont-email.me>,
> Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
>>[snip]
>>However, you may not like the results if a bunch of highly skilled
>>researchers suddenly descend on an operating system that has had
>>relatively little probing compared to other operating systems.
>
> I honestly don't understand this. Surely there'd be an initial
> flurry of activity as they found low-hanging security fruit and
> it was patched, but the result in the medium- to long-term would
> be a significantly more robust and secure operating system.
>

That's _my_ attitude as well, and why I am strongly in favour of
security researchers probing VMS.

Some others however have a different opinion.

> Why would that be a problem?
>

There is a mindset in the VMS world, including from VSI management
as well as elements of the VMS user community, that VMS is the most
secure operating system in the world and is somehow immune to the
security issues that affect other operating systems.

Those people are wrong, but that attitude persists.

It also means they are not prepared for the sudden influx of security
issues that would be reported in public were such research activity
to take place and may not even have a method to remedy them as a good
number of people are running VMS systems on a frozen version of VMS
that is long out of support.

When the details of my DCL research became public knowledge, a couple
of the emulator vendors had to release documents explaining how to work
around the issue on the old versions of VMS some of their customers were
running on because some customers couldn't upgrade their old VMS versions.

This assumed the workaround (removing privileges from CDU) was suitable
for them and I will point out, once again, the next VMS vulnerability
may not have such a workaround.

I will also remind people that a vulnerability found on a more modern
version of VMS may also work just fine on an older, out of support,
version of VMS.

VSI doesn't even have a public security reporting mechanism, in spite
of being asked for one multiple times. They finally put one up in the
aftermath of my DCL research a few years ago but silently removed it
sometime later. They have ignored all requests by me for them to
reinstate it.

I invite you to find a way of securely reporting a security issue on
the following web page:

https://vmssoftware.com/contact/

There are also those in the VMS user community who for some reason see
security researchers as the enemy and as not people working to help
make operating systems more secure. Turns out there are people out
there who _really_ do not like having their illusions (delusions ? :-))
about the superiority of "their" operating system called into question.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS VAX License for personal Microvax 3100 Model 40

<memo.20220802211946.11788i@jgd.cix.co.uk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24070&group=comp.os.vms#24070

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: jgd...@cix.co.uk (John Dallman)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Tue, 2 Aug 2022 21:19 +0100 (BST)
Organization: A noiseless patient Spider
Lines: 15
Message-ID: <memo.20220802211946.11788i@jgd.cix.co.uk>
References: <tcbqoo$1lh1v$1@dont-email.me>
Reply-To: jgd@cix.co.uk
Injection-Info: reader01.eternal-september.org; posting-host="3e5bb2cfe2cc205c6c45f9a833f4e4a9";
logging-data="1805473"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1++1lEkgqS1O+d16GfOkn3O+qPpD0Jqu/M="
Cancel-Lock: sha1:kYmNQ+h145XjhBNDyLRuKxCfFY8=
 by: John Dallman - Tue, 2 Aug 2022 20:19 UTC

In article <tcbqoo$1lh1v$1@dont-email.me>,
clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley) wrote:

> There are also those in the VMS user community who for some reason
> see security researchers as the enemy and as not people working to
> help make operating systems more secure.

There are people like that throughout computing. I've seen a development
group manager complain about being "blackmailed" by only being given 90
days to release fixes before vulnerabilities are disclosed. He gradually
came to accept the idea that you should make use of the reports you get,
because there are also people who sell the vulnerabilities they find on
the dark-grey market.

John

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcc59k$3j1$2@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24073&group=comp.os.vms#24073

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Tue, 2 Aug 2022 21:34:44 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <tcc59k$3j1$2@reader2.panix.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me>
Injection-Date: Tue, 2 Aug 2022 21:34:44 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="3681"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Tue, 2 Aug 2022 21:34 UTC

In article <tcbqoo$1lh1v$1@dont-email.me>,
Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
>There is a mindset in the VMS world, including from VSI management
>as well as elements of the VMS user community, that VMS is the most
>secure operating system in the world and is somehow immune to the
>security issues that affect other operating systems.
>
>Those people are wrong, but that attitude persists.

Well that just seems divorced from reality. It reminds me of
how people would bellyache about how mainframes and VMS were
"more secure" than Unix 30 years ago, nevermind that entirely
new categories of vulnerabilities have been discovered in the
meantime.

>It also means they are not prepared for the sudden influx of security
>issues that would be reported in public were such research activity
>to take place and may not even have a method to remedy them as a good
>number of people are running VMS systems on a frozen version of VMS
>that is long out of support.
>
>When the details of my DCL research became public knowledge, a couple
>of the emulator vendors had to release documents explaining how to work
>around the issue on the old versions of VMS some of their customers were
>running on because some customers couldn't upgrade their old VMS versions.
>
>This assumed the workaround (removing privileges from CDU) was suitable
>for them and I will point out, once again, the next VMS vulnerability
>may not have such a workaround.
>
>I will also remind people that a vulnerability found on a more modern
>version of VMS may also work just fine on an older, out of support,
>version of VMS.

And presumably VSI can't even release patches for older versions
of VMS, for similar reasons that they can't issue licenses for
those versions?

>VSI doesn't even have a public security reporting mechanism, in spite
>of being asked for one multiple times. They finally put one up in the
>aftermath of my DCL research a few years ago but silently removed it
>sometime later. They have ignored all requests by me for them to
>reinstate it.
>
>I invite you to find a way of securely reporting a security issue on
>the following web page:
>
>https://vmssoftware.com/contact/
>
>There are also those in the VMS user community who for some reason see
>security researchers as the enemy and as not people working to help
>make operating systems more secure. Turns out there are people out
>there who _really_ do not like having their illusions (delusions ? :-))
>about the superiority of "their" operating system called into question.

Yeah, that's the part I really don't get. *shrug*

- Dan C.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcc5ih$ues$1@news.misty.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24074&group=comp.os.vms#24074

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!.POSTED.m83-185-45-236.cust.tele2.se!not-for-mail
From: bqt...@softjar.se (Johnny Billquist)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Tue, 2 Aug 2022 23:39:28 +0200
Organization: MGT Consulting
Message-ID: <tcc5ih$ues$1@news.misty.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<jk8jhjF7pt9U1@mid.individual.net> <tbojbs$b3c$1@reader2.panix.com>
<tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 2 Aug 2022 21:39:29 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="m83-185-45-236.cust.tele2.se:83.185.45.236";
logging-data="31196"; mail-complaints-to="abuse@misty.com"
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.11.0
Content-Language: en-US
In-Reply-To: <tcbcj9$l22$1@reader2.panix.com>
 by: Johnny Billquist - Tue, 2 Aug 2022 21:39 UTC

On 2022-08-02 16:33, Dan Cross wrote:
> In article <tc1d87$tnl$1@news.misty.com>,
> Johnny Billquist <bqt@softjar.se> wrote:
>> On 2022-07-26 13:32, Dan Cross wrote:
>>> But again, why should VSI care? They have nothing to do
>>> with VAX. If people started doing this for Alpha, Itanium
>>> or x86, I could see it since VSI has interest in those
>>> platforms. But VAX is explicitly out of their domain.
>>
>> I should point out that VSI have nothing to do with VAX out of choice.
>> They could technically make a VAX release if they wanted to. They do
>> have the rights, and the code.
>
> A fair point, but regardless, they have chosen not to care.
>
> It boggles my mind that people think that an organization that
> has explicitly declined to work with the VAX (for the very valid
> reasons mentioned elsewhere in this thread) would care if a few
> hobbyists run an OS, 20 years out of maintenance, they can't
> issue licenses for anyway.
>
> Maybe those people have the inside track with someone at at VSI
> who has told them that this is as big a deal as they are making
> it out to be, but I find that doubtful.

