Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Remember, there's a big difference between kneeling down and bending over. -- Frank Zappa


computers / comp.os.vms / Re: VMS and security

SubjectAuthor
* VMS and securitySimon Clubley
+* Re: VMS and security<kemain.nospam
|+* Re: VMS and securityDave Froble
||+* Re: VMS and securitySimon Clubley
|||+- Re: VMS and securityIanD
|||+* Re: VMS and securityDave Froble
||||`- Re: VMS and securitySimon Clubley
|||`* Re: VMS and securityArne Vajhøj
||| `* Re: VMS and securitySimon Clubley
|||  `* Re: VMS and securityArne Vajhøj
|||   `* Re: VMS and securitySimon Clubley
|||    `* Re: VMS and securityArne Vajhøj
|||     `* Re: VMS and securitySimon Clubley
|||      `* Re: VMS and securityArne Vajhøj
|||       `- Re: VMS and securitySimon Clubley
||`* Re: VMS and securityArne Vajhøj
|| `* Re: VMS and securityDave Froble
||  `* Re: VMS and securityArne Vajhøj
||   `* Re: VMS and securitySteve Kelley
||    +- Re: VMS and securityArne Vajhøj
||    +- Re: VMS and securityRobert A. Brooks
||    +- Re: VMS and securityPhillip Helbig (undress to reply
||    +* Re: VMS and securityPhillip Helbig (undress to reply
||    |+- Re: VMS and securitySimon Clubley
||    |`* Re: VMS and securityArne Vajhøj
||    | `- Re: VMS and security<kemain.nospam
||    `* Re: VMS and securityPhillip Helbig (undress to reply
||     +- Re: VMS and securityDave Froble
||     `* Re: VMS and securityPhillip Helbig (undress to reply
||      `* Re: VMS and securityDave Froble
||       `- Re: VMS and securityStephen Hoffman
|`- Re: VMS and securitySimon Clubley
+- Re: VMS and securityStephen Hoffman
+* Re: VMS and securityjimc...@gmail.com
|`- Re: VMS and securitySimon Clubley
`* Re: VMS and securityDave Froble
 +* Re: VMS and securitySimon Clubley
 |`* Re: VMS and securityArne Vajhøj
 | `* Re: VMS and securityultr...@gmail.com
 |  +* Re: VMS and securitySimon Clubley
 |  |`- Re: VMS and securityultr...@gmail.com
 |  `* Re: VMS and securityStephen Hoffman
 |   `* Re: VMS and securityultr...@gmail.com
 |    `- Re: VMS and securityStephen Hoffman
 +* Re: VMS and securityStephen Hoffman
 |`- Re: VMS and securitySimon Clubley
 `* Re: VMS and securityArne Vajhøj
  `- Re: VMS and securityStephen Hoffman

Pages:12
VMS and security

<tk0gg3$1fd3b$3@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25460&group=comp.os.vms#25460

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: VMS and security
Date: Thu, 3 Nov 2022 13:42:27 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 29
Message-ID: <tk0gg3$1fd3b$3@dont-email.me>
Injection-Date: Thu, 3 Nov 2022 13:42:27 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="dafae393f945b746fa5fedbbe23f21d5";
logging-data="1553515"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19zpoMTVfLa5winpqxXLhvFCeGZfTgc5Vk="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:a66g8r0rFC970Wn0P1pbLHKBrpc=
 by: Simon Clubley - Thu, 3 Nov 2022 13:42 UTC

On 2022-11-02, IanD <iloveopenvms@gmail.com> wrote:
>
> I would have thought VMS could leverage it's historical reputation in security to give it an advantage against Linux at least, but I'm not convinced it has done enough to ensure it's up to date in the modern security landscape and it really needs to make sure it has it's ducks all in a row and then some because any failure in the security arena could/would end VMS chances of making a comeback

Unfortunately, the idea of VMS security somehow being comparable to
today's expected security standards is utterly delusional.

Even Linux is _far_ in advance of what VMS offers.

For example, Linux has mandatory access controls and VMS is still stuck
back in the DAC world.

There's no ASLR/KASLR support on VMS.

There's nothing like the Unix chroot jails on VMS.

Compiler protections in generated code has been lacking on VMS compared
to what is available elsewhere, but John in recent years has started
looking at getting comparable protections in the VMS compilers, when it
comes to generating code, that currently exist elsewhere.

Back in the 1980s/early 1990s, VMS was a leader in security and it has
proudly remained there while the rest of the world has moved on.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS and security

<mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25520&group=comp.os.vms#25520

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!kishost2.serverpowered.net!not-for-mail
From:
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Mon, 7 Nov 2022 21:30:23 -0400
Lines: 66
Message-ID: <mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
References: <tk0gg3$1fd3b$3@dont-email.me>
<000101d8f311$ac647d10$052d7730$@gmail.com>
Mime-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Info: solani.org;
logging-data="578976"; mail-complaints-to="abuse@news.solani.org"
To: "'comp.os.vms to email gateway'" <info-vax@rbnsn.com>
Cancel-Lock: sha1:RhoO1fh2p5RNiVOXncQyyEobpcM=
Precedence: list
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
h=thread-index:content-language:content-transfer-encoding
:mime-version:message-id:date:subject:in-reply-to:references:to:from
:from:to:cc:subject:date:message-id:reply-to;
bh=Fz6nznzFIZFd2O3S2A3/8PPHHa8sOGQUydH/OVWhCvs=;
b=dUgLbp9yy6wKD9pB2afK79GntOQy7IAWrKGQYQc1tcAq0qJDlK1ez3s9CMv2b7uQvm
Sb68mYOjCkrFB8SRJXrqAaaHHD9Cnat+EtHHylFOTswHo5nmGgdpEXYwUxevrXby2IJU
t+GBF7IC17rZHythkmKAbAEHSn90LRv3tEQdnZNDxCd/dW3zrpK0cqwB67CLJ4xxYRhB
UqZNVgpxoxeheISM2vZXpsxAubsNKahCrW1EEwAYEpaqCRxkJvcc01DCUXOxIQzp6ZPI
ju4nJp0vRC3iLdFAeITl4whuje9WOyxvMYRPoKnOGK/AtQV9jvmB7KlnHJMKfzwxE3pP
ApOQ==
List-Subscribe: <http://rbnsn.com/mailman/listinfo/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=subscribe>
X-Spam-Bar: ++
X-Ham-Report: Spam detection software,
running on the system "kishost2.serverpowered.net",
has NOT identified this incoming email as spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
root\@localhost for details. Content preview: >
Content analysis details: (2.8 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
3.0 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.5000]
-0.0 SPF_PASS SPF: sender matches SPF record
0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail
provider [kemain.nospam[at]gmail.com]
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's domain
-0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from
envelope-from domain
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
X-Mailman-Version: 2.1.38
X-BeenThere: info-vax@rbnsn.com
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGTR3HbTpssiWOeYxww/2QEhOIq3a6/k1lg
X-Received: by 2002:ac8:601:0:b0:3a5:7e9c:fe40 with SMTP id
d1-20020ac80601000000b003a57e9cfe40mr9985584qth.107.1667871024452;
Mon, 07 Nov 2022 17:30:24 -0800 (PST)
List-Id: "comp.os.vms to email gateway" <info-vax.rbnsn.com>
X-Spam-Status: No, score=2.8
List-Help: <mailto:info-vax-request@rbnsn.com?subject=help>
X-User-ID: eJwFwYEBwDAIArCXilbEe1z5/4QllQS3L4u3XJb8kjEDpBuzC4v9Ump+pycKkyo45eD5AQBxD68=
List-Post: <mailto:info-vax@rbnsn.com>
List-Archive: <http://rbnsn.com/pipermail/info-vax_rbnsn.com/>
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=thread-index:content-language:content-transfer-encoding
:mime-version:message-id:date:subject:in-reply-to:references:to:from
:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
bh=Fz6nznzFIZFd2O3S2A3/8PPHHa8sOGQUydH/OVWhCvs=;
b=qAMBfQUs6M8tbWLq9AeAuMOaDEEfiq9lmzaiUbCfGCvzT3FMe/xmIRB9wNVShh0wNg
YxaCXZCRJutgeRXZX+xBCDaYqfC5EN1VSB0kEhj+11WnQ4ycuht6HswvXbYMnECY/AfR
BPjYPOr44l1UXiInHXDej3vJGGIrjXeF/i5bb77WMfA7QeI75l5GuTypjNU6VgLUrUP7
ELO0bnioXx1U0VXvNh4i1K0X1eFpi9wQIAkAc0q/i8zsLiJ9jB6GeJ2LFeuhb1kBuevV
wt6bMCjObs/m3x2FXTSIow2eTgkIGl18QOsh8Lo6180JWIOpCOFJVzAxlvHhwI3dZ3Qj
1rqg==
X-Spam-Score: 28
X-Gm-Message-State: ACrzQf3kB/9myn2iD5kcJOiu6dZ93rULNEZ9HKDGqrrABj8iN/gDm1Eo
ubMn8eBxyV6KCo4hPuUDtgtNVBVml/0=
X-Spam-Flag: NO
X-Mailman-Original-References: <tk0gg3$1fd3b$3@dont-email.me>
X-Google-Smtp-Source: AMsMyM6vDIzXV7rPP8axfdE2eJhAvQ2cVhJpssmJraWvGuNw+AEGLDMg3dCMQKdleMy9ksOuPz0f4Q==
In-Reply-To: <tk0gg3$1fd3b$3@dont-email.me>
Content-Language: en-ca
List-Unsubscribe: <http://rbnsn.com/mailman/options/info-vax_rbnsn.com>,
<mailto:info-vax-request@rbnsn.com?subject=unsubscribe>
X-Antivirus: AVG (VPS 221107-8, 2022-11-7), Outbound message
X-Antivirus-Status: Clean
X-Mailman-Original-Message-ID: <000101d8f311$ac647d10$052d7730$@gmail.com>
 by: - Tue, 8 Nov 2022 01:30 UTC

> -----Original Message-----
> From: Info-vax <info-vax-bounces@rbnsn.com> On Behalf Of Simon Clubley
> via Info-vax
> Sent: Thursday, November 03, 2022 10:42 AM
> To: info-vax@rbnsn.com
> Cc: Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP>
> Subject: [Info-vax] VMS and security
>
> On 2022-11-02, IanD <iloveopenvms@gmail.com> wrote:
> >
> > I would have thought VMS could leverage it's historical reputation in
> > security to give it an advantage against Linux at least, but I'm not
> > convinced it has done enough to ensure it's up to date in the modern
> > security landscape and it really needs to make sure it has it's ducks
> > all in a row and then some because any failure in the security arena
> > could/would end VMS chances of making a comeback
>
> Unfortunately, the idea of VMS security somehow being comparable to
> today's expected security standards is utterly delusional.
>
> Even Linux is _far_ in advance of what VMS offers.
>
> For example, Linux has mandatory access controls and VMS is still stuck
back
> in the DAC world.
>
> There's no ASLR/KASLR support on VMS.
>
> There's nothing like the Unix chroot jails on VMS.
>
> Compiler protections in generated code has been lacking on VMS compared
> to what is available elsewhere, but John in recent years has started
looking at
> getting comparable protections in the VMS compilers, when it comes to
> generating code, that currently exist elsewhere.
>
> Back in the 1980s/early 1990s, VMS was a leader in security and it has
proudly
> remained there while the rest of the world has moved on.
>
> Simon.
>

For those looking for additional security than what the base OpenVMS OS
provides, they can always add 3rd party products like those from
PointSecure.

Reference: System Detective
<https://pointsecure.com/products/system-detective/>

Regards,

Kerry Main
Kerry dot main at starkgaming dot com

--
This email has been checked for viruses by AVG antivirus software.
www.avg.com

Re: VMS and security

<tkcllf$3r9hf$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25522&group=comp.os.vms#25522

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Mon, 7 Nov 2022 23:24:07 -0500
Organization: A noiseless patient Spider
Lines: 72
Message-ID: <tkcllf$3r9hf$1@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me>
<000101d8f311$ac647d10$052d7730$@gmail.com>
<mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 8 Nov 2022 04:24:15 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="0fdb30d8b723bc70fb8c7d82fc4db6c7";
logging-data="4040239"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1960twZLYZgTUB31ok9P0ePJRwtsUepewk="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:xiCZ+l1rnHJQu8pJo6jr4TuGmEw=
In-Reply-To: <mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
 by: Dave Froble - Tue, 8 Nov 2022 04:24 UTC

On 11/7/2022 8:30 PM, kemain.nospam@gmail.com wrote:
>
>> -----Original Message-----
>> From: Info-vax <info-vax-bounces@rbnsn.com> On Behalf Of Simon Clubley
>> via Info-vax
>> Sent: Thursday, November 03, 2022 10:42 AM
>> To: info-vax@rbnsn.com
>> Cc: Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP>
>> Subject: [Info-vax] VMS and security
>>
>> On 2022-11-02, IanD <iloveopenvms@gmail.com> wrote:
>>>
>>> I would have thought VMS could leverage it's historical reputation in
>>> security to give it an advantage against Linux at least, but I'm not
>>> convinced it has done enough to ensure it's up to date in the modern
>>> security landscape and it really needs to make sure it has it's ducks
>>> all in a row and then some because any failure in the security arena
>>> could/would end VMS chances of making a comeback
>>
>> Unfortunately, the idea of VMS security somehow being comparable to
>> today's expected security standards is utterly delusional.
>>
>> Even Linux is _far_ in advance of what VMS offers.
>>
>> For example, Linux has mandatory access controls and VMS is still stuck
> back
>> in the DAC world.
>>
>> There's no ASLR/KASLR support on VMS.
>>
>> There's nothing like the Unix chroot jails on VMS.
>>
>> Compiler protections in generated code has been lacking on VMS compared
>> to what is available elsewhere, but John in recent years has started
> looking at
>> getting comparable protections in the VMS compilers, when it comes to
>> generating code, that currently exist elsewhere.
>>
>> Back in the 1980s/early 1990s, VMS was a leader in security and it has
> proudly
>> remained there while the rest of the world has moved on.
>>
>> Simon.
>>
>
> For those looking for additional security than what the base OpenVMS OS
> provides, they can always add 3rd party products like those from
> PointSecure.
>
> Reference: System Detective
> <https://pointsecure.com/products/system-detective/>
>
>
> Regards,
>
> Kerry Main
> Kerry dot main at starkgaming dot com

I don't use Linux, but it is my impression that just about everything in Linux
is from third parties. Nor is Linux restricted to a single vendor.

So why then should VSI be responsible for everything VMS needs?

Gotta love double standards ...

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VMS and security

<tke6v0$3vc04$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25524&group=comp.os.vms#25524

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Tue, 8 Nov 2022 18:25:37 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 51
Message-ID: <tke6v0$3vc04$2@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me> <000101d8f311$ac647d10$052d7730$@gmail.com> <mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
Injection-Date: Tue, 8 Nov 2022 18:25:37 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="3e480dc9e556eb358a3629dad6b23e0a";
logging-data="4173828"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18FHji5+UeMsL92EjZ3XVh6mb3R8CEoi+8="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:qepnGeXBG7d+nLKINPXztzgfRZ0=
 by: Simon Clubley - Tue, 8 Nov 2022 18:25 UTC

On 2022-11-07, <kemain.nospam@gmail.com> <kemain.nospam@gmail.com> wrote:
>
>> -----Original Message-----
>> From: Info-vax <info-vax-bounces@rbnsn.com> On Behalf Of Simon Clubley
>> via Info-vax
>> Sent: Thursday, November 03, 2022 10:42 AM
>> To: info-vax@rbnsn.com
>> Cc: Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP>
>> Subject: [Info-vax] VMS and security
>>
>> Unfortunately, the idea of VMS security somehow being comparable to
>> today's expected security standards is utterly delusional.
>>
>> Even Linux is _far_ in advance of what VMS offers.
>>
>> For example, Linux has mandatory access controls and VMS is still stuck
> back
>> in the DAC world.
>>
>> There's no ASLR/KASLR support on VMS.
>>
>> There's nothing like the Unix chroot jails on VMS.
>>
>> Compiler protections in generated code has been lacking on VMS compared
>> to what is available elsewhere, but John in recent years has started
> looking at
>> getting comparable protections in the VMS compilers, when it comes to
>> generating code, that currently exist elsewhere.
>>
>> Back in the 1980s/early 1990s, VMS was a leader in security and it has
> proudly
>> remained there while the rest of the world has moved on.
>>
>> Simon.
>>
>
> For those looking for additional security than what the base OpenVMS OS
> provides, they can always add 3rd party products like those from
> PointSecure.
>
> Reference: System Detective
><https://pointsecure.com/products/system-detective/>
>

How well does PointSecure handle the above items in my list ?

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS and security

<tke76b$3vc04$3@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25525&group=comp.os.vms#25525

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Tue, 8 Nov 2022 18:29:31 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <tke76b$3vc04$3@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me> <000101d8f311$ac647d10$052d7730$@gmail.com> <mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com> <tkcllf$3r9hf$1@dont-email.me>
Injection-Date: Tue, 8 Nov 2022 18:29:31 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="3e480dc9e556eb358a3629dad6b23e0a";
logging-data="4173828"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19zKPlVf9LkKg8iO/mgICPYWvQGKX0SM1o="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:dluZPgx52XLxT97dMweMSZ7UnnY=
 by: Simon Clubley - Tue, 8 Nov 2022 18:29 UTC

On 2022-11-07, Dave Froble <davef@tsoft-inc.com> wrote:
>
> I don't use Linux, but it is my impression that just about everything in Linux
> is from third parties. Nor is Linux restricted to a single vendor.
>
> So why then should VSI be responsible for everything VMS needs?
>
> Gotta love double standards ...
>

Well that's a load of bollocks David. We are talking about things
that are integral within Linux, in the same way as, say, RMS, clustering,
and KESU modes are integral within VMS.

The only people in a position to add those missing features to VMS are
VSI themselves.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS and security

<2dccc58c-04c9-4aaa-8c0e-d90647fd64b2n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25526&group=comp.os.vms#25526

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a37:63c4:0:b0:6fa:23a2:9fc6 with SMTP id x187-20020a3763c4000000b006fa23a29fc6mr35780908qkb.376.1667937158519;
Tue, 08 Nov 2022 11:52:38 -0800 (PST)
X-Received: by 2002:ad4:5b84:0:b0:4bb:bda9:7025 with SMTP id
4-20020ad45b84000000b004bbbda97025mr51123405qvp.0.1667937158275; Tue, 08 Nov
2022 11:52:38 -0800 (PST)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Tue, 8 Nov 2022 11:52:38 -0800 (PST)
In-Reply-To: <tke76b$3vc04$3@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=159.196.118.223; posting-account=0tEijwoAAAAMP4aWao59DU5bzWsrJu9_
NNTP-Posting-Host: 159.196.118.223
References: <tk0gg3$1fd3b$3@dont-email.me> <000101d8f311$ac647d10$052d7730$@gmail.com>
<mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com> <tkcllf$3r9hf$1@dont-email.me>
<tke76b$3vc04$3@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <2dccc58c-04c9-4aaa-8c0e-d90647fd64b2n@googlegroups.com>
Subject: Re: VMS and security
From: iloveope...@gmail.com (IanD)
Injection-Date: Tue, 08 Nov 2022 19:52:38 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 3236
 by: IanD - Tue, 8 Nov 2022 19:52 UTC

I raised the security point in the other thread as a possible avenue for VMS to gain a reason for businesses to adopt it because in my experience was being exited from workplaces unless they have some type of stranglehold, typically some type of application, that stops it being migrated off of. That's not a long term winning strategy.

I realise VMS no longer holds the security mantle it once did but rather than try and out-compete Linux and Windows in areas they have won market share in, I thought it would be better to focus VMS energy in an area where VMS could utilise it's existing good name (how behind that image is to reality, is not the point) and build upon it, to potentially leap-frog the others or at least compete with a chance.

How feasible this is as a realistic goal, I have no idea, it just seems a sensible line of reasoning when security breaches are continuing to happen all over the planet and business are more than prepared to throw money towards systems highly focused on security vs trying to get them to adopt an OS that most younger business executive would have no idea about yet alone heard of.

What's the alternative?
You either out-compete Linux and/or Windows that have pretty much conquered the entire IT world, except niche mainframe areas, and I don't see this happening anytime soon, OR you come up with something that puts you on an even playing field / leap-frogs you ahead.

We've got to VMS on x86 and even VM support, that's a start, but it's not the end state or has even made VMS competitive, so what else can be done to give VMS a competitive advantage?

What else would get businesses to adopt VMS into their existing eco systems that they don't already have capabilities for?

Security surely would be one arena because it's cutting edge, always adapting and never a settled solution

Maybe I'm wrong, I'm just putting my ideas forward

Re: VMS and security

<tkehlp$g4v$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25529&group=comp.os.vms#25529

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Tue, 8 Nov 2022 16:28:25 -0500
Organization: HoffmanLabs LLC
Lines: 38
Message-ID: <tkehlp$g4v$1@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader01.eternal-september.org; posting-host="bb369eca171cb61755bbc748efcd0b51";
logging-data="16543"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19VjamgD8p2psE4w3grJ3I+WVVNCDLn2pM="
User-Agent: Unison/2.2
Cancel-Lock: sha1:Wy3ubSKixUCc+jr7+RRSEoUF2ZM=
 by: Stephen Hoffman - Tue, 8 Nov 2022 21:28 UTC

On 2022-11-03 13:42:27 +0000, Simon Clubley said:

> On 2022-11-02, IanD <iloveopenvms@gmail.com> wrote:
>>
>> I would have thought VMS could leverage it's historical reputation in
>> security to give it an advantage against Linux at least, but I'm not
>> convinced it has done enough to ensure it's up to date in the modern
>> security landscape and it really needs to make sure it has it's ducks
>> all in a row and then some because any failure in the security arena
>> could/would end VMS chances of making a comeback
>
> Unfortunately, the idea of VMS security somehow being comparable to
> today's expected security standards is utterly delusional.
>
> Even Linux is _far_ in advance of what VMS offers.

Write a secure app with encrypted data storage, with secure key
management, with encrypted and authenticated connections checking
client and server certs, with IPv4 and IPv6 support, integrate the
results with LDAP, and with the OpenVMS system configuration such that
the app won't allow access all over if it's breached (e.g. sandboxing).
If the goals involve writing an app from before Y2K and with older
security requirements, or incrementally updating security in same,
sure, OpenVMS does fine. But... have y'all thought about how much is
missing from the programming concepts manual and the security manual,
and how much of what does exist for documentation is just scattered
around in mostly-unrelated OpenVMS and layered product manuals, or
sometimes in comments in files, or documentation at related websites?
Connecting using public key authentication using common root certs—the
Mozilla server root cert list, for instance—is itself more of a project
than it ever should be. Can this stuff be done with OpenVMS? Sure. But
there are myriad ways to screw it up. Too many subtle ways, too.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: VMS and security

<tkeqct$191s$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25531&group=comp.os.vms#25531

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Tue, 8 Nov 2022 18:57:10 -0500
Organization: A noiseless patient Spider
Lines: 29
Message-ID: <tkeqct$191s$1@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me>
<000101d8f311$ac647d10$052d7730$@gmail.com>
<mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
<tkcllf$3r9hf$1@dont-email.me> <tke76b$3vc04$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 8 Nov 2022 23:57:17 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="531112189c47d8a1ad9fdcec7accd8f7";
logging-data="42044"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18byzCljxpEL1EFg9MF7A59y7mPTVOXqV4="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:idLNq/3mzgiomP/dt1wFC8I8XAQ=
In-Reply-To: <tke76b$3vc04$3@dont-email.me>
 by: Dave Froble - Tue, 8 Nov 2022 23:57 UTC

On 11/8/2022 1:29 PM, Simon Clubley wrote:
> On 2022-11-07, Dave Froble <davef@tsoft-inc.com> wrote:
>>
>> I don't use Linux, but it is my impression that just about everything in Linux
>> is from third parties. Nor is Linux restricted to a single vendor.
>>
>> So why then should VSI be responsible for everything VMS needs?
>>
>> Gotta love double standards ...
>>
>
> Well that's a load of bollocks David. We are talking about things
> that are integral within Linux, in the same way as, say, RMS, clustering,
> and KESU modes are integral within VMS.
>
> The only people in a position to add those missing features to VMS are
> VSI themselves.
>
> Simon.
>

Gee Simon, I thought we were talking about security and SSL.

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VMS and security

<a4472df1-b095-46d9-9574-13fc378c13fbn@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25532&group=comp.os.vms#25532

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:12b5:b0:6fa:8a0c:ffd9 with SMTP id x21-20020a05620a12b500b006fa8a0cffd9mr18858632qki.518.1667953693120;
Tue, 08 Nov 2022 16:28:13 -0800 (PST)
X-Received: by 2002:a0c:80e1:0:b0:4b1:a9ac:21e6 with SMTP id
88-20020a0c80e1000000b004b1a9ac21e6mr52614229qvb.50.1667953692951; Tue, 08
Nov 2022 16:28:12 -0800 (PST)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Tue, 8 Nov 2022 16:28:12 -0800 (PST)
In-Reply-To: <tk0gg3$1fd3b$3@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=67.185.69.149; posting-account=zLN-tQoAAAAsk_LJGSALC4tFlw9OCpzy
NNTP-Posting-Host: 67.185.69.149
References: <tk0gg3$1fd3b$3@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <a4472df1-b095-46d9-9574-13fc378c13fbn@googlegroups.com>
Subject: Re: VMS and security
From: jimcau...@gmail.com (jimc...@gmail.com)
Injection-Date: Wed, 09 Nov 2022 00:28:13 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 2265
 by: jimc...@gmail.com - Wed, 9 Nov 2022 00:28 UTC

On Thursday, November 3, 2022 at 6:42:30 AM UTC-7, Simon Clubley wrote:
> Unfortunately, the idea of VMS security somehow being comparable to
> today's expected security standards is utterly delusional.
>
> Even Linux is _far_ in advance of what VMS offers.
>
> For example, Linux has mandatory access controls and VMS is still stuck
> back in the DAC world.
>
> There's no ASLR/KASLR support on VMS.
>
> There's nothing like the Unix chroot jails on VMS.
>
> Compiler protections in generated code has been lacking on VMS compared
> to what is available elsewhere, but John in recent years has started
> looking at getting comparable protections in the VMS compilers, when it
> comes to generating code, that currently exist elsewhere.

Does VSI have a security program roadmap? I would have hoped that the x64 port would include table-stakes features like ASLR; if the product wants to compete with Linux and Windows, it will also need to have transparency on progress @ modernization features, compiler practices, and responsible security reporting -- at a minimum

Re: VMS and security

<tkesu1$1t22$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25533&group=comp.os.vms#25533

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!LeVffQP25j5GAigzc2gaQA.user.46.165.242.75.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Tue, 8 Nov 2022 19:40:33 -0500
Organization: Aioe.org NNTP Server
Message-ID: <tkesu1$1t22$1@gioia.aioe.org>
References: <tk0gg3$1fd3b$3@dont-email.me>
<000101d8f311$ac647d10$052d7730$@gmail.com>
<mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
<tkcllf$3r9hf$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="62530"; posting-host="LeVffQP25j5GAigzc2gaQA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
X-Notice: Filtered by postfilter v. 0.9.2
Content-Language: en-US
 by: Arne Vajhøj - Wed, 9 Nov 2022 00:40 UTC

On 11/7/2022 11:24 PM, Dave Froble wrote:
> I don't use Linux, but it is my impression that just about everything in
> Linux is from third parties.  Nor is Linux restricted to a single vendor.

I think that depends a lot on whether you talk about Linux
kernel or a typical Linux distro.

The Linux kernel comes with very little.

A typical Linux distro comes with almost everything (open source)
under the sun.

Arne

Re: VMS and security

<tkevh5$mi5$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25534&group=comp.os.vms#25534

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!LeVffQP25j5GAigzc2gaQA.user.46.165.242.75.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Tue, 8 Nov 2022 20:24:53 -0500
Organization: Aioe.org NNTP Server
Message-ID: <tkevh5$mi5$1@gioia.aioe.org>
References: <tk0gg3$1fd3b$3@dont-email.me>
<000101d8f311$ac647d10$052d7730$@gmail.com>
<mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
<tkcllf$3r9hf$1@dont-email.me> <tke76b$3vc04$3@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Info: gioia.aioe.org; logging-data="23109"; posting-host="LeVffQP25j5GAigzc2gaQA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
X-Notice: Filtered by postfilter v. 0.9.2
Content-Language: en-US
 by: Arne Vajhøj - Wed, 9 Nov 2022 01:24 UTC

On 11/8/2022 1:29 PM, Simon Clubley wrote:
> On 2022-11-07, Dave Froble <davef@tsoft-inc.com> wrote:
>> I don't use Linux, but it is my impression that just about everything in Linux
>> is from third parties. Nor is Linux restricted to a single vendor.
>>
>> So why then should VSI be responsible for everything VMS needs?
>>
>> Gotta love double standards ...
>
> Well that's a load of bollocks David. We are talking about things
> that are integral within Linux, in the same way as, say, RMS, clustering,
> and KESU modes are integral within VMS.

That was pretty strong words given that you are only 75% correct ...

Arne

Re: VMS and security

<tkg8ls$7lfo$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25538&group=comp.os.vms#25538

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 13:07:08 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 37
Message-ID: <tkg8ls$7lfo$1@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me> <000101d8f311$ac647d10$052d7730$@gmail.com> <mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com> <tkcllf$3r9hf$1@dont-email.me> <tke76b$3vc04$3@dont-email.me> <tkeqct$191s$1@dont-email.me>
Injection-Date: Wed, 9 Nov 2022 13:07:08 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="dbd6b08a473efdfa4e7ced458587e50e";
logging-data="251384"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18+N8VyWyvZ7vUM392XgWfX1X38IuZrRSk="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:85IfUHSzLLIGmsaAy1Naj4PHpdA=
 by: Simon Clubley - Wed, 9 Nov 2022 13:07 UTC

On 2022-11-08, Dave Froble <davef@tsoft-inc.com> wrote:
> On 11/8/2022 1:29 PM, Simon Clubley wrote:
>> On 2022-11-07, Dave Froble <davef@tsoft-inc.com> wrote:
>>>
>>> I don't use Linux, but it is my impression that just about everything in Linux
>>> is from third parties. Nor is Linux restricted to a single vendor.
>>>
>>> So why then should VSI be responsible for everything VMS needs?
>>>
>>> Gotta love double standards ...
>>>
>>
>> Well that's a load of bollocks David. We are talking about things
>> that are integral within Linux, in the same way as, say, RMS, clustering,
>> and KESU modes are integral within VMS.
>>
>> The only people in a position to add those missing features to VMS are
>> VSI themselves.
>>
>> Simon.
>>
>
> Gee Simon, I thought we were talking about security and SSL.
>

Although SSL has been discussed previously, SSL wasn't even mentioned in
the list of things I asked about in the posting you are responding to.

I am asking some very awkward questions about the limitations of VMS
internally when compared to Linux and you are trying to move the
discussion away from that and onto other ground.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS and security

<tkg8qa$7lfo$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25539&group=comp.os.vms#25539

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 13:09:31 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <tkg8qa$7lfo$2@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me> <000101d8f311$ac647d10$052d7730$@gmail.com> <mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com> <tkcllf$3r9hf$1@dont-email.me> <tke76b$3vc04$3@dont-email.me> <tkevh5$mi5$1@gioia.aioe.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 9 Nov 2022 13:09:31 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="dbd6b08a473efdfa4e7ced458587e50e";
logging-data="251384"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18zqqgm8lLFJw/tKj5RWpIgMPyh0G7buuk="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:B8KQNmZyl8mgk7RF0NlQk9JWMic=
 by: Simon Clubley - Wed, 9 Nov 2022 13:09 UTC

On 2022-11-08, Arne Vajhøj <arne@vajhoej.dk> wrote:
> On 11/8/2022 1:29 PM, Simon Clubley wrote:
>> On 2022-11-07, Dave Froble <davef@tsoft-inc.com> wrote:
>>> I don't use Linux, but it is my impression that just about everything in Linux
>>> is from third parties. Nor is Linux restricted to a single vendor.
>>>
>>> So why then should VSI be responsible for everything VMS needs?
>>>
>>> Gotta love double standards ...
>>
>> Well that's a load of bollocks David. We are talking about things
>> that are integral within Linux, in the same way as, say, RMS, clustering,
>> and KESU modes are integral within VMS.
>
> That was pretty strong words given that you are only 75% correct ...
>

I've just reviewed my list in the posting that David is responding to
and I don't see it, so can you tell me which 25% am I wrong about ?

Thanks,

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS and security

<tkg9ja$7lfo$3@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25540&group=comp.os.vms#25540

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 13:22:50 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 44
Message-ID: <tkg9ja$7lfo$3@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me> <a4472df1-b095-46d9-9574-13fc378c13fbn@googlegroups.com>
Injection-Date: Wed, 9 Nov 2022 13:22:50 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="dbd6b08a473efdfa4e7ced458587e50e";
logging-data="251384"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/xqS5MvSSnOXBE/EwabUvjzaP5AtHBdP0="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:xKr+cMPN+jl8Ucu+8yvxoZ7hOX4=
 by: Simon Clubley - Wed, 9 Nov 2022 13:22 UTC

On 2022-11-08, jimc...@gmail.com <jimcausey@gmail.com> wrote:
> On Thursday, November 3, 2022 at 6:42:30 AM UTC-7, Simon Clubley wrote:
>> Unfortunately, the idea of VMS security somehow being comparable to
>> today's expected security standards is utterly delusional.
>>
>> Even Linux is _far_ in advance of what VMS offers.
>>
>> For example, Linux has mandatory access controls and VMS is still stuck
>> back in the DAC world.
>>
>> There's no ASLR/KASLR support on VMS.
>>
>> There's nothing like the Unix chroot jails on VMS.
>>
>> Compiler protections in generated code has been lacking on VMS compared
>> to what is available elsewhere, but John in recent years has started
>> looking at getting comparable protections in the VMS compilers, when it
>> comes to generating code, that currently exist elsewhere.
>
> Does VSI have a security program roadmap? I would have hoped that the x64
> port would include table-stakes features like ASLR; if the product wants to
> compete with Linux and Windows, it will also need to have transparency on
> progress @ modernization features, compiler practices, and responsible
> security reporting -- at a minimum

The only security work I have seen is an enhanced password algorithm
and plans for encryption of VMS cluster traffic.

John has also talked about adding some industry-standard security
features to the compilers but I don't know the status of that work.

The last one on your list is especially annoying because VSI _did_
introduce a public reporting mechanism in the immediate aftermath of
my DCL research, but then they removed it for some reason after all
the fuss had died down. :-( :-(

Emails to VSI and requests to VSI via their contact page asking them
to reinstate it have gone ignored.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS and security

<tkgbfu$7us8$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25541&group=comp.os.vms#25541

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 08:55:02 -0500
Organization: A noiseless patient Spider
Lines: 23
Message-ID: <tkgbfu$7us8$1@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me>
<000101d8f311$ac647d10$052d7730$@gmail.com>
<mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
<tkcllf$3r9hf$1@dont-email.me> <tkesu1$1t22$1@gioia.aioe.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 9 Nov 2022 13:55:10 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="531112189c47d8a1ad9fdcec7accd8f7";
logging-data="261000"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+ET1RDvDFWBW4IHvQ7K57mFZZFnq00Dw0="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:5CBr0ZFQswNE6dIl18UbWS4WUBs=
In-Reply-To: <tkesu1$1t22$1@gioia.aioe.org>
 by: Dave Froble - Wed, 9 Nov 2022 13:55 UTC

On 11/8/2022 7:40 PM, Arne Vajhøj wrote:
> On 11/7/2022 11:24 PM, Dave Froble wrote:
>> I don't use Linux, but it is my impression that just about everything in Linux
>> is from third parties. Nor is Linux restricted to a single vendor.
>
> I think that depends a lot on whether you talk about Linux
> kernel or a typical Linux distro.
>
> The Linux kernel comes with very little.
>
> A typical Linux distro comes with almost everything (open source)
> under the sun.

I think my point was that perhaps not all of that "almost everything" comes from
the same source.

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VMS and security

<tkgbrd$80pt$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25542&group=comp.os.vms#25542

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 09:01:09 -0500
Organization: A noiseless patient Spider
Lines: 48
Message-ID: <tkgbrd$80pt$1@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 9 Nov 2022 14:01:18 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="531112189c47d8a1ad9fdcec7accd8f7";
logging-data="262973"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18QHzxN0+JDbywePB7toJolekLwAxTT8Xs="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:2IIQwzcF+jqqzmA6S6NAZtztmsE=
In-Reply-To: <tk0gg3$1fd3b$3@dont-email.me>
 by: Dave Froble - Wed, 9 Nov 2022 14:01 UTC

On 11/3/2022 9:42 AM, Simon Clubley wrote:
> On 2022-11-02, IanD <iloveopenvms@gmail.com> wrote:
>>
>> I would have thought VMS could leverage it's historical reputation in security to give it an advantage against Linux at least, but I'm not convinced it has done enough to ensure it's up to date in the modern security landscape and it really needs to make sure it has it's ducks all in a row and then some because any failure in the security arena could/would end VMS chances of making a comeback
>
> Unfortunately, the idea of VMS security somehow being comparable to
> today's expected security standards is utterly delusional.

Who's expectations?

> Even Linux is _far_ in advance of what VMS offers.

Perhaps in some areas, and perhaps VMS is ahead in others.

> For example, Linux has mandatory access controls and VMS is still stuck
> back in the DAC world.

Is this the only method?

> There's no ASLR/KASLR support on VMS.

Is this the only method?

> There's nothing like the Unix chroot jails on VMS.

Is this the only method?

> Compiler protections in generated code has been lacking on VMS compared
> to what is available elsewhere, but John in recent years has started
> looking at getting comparable protections in the VMS compilers, when it
> comes to generating code, that currently exist elsewhere.
>
> Back in the 1980s/early 1990s, VMS was a leader in security and it has
> proudly remained there while the rest of the world has moved on.

It is understood that VMS has been neglected by it's owners for some time.
However, the question of how far behind could be interesting.

Simon, you throw out things used elsewhere and claim that that is the only way
to provide security. I don't think that is quite accurate.

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VMS and security

<tkgrkt$9kad$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25545&group=comp.os.vms#25545

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 18:30:53 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 75
Message-ID: <tkgrkt$9kad$1@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me> <tkgbrd$80pt$1@dont-email.me>
Injection-Date: Wed, 9 Nov 2022 18:30:53 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="dbd6b08a473efdfa4e7ced458587e50e";
logging-data="315725"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18/kCftdw/4mpvpY8LPGggnXM/Denq19U8="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:J3GIwnOMkVtZh5YTuPNfcmqibMA=
 by: Simon Clubley - Wed, 9 Nov 2022 18:30 UTC

On 2022-11-09, Dave Froble <davef@tsoft-inc.com> wrote:
> On 11/3/2022 9:42 AM, Simon Clubley wrote:
>> On 2022-11-02, IanD <iloveopenvms@gmail.com> wrote:
>>>
>>> I would have thought VMS could leverage it's historical reputation in security to give it an advantage against Linux at least, but I'm not convinced it has done enough to ensure it's up to date in the modern security landscape and it really needs to make sure it has it's ducks all in a row and then some because any failure in the security arena could/would end VMS chances of making a comeback
>>
>> Unfortunately, the idea of VMS security somehow being comparable to
>> today's expected security standards is utterly delusional.
>
> Who's expectations?
>

Everyone in the industry outside of those who write DEC Basic code for
a living ?

>> Even Linux is _far_ in advance of what VMS offers.
>
> Perhaps in some areas, and perhaps VMS is ahead in others.
>
>> For example, Linux has mandatory access controls and VMS is still stuck
>> back in the DAC world.
>
> Is this the only method?
>

The fact you are asking this question, and phrasing it in this way,
tells me that you simply don't understand the issues being discussed.

Security is a layered approach, and things that were not required 20-30
years ago, are now required (and expected to be available) as a result of
experience and a changing security environment.

>> There's no ASLR/KASLR support on VMS.
>
> Is this the only method?
>

That question makes absolutely no sense.

>> There's nothing like the Unix chroot jails on VMS.
>
> Is this the only method?
>

If you could come up with something that provides the same level of
isolation, that could be acceptable as well. What would be your
suggested VMS alternative to a Unix chroot jail ?

>> Compiler protections in generated code has been lacking on VMS compared
>> to what is available elsewhere, but John in recent years has started
>> looking at getting comparable protections in the VMS compilers, when it
>> comes to generating code, that currently exist elsewhere.
>>
>> Back in the 1980s/early 1990s, VMS was a leader in security and it has
>> proudly remained there while the rest of the world has moved on.
>
> It is understood that VMS has been neglected by it's owners for some time.
> However, the question of how far behind could be interesting.
>
> Simon, you throw out things used elsewhere and claim that that is the only way
> to provide security. I don't think that is quite accurate.
>

Ok, so what are the VMS equivalents of the above functionality that
can be used to address the same security issues ?

I am especially interested in your plans for implementing MAC security
on VMS to the same level of functionality and fine-grained levels of
control seen in SELinux.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS and security

<tkgvul$a6jc$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25548&group=comp.os.vms#25548

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 14:44:21 -0500
Organization: HoffmanLabs LLC
Lines: 87
Message-ID: <tkgvul$a6jc$1@dont-email.me>
References: <tkgbrd$80pt$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader01.eternal-september.org; posting-host="642762fed5883993be91659098694650";
logging-data="334444"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18PjYFIdUL9aCa2oY16BUvbIO4+q1Sgics="
User-Agent: Unison/2.2
Cancel-Lock: sha1:2yydY7FlYVSX2oJqJz9LsfE6c58=
 by: Stephen Hoffman - Wed, 9 Nov 2022 19:44 UTC

On 2022-11-09 14:01:09 +0000, Dave Froble said:

> On 11/3/2022 9:42 AM, Simon Clubley wrote:
>> On 2022-11-02, IanD <iloveopenvms@gmail.com> wrote:
>>>
>>> I would have thought VMS could leverage it's historical reputation in
>>> security to give it an advantage against Linux at least, but I'm not
>>> convinced it has done enough to ensure it's up to date in the modern
>>> security landscape and it really needs to make sure it has it's ducks
>>> all in a row and then some because any failure in the security arena
>>> could/would end VMS chances of making a comeback
>>
>> Unfortunately, the idea of VMS security somehow being comparable to
>> today's expected security standards is utterly delusional.
>
> Who's expectations?

The expectations of folks with some experience with securing and
isolating apps and data on various available systems, of course.

>> Even Linux is _far_ in advance of what VMS offers.
>
> Perhaps in some areas, and perhaps VMS is ahead in others.

Clustering and host-based RAID-1 is still pretty good, but few OpenVMS
folks use that due to its pricing. And other platforms have
alternatives to those.

>> For example, Linux has mandatory access controls and VMS is still stuck
>> back in the DAC world.
>
> Is this the only method?

Traditional mandatory access control (MAC) security isn't widely used.
Some of the concepts from MAC security were repurposed, and are used.
OpenVMS does have MAC features, though many of the related tools were
retired with the old layered product. The MAC features could be the
foundation for better app isolation. Some of the MAC features have
served well underneath sandboxes and jails, and underneath containers.
Subsystem identifiers and the latent bits of MAC can be used to build
your own isolation scheme, but that all gets Really Ugly. And none of
that restricts available calls past what privileges might be involved;
BSD-style pledges or such, and unveil. https://man.openbsd.org/pledge
https://man.openbsd.org/unveil.2 etc.

>> There's no ASLR/KASLR support on VMS.
>
> Is this the only method?

It's one of the more common means of making exploitation more unstable.
Pointer authentication is another. The two can and variously are
combined.

>> There's nothing like the Unix chroot jails on VMS.
>
> Is this the only method?

Sandboxes and jails are the typical means, and BSD-style promises can
get part way there. These mechanisms also tend to be the foundation of
containers.

>> Compiler protections in generated code has been lacking on VMS compared
>> to what is available elsewhere, but John in recent years has started
>> looking at getting comparable protections in the VMS compilers, when it
>> comes to generating code, that currently exist elsewhere.
>>
>> Back in the 1980s/early 1990s, VMS was a leader in security and it has
>> proudly remained there while the rest of the world has moved on.
>
> It is understood that VMS has been neglected by it's owners for some
> time. However, the question of how far behind could be interesting.

Fairly far behind, yes.

> Simon, you throw out things used elsewhere and claim that that is the
> only way to provide security. I don't think that is quite accurate.

An install that's running isolated is a possibility, though the
traditional means of trying to prevent app and system
compromises—writing totally mistake-free code—has proven somewhat
problematic.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: VMS and security

<tkh0tn$j43$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25549&group=comp.os.vms#25549

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!LeVffQP25j5GAigzc2gaQA.user.46.165.242.75.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 15:00:55 -0500
Organization: Aioe.org NNTP Server
Message-ID: <tkh0tn$j43$1@gioia.aioe.org>
References: <tk0gg3$1fd3b$3@dont-email.me> <tkgbrd$80pt$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="19587"; posting-host="LeVffQP25j5GAigzc2gaQA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
X-Notice: Filtered by postfilter v. 0.9.2
Content-Language: en-US
 by: Arne Vajhøj - Wed, 9 Nov 2022 20:00 UTC

On 11/9/2022 9:01 AM, Dave Froble wrote:
> On 11/3/2022 9:42 AM, Simon Clubley wrote:
>> On 2022-11-02, IanD <iloveopenvms@gmail.com> wrote:
>>> I would have thought VMS could leverage it's historical reputation in
>>> security to give it an advantage against Linux at least, but I'm not
>>> convinced it has done enough to ensure it's up to date in the modern
>>> security landscape and it really needs to make sure it has it's ducks
>>> all in a row and then some because any failure in the security arena
>>> could/would end VMS chances of making a comeback
>>
>> Unfortunately, the idea of VMS security somehow being comparable to
>> today's expected security standards is utterly delusional.
>
> Who's expectations?

Whoever are into IT security today.

>> Even Linux is _far_ in advance of what VMS offers.
>
> Perhaps in some areas, and perhaps VMS is ahead in others.

The lack of investments in VMS the last 25 years has some
consequences.

Security has evolved a lot in those 25 years, so VMS
are generally behind in this area.

>> For example, Linux has mandatory access controls and VMS is still stuck
>> back in the DAC world.
>
> Is this the only method?
>
>> There's no ASLR/KASLR support on VMS.
>
> Is this the only method?
>
>> There's nothing like the Unix chroot jails on VMS.
>
> Is this the only method?

It is nice features for security.

None of them are strictly required.

VMS will not need all security features available elsewhere, but
VMS will definitely need a good portion of them to be considered
OK.

> It is understood that VMS has been neglected by it's owners for some
> time. However, the question of how far behind could be interesting.

I will claim that the VMS team anno 1990 could catch up in a year
or two, but VSI will need way more years to catch up. They are a
small team and even though security is important then they also have
lots of other priorities.

> Simon, you throw out things used elsewhere and claim that that is the
> only way to provide security.  I don't think that is quite accurate.

The cheapest and fastest way forward for VSI is to build
on work other have done.

Security research coming up with new ideas and concepts are
bloody expensive. DEC had the money for it. VSI doesn't.

Arne

Re: VMS and security

<tkh259$1516$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25550&group=comp.os.vms#25550

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!LeVffQP25j5GAigzc2gaQA.user.46.165.242.75.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 15:22:00 -0500
Organization: Aioe.org NNTP Server
Message-ID: <tkh259$1516$1@gioia.aioe.org>
References: <tk0gg3$1fd3b$3@dont-email.me> <tkgbrd$80pt$1@dont-email.me>
<tkgrkt$9kad$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Info: gioia.aioe.org; logging-data="37926"; posting-host="LeVffQP25j5GAigzc2gaQA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
Content-Language: en-US
X-Notice: Filtered by postfilter v. 0.9.2
 by: Arne Vajhøj - Wed, 9 Nov 2022 20:22 UTC

On 11/9/2022 1:30 PM, Simon Clubley wrote:
> On 2022-11-09, Dave Froble <davef@tsoft-inc.com> wrote:
>> On 11/3/2022 9:42 AM, Simon Clubley wrote:
>>> On 2022-11-02, IanD <iloveopenvms@gmail.com> wrote:
>>>>
>>>> I would have thought VMS could leverage it's historical reputation in security to give it an advantage against Linux at least, but I'm not convinced it has done enough to ensure it's up to date in the modern security landscape and it really needs to make sure it has it's ducks all in a row and then some because any failure in the security arena could/would end VMS chances of making a comeback
>>>
>>> Unfortunately, the idea of VMS security somehow being comparable to
>>> today's expected security standards is utterly delusional.
>>
>> Who's expectations?
>
> Everyone in the industry outside of those who write DEC Basic code for
> a living ?

Lots of people has or still does live from writing Basic code.

>>> There's nothing like the Unix chroot jails on VMS.
>>
>> Is this the only method?
>>
>
> If you could come up with something that provides the same level of
> isolation, that could be acceptable as well. What would be your
> suggested VMS alternative to a Unix chroot jail ?

>> It is understood that VMS has been neglected by it's owners for some time.
>> However, the question of how far behind could be interesting.
>>
>> Simon, you throw out things used elsewhere and claim that that is the only way
>> to provide security. I don't think that is quite accurate.
>
> Ok, so what are the VMS equivalents of the above functionality that
> can be used to address the same security issues ?
>
> I am especially interested in your plans for implementing MAC security
> on VMS to the same level of functionality and fine-grained levels of
> control seen in SELinux.

MAC for VMS should be relative well understood. That was what
SEVMS provided.

For isolation I am thinking that VMS got group isolation
on global sections, logicals, file access and process
access. Adding group isolation to disk mount and
network definition plus adding a group based
scheduler may start to look like a foundation for
something.

Arne

Re: VMS and security

<tkh2bg$1516$2@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25551&group=comp.os.vms#25551

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!LeVffQP25j5GAigzc2gaQA.user.46.165.242.75.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 15:25:20 -0500
Organization: Aioe.org NNTP Server
Message-ID: <tkh2bg$1516$2@gioia.aioe.org>
References: <tk0gg3$1fd3b$3@dont-email.me>
<000101d8f311$ac647d10$052d7730$@gmail.com>
<mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
<tkcllf$3r9hf$1@dont-email.me> <tkesu1$1t22$1@gioia.aioe.org>
<tkgbfu$7us8$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="37926"; posting-host="LeVffQP25j5GAigzc2gaQA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
Content-Language: en-US
X-Notice: Filtered by postfilter v. 0.9.2
 by: Arne Vajhøj - Wed, 9 Nov 2022 20:25 UTC

On 11/9/2022 8:55 AM, Dave Froble wrote:
> On 11/8/2022 7:40 PM, Arne Vajhøj wrote:
>> On 11/7/2022 11:24 PM, Dave Froble wrote:
>>> I don't use Linux, but it is my impression that just about everything
>>> in Linux
>>> is from third parties.  Nor is Linux restricted to a single vendor.
>>
>> I think that depends a lot on whether you talk about Linux
>> kernel or a typical Linux distro.
>>
>> The Linux kernel comes with very little.
>>
>> A typical Linux distro comes with almost everything (open source)
>> under the sun.
>
> I think my point was that perhaps not all of that "almost everything"
> comes from the same source.

That would be hundreds/thousands of open source projects.

Some of that stuff could work on VMS as well.

But VMS has a huge handicap compared to Linux - the
interest in the VMS community to contribute to
open source is very small.

Arne

Re: VMS and security

<tkhd06$biai$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25554&group=comp.os.vms#25554

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 18:27:02 -0500
Organization: HoffmanLabs LLC
Lines: 32
Message-ID: <tkhd06$biai$1@dont-email.me>
References: <tkgbrd$80pt$1@dont-email.me> <tkh0tn$j43$1@gioia.aioe.org> <memo.20221109220726.18656H@jgd.cix.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader01.eternal-september.org; posting-host="ba47cdcb16bdc4e83bd816dce356ef5f";
logging-data="379218"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/A46avM4jKFZC9rAd9JM5v9t/oYZMWCKo="
User-Agent: Unison/2.2
Cancel-Lock: sha1:nrKAv4fJGb2DGhlM5/ydKXdJxh4=
 by: Stephen Hoffman - Wed, 9 Nov 2022 23:27 UTC

On 2022-11-09 22:07:00 +0000, John Dallman said:

> An equivalent of chroot would require setting up new tables of symbols
> and logicals. I don't know enough about VMS internals to know how
> complicated that would be.

Complicated.

I looked into that a while back.

That whole area gets "entertaining", as OpenVMS assumes a whole bunch
of stuff is system-wide, as do a number of apps and app installers, and
assumptions can get broken.

Logical names and tables, global sections, event flag clusters, IP
ports, mailboxes, and usernames, for instance.

Some of that can be "demoted" to a sandbox with (maybe) more logical
name tables for each sandbox, some—like potentially permitting
duplicate usernames and duplicate identifiers and UICs—gets more gnarly.

Symbols are already inherently process local, so those are less of an issue.

The BSD Pledge scheme is rather more feasible on a smaller budget and
with fewer repercussions, and apps can opt into that. VSI probably
doesn't have the budget or the schedule or the call for an overhaul of
the scale of adding sandboxes.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: VMS and security

<tkhnhp$mg1$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25555&group=comp.os.vms#25555

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!LeVffQP25j5GAigzc2gaQA.user.46.165.242.75.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Wed, 9 Nov 2022 21:27:05 -0500
Organization: Aioe.org NNTP Server
Message-ID: <tkhnhp$mg1$1@gioia.aioe.org>
References: <tk0gg3$1fd3b$3@dont-email.me>
<000101d8f311$ac647d10$052d7730$@gmail.com>
<mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com>
<tkcllf$3r9hf$1@dont-email.me> <tke76b$3vc04$3@dont-email.me>
<tkevh5$mi5$1@gioia.aioe.org> <tkg8qa$7lfo$2@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="23041"; posting-host="LeVffQP25j5GAigzc2gaQA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
X-Notice: Filtered by postfilter v. 0.9.2
Content-Language: en-US
 by: Arne Vajhøj - Thu, 10 Nov 2022 02:27 UTC

On 11/9/2022 8:09 AM, Simon Clubley wrote:
> On 2022-11-08, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> On 11/8/2022 1:29 PM, Simon Clubley wrote:
>>> On 2022-11-07, Dave Froble <davef@tsoft-inc.com> wrote:
>>>> I don't use Linux, but it is my impression that just about everything in Linux
>>>> is from third parties. Nor is Linux restricted to a single vendor.
>>>>
>>>> So why then should VSI be responsible for everything VMS needs?
>>>>
>>>> Gotta love double standards ...
>>>
>>> Well that's a load of bollocks David. We are talking about things
>>> that are integral within Linux, in the same way as, say, RMS, clustering,
>>> and KESU modes are integral within VMS.
>>
>> That was pretty strong words given that you are only 75% correct ...
>>
>
> I've just reviewed my list in the posting that David is responding to
> and I don't see it, so can you tell me which 25% am I wrong about ?

Really?

So if we from that list:

# For example, Linux has mandatory access controls and VMS is still stuck
# back in the DAC world.
# # There's no ASLR/KASLR support on VMS.
# # There's nothing like the Unix chroot jails on VMS.
# # Compiler protections in generated code has been lacking on VMS compared
# to what is available elsewhere, but John in recent years has started
# looking at getting comparable protections in the VMS compilers, when it
# comes to generating code, that currently exist elsewhere.

create a little pop quiz:

Which of the following items:
A) mandatory access controls
B) ASLR
C) chroot jails
D) Compiler protections in generated code
are not "integral within Linux"?

Then you have no idea?

Arne

Re: VMS and security

<tkitju$i7kq$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25561&group=comp.os.vms#25561

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Thu, 10 Nov 2022 13:16:46 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <tkitju$i7kq$1@dont-email.me>
References: <tkgbrd$80pt$1@dont-email.me> <tkgvul$a6jc$1@dont-email.me>
Injection-Date: Thu, 10 Nov 2022 13:16:46 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="c235c0e5b78af62d01a659319b312409";
logging-data="597658"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX187azC08utVHeOTp1UfsUoUiqXKsYPqAuE="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:4ICKnA7SpPZVuCkEVYDLWtZikM8=
 by: Simon Clubley - Thu, 10 Nov 2022 13:16 UTC

On 2022-11-09, Stephen Hoffman <seaohveh@hoffmanlabs.invalid> wrote:
>
> Traditional mandatory access control (MAC) security isn't widely used.

One place where a form of MAC security is in wide use is in protecting
server-side applications in Linux. SELinux is turned on by default, and
with a configuration that protects server applications, such as Apache,
unless you actively decide to turn it off.

In the early days of SELinux, there was an attempt to cover much more than
that by default, but that was considered to be too much out of the box, so
the default coverage was changed to server applications only.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VMS and security

<tkiuho$i7kq$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25562&group=comp.os.vms#25562

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VMS and security
Date: Thu, 10 Nov 2022 13:32:40 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 68
Message-ID: <tkiuho$i7kq$2@dont-email.me>
References: <tk0gg3$1fd3b$3@dont-email.me> <000101d8f311$ac647d10$052d7730$@gmail.com> <mailman.7.1667871070.18200.info-vax_rbnsn.com@rbnsn.com> <tkcllf$3r9hf$1@dont-email.me> <tke76b$3vc04$3@dont-email.me> <tkevh5$mi5$1@gioia.aioe.org> <tkg8qa$7lfo$2@dont-email.me> <tkhnhp$mg1$1@gioia.aioe.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 10 Nov 2022 13:32:40 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="c235c0e5b78af62d01a659319b312409";
logging-data="597658"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19VvFGJs7Gu0neiuiRbx3G9vsrSjMGF8BE="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:6hqlSR2zg4HYiwai8V5xNms6FkE=
 by: Simon Clubley - Thu, 10 Nov 2022 13:32 UTC

On 2022-11-09, Arne Vajhøj <arne@vajhoej.dk> wrote:
> On 11/9/2022 8:09 AM, Simon Clubley wrote:
>> On 2022-11-08, Arne Vajhøj <arne@vajhoej.dk> wrote:
>>> On 11/8/2022 1:29 PM, Simon Clubley wrote:
>>>> On 2022-11-07, Dave Froble <davef@tsoft-inc.com> wrote:
>>>>> I don't use Linux, but it is my impression that just about everything in Linux
>>>>> is from third parties. Nor is Linux restricted to a single vendor.
>>>>>
>>>>> So why then should VSI be responsible for everything VMS needs?
>>>>>
>>>>> Gotta love double standards ...
>>>>
>>>> Well that's a load of bollocks David. We are talking about things
>>>> that are integral within Linux, in the same way as, say, RMS, clustering,
>>>> and KESU modes are integral within VMS.
>>>
>>> That was pretty strong words given that you are only 75% correct ...
>>>
>>
>> I've just reviewed my list in the posting that David is responding to
>> and I don't see it, so can you tell me which 25% am I wrong about ?
>
> Really?
>
> So if we from that list:
>
> # For example, Linux has mandatory access controls and VMS is still stuck
> # back in the DAC world.
> #
> # There's no ASLR/KASLR support on VMS.
> #
> # There's nothing like the Unix chroot jails on VMS.
> #
> # Compiler protections in generated code has been lacking on VMS compared
> # to what is available elsewhere, but John in recent years has started
> # looking at getting comparable protections in the VMS compilers, when it
> # comes to generating code, that currently exist elsewhere.
>
> create a little pop quiz:
>
> Which of the following items:
> A) mandatory access controls
> B) ASLR
> C) chroot jails
> D) Compiler protections in generated code
> are not "integral within Linux"?
>
> Then you have no idea?
>

They all are present and integrated within Linux these days Arne. Which one
do you think is missing from Linux ?

BTW, that last one, where the entire Linux distribution is built with
those protections, has generally been present in Linux distributions
for the last decade or so. It's probably going to be the first one in the
above list to be present on VMS, at least after John does the necessary
compiler and other work (including dealing with the Macro-32 problem).

Having a VMS distribution with all the binaries compiled with the expected
industry-standard protections such as stack-smashing protection, will be a
nice thing to finally see.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Pages:12
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor