> -----Original Message-----
> From: Info-vax [mailto:
info-vax...@info-vax.com] On Behalf Of
> Stephen Hoffman via Info-vax
> Sent: 02-Mar-16 11:39 AM
> To:
info...@info-vax.com
> Cc: Stephen Hoffman <seao...@hoffmanlabs.invalid>
> Subject: Re: [New Info-vax] VMS SSH2 experts, journaymen, hackers,
> and just about anyone else
>
> On 2016-03-02 15:08:33 +0000, Kerry Main said:
>
> > If this is the case, then this is likely a good example of not keeping
> > current with changing security standards.
>
> Yes, upgrading off of anything prior to OpenVMS V8.4 and getting to
> "current" versions and patches is important. But as for changing
> security standards? This is HPE OpenVMS. Which — off the top —
> features down-revision OpenSSL. Down-revision Apache. Down-
> revision
> ssh. Down-revision NTP. Down-revision Tomcat. Down-revision Java.
> Down-revision ISC BIND. Utterly unsupported CDSA as the "security"
> infrastructure, and which apparently led HPE to roll their own private
> replacement for the CDSA kit-signing infrastructure. A brand-new
> SMTP server that defaults to an open relay. Rather than one digital
> certificate infrastructure, OpenVMS has at least three completely
> disjoint and incomplete and manually-maintained and arcane digital
> certificate infrastructures. There's no full-disk encryption
> support. The patch infrastructure is manual, and multi-step, and with
> no integrated notifications.
>
> Need I keep going? Because I can...
>
mmm.. we all know that OpenVMS was basically ignored in terms of
investments in the later years of DEC, then Compaq, then HP. With
the addition of the many acquisitions HP made (43 when I left in 2012),
it's no wonder OpenVMS (and now HP-UX + NonStop), as well as other
traditional HP products & platforms slowly became less & less important.
Having stated this, the most recent roadmap from VSI has more new
significant updates on 1 page than the last 10 years under HP. Port to
X86-64, new file system, current version of Apache (likely within 4-6
weeks), Java V8, 64 core /1.5TB memory support, new TCPIP stack.
I'd rather glance at the rear view mirror once in a while, but the future
Is better handled looking forward through the front window.
> The security world does not work at the classic OpenVMS software
> development and deployment cycles, either. You're getting scanned for
> vulnerabilities before the patches are ready. The attackers have
> automated, and can scan the whole of the active IPv4 internet — from a
> single host — in about four minutes. The scans are faster than that,
> from a botnet. But I digress.
>
All platforms and all vendors have that challenge today. It's no secret
the Bots are out there working 24x7. Been doing that for years now. Heck,
my home firewall has GEO IP filtering and I see all of the failed attempts
from disallowed country IP's poking at my door. It’s a lot.
> Yes, VSI has more than a little fodder for enhancements and upgrades
> here.
>
Agree 100%. Onward and upward.
:-)
Btw, I am a big fan of Multinet, so my IP stack is pretty current in terms
of standards support. In addition, their current version V5.4 is supported
on VAX V7.3, Alpha V6.2+, IA64 8.2+ so interoperability with older VMS
systems and other OS platforms is very high.
Next version V5.5 of Multinet has completed public beta, so expect the full
V5.5 version to be available shortly. Here are V5.5 updates:
http://www.process.com/psc/products/multinet/multinet-55-beta-test/
Regards,
Kerry Main
Kerry dot main at starkgaming dot com