I doubt it's the talking point of the day for VSI. But never the less,
there is a point in observing how people behave in similar situations to
deduce how they might behave elsewhere.

Bill did make a good point about the non-existence of hobbyist program
for the PDP-11 software, which allegedly is because people were
misbehaving. And VSI might look at how people behave around the VAX and
decide how they want to continue hobbyist stuff for the platforms they
have made releases for.

Not to mention the risk that if you do not protect your rights, it can
become a point in future legal discussions elsewhere. It's not like the
VAX version is completely different than current VMS.

I would say it's a mischaracterization to say "they have choosen not to
care". They have different priorities and different goals. That do not
mean they do not care.

It is, as always, a question of prioritization and resource allocation.

With infinite money and infinite time, I would suspect that they
wouldn't mind doing something for the VAX as well.

Johnny

Re: VMS VAX License for personal Microvax 3100 Model 40

<tccbn2$sgh$1@panix2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24082&group=comp.os.vms#24082

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.panix2.panix.com!panix2.panix.com!not-for-mail
From: klu...@panix.com (Scott Dorsey)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: 2 Aug 2022 23:24:18 -0000
Organization: Former users of Netcom shell (1989-2000)
Lines: 22
Message-ID: <tccbn2$sgh$1@panix2.panix.com>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc12et$3i5gm$1@dont-email.me> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
Injection-Info: reader2.panix.com; posting-host="panix2.panix.com:166.84.1.2";
logging-data="27453"; mail-complaints-to="abuse@panix.com"
 by: Scott Dorsey - Tue, 2 Aug 2022 23:24 UTC

Dan Cross <cross@spitfire.i.gajendra.net> wrote:
>In article <tc16i1$3iirh$3@dont-email.me>,
>Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
>>[snip]
>>However, you may not like the results if a bunch of highly skilled
>>researchers suddenly descend on an operating system that has had
>>relatively little probing compared to other operating systems.
>
>I honestly don't understand this. Surely there'd be an initial
>flurry of activity as they found low-hanging security fruit and
>it was patched, but the result in the medium- to long-term would
>be a significantly more robust and secure operating system.

This is generally what happens. However, in the case of some (Windows)
operating systems, the patches don't actually address the initial design
problems and merely target specific (Windows) vulnerabilities. This
looks good in the short term but just leaves (Windows) systems no more
secure in the long run. This goes double for log4j on any OS.
--scott

--
"C'est un Nagra. C'est suisse, et tres, tres precis."

Re: VMS VAX License for personal Microvax 3100 Model 40

<62e9b4ec$0$699$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24084&group=comp.os.vms#24084

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Tue, 2 Aug 2022 19:36:09 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<jk8jhjF7pt9U1@mid.individual.net> <tbojbs$b3c$1@reader2.panix.com>
<tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <tcbcj9$l22$1@reader2.panix.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 34
Message-ID: <62e9b4ec$0$699$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 7f7eb5c7.news.sunsite.dk
X-Trace: 1659483372 news.sunsite.dk 699 arne@vajhoej.dk/68.9.63.232:54901
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Tue, 2 Aug 2022 23:36 UTC

On 8/2/2022 10:33 AM, Dan Cross wrote:
> In article <tc1d87$tnl$1@news.misty.com>,
> Johnny Billquist <bqt@softjar.se> wrote:
>> On 2022-07-26 13:32, Dan Cross wrote:
>>> But again, why should VSI care? They have nothing to do
>>> with VAX. If people started doing this for Alpha, Itanium
>>> or x86, I could see it since VSI has interest in those
>>> platforms. But VAX is explicitly out of their domain.
>>
>> I should point out that VSI have nothing to do with VAX out of choice.
>> They could technically make a VAX release if they wanted to. They do
>> have the rights, and the code.
>
> A fair point, but regardless, they have chosen not to care.
>
> It boggles my mind that people think that an organization that
> has explicitly declined to work with the VAX (for the very valid
> reasons mentioned elsewhere in this thread) would care if a few
> hobbyists run an OS, 20 years out of maintenance, they can't
> issue licenses for anyway.
>
> Maybe those people have the inside track with someone at at VSI
> who has told them that this is as big a deal as they are making
> it out to be, but I find that doubtful.

It is quite common to suspect that people known to be willing to
break one law is more willing to break another law.

Most people would not let their daughter go on a date with
a convicted bank robber - even though the daughter is obviously
not a bank.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<60124fdf-431b-4e3b-b4bf-7e509ac32e97n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24087&group=comp.os.vms#24087

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a37:be42:0:b0:6b5:e542:233b with SMTP id o63-20020a37be42000000b006b5e542233bmr17277406qkf.498.1659488789696;
Tue, 02 Aug 2022 18:06:29 -0700 (PDT)
X-Received: by 2002:a05:620a:25d0:b0:6b8:9dec:6c12 with SMTP id
y16-20020a05620a25d000b006b89dec6c12mr9918566qko.634.1659488789491; Tue, 02
Aug 2022 18:06:29 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Tue, 2 Aug 2022 18:06:29 -0700 (PDT)
In-Reply-To: <62e9b4ec$0$699$14726298@news.sunsite.dk>
Injection-Info: google-groups.googlegroups.com; posting-host=124.157.103.69; posting-account=9D9SDwoAAACnifBr_Q9Flw5yKJJnd5rB
NNTP-Posting-Host: 124.157.103.69
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<jk8jhjF7pt9U1@mid.individual.net> <tbojbs$b3c$1@reader2.panix.com>
<tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com> <62e9b4ec$0$699$14726298@news.sunsite.dk>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <60124fdf-431b-4e3b-b4bf-7e509ac32e97n@googlegroups.com>
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
From: dgsof...@gmail.com (David Goodwin)
Injection-Date: Wed, 03 Aug 2022 01:06:29 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 3237
 by: David Goodwin - Wed, 3 Aug 2022 01:06 UTC

On Wednesday, August 3, 2022 at 11:36:14 AM UTC+12, Arne Vajhøj wrote:
> On 8/2/2022 10:33 AM, Dan Cross wrote:
> > In article <tc1d87$tnl$1...@news.misty.com>,
> > Johnny Billquist <b...@softjar.se> wrote:
> >> On 2022-07-26 13:32, Dan Cross wrote:
> >>> But again, why should VSI care? They have nothing to do
> >>> with VAX. If people started doing this for Alpha, Itanium
> >>> or x86, I could see it since VSI has interest in those
> >>> platforms. But VAX is explicitly out of their domain.
> >>
> >> I should point out that VSI have nothing to do with VAX out of choice.
> >> They could technically make a VAX release if they wanted to. They do
> >> have the rights, and the code.
> >
> > A fair point, but regardless, they have chosen not to care.
> >
> > It boggles my mind that people think that an organization that
> > has explicitly declined to work with the VAX (for the very valid
> > reasons mentioned elsewhere in this thread) would care if a few
> > hobbyists run an OS, 20 years out of maintenance, they can't
> > issue licenses for anyway.
> >
> > Maybe those people have the inside track with someone at at VSI
> > who has told them that this is as big a deal as they are making
> > it out to be, but I find that doubtful.
> It is quite common to suspect that people known to be willing to
> break one law is more willing to break another law.

These are people who were probably never going to buy VMS anyway.
Worrying about them or trying to prevent it is just a waste of time and
money and making licensing more onerous than it already is just runs
the risk of alienating people who *might* have someday contributed
to the viability of the platform (bought a license, ported software,
encouraged their company not to migrate to linux, etc)

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcda9b$23pqu$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24090&group=comp.os.vms#24090

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: g4u...@dave.invalid (David Wade)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Wed, 3 Aug 2022 09:06:02 +0100
Organization: A noiseless patient Spider
Lines: 57
Message-ID: <tcda9b$23pqu$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<jk8jhjF7pt9U1@mid.individual.net> <tbojbs$b3c$1@reader2.panix.com>
<tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com>
<62e9b4ec$0$699$14726298@news.sunsite.dk>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 3 Aug 2022 08:06:03 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="341507ea5aef15b90c89da2f04da1fe5";
logging-data="2221918"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19EakVyCGt0QskhE6Tbt3wr"
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Cancel-Lock: sha1:DAYgZ7plDwDh5I432GpHwKl7CIE=
Content-Language: en-GB
In-Reply-To: <62e9b4ec$0$699$14726298@news.sunsite.dk>
 by: David Wade - Wed, 3 Aug 2022 08:06 UTC

On 03/08/2022 00:36, Arne Vajhøj wrote:
> On 8/2/2022 10:33 AM, Dan Cross wrote:
>> In article <tc1d87$tnl$1@news.misty.com>,
>> Johnny Billquist  <bqt@softjar.se> wrote:
>>> On 2022-07-26 13:32, Dan Cross wrote:
>>>> But again, why should VSI care?  They have nothing to do
>>>> with VAX.  If people started doing this for Alpha, Itanium
>>>> or x86, I could see it since VSI has interest in those
>>>> platforms.  But VAX is explicitly out of their domain.
>>>
>>> I should point out that VSI have nothing to do with VAX out of choice.
>>> They could technically make a VAX release if they wanted to. They do
>>> have the rights, and the code.
>>
>> A fair point, but regardless, they have chosen not to care.
>>
>> It boggles my mind that people think that an organization that
>> has explicitly declined to work with the VAX (for the very valid
>> reasons mentioned elsewhere in this thread) would care if a few
>> hobbyists run an OS, 20 years out of maintenance, they can't
>> issue licenses for anyway.
>>
>> Maybe those people have the inside track with someone at at VSI
>> who has told them that this is as big a deal as they are making
>> it out to be, but I find that doubtful.
>
> It is quite common to suspect that people known to be willing to
> break one law is more willing to break another law.

People think it, but is it true? If I occasionality exceed the speed
limits, have a Ham Antenna without Planning Permission or make
structural changes to my house without notifying building control, does
that make me more likely to rob a bank?

Is it actually possible to drive a car in the UK without breaking the
law. For example what to do if your screen wash runs out on the
motorway? Stopping on the motorway except in an emergency is an offence
but so is driving with an empty screen wash bottle...

.... so as far as I can see no one has suggested running modern versions
of VMS without a valid licence. If my Alpha box worked it would have a
VSI version installed. Sadly it doesn't but thats another tale...

>
> Most people would not let their daughter go on a date with
> a convicted bank robber - even though the daughter is obviously
> not a bank.

She probably wouldn't ask? Did Bonnie Parker check with her mum before
running off with Clyde Barrow?

>
> Arne
>

Dave

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcdodh$277ja$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24093&group=comp.os.vms#24093

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Wed, 3 Aug 2022 12:07:13 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <tcdodh$277ja$1@dont-email.me>
References: <tcbqoo$1lh1v$1@dont-email.me> <memo.20220802211946.11788i@jgd.cix.co.uk>
Injection-Date: Wed, 3 Aug 2022 12:07:13 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="bea64bb7ed73fa26fbdfaabf10b8f5c9";
logging-data="2334314"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX184Vs6jBrAwaWIj+iTFeFQYQDeUVjx/lhs="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:R2z204EnfTTKap9SBeGRiWwS7kI=
 by: Simon Clubley - Wed, 3 Aug 2022 12:07 UTC

On 2022-08-02, John Dallman <jgd@cix.co.uk> wrote:
> In article <tcbqoo$1lh1v$1@dont-email.me>,
> clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley) wrote:
>
>> There are also those in the VMS user community who for some reason
>> see security researchers as the enemy and as not people working to
>> help make operating systems more secure.
>
> There are people like that throughout computing. I've seen a development
> group manager complain about being "blackmailed" by only being given 90
> days to release fixes before vulnerabilities are disclosed. He gradually
> came to accept the idea that you should make use of the reports you get,
> because there are also people who sell the vulnerabilities they find on
> the dark-grey market.
>

I can believe that's way possible for more bespoke software development.

However, in other operating systems (Windows, Linux, Apple, Android, etc)
the protocols around management of security issues follow well established
industry standards and are accepted by everyone, including the users.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcdopa$277ja$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24094&group=comp.os.vms#24094

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Wed, 3 Aug 2022 12:13:30 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 26
Message-ID: <tcdopa$277ja$2@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
Injection-Date: Wed, 3 Aug 2022 12:13:30 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="bea64bb7ed73fa26fbdfaabf10b8f5c9";
logging-data="2334314"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+M3go0/imfgDCgBZC0Q2zB53XdfDopxOE="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:wglIpEyA+2lOLiU4EwR/eykcvtI=
 by: Simon Clubley - Wed, 3 Aug 2022 12:13 UTC

On 2022-08-02, Dan Cross <cross@spitfire.i.gajendra.net> wrote:
> In article <tcbqoo$1lh1v$1@dont-email.me>,
> Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
>>
>>I will also remind people that a vulnerability found on a more modern
>>version of VMS may also work just fine on an older, out of support,
>>version of VMS.
>
> And presumably VSI can't even release patches for older versions
> of VMS, for similar reasons that they can't issue licenses for
> those versions?
>

Correct. In addition to the HPE versus VSI issue, VMS support has always
gone through a versioning system, where older versions have dropped out
of support.

The difference is that there's a culture in VMS land where people don't
really see a problem with running an old out-of-support version of VMS
provided the hardware issues are dealt with.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS VAX License for personal Microvax 3100 Model 40

<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24097&group=comp.os.vms#24097

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:ac8:5a53:0:b0:327:fc2b:7c21 with SMTP id o19-20020ac85a53000000b00327fc2b7c21mr15605878qta.375.1659531306486;
Wed, 03 Aug 2022 05:55:06 -0700 (PDT)
X-Received: by 2002:ac8:5f0f:0:b0:31f:41fc:4e0c with SMTP id
x15-20020ac85f0f000000b0031f41fc4e0cmr22069668qta.657.1659531306345; Wed, 03
Aug 2022 05:55:06 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 3 Aug 2022 05:55:06 -0700 (PDT)
In-Reply-To: <tcdopa$277ja$2@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=96.230.211.194; posting-account=Ysq9BAoAAACGX1EcMMPkdNg4YcTg0TxG
NNTP-Posting-Host: 96.230.211.194
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
From: dansabrs...@yahoo.com (abrsvc)
Injection-Date: Wed, 03 Aug 2022 12:55:06 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 3090
 by: abrsvc - Wed, 3 Aug 2022 12:55 UTC

> The difference is that there's a culture in VMS land where people don't
> really see a problem with running an old out-of-support version of VMS
> provided the hardware issues are dealt with.
> Simon.
>

Well, I still run Windows 98 for some stuff that is still useful to me. Granted, it is not internet connected...

Running older versions of software that perform well for the task at hand is not necessarily a problem.
Please note that VMS does NOT have the same problems that Windows does in terms of viruses. And the vulnerability that you seem to draw out for every argument REQUIRES that the person already be logged in to the VMS system in order to access it. Not the same as most of the vulnerabilities reported for Windows.

How about we compare situational apples to apples here. Lets look at vulnerabilities on both systems that do not require prior connection to the system and see how that does.

The lack of support means nothing. In many cases, support was continued strictly for access to newer versions that often were never used. I new of many clients that remained at V7.3-2 for Alpha systems because it was stable and did what they needed with no problems at all. Moving to newer versions was a cost (validation work) that couldn't be justified since there were no benefits to the upgrade. I can cite other clients with different hardware and OS levels with similar status too. Stabile application software that does the job does not usually need newer OS versions. Compare the VMS environment with that of Windows where updates are constantly required because of the instability of the OS or external vulnerabilities that just don't exist for VMS.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tce10i$29hfm$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24100&group=comp.os.vms#24100

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Wed, 3 Aug 2022 10:34:05 -0400
Organization: A noiseless patient Spider
Lines: 49
Message-ID: <tce10i$29hfm$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 3 Aug 2022 14:33:55 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="1f4c7afd62e5d10d774891cad27f4685";
logging-data="2409974"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX180x5rK8UXboNQ3MN6nxIrqZ9Bw3UQ5H7Q="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:sZsy1tnIPffst0jlsGGZ8079apQ=
In-Reply-To: <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
 by: Dave Froble - Wed, 3 Aug 2022 14:34 UTC

On 8/3/2022 8:55 AM, abrsvc wrote:
>
>> The difference is that there's a culture in VMS land where people don't
>> really see a problem with running an old out-of-support version of VMS
>> provided the hardware issues are dealt with.
>> Simon.
>>
>
> Well, I still run Windows 98 for some stuff that is still useful to me. Granted, it is not internet connected...
>
> Running older versions of software that perform well for the task at hand is not necessarily a problem.
> Please note that VMS does NOT have the same problems that Windows does in terms of viruses. And the vulnerability that you seem to draw out for every argument REQUIRES that the person already be logged in to the VMS system in order to access it. Not the same as most of the vulnerabilities reported for Windows.
>
> How about we compare situational apples to apples here. Lets look at vulnerabilities on both systems that do not require prior connection to the system and see how that does.
>
> The lack of support means nothing. In many cases, support was continued strictly for access to newer versions that often were never used. I new of many clients that remained at V7.3-2 for Alpha systems because it was stable and did what they needed with no problems at all. Moving to newer versions was a cost (validation work) that couldn't be justified since there were no benefits to the upgrade. I can cite other clients with different hardware and OS levels with similar status too. Stabile application software that does the job does not usually need newer OS versions. Compare the VMS environment with that of Windows where updates are constantly required because of the instability of the OS or external vulnerabilities that just don't exist for VMS.
>

There can be arguments for and against running old versions of VMS. All can be
valid.

It is possible for errors to be introduced in a new version. I believe it has
happened, however I cannot remember any details.

For the user, there may be things that insist on total validation before
anything new is used. This can be a tremendous cost. People don't like such costs.

For the OS vendor, new versions are a method of introducing new capabilities.
Perhaps some fixes could be applied to older versions, sometimes not. How much
extra cost should the OS vendor incur? At some point it becomes prohibitive.

For something as old as VMS, with the expectation of continued compatibility,
there are some issues that just cannot be solved. Alpha may not be able to
perform some VAX capabilities. VAX does not have 64 bit addresses. Some people
may be using capabilities that do not exist on newer hardware. Anything that
counts on PDP-11 compatibility mode is an example, though not a practice I'd
recommend.

The issue seems to be one with no good answers. Continual deprecation of
capabilities will result in lost customers and remaining on old OS versions.
Both are rather bad. Continual upgrading of applications may be a good idea for
those being paid to do so, but is a rather bad idea for those doing the paying.

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VMS VAX License for personal Microvax 3100 Model 40

<tce5cq$16id$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24102&group=comp.os.vms#24102

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!jazQyxryRFiI4FEZ51SAvA.user.46.165.242.75.POSTED!not-for-mail
From: chris-no...@tridac.net (chris)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Wed, 03 Aug 2022 16:48:42 +0100
Organization: Aioe.org NNTP Server
Message-ID: <tce5cq$16id$1@gioia.aioe.org>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Info: gioia.aioe.org; logging-data="39501"; posting-host="jazQyxryRFiI4FEZ51SAvA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (X11; SunOS sun4u; rv:10.0.2) Gecko/20120216 Thunderbird/10.0.2
X-Notice: Filtered by postfilter v. 0.9.2
 by: chris - Wed, 3 Aug 2022 15:48 UTC

On 08/03/22 13:55, abrsvc wrote:
>
>> The difference is that there's a culture in VMS land where people don't
>> really see a problem with running an old out-of-support version of VMS
>> provided the hardware issues are dealt with.
>> Simon.
>>
>
> Well, I still run Windows 98 for some stuff that is still useful to me. Granted, it is not internet connected...
>
> Running older versions of software that perform well for the task at hand is not necessarily a problem.
> Please note that VMS does NOT have the same problems that Windows does in terms of viruses. And the vulnerability that you seem to draw out for every argument REQUIRES that the person already be logged in to the VMS system in order to access it. Not the same as most of the vulnerabilities reported for Windows.
>

May have been true years ago, when vms ran on non X86 hardware, but
not the case now. Unless vms has strong protections at system level,
it could be just as vulnerable as any other X86 based system. Once an
attacker with sufficient resources and time to get a X86 binary onto
the system, all bets are off.

X86 architecture is possibly the worst possible architecture to build
a secure system with...

Chris

> How about we compare situational apples to apples here. Lets look at vulnerabilities on both systems that do not require prior connection to the system and see how that does.
>
> The lack of support means nothing. In many cases, support was continued strictly for access to newer versions that often were never used. I new of many clients that remained at V7.3-2 for Alpha systems because it was stable and did what they needed with no problems at all. Moving to newer versions was a cost (validation work) that couldn't be justified since there were no benefits to the upgrade. I can cite other clients with different hardware and OS levels with similar status too. Stabile application software that does the job does not usually need newer OS versions. Compare the VMS environment with that of Windows where updates are constantly required because of the instability of the OS or external vulnerabilities that just don't exist for VMS.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcebao$2c4e5$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24105&group=comp.os.vms#24105

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Wed, 3 Aug 2022 17:30:00 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <tcebao$2c4e5$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
Injection-Date: Wed, 3 Aug 2022 17:30:00 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="bea64bb7ed73fa26fbdfaabf10b8f5c9";
logging-data="2494917"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+DwtXstiO2XZK7jUqYwKADCw4uua3OiKQ="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:Nmnc4iB17ler4E8x2ujAeOYZ1Oo=
 by: Simon Clubley - Wed, 3 Aug 2022 17:30 UTC

On 2022-08-03, abrsvc <dansabrservices@yahoo.com> wrote:
>
> The lack of support means nothing. In many cases, support was continued strictly for access to newer versions that often were never used. I new of many clients that remained at V7.3-2 for Alpha systems because it was stable and did what they needed with no problems at all. Moving to newer versions was a cost (validation work) that couldn't be justified since there were no benefits to the upgrade. I can cite other clients with different hardware and OS levels with similar status too. Stabile application software that does the job does not usually need newer OS versions. Compare the VMS environment with that of Windows where updates are constantly required because of the instability of the OS or external vulnerabilities that just don't exist for VMS.

This isn't a discussion about the DCL vulnerability. It's a discussion
about what is likely to happen if security researchers take a serious
interest in probing VMS in general and find a series of vulnerabilities
which they then disclose in public after giving VSI time (about 3 months
usually) to fix the vulnerabilities.

Your last sentence above is a perfect example of the mindset I am
warning about.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS VAX License for personal Microvax 3100 Model 40

<bac17ef7-9cf0-4d0a-9abf-026662ce0246n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24111&group=comp.os.vms#24111

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:622a:1649:b0:33d:df39:8c8a with SMTP id y9-20020a05622a164900b0033ddf398c8amr3899197qtj.416.1659557356984;
Wed, 03 Aug 2022 13:09:16 -0700 (PDT)
X-Received: by 2002:a05:620a:1a8f:b0:6b5:fe28:f91d with SMTP id
bl15-20020a05620a1a8f00b006b5fe28f91dmr19370705qkb.279.1659557356831; Wed, 03
Aug 2022 13:09:16 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 3 Aug 2022 13:09:16 -0700 (PDT)
In-Reply-To: <tcebao$2c4e5$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=96.230.211.194; posting-account=Ysq9BAoAAACGX1EcMMPkdNg4YcTg0TxG
NNTP-Posting-Host: 96.230.211.194
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <bac17ef7-9cf0-4d0a-9abf-026662ce0246n@googlegroups.com>
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
From: dansabrs...@yahoo.com (abrsvc)
Injection-Date: Wed, 03 Aug 2022 20:09:16 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 3184
 by: abrsvc - Wed, 3 Aug 2022 20:09 UTC

On Wednesday, August 3, 2022 at 1:30:02 PM UTC-4, Simon Clubley wrote:
> On 2022-08-03, abrsvc <dansabr...@yahoo.com> wrote:
> >
> > The lack of support means nothing. In many cases, support was continued strictly for access to newer versions that often were never used. I new of many clients that remained at V7.3-2 for Alpha systems because it was stable and did what they needed with no problems at all. Moving to newer versions was a cost (validation work) that couldn't be justified since there were no benefits to the upgrade. I can cite other clients with different hardware and OS levels with similar status too. Stabile application software that does the job does not usually need newer OS versions. Compare the VMS environment with that of Windows where updates are constantly required because of the instability of the OS or external vulnerabilities that just don't exist for VMS.
> This isn't a discussion about the DCL vulnerability. It's a discussion
> about what is likely to happen if security researchers take a serious
> interest in probing VMS in general and find a series of vulnerabilities
> which they then disclose in public after giving VSI time (about 3 months
> usually) to fix the vulnerabilities.
>
> Your last sentence above is a perfect example of the mindset I am
> warning about.
> Simon.
>
> --
> Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
> Walking destinations on a map are further away than they appear.
I welcome such an effort. And I doubt there will be much found. Call it attitude if you want, but VMS works differently than Windows and doesn't have the opportunities that Windows has for exploitation.

Re: VMS VAX License for personal Microvax 3100 Model 40

<62ead9b7$0$703$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24112&group=comp.os.vms#24112

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!newsreader4.netcologne.de!news.netcologne.de!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 3 Aug 2022 16:25:23 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<jk8jhjF7pt9U1@mid.individual.net> <tbojbs$b3c$1@reader2.panix.com>
<tc1d87$tnl$1@news.misty.com> <tcbcj9$l22$1@reader2.panix.com>
<62e9b4ec$0$699$14726298@news.sunsite.dk> <tcda9b$23pqu$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <tcda9b$23pqu$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 27
Message-ID: <62ead9b7$0$703$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: aa882d82.news.sunsite.dk
X-Trace: 1659558327 news.sunsite.dk 703 arne@vajhoej.dk/68.9.63.232:53428
X-Complaints-To: staff@sunsite.dk
X-Received-Bytes: 2179
 by: Arne Vajhøj - Wed, 3 Aug 2022 20:25 UTC

On 8/3/2022 4:06 AM, David Wade wrote:
> On 03/08/2022 00:36, Arne Vajhøj wrote:
>> On 8/2/2022 10:33 AM, Dan Cross wrote:
>>> It boggles my mind that people think that an organization that
>>> has explicitly declined to work with the VAX (for the very valid
>>> reasons mentioned elsewhere in this thread) would care if a few
>>> hobbyists run an OS, 20 years out of maintenance, they can't
>>> issue licenses for anyway.
>>>
>>> Maybe those people have the inside track with someone at at VSI
>>> who has told them that this is as big a deal as they are making
>>> it out to be, but I find that doubtful.
>>
>> It is quite common to suspect that people known to be willing to
>> break one law is more willing to break another law.
>
> People think it, but is it true?

Interesting question.

But it does not matter.

If people believe it to be so then they will act accordingly
and the fact that they may have been wrong does not change
their actions.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<62eadac0$0$701$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24113&group=comp.os.vms#24113

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 3 Aug 2022 16:29:43 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tce5cq$16id$1@gioia.aioe.org>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <tce5cq$16id$1@gioia.aioe.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 26
Message-ID: <62eadac0$0$701$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: aa882d82.news.sunsite.dk
X-Trace: 1659558592 news.sunsite.dk 701 arne@vajhoej.dk/68.9.63.232:53718
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 3 Aug 2022 20:29 UTC

On 8/3/2022 11:48 AM, chris wrote:
> On 08/03/22 13:55, abrsvc wrote:
>> Running older versions of software that perform well for the task at
>> hand is not necessarily a problem.
>> Please note that VMS does NOT have the same problems that Windows does
>> in terms of viruses.  And the vulnerability that you seem to draw out
>> for every argument REQUIRES that the person already be logged in to
>> the VMS system in order to access it. Not the same as most of the
>> vulnerabilities reported for Windows.
>
> May have been true years ago, when vms ran on non X86 hardware, but
> not the case now. Unless vms has strong protections at system level,
> it could be just as vulnerable as any other X86 based system. Once an
> attacker with sufficient resources and time to get a X86 binary onto
> the system, all bets are off.
>
> X86 architecture is possibly the worst possible architecture to build
> a secure system with...

The percentage of security vulnerabilities that has a directly
dependency on the ISA must very small.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<62eadd42$0$703$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24115&group=comp.os.vms#24115

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!feeder1.feed.usenet.farm!feed.usenet.farm!feeder.usenetexpress.com!tr2.eu1.usenetexpress.com!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 3 Aug 2022 16:40:30 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 56
Message-ID: <62eadd42$0$703$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: aa882d82.news.sunsite.dk
X-Trace: 1659559234 news.sunsite.dk 703 arne@vajhoej.dk/68.9.63.232:53995
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 3 Aug 2022 20:40 UTC

On 8/3/2022 8:55 AM, abrsvc wrote:
> Running older versions of software that perform well for the task at
> hand is not necessarily a problem. Please note that VMS does NOT have
> the same problems that Windows does in terms of viruses.

Isn't Windows virus'es a bit 00'ish?

> And the
> vulnerability that you seem to draw out for every argument REQUIRES
> that the person already be logged in to the VMS system in order to
> access it. Not the same as most of the vulnerabilities reported for
> Windows.
>
> How about we compare situational apples to apples here. Lets look at
> vulnerabilities on both systems that do not require prior connection
> to the system and see how that does.

I don't think it is correct to say that the known VMS problems
are privilege escalation problems.

The frequently mentioned DCL issue is.

But password sent unencrypted via DECnet is not.

> The lack of support means nothing. In many cases, support was
> continued strictly for access to newer versions that often were never
> used. I new of many clients that remained at V7.3-2 for Alpha
> systems because it was stable and did what they needed with no
> problems at all. Moving to newer versions was a cost (validation
> work) that couldn't be justified since there were no benefits to the
> upgrade. I can cite other clients with different hardware and OS
> levels with similar status too. Stabile application software that
> does the job does not usually need newer OS versions.

It is a potential problem - a risk.

If a problem is found (security vulnerability or functional) then
it will not be fixed.

Some people like to go into the casino and put all chips on red.

Some people like to assume that there will never be a problem with
their IT system.

> Compare the
> VMS environment with that of Windows where updates are constantly
> required because of the instability of the OS or external
> vulnerabilities that just don't exist for VMS.

All large systems that get probed in detail get security fixes.

Windows, Linux, Java, Oracle DB.

Nobody expect a bugs/KLOC ratio of zero.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<tceurv$1arc$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24124&group=comp.os.vms#24124

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!jazQyxryRFiI4FEZ51SAvA.user.46.165.242.75.POSTED!not-for-mail
From: chris-no...@tridac.net (chris)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Thu, 04 Aug 2022 00:03:27 +0100
Organization: Aioe.org NNTP Server
Message-ID: <tceurv$1arc$1@gioia.aioe.org>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com> <tce5cq$16id$1@gioia.aioe.org> <62eadac0$0$701$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="43884"; posting-host="jazQyxryRFiI4FEZ51SAvA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (X11; SunOS sun4u; rv:10.0.2) Gecko/20120216 Thunderbird/10.0.2
X-Notice: Filtered by postfilter v. 0.9.2
 by: chris - Wed, 3 Aug 2022 23:03 UTC

On 08/03/22 21:29, Arne Vajhøj wrote:
> On 8/3/2022 11:48 AM, chris wrote:
>> On 08/03/22 13:55, abrsvc wrote:
>>> Running older versions of software that perform well for the task at
>>> hand is not necessarily a problem.
>>> Please note that VMS does NOT have the same problems that Windows
>>> does in terms of viruses. And the vulnerability that you seem to
>>> draw out for every argument REQUIRES that the person already be
>>> logged in to the VMS system in order to access it. Not the same as
>>> most of the vulnerabilities reported for Windows.
>>
>> May have been true years ago, when vms ran on non X86 hardware, but
>> not the case now. Unless vms has strong protections at system level,
>> it could be just as vulnerable as any other X86 based system. Once an
>> attacker with sufficient resources and time to get a X86 binary onto
>> the system, all bets are off.
>>
>> X86 architecture is possibly the worst possible architecture to build
>> a secure system with...
>
> The percentage of security vulnerabilities that has a directly
> dependency on the ISA must very small.
>
> Arne
>

That may be true, but there are literally decades of hacker experience
with X86, because of the ubiquity of the hardware and operating
systems, windows, for example. In comparison, how
often do we hear of destructive and expensive hacks of power, sparc or
mainframe systems ?. Yes, the cpu arch is only one brick in a security
model, but a pretty substantial one given the potential for hacking
with X86. It means that extra work is needed at all levels of os and
application design...

Chris

Re: VMS VAX License for personal Microvax 3100 Model 40

<4e11c910-3b1f-4a76-8775-227af864662en@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24125&group=comp.os.vms#24125

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:ac8:5a53:0:b0:327:fc2b:7c21 with SMTP id o19-20020ac85a53000000b00327fc2b7c21mr17967761qta.375.1659568316707;
Wed, 03 Aug 2022 16:11:56 -0700 (PDT)
X-Received: by 2002:ac8:5b4d:0:b0:33b:858a:5c40 with SMTP id
n13-20020ac85b4d000000b0033b858a5c40mr7195937qtw.563.1659568316566; Wed, 03
Aug 2022 16:11:56 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 3 Aug 2022 16:11:56 -0700 (PDT)
In-Reply-To: <tceurv$1arc$1@gioia.aioe.org>
Injection-Info: google-groups.googlegroups.com; posting-host=2601:602:9700:4689:d09e:84cb:b4b0:97fd;
posting-account=gLDX1AkAAAA26M5HM-O3sVMAXdxK9FPA
NNTP-Posting-Host: 2601:602:9700:4689:d09e:84cb:b4b0:97fd
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tce5cq$16id$1@gioia.aioe.org> <62eadac0$0$701$14726298@news.sunsite.dk> <tceurv$1arc$1@gioia.aioe.org>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <4e11c910-3b1f-4a76-8775-227af864662en@googlegroups.com>
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
From: gah...@u.washington.edu (gah4)
Injection-Date: Wed, 03 Aug 2022 23:11:56 +0000
Content-Type: text/plain; charset="UTF-8"
X-Received-Bytes: 2688
 by: gah4 - Wed, 3 Aug 2022 23:11 UTC

On Wednesday, August 3, 2022 at 4:03:31 PM UTC-7, chris wrote:

(snip)

> That may be true, but there are literally decades of hacker experience
> with X86, because of the ubiquity of the hardware and operating
> systems, windows, for example. In comparison, how
> often do we hear of destructive and expensive hacks of power, sparc or
> mainframe systems ?. Yes, the cpu arch is only one brick in a security
> model, but a pretty substantial one given the potential for hacking
> with X86. It means that extra work is needed at all levels of os and
> application design...

I was working with Sun machines around the time of the SunOS to
Solaris transition. Early in the Solaris years, there were more attacks
on Solaris than SunOS, second only to Windows.

It seems that, at the time, Solaris was popular for web servers,
and so were interesting to hackers.

There are some favorite tricks to get x86 systems to write data onto
the stack, and then execute it. There are now hardware features to
make that harder. I don't know if the same tricks would work for
other x86 OS, but in any case, would need to exploit OS features
once the code was running.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcf7bh$2jb40$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24127&group=comp.os.vms#24127

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Wed, 3 Aug 2022 21:28:27 -0400
Organization: A noiseless patient Spider
Lines: 33
Message-ID: <tcf7bh$2jb40$1@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 4 Aug 2022 01:28:17 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="41f6e3804ce2fdde6a4782e7b3f941d2";
logging-data="2731136"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/isthz4VJpBzNIF5T6OwQ6ozn8jfK8t50="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:SZ2Z2C/TNRfw5jWenC8/qYT4roo=
In-Reply-To: <tcebao$2c4e5$1@dont-email.me>
 by: Dave Froble - Thu, 4 Aug 2022 01:28 UTC

On 8/3/2022 1:30 PM, Simon Clubley wrote:
> On 2022-08-03, abrsvc <dansabrservices@yahoo.com> wrote:
>>
>> The lack of support means nothing. In many cases, support was continued strictly for access to newer versions that often were never used. I new of many clients that remained at V7.3-2 for Alpha systems because it was stable and did what they needed with no problems at all. Moving to newer versions was a cost (validation work) that couldn't be justified since there were no benefits to the upgrade. I can cite other clients with different hardware and OS levels with similar status too. Stabile application software that does the job does not usually need newer OS versions. Compare the VMS environment with that of Windows where updates are constantly required because of the instability of the OS or external vulnerabilities that just don't exist for VMS.
>
> This isn't a discussion about the DCL vulnerability. It's a discussion
> about what is likely to happen if security researchers take a serious
> interest in probing VMS in general and find a series of vulnerabilities
> which they then disclose in public after giving VSI time (about 3 months
> usually) to fix the vulnerabilities.
>
> Your last sentence above is a perfect example of the mindset I am
> warning about.
>
> Simon.
>

Ok Simon, a question for you.

Suppose someone finds a vulnerability in VAX/VMS V5.2H4, and that someone knows
that there is very little, or no, chance of a fix. And that someone also is
aware that some users are still using that old software.

So now the moral question. Knowing there will not be a fix, and knowing that
exposure just might cause problems for said user running that old software, is
it Ok to expose the vulnerability?

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VMS VAX License for personal Microvax 3100 Model 40

<62eb1562$0$694$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24128&group=comp.os.vms#24128

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 3 Aug 2022 20:39:53 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.11.0
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Content-Language: en-US
Newsgroups: comp.os.vms
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me>
<2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tce5cq$16id$1@gioia.aioe.org> <62eadac0$0$701$14726298@news.sunsite.dk>
<tceurv$1arc$1@gioia.aioe.org>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <tceurv$1arc$1@gioia.aioe.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 47
Message-ID: <62eb1562$0$694$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: d049c3ac.news.sunsite.dk
X-Trace: 1659573602 news.sunsite.dk 694 arne@vajhoej.dk/68.9.63.232:62241
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Thu, 4 Aug 2022 00:39 UTC

On 8/3/2022 7:03 PM, chris wrote:
> On 08/03/22 21:29, Arne Vajhøj wrote:
>> On 8/3/2022 11:48 AM, chris wrote:
>>> On 08/03/22 13:55, abrsvc wrote:
>>>> Running older versions of software that perform well for the task at
>>>> hand is not necessarily a problem.
>>>> Please note that VMS does NOT have the same problems that Windows
>>>> does in terms of viruses.  And the vulnerability that you seem to
>>>> draw out for every argument REQUIRES that the person already be
>>>> logged in to the VMS system in order to access it. Not the same as
>>>> most of the vulnerabilities reported for Windows.
>>>
>>> May have been true years ago, when vms ran on non X86 hardware, but
>>> not the case now. Unless vms has strong protections at system level,
>>> it could be just as vulnerable as any other X86 based system. Once an
>>> attacker with sufficient resources and time to get a X86 binary onto
>>> the system, all bets are off.
>>>
>>> X86 architecture is possibly the worst possible architecture to build
>>> a secure system with...
>>
>> The percentage of security vulnerabilities that has a directly
>> dependency on the ISA must very small.
>
> That may be true, but there are literally decades of hacker experience
> with X86, because of the ubiquity of the hardware and operating
> systems, windows, for example. In comparison, how
> often do we hear of destructive and expensive hacks of power, sparc or
> mainframe systems ?. Yes, the cpu arch is only one brick in a security
> model, but a pretty substantial one given the potential for hacking
> with X86. It means that extra work is needed at all levels of os and
> application design...

Hackers tend to focus on common ISA and common OS.That
makes sense. So Linux, Windows and x86-64.

But I would be hard pressed to name any specific problems
due to x86-64. Even the cache issues existed on other
ISA. And as we all know then ILO are not x86-64 specific
either.

The reality is that there are close to nothing ISA
related, some OS related, some standard application related
and the vast majority custom application related.

Arne

Re: VMS VAX License for personal Microvax 3100 Model 40

<80817091-ff87-480a-88c5-b73cba440d57n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24129&group=comp.os.vms#24129

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:6214:27ce:b0:477:2f42:a199 with SMTP id ge14-20020a05621427ce00b004772f42a199mr3270295qvb.115.1659580714205;
Wed, 03 Aug 2022 19:38:34 -0700 (PDT)
X-Received: by 2002:ac8:4e4f:0:b0:33a:5048:463d with SMTP id
e15-20020ac84e4f000000b0033a5048463dmr8358349qtw.492.1659580713988; Wed, 03
Aug 2022 19:38:33 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!border-1.nntp.ord.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 3 Aug 2022 19:38:33 -0700 (PDT)
In-Reply-To: <tcf7bh$2jb40$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=124.157.103.69; posting-account=9D9SDwoAAACnifBr_Q9Flw5yKJJnd5rB
NNTP-Posting-Host: 124.157.103.69
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com>
<tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com>
<tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com>
<tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com>
<tcebao$2c4e5$1@dont-email.me> <tcf7bh$2jb40$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <80817091-ff87-480a-88c5-b73cba440d57n@googlegroups.com>
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
From: dgsof...@gmail.com (David Goodwin)
Injection-Date: Thu, 04 Aug 2022 02:38:34 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Lines: 58
X-Received-Bytes: 4124
 by: David Goodwin - Thu, 4 Aug 2022 02:38 UTC

On Thursday, August 4, 2022 at 1:28:20 PM UTC+12, Dave Froble wrote:
> On 8/3/2022 1:30 PM, Simon Clubley wrote:
> > On 2022-08-03, abrsvc <dansabr...@yahoo.com> wrote:
> >>
> >> The lack of support means nothing. In many cases, support was continued strictly for access to newer versions that often were never used. I new of many clients that remained at V7.3-2 for Alpha systems because it was stable and did what they needed with no problems at all. Moving to newer versions was a cost (validation work) that couldn't be justified since there were no benefits to the upgrade. I can cite other clients with different hardware and OS levels with similar status too. Stabile application software that does the job does not usually need newer OS versions. Compare the VMS environment with that of Windows where updates are constantly required because of the instability of the OS or external vulnerabilities that just don't exist for VMS.
> >
> > This isn't a discussion about the DCL vulnerability. It's a discussion
> > about what is likely to happen if security researchers take a serious
> > interest in probing VMS in general and find a series of vulnerabilities
> > which they then disclose in public after giving VSI time (about 3 months
> > usually) to fix the vulnerabilities.
> >
> > Your last sentence above is a perfect example of the mindset I am
> > warning about.
> >
> > Simon.
> >
> Ok Simon, a question for you.
>
> Suppose someone finds a vulnerability in VAX/VMS V5.2H4, and that someone knows
> that there is very little, or no, chance of a fix. And that someone also is
> aware that some users are still using that old software.
>
> So now the moral question. Knowing there will not be a fix, and knowing that
> exposure just might cause problems for said user running that old software, is
> it Ok to expose the vulnerability?

If you find a vulnerability you have no way to be sure that you were the first to discover it
or that you are the only one who will ever discover it. For all you know someone else
discovered that vulnerability years ago and has been quietly exploiting it ever since.

By exposing the vulnerability users can at least be aware it exists and take appropriate
steps to mitigate the risk even if there is no chance of it ever being properly fixed. By
keeping it secret you're just giving anyone else who is aware of the issue the opportunity
to continue exploiting it.

Re: VMS VAX License for personal Microvax 3100 Model 40

<tcge2u$2q741$4@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=24136&group=comp.os.vms#24136

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS VAX License for personal Microvax 3100 Model 40
Date: Thu, 4 Aug 2022 12:29:18 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 36
Message-ID: <tcge2u$2q741$4@dont-email.me>
References: <42c1333a-e885-414a-a86a-c9b91b7f5b31n@googlegroups.com> <tc16i1$3iirh$3@dont-email.me> <tcbcqr$l22$3@reader2.panix.com> <tcbqoo$1lh1v$1@dont-email.me> <tcc59k$3j1$2@reader2.panix.com> <tcdopa$277ja$2@dont-email.me> <2c1f50e0-8a5e-464b-9b73-052b9013e996n@googlegroups.com> <tce5cq$16id$1@gioia.aioe.org> <62eadac0$0$701$14726298@news.sunsite.dk>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 4 Aug 2022 12:29:18 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="fd821f9850da83fcd16690a892388ae0";
logging-data="2956417"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/TOKzZFfAUy4EGxN6P+aYG/cssXsxHa44="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:uemhXxRmuIdKf5BHv2WPu/vf3r0=
 by: Simon Clubley - Thu, 4 Aug 2022 12:29 UTC

On 2022-08-03, Arne Vajhøj <arne@vajhoej.dk> wrote:
> On 8/3/2022 11:48 AM, chris wrote:
>> On 08/03/22 13:55, abrsvc wrote:
>>> Running older versions of software that perform well for the task at
>>> hand is not necessarily a problem.
>>> Please note that VMS does NOT have the same problems that Windows does
>>> in terms of viruses.  And the vulnerability that you seem to draw out
>>> for every argument REQUIRES that the person already be logged in to
>>> the VMS system in order to access it. Not the same as most of the
>>> vulnerabilities reported for Windows.
>>
>> May have been true years ago, when vms ran on non X86 hardware, but
>> not the case now. Unless vms has strong protections at system level,
>> it could be just as vulnerable as any other X86 based system. Once an
>> attacker with sufficient resources and time to get a X86 binary onto
>> the system, all bets are off.
>>
>> X86 architecture is possibly the worst possible architecture to build
>> a secure system with...
>
> The percentage of security vulnerabilities that has a directly
> dependency on the ISA must very small.
>

Well, in fairness to Chris, while he clearly has an ideological dislike
for x86-64 for whatever reasons, this is also the architecture that has
all the Intel Management Engine and other management stuff running on
modern versions of that architecture.

Stuff that runs underneath your operating system and can't be switched off.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Pages:123456789
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor