Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

"In the fight between you and the world, back the world." -- Frank Zappa


computers / comp.os.vms / Re: Kernel Transplantation

SubjectAuthor
* New CEO of VMS SoftwareSlo
+* Re: New CEO of VMS SoftwareArne Vajhøj
|`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
| `- Re: New CEO of VMS SoftwareArne Vajhøj
`* Re: New CEO of VMS SoftwareSimon Clubley
 +* Re: New CEO of VMS SoftwareArne Vajhøj
 |+* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||`* Re: New CEO of VMS SoftwareArne Vajhøj
 || `* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||  `* Re: New CEO of VMS SoftwareArne Vajhøj
 ||   `* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||    `* Re: New CEO of VMS SoftwareArne Vajhøj
 ||     `* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||      +* Re: New CEO of VMS SoftwareArne Vajhøj
 ||      |`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||      | `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      |  `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |   `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      |    `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |     +* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Dan Cross
 ||      |     |+* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |     ||`- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Dan Cross
 ||      |     |`- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)bill
 ||      |     `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      |      `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       +* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |+* Re: Kernel TransplantationMark Berryman
 ||      |       ||+- Re: Kernel TransplantationLawrence D'Oliveiro
 ||      |       ||`* Re: Kernel TransplantationSimon Clubley
 ||      |       || `- Re: Kernel TransplantationMark Berryman
 ||      |       |`* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       | `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  +* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |  |`* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  | +* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |  | |`* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  | | +- Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | | +* Re: Kernel TransplantationMark Berryman
 ||      |       |  | | |+- Re: Kernel TransplantationSimon Clubley
 ||      |       |  | | |+- Re: Kernel TransplantationDave Froble
 ||      |       |  | | |+- Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | | |+* Re: Kernel TransplantationLawrence D'Oliveiro
 ||      |       |  | | ||`* Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | | || +- Re: Kernel TransplantationLawrence D'Oliveiro
 ||      |       |  | | || `- Re: Kernel TransplantationDan Cross
 ||      |       |  | | |`- Re: Kernel TransplantationDan Cross
 ||      |       |  | | `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |  | |  `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  | |   `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |  | |    +- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Scott Dorsey
 ||      |       |  | |    `- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  | +* Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | |`* Re: Kernel TransplantationSimon Clubley
 ||      |       |  | | `- Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | +* Re: Kernel TransplantationDave Froble
 ||      |       |  | |`- Re: Kernel TransplantationSimon Clubley
 ||      |       |  | `* Re: Kernel TransplantationMark Berryman
 ||      |       |  |  `* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |   `* Re: Kernel TransplantationMark Berryman
 ||      |       |  |    `* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |     +* Re: Kernel TransplantationStephen Hoffman
 ||      |       |  |     |`- Re: Kernel TransplantationLawrence D'Oliveiro
 ||      |       |  |     `* Re: Kernel TransplantationMark Berryman
 ||      |       |  |      `* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |       `* Re: Kernel TransplantationMark Berryman
 ||      |       |  |        +* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |        |`* Re: Kernel TransplantationStephen Hoffman
 ||      |       |  |        | `- Re: Kernel TransplantationMark Berryman
 ||      |       |  |        `* Re: Kernel TransplantationArne Vajhøj
 ||      |       |  |         +- Re: Kernel TransplantationHans Bachner
 ||      |       |  |         `* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |          `- Re: Kernel TransplantationMark Berryman
 ||      |       |  `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |   `- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      |        `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |         `- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      `* Re: New CEO of VMS SoftwareDan Cross
 ||       +* Re: New CEO of VMS SoftwareArne Vajhøj
 ||       |`- Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       +* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       |+* Re: New CEO of VMS SoftwareDan Cross
 ||       ||`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || +* Re: New CEO of VMS SoftwareRobert A. Brooks
 ||       || |`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || | +* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || | |`* Re: New CEO of VMS SoftwareArne Vajhøj
 ||       || | | `* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || | |  +* Re: New CEO of VMS SoftwareDan Cross
 ||       || | |  |+- Re: New CEO of VMS SoftwareArne Vajhøj
 ||       || | |  |`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || | |  | `- Re: New CEO of VMS SoftwareDan Cross
 ||       || | |  `- Re: New CEO of VMS SoftwareArne Vajhøj
 ||       || | `* Re: 64-bit (was Re: New CEO of VMS Software)Stephen Hoffman
 ||       || |  +* Re: 64-bit (was Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||       || |  |+- Re: 64-bit (was Re: New CEO of VMS Software)Arne Vajhøj
 ||       || |  |`* Re: 64-bit (was Re: New CEO of VMS Software)Dave Froble
 ||       || |  | +- Re: 64-bit (was Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||       || |  | `* off topic: BASIC (was Re: 64-bit)mjos_examine
 ||       || |  |  +- Re: off topic: BASIC (was Re: 64-bit)Arne Vajhøj
 ||       || |  |  `* Re: BASIC (was Re: 64-bit)Lawrence D'Oliveiro
 ||       || |  +* Re: 64-bit (was Re: New CEO of VMS Software)Arne Vajhøj
 ||       || |  +* Re: 64-bit (was Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||       || |  `* Re: 64-bit (was Re: New CEO of VMS Software)Dave Froble
 ||       || +- Re: New CEO of VMS SoftwareDan Cross
 ||       || `- Re: New CEO of VMS SoftwareSingle Stage to Orbit
 ||       |`* Re: New CEO of VMS SoftwareArne Vajhøj
 ||       `* Re: New CEO of VMS Softwarebill
 |+- Re: New CEO of VMS SoftwareArne Vajhøj
 |`* Re: New CEO of VMS Softwaremjos_examine
 `* Re: New CEO of VMS SoftwareArne Vajhøj

Pages:123456789101112131415161718
Re: BSDs vs Linux (was Re: New CEO of VMS Software)

<uo74p9$1lkg8$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33133&group=comp.os.vms#33133

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arne@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: BSDs vs Linux (was Re: New CEO of VMS Software)
Date: Tue, 16 Jan 2024 18:51:03 -0500
Organization: A noiseless patient Spider
Lines: 34
Message-ID: <uo74p9$1lkg8$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<uo4dle$13tot$1@dont-email.me> <uo4k33$4kf$1@panix2.panix.com>
<uo4l7m$14taq$1@dont-email.me> <uo4s2g$4dt$1@panix2.panix.com>
<uo60k6$1f897$1@dont-email.me> <uo6s3k$1k5at$5@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 16 Jan 2024 23:51:05 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="ea9bc3262920cec13cfaab586907029d";
logging-data="1757704"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18x/C8dEBJ81qM+aZZrg/wgWLOgx0/fsYk="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:gTvuIFjoo9I85niLcg8I4qNG8f0=
Content-Language: en-US
In-Reply-To: <uo6s3k$1k5at$5@dont-email.me>
 by: Arne Vajhøj - Tue, 16 Jan 2024 23:51 UTC

On 1/16/2024 4:23 PM, Lawrence D'Oliveiro wrote:
> On Tue, 16 Jan 2024 13:33:58 -0000 (UTC), Simon Clubley wrote:
>> However, when he is not making some crazy out of touch
>> comments, such as replicating the VMS APIs on Linux work ...
>
> Consider that the entirety of the VMS APIs add up to only a tiny fraction
> of the Windows APIs. Yet an emulation layer for Windows (WINE) has been
> successfully built on Linux, and is actually seeing some production use.

If the expectation is that:

systems running emulated VMS on top of Linux / systems running actual VMS

=

systems running Windows server apps on Wine on Linux / systems running
real Windows Server

then that confirms that there are no business case.

> And this was done with only a fraction of the resources available to VSI.

That would be a pretty big fraction.

According to Github then Wine has 873 contributors. Not all active
every year and definitely not full time.

But compared to VSI VMS engineering team (that excludes management,
sales people, compiler engineering teams and other applications
engineering teams) then the fraction must still be like 5/1 or 10/1.

Arne

Re: BSDs vs Linux (was Re: New CEO of VMS Software)

<uo74rp$ar1$1@panix2.panix.com>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33134&group=comp.os.vms#33134

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!newsfeed.endofthelinebbs.com!panix!.POSTED.panix2.panix.com!panix2.panix.com!not-for-mail
From: kludge@panix.com (Scott Dorsey)
Newsgroups: comp.os.vms
Subject: Re: BSDs vs Linux (was Re: New CEO of VMS Software)
Date: 16 Jan 2024 23:52:25 -0000
Organization: Former users of Netcom shell (1989-2000)
Lines: 16
Message-ID: <uo74rp$ar1$1@panix2.panix.com>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <uo4a3n$13d5q$1@dont-email.me> <uo5vjd$1evpp$2@dont-email.me> <uo6s0o$1k5at$4@dont-email.me>
Injection-Info: reader1.panix.com; posting-host="panix2.panix.com:166.84.1.2";
logging-data="10121"; mail-complaints-to="abuse@panix.com"
 by: Scott Dorsey - Tue, 16 Jan 2024 23:52 UTC

Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>On Tue, 16 Jan 2024 13:16:29 -0000 (UTC), Simon Clubley wrote:
>
>> The problem with that is that you need to rebuild the kernel everytime
>> there is a kernel security update.
>
>Somebody has to, anyway, for security bugs in the core. Building your own
>kernel really isn’t that big a deal. And remember, it’s your choice
>whether to use an off-the-shelf kernel or not.

Only ONE person has to. It's not like modern Unix and Linux users have to do
a SYSGEN with every kernel patch or every time a device is added or removed.
Modloading is a cool thing.
--scott
--
"C'est un Nagra. C'est suisse, et tres, tres precis."

Re: New CEO of VMS Software

<uo74tn$1cang$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33135&group=comp.os.vms#33135

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: news@cct-net.co.uk (Chris Townley)
Newsgroups: comp.os.vms
Subject: Re: New CEO of VMS Software
Date: Tue, 16 Jan 2024 23:53:26 +0000
Organization: A noiseless patient Spider
Lines: 13
Message-ID: <uo74tn$1cang$1@dont-email.me>
References: <unf485$174pb$5@dont-email.me>
<memo.20240107213108.16260u@jgd.cix.co.uk> <unfa5g$af6$2@reader1.panix.com>
<unfcju$11pba$2@dont-email.me> <uo6ru6$1k5at$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 16 Jan 2024 23:53:27 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="d952549e21fa08d94a2ea2f739c54de9";
logging-data="1452784"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+fhSMDXkwqwunnpyn1wjIATjDwoRF+Xq0="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:xGnekjTN7P8qjfV5LoDs0LuBidU=
Content-Language: en-GB
In-Reply-To: <uo6ru6$1k5at$3@dont-email.me>
 by: Chris Townley - Tue, 16 Jan 2024 23:53 UTC

On 16/01/2024 21:20, Lawrence D'Oliveiro wrote:
> On Sun, 7 Jan 2024 23:37:34 +0000, Chris Townley wrote:
>
>> There are plenty of good engineers at Raspberry
>
> And yet it was none of them that created Raspbian, to begin with.

They don't use raspian any more. They use Debian, but add quite a few
extra bits, and patches for raspberry pi architecture

--
Chris

Re: BSDs vs Linux (was Re: New CEO of VMS Software)

<uo754l$b2v$1@reader1.panix.com>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33136&group=comp.os.vms#33136

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.bbs.nz!news.quux.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cross@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: BSDs vs Linux (was Re: New CEO of VMS Software)
Date: Tue, 16 Jan 2024 23:57:09 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <uo754l$b2v$1@reader1.panix.com>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <uo60k6$1f897$1@dont-email.me> <uo6s3k$1k5at$5@dont-email.me> <uo74p9$1lkg8$1@dont-email.me>
Injection-Date: Tue, 16 Jan 2024 23:57:09 -0000 (UTC)
Injection-Info: reader1.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="11359"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Tue, 16 Jan 2024 23:57 UTC

In article <uo74p9$1lkg8$1@dont-email.me>,
Arne Vajhøj <arne@vajhoej.dk> wrote:
>On 1/16/2024 4:23 PM, Lawrence D'Oliveiro wrote:
>[snip]
>> And this was done with only a fraction of the resources available to VSI.
>
>That would be a pretty big fraction.
>
>According to Github then Wine has 873 contributors. Not all active
>every year and definitely not full time.
>
>But compared to VSI VMS engineering team (that excludes management,
>sales people, compiler engineering teams and other applications
>engineering teams) then the fraction must still be like 5/1 or 10/1.

Please don't feed the troll.

- Dan C.

Re: New CEO of VMS Software

<uo7831$1m0or$2@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33137&group=comp.os.vms#33137

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.os.vms
Subject: Re: New CEO of VMS Software
Date: Wed, 17 Jan 2024 00:47:29 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 15
Message-ID: <uo7831$1m0or$2@dont-email.me>
References: <unf485$174pb$5@dont-email.me>
<memo.20240107213108.16260u@jgd.cix.co.uk> <unfa5g$af6$2@reader1.panix.com>
<unfcju$11pba$2@dont-email.me> <uo6ru6$1k5at$3@dont-email.me>
<uo74tn$1cang$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 17 Jan 2024 00:47:29 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="71e924a53864396a82a319f1f0d5bb71";
logging-data="1770267"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+Atwfsjn5pcvLqVIWCYmr8"
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Cancel-Lock: sha1:CE8KH6PcQx9rapypdlJzWe0V6iY=
 by: Lawrence D'Oliv - Wed, 17 Jan 2024 00:47 UTC

On Tue, 16 Jan 2024 23:53:26 +0000, Chris Townley wrote:

> On 16/01/2024 21:20, Lawrence D'Oliveiro wrote:
>
>> On Sun, 7 Jan 2024 23:37:34 +0000, Chris Townley wrote:
>>
>>> There are plenty of good engineers at Raspberry
>>
>> And yet it was none of them that created Raspbian, to begin with.
>
> They don't use raspian any more. They use Debian, but add quite a few
> extra bits, and patches for raspberry pi architecture

That is what “Raspbian” is. As I mentioned before, it’s now called
“Raspberry Pi OS”.

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uo8jm3$20n2e$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33140&group=comp.os.vms#33140

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: Wed, 17 Jan 2024 13:11:31 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 31
Message-ID: <uo8jm3$20n2e$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me>
Injection-Date: Wed, 17 Jan 2024 13:11:31 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="4696af6deabbcd262987807b376ede2d";
logging-data="2120782"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX191nPFlWUKduKfgpFjxlzoydSr4EumrXSw="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:Lcx74gZp0IYtSkLGYBjt3aGPcQ4=
 by: Simon Clubley - Wed, 17 Jan 2024 13:11 UTC

On 2024-01-16, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
> On Thu, 11 Jan 2024 13:48:37 -0000 (UTC), Simon Clubley wrote:
>
>> On 2024-01-10, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>>>
>>> Nowadays, the whole Internet is built on the concept of running secure
>>> protocols over insecure channels. Those secure protocols can in turn be
>>> channels for older, insecure protocols--this is not rocket science.
>>
>> Things like SSL only protect data in motion. It does nothing to help you
>> if the server software on the receiving end of that SSL connection has a
>> vulnerability within it.
>
> Not sure why that?s relevant to the issue of whether to support DECnet or
> not.

The server software with the vulnerability could be the DECnet stack
running on that server.

BTW, has anyone been able to do a $ show proc/priv against the EVL listener
PID and are you able to post the output ?

I notice that no-one, including Mark yet, has posted this, so I wonder
just how many of you are actually running the DECnet Phase IV stack on
your machines.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uo9csc$26bvc$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33151&group=comp.os.vms#33151

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: Wed, 17 Jan 2024 20:21:32 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 25
Message-ID: <uo9csc$26bvc$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 17 Jan 2024 20:21:32 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="71e924a53864396a82a319f1f0d5bb71";
logging-data="2306028"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19b4RObo+mmAtokSPEtCtzZ"
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Cancel-Lock: sha1:WEeIu5pAONeuWcDRAB1TA8atwZE=
 by: Lawrence D'Oliv - Wed, 17 Jan 2024 20:21 UTC

On Wed, 17 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:

> On 2024-01-16, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>
>> On Thu, 11 Jan 2024 13:48:37 -0000 (UTC), Simon Clubley wrote:
>>
>>> On 2024-01-10, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>>>>
>>>> Nowadays, the whole Internet is built on the concept of running
>>>> secure protocols over insecure channels. Those secure protocols can
>>>> in turn be channels for older, insecure protocols--this is not rocket
>>>> science.
>>>
>>> Things like SSL only protect data in motion. It does nothing to help
>>> you if the server software on the receiving end of that SSL connection
>>> has a vulnerability within it.
>>
>> Not sure why that’s relevant to the issue of whether to support DECnet
>> or not.
>
> The server software with the vulnerability could be the DECnet stack
> running on that server.

Any reason why you think DECnet is particularly prone to introducing
security holes, per se?

Re: Kernel Transplantation

<uo9rqn$28ehn$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33165&group=comp.os.vms#33165

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arne@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Wed, 17 Jan 2024 19:36:38 -0500
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <uo9rqn$28ehn$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 18 Jan 2024 00:36:39 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6806900df0d41620935ae3fe0cde946c";
logging-data="2374199"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+Wt33iHTmroI19GI94Wvw+jed84HS1pz4="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:RhdmDlz1/g+LTf+hLHs9QZb27fk=
Content-Language: en-US
In-Reply-To: <uo8jm3$20n2e$1@dont-email.me>
 by: Arne Vajhøj - Thu, 18 Jan 2024 00:36 UTC

On 1/17/2024 8:11 AM, Simon Clubley wrote:
> BTW, has anyone been able to do a $ show proc/priv against the EVL listener
> PID and are you able to post the output ?

Full priv on my VMS 8.4-2L2 Alpha and 9.2-1 x86-64.

> I notice that no-one, including Mark yet, has posted this, so I wonder
> just how many of you are actually running the DECnet Phase IV stack on
> your machines.

Among hobbyists I expect most to have DECnet installed - to get
"the real VMS experience". And 20 years ago many would have went
with V, but today I think a lot just go with IV because it is
simpler and does what they need.

For real use there are probably more TCP/IP only among the
newly installed systems while the older systems probably have
either V or IV installed.

Arne

Re: Kernel Transplantation

<uoa38v$2d72i$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33170&group=comp.os.vms#33170

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!usenet.network!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: davef@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Wed, 17 Jan 2024 21:43:42 -0500
Organization: A noiseless patient Spider
Lines: 99
Message-ID: <uoa38v$2d72i$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 18 Jan 2024 02:43:43 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="d42c6b8185cac55e8d3849127dac6ca4";
logging-data="2530386"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/C6cNxJuKIImRWu8nRuorAXnIbpN0kAjs="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:qn9ftSREz/2TdqO4S6Qg58le6GQ=
In-Reply-To: <uo8jm3$20n2e$1@dont-email.me>
 by: Dave Froble - Thu, 18 Jan 2024 02:43 UTC

On 1/17/2024 8:11 AM, Simon Clubley wrote:
> On 2024-01-16, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>> On Thu, 11 Jan 2024 13:48:37 -0000 (UTC), Simon Clubley wrote:
>>
>>> On 2024-01-10, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>>>>
>>>> Nowadays, the whole Internet is built on the concept of running secure
>>>> protocols over insecure channels. Those secure protocols can in turn be
>>>> channels for older, insecure protocols--this is not rocket science.
>>>
>>> Things like SSL only protect data in motion. It does nothing to help you
>>> if the server software on the receiving end of that SSL connection has a
>>> vulnerability within it.
>>
>> Not sure why that?s relevant to the issue of whether to support DECnet or
>> not.
>
> The server software with the vulnerability could be the DECnet stack
> running on that server.
>
> BTW, has anyone been able to do a $ show proc/priv against the EVL listener
> PID and are you able to post the output ?
>
> I notice that no-one, including Mark yet, has posted this, so I wonder
> just how many of you are actually running the DECnet Phase IV stack on
> your machines.
>
> Simon.
>

Well, rather old, on a VAX/VMS V7.2 system.

$ show proc/priv/id=90

17-JAN-2024 21:37:35.63 User: DECNET Process ID: 00000090
Node: DFE90A Process name: "EVL"

Authorized privileges:
ACNT ALLSPOOL ALTPRI AUDIT BUGCHK BYPASS CMEXEC CMKRNL
IMPERSONATDIAGNOSE DOWNGRADE EXQUOTA GROUP GRPNAM GRPPRV IMPORT
LOG_IO MOUNT NETMBX OPER PFNMAP PHY_IO PRMCEB PRMGBL
PRMMBX PSWAPM READALL SECURITY SETPRV SHARE SHMEM SYSGBL
SYSLCK SYSNAM SYSPRV TMPMBX UPGRADE VOLPRO WORLD

Process privileges:
ACNT may suppress accounting messages
ALLSPOOL may allocate spooled device
ALTPRI may set any priority value
AUDIT may direct audit to system security audit log
BUGCHK may make bug check log entries
BYPASS may bypass all object access controls
CMEXEC may change mode to exec
CMKRNL may change mode to kernel
IMPERSONATE may impersonate another user
DIAGNOSE may diagnose devices
DOWNGRADE may downgrade object secrecy
EXQUOTA may exceed disk quota
GROUP may affect other processes in same group
GRPNAM may insert in group logical name table
GRPPRV may access group objects via system protection
IMPORT may set classification for unlabeled object
LOG_IO may do logical i/o
MOUNT may execute mount acp function
NETMBX may create network device
OPER may perform operator functions
PFNMAP may map to specific physical pages
PHY_IO may do physical i/o
PRMCEB may create permanent common event clusters
PRMGBL may create permanent global sections
PRMMBX may create permanent mailbox
PSWAPM may change process swap mode
READALL may read anything as the owner
SECURITY may perform security administration functions
SETPRV may set any privilege bit
SHARE may assign channels to non-shared devices
SHMEM may create/delete objects in shared memory
SYSGBL may create system wide global sections
SYSLCK may lock system wide resources
SYSNAM may insert in system logical name table
SYSPRV may access objects via system protection
TMPMBX may create temporary mailbox
UPGRADE may upgrade object integrity
VOLPRO may override volume protection
WORLD may affect other processes in the world

Process rights:
SYSTEM resource
BATCH

System rights:
SYS$NODE_DFE90A

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uob7oc$2jji6$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33175&group=comp.os.vms#33175

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: Thu, 18 Jan 2024 13:06:21 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 16
Message-ID: <uob7oc$2jji6$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uo9csc$26bvc$1@dont-email.me>
Injection-Date: Thu, 18 Jan 2024 13:06:21 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="844477ba3d1e29d6a6b7a8d816bc570b";
logging-data="2739782"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+uhPx+e3iZLvJvktGcQqPkxYie7TvjNdE="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:6hFliXZsm/9sfL/k1KrDJBYQRos=
 by: Simon Clubley - Thu, 18 Jan 2024 13:06 UTC

On 2024-01-17, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
> On Wed, 17 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>> The server software with the vulnerability could be the DECnet stack
>> running on that server.
>
> Any reason why you think DECnet is particularly prone to introducing
> security holes, per se?

Because, at best, it has only had a very small fraction of the effort
spent on probing it that the mainstream network stacks have had.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation

<uob8ei$2jnoi$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33176&group=comp.os.vms#33176

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 13:18:10 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 30
Message-ID: <uob8ei$2jnoi$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uo9rqn$28ehn$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 18 Jan 2024 13:18:10 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="844477ba3d1e29d6a6b7a8d816bc570b";
logging-data="2744082"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+qvItsYewDRr1tOat6edgskRuB26qczhM="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:7MYR4a9shi/K1LzRoWdvhj9KuRQ=
 by: Simon Clubley - Thu, 18 Jan 2024 13:18 UTC

On 2024-01-17, Arne Vajhøj <arne@vajhoej.dk> wrote:
> On 1/17/2024 8:11 AM, Simon Clubley wrote:
>> BTW, has anyone been able to do a $ show proc/priv against the EVL listener
>> PID and are you able to post the output ?
>
> Full priv on my VMS 8.4-2L2 Alpha and 9.2-1 x86-64.
>

Thank you for checking Arne. Seeing this still being the case on x86-64
was an unpleasant surprise.

So, that's two full years VSI have had to look at this and they have
done nothing.

I wonder if they are sitting on any other issues that are just a weakness
at the moment, but may become an actual vulnerability if either further
probing is done, or if another unrelated issue is discovered and these
are chained together with that new issue.

For those of you with the premium support contracts who are worried about
this, then a formal _polite_ request to VSI to answer the above question
and to ask when the DECnet issues will be fixed might be in order.

You may have more luck getting them to fix these issues than I have had.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation

<uob8j7$2jnoi$2@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33177&group=comp.os.vms#33177

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 13:20:40 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <uob8j7$2jnoi$2@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uoa38v$2d72i$1@dont-email.me>
Injection-Date: Thu, 18 Jan 2024 13:20:40 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="844477ba3d1e29d6a6b7a8d816bc570b";
logging-data="2744082"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18slO0+Ii64X06xPRrfllVPJDeYly1HVzU="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:gikzGy0ytX14s92k46IBR7aGtuQ=
 by: Simon Clubley - Thu, 18 Jan 2024 13:20 UTC

On 2024-01-17, Dave Froble <davef@tsoft-inc.com> wrote:
>
> Well, rather old, on a VAX/VMS V7.2 system.
>
> $ show proc/priv/id=90
>
> 17-JAN-2024 21:37:35.63 User: DECNET Process ID: 00000090
> Node: DFE90A Process name: "EVL"
>
> Authorized privileges:
> ACNT ALLSPOOL ALTPRI AUDIT BUGCHK BYPASS CMEXEC CMKRNL
> IMPERSONATDIAGNOSE DOWNGRADE EXQUOTA GROUP GRPNAM GRPPRV IMPORT
> LOG_IO MOUNT NETMBX OPER PFNMAP PHY_IO PRMCEB PRMGBL
> PRMMBX PSWAPM READALL SECURITY SETPRV SHARE SHMEM SYSGBL
> SYSLCK SYSNAM SYSPRV TMPMBX UPGRADE VOLPRO WORLD
>

[snip]

Thank you for checking David. I wonder when VSI will get around to finally
fixing these issues ?

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation

<uob9b4$2jn7j$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33179&group=comp.os.vms#33179

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arne@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 08:33:24 -0500
Organization: A noiseless patient Spider
Lines: 32
Message-ID: <uob9b4$2jn7j$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 18 Jan 2024 13:33:24 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6806900df0d41620935ae3fe0cde946c";
logging-data="2743539"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19P4xtkH64J/MJktUoLyIlu7t4K16mFeyo="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:ZD5uDqniav7IPz7vGplx/KHeqmY=
In-Reply-To: <uob7oc$2jji6$1@dont-email.me>
Content-Language: en-US
 by: Arne Vajhøj - Thu, 18 Jan 2024 13:33 UTC

On 1/18/2024 8:06 AM, Simon Clubley wrote:
> On 2024-01-17, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>> On Wed, 17 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>>> The server software with the vulnerability could be the DECnet stack
>>> running on that server.
>>
>> Any reason why you think DECnet is particularly prone to introducing
>> security holes, per se?
>
> Because, at best, it has only had a very small fraction of the effort
> spent on probing it that the mainstream network stacks have had.

Less probing and less evolution.

I don't think DECnet phase IV was worse than other networking
at the time (late 70's to early 90's). But other networking
which ended up being almost entirely TCP/IP evolved.

I don't know if phase V had better options that just did
not materialize because everyone only used the phase IV
compatibility stuff in phase V.

But if DEC and VMS had evolved like the rest of the IT world
then we would have been at phase VII or VIII now - and I am
sure that it would have been much better security wise.

Well - back to the real world. DECnet is old and has not
evolved.

Arne

Re: Kernel Transplantation

<uob9j7$2jn7j$2@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33180&group=comp.os.vms#33180

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arne@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 08:37:43 -0500
Organization: A noiseless patient Spider
Lines: 37
Message-ID: <uob9j7$2jn7j$2@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uo9rqn$28ehn$1@dont-email.me> <uob8ei$2jnoi$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 18 Jan 2024 13:37:43 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6806900df0d41620935ae3fe0cde946c";
logging-data="2743539"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX188HfX14f3xT/R5CIXWaghrTyT9aC8fKnY="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:dnwMO07Cf74vJppggM725NpAWH4=
In-Reply-To: <uob8ei$2jnoi$1@dont-email.me>
Content-Language: en-US
 by: Arne Vajhøj - Thu, 18 Jan 2024 13:37 UTC

On 1/18/2024 8:18 AM, Simon Clubley wrote:
> On 2024-01-17, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> On 1/17/2024 8:11 AM, Simon Clubley wrote:
>>> BTW, has anyone been able to do a $ show proc/priv against the EVL listener
>>> PID and are you able to post the output ?
>>
>> Full priv on my VMS 8.4-2L2 Alpha and 9.2-1 x86-64.
>
> Thank you for checking Arne. Seeing this still being the case on x86-64
> was an unpleasant surprise.
>
> So, that's two full years VSI have had to look at this and they have
> done nothing.
>
> I wonder if they are sitting on any other issues that are just a weakness
> at the moment, but may become an actual vulnerability if either further
> probing is done, or if another unrelated issue is discovered and these
> are chained together with that new issue.
>
> For those of you with the premium support contracts who are worried about
> this, then a formal _polite_ request to VSI to answer the above question
> and to ask when the DECnet issues will be fixed might be in order.
>
> You may have more luck getting them to fix these issues than I have had.

VSI has to prioritize engineering resources.

I think it would be hard to justify prioritizing DECnet
enhancements.

Customers will have to decide whether to drop DECnet
completely or perform sufficient mitigation to consider
the risk lowered to an acceptable level in their context.

Arne

Re: Kernel Transplantation

<uobl4r$2lupm$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33183&group=comp.os.vms#33183

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mark@theberrymans.com (Mark Berryman)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 09:54:49 -0700
Organization: A noiseless patient Spider
Lines: 52
Message-ID: <uobl4r$2lupm$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 18 Jan 2024 16:54:51 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="69fde297928b38c6556e90b635e64f8e";
logging-data="2816822"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX196EP9Q0Ow3TDzmeUhADzySmSaCfdehUtI="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:enUhR0AE5henFjG9wn6v2X4ltIo=
Content-Language: en-US
In-Reply-To: <uo8jm3$20n2e$1@dont-email.me>
 by: Mark Berryman - Thu, 18 Jan 2024 16:54 UTC

On 1/17/24 6:11 AM, Simon Clubley wrote:
> On 2024-01-16, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>> On Thu, 11 Jan 2024 13:48:37 -0000 (UTC), Simon Clubley wrote:
>>
>>> On 2024-01-10, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>>>>
>>>> Nowadays, the whole Internet is built on the concept of running secure
>>>> protocols over insecure channels. Those secure protocols can in turn be
>>>> channels for older, insecure protocols--this is not rocket science.
>>>
>>> Things like SSL only protect data in motion. It does nothing to help you
>>> if the server software on the receiving end of that SSL connection has a
>>> vulnerability within it.
>>
>> Not sure why that?s relevant to the issue of whether to support DECnet or
>> not.
>
> The server software with the vulnerability could be the DECnet stack
> running on that server.
>
> BTW, has anyone been able to do a $ show proc/priv against the EVL listener
> PID and are you able to post the output ?
>
> I notice that no-one, including Mark yet, has posted this, so I wonder
> just how many of you are actually running the DECnet Phase IV stack on
> your machines.

Sorry, I am only infrequently on this forum.

On my system EVL runs with exactly the privs I specified earlier but I
did do some digging.

EVL is started by netacp in whatever account netacp is running using the
command file sys$system:evl.com. EVL neither raises nor lowers privs.
The startup command file normally looks like this:
$ ! Copyright (c) 1987 Digital Equipment Corporation. All rights reserved.
$ SET NOON
$ IF "''EVL$COMMAND'" .NES. "" THEN EVL$COMMAND
$ RUN SYS$SYSTEM:EVL
$ PURGE/KEEP=3 EVL.LOG
$ LOGOUT/BRIEF

However, sometime in the dim and distant past (meaning I no longer
remember when or why) I inserted this line:

$ SET PROCESS/PRIVILEGES=(NOALL,SYSNAM,OPER,SYSPRV,NETMBX,TMPMBX)

which is why EVL is limited in privs on my system. Anyone concerned can
make the same edit.

Mark Berryman

Re: Kernel Transplantation

<uobmub$2m944$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33184&group=comp.os.vms#33184

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mark@theberrymans.com (Mark Berryman)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 10:25:29 -0700
Organization: A noiseless patient Spider
Lines: 53
Message-ID: <uobmub$2m944$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 18 Jan 2024 17:25:31 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="69fde297928b38c6556e90b635e64f8e";
logging-data="2827396"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19mkGkSbquYJYEaNhqf53gxEwiZVt6K3xM="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:nq2ErqE5jR5A8SpPocTqiS/JjoA=
In-Reply-To: <uob7oc$2jji6$1@dont-email.me>
Content-Language: en-US
 by: Mark Berryman - Thu, 18 Jan 2024 17:25 UTC

On 1/18/24 6:06 AM, Simon Clubley wrote:
> On 2024-01-17, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>> On Wed, 17 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>>> The server software with the vulnerability could be the DECnet stack
>>> running on that server.
>>
>> Any reason why you think DECnet is particularly prone to introducing
>> security holes, per se?
>
> Because, at best, it has only had a very small fraction of the effort
> spent on probing it that the mainstream network stacks have had.

Simon's postings would tend to indicate that he believes that anything
not subject to constant probing by hundreds or thousands of hack.., er,
security researchers is just full of latent bugs waiting to be discovered.

It might help to remember that the IP stack was designed by committee
and implemented by an even more diverse group, some good at programming,
some not so much. DECnet, however, was designed and implemented by a
much smaller group, which often leads to much better code. I suspect,
but don't know for sure, that the designers and implementers were also
essentially the same people. (They were also very good).

Also, once upon a time, DECnet was a more diverse network than the
internet. Until the internet went public in the early 90s, it was quite
limited in scope, consisting mainly of some government institutions,
some government contractors, and some universities. DECnet, however,
was used to implement a number of world-wide networks consisting of many
diverse endpoints. There was some probing that went on but not a whole
lot. For one, with DECnet the source was too easy to trace and, for
another, if any of the probes were successful I never heard of it (I was
on SPAN at the time). This was all DECnet phase IV. After the internet
went public, these networks ran multiple protocols in parallel,
including TCP/IP and DECnet. As DEC equipment was phased out at these
sites, so was DECnet. But it somehow managed to survive without issue
all those years. (The only known problems were caused by local
misconfigurations by people who didn't read the manual and simply
accepted defaults that should have been better. None were cause by the
stack itself.)

Finally, as I mentioned in an earlier post, it is trivial in today's
world to isolate one's DECnet stack from anything other than trusted
hosts. On any network where I have been involved, it some host were
compromised, and if that host were to try to probe DECnet, none of its
packets would even reach the DECnet interface of any host that was
actually running DECnet.

There are, after all, many ways to implement security.

My two cents.

Mark Berryman

Re: Kernel Transplantation

<uobr6j$2mtfn$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33185&group=comp.os.vms#33185

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 18:38:11 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 35
Message-ID: <uobr6j$2mtfn$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uobl4r$2lupm$1@dont-email.me>
Injection-Date: Thu, 18 Jan 2024 18:38:11 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="844477ba3d1e29d6a6b7a8d816bc570b";
logging-data="2848247"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19uBv+oCiCBOn06X3jR8hd6cvNYYGV6IF8="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:wA9/7QvTaoTHgRwoKN3+e5py8Jg=
 by: Simon Clubley - Thu, 18 Jan 2024 18:38 UTC

On 2024-01-18, Mark Berryman <mark@theberrymans.com> wrote:
>
> Sorry, I am only infrequently on this forum.
>
> On my system EVL runs with exactly the privs I specified earlier but I
> did do some digging.
>
> EVL is started by netacp in whatever account netacp is running using the
> command file sys$system:evl.com. EVL neither raises nor lowers privs.
> The startup command file normally looks like this:
> $ ! Copyright (c) 1987 Digital Equipment Corporation. All rights reserved.
> $ SET NOON
> $ IF "''EVL$COMMAND'" .NES. "" THEN EVL$COMMAND
> $ RUN SYS$SYSTEM:EVL
> $ PURGE/KEEP=3 EVL.LOG
> $ LOGOUT/BRIEF
>
> However, sometime in the dim and distant past (meaning I no longer
> remember when or why) I inserted this line:
>
> $ SET PROCESS/PRIVILEGES=(NOALL,SYSNAM,OPER,SYSPRV,NETMBX,TMPMBX)
>
> which is why EVL is limited in privs on my system. Anyone concerned can
> make the same edit.
>

Because that command is being run in the same process as the EVL listener
it will not help constrain an attacker. This is because all an attacker
needs to do in their shellcode is to reenable those privileges.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation

<uobrik$2mtfn$2@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33186&group=comp.os.vms#33186

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 18:44:36 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 28
Message-ID: <uobrik$2mtfn$2@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me> <uobmub$2m944$1@dont-email.me>
Injection-Date: Thu, 18 Jan 2024 18:44:36 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="844477ba3d1e29d6a6b7a8d816bc570b";
logging-data="2848247"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/jInPGhBuC057rvxWIpEG+RGm1ThD2nMw="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:X1qEz46LcWAu+eE2T+Zimz4T72k=
 by: Simon Clubley - Thu, 18 Jan 2024 18:44 UTC

On 2024-01-18, Mark Berryman <mark@theberrymans.com> wrote:
> On 1/18/24 6:06 AM, Simon Clubley wrote:
>> On 2024-01-17, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>>> On Wed, 17 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>>>> The server software with the vulnerability could be the DECnet stack
>>>> running on that server.
>>>
>>> Any reason why you think DECnet is particularly prone to introducing
>>> security holes, per se?
>>
>> Because, at best, it has only had a very small fraction of the effort
>> spent on probing it that the mainstream network stacks have had.
>
> Simon's postings would tend to indicate that he believes that anything
> not subject to constant probing by hundreds or thousands of hack.., er,
> security researchers is just full of latent bugs waiting to be discovered.
>

Simon's relatively quick research into DECnet a couple of years ago would
seem to indicate that he has a point... :-)

Simon.

PS: $ set response/mode=good_natured :-)

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation

<uoc1ds$2o1os$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33187&group=comp.os.vms#33187

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: davef@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 15:24:28 -0500
Organization: A noiseless patient Spider
Lines: 65
Message-ID: <uoc1ds$2o1os$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me>
<uobmub$2m944$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 18 Jan 2024 20:24:28 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="d42c6b8185cac55e8d3849127dac6ca4";
logging-data="2885404"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18//AEBs5sOwr+3kuthCndXb9zEAQOIjgQ="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:5LKw20ZxHLLpDOmtww9FqdKm+cU=
In-Reply-To: <uobmub$2m944$1@dont-email.me>
 by: Dave Froble - Thu, 18 Jan 2024 20:24 UTC

On 1/18/2024 12:25 PM, Mark Berryman wrote:
> On 1/18/24 6:06 AM, Simon Clubley wrote:
>> On 2024-01-17, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>>> On Wed, 17 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>>>> The server software with the vulnerability could be the DECnet stack
>>>> running on that server.
>>>
>>> Any reason why you think DECnet is particularly prone to introducing
>>> security holes, per se?
>>
>> Because, at best, it has only had a very small fraction of the effort
>> spent on probing it that the mainstream network stacks have had.
>
> Simon's postings would tend to indicate that he believes that anything not
> subject to constant probing by hundreds or thousands of hack.., er, security
> researchers is just full of latent bugs waiting to be discovered.

No, really? Someone else noticed this? And here I thought it was just me ..

> It might help to remember that the IP stack was designed by committee and
> implemented by an even more diverse group, some good at programming, some not so
> much. DECnet, however, was designed and implemented by a much smaller group,
> which often leads to much better code. I suspect, but don't know for sure, that
> the designers and implementers were also essentially the same people. (They
> were also very good).

Well, it does work well, for what it does.

> Also, once upon a time, DECnet was a more diverse network than the internet.
> Until the internet went public in the early 90s, it was quite limited in scope,
> consisting mainly of some government institutions, some government contractors,
> and some universities. DECnet, however, was used to implement a number of
> world-wide networks consisting of many diverse endpoints. There was some
> probing that went on but not a whole lot. For one, with DECnet the source was
> too easy to trace and, for another, if any of the probes were successful I never
> heard of it (I was on SPAN at the time). This was all DECnet phase IV. After
> the internet went public, these networks ran multiple protocols in parallel,
> including TCP/IP and DECnet. As DEC equipment was phased out at these sites, so
> was DECnet. But it somehow managed to survive without issue all those years.
> (The only known problems were caused by local misconfigurations by people who
> didn't read the manual and simply accepted defaults that should have been
> better. None were cause by the stack itself.)

Sure, blame the user (guilty) ...

> Finally, as I mentioned in an earlier post, it is trivial in today's world to
> isolate one's DECnet stack from anything other than trusted hosts. On any
> network where I have been involved, it some host were compromised, and if that
> host were to try to probe DECnet, none of its packets would even reach the
> DECnet interface of any host that was actually running DECnet.
>
> There are, after all, many ways to implement security.
>
> My two cents.
>
> Mark Berryman
>

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: Kernel Transplantation

<uoc1on$2o4bi$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33188&group=comp.os.vms#33188

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arne@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 15:30:15 -0500
Organization: A noiseless patient Spider
Lines: 21
Message-ID: <uoc1on$2o4bi$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me>
<uobmub$2m944$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 18 Jan 2024 20:30:15 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6806900df0d41620935ae3fe0cde946c";
logging-data="2888050"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19c5H5fnFJbfM9aWBfVFe4aJjYPhj+MGOs="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:r6v5KgY3+x1ttd1c6Cp20wY2yn0=
Content-Language: en-US
In-Reply-To: <uobmub$2m944$1@dont-email.me>
 by: Arne Vajhøj - Thu, 18 Jan 2024 20:30 UTC

On 1/18/2024 12:25 PM, Mark Berryman wrote:
> Finally, as I mentioned in an earlier post, it is trivial in today's
> world to isolate one's DECnet stack from anything other than trusted
> hosts.  On any network where I have been involved, it some host were
> compromised, and if that host were to try to probe DECnet, none of its
> packets would even reach the DECnet interface of any host that was
> actually running DECnet.

Common practice.

And considered good enough for years.

But it may not continue so - ZTN is in fashion.

Arne

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uoc23d$2o6et$2@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33189&group=comp.os.vms#33189

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: Thu, 18 Jan 2024 20:35:57 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 16
Message-ID: <uoc23d$2o6et$2@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 18 Jan 2024 20:35:57 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="f05da8d0375bd152ab59cb890d40489a";
logging-data="2890205"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18UCuelG+6HWphf4G9HzLkc"
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Cancel-Lock: sha1:99xdi3+fXRFaiOLPnppKRb3paMQ=
 by: Lawrence D'Oliv - Thu, 18 Jan 2024 20:35 UTC

On Thu, 18 Jan 2024 13:06:21 -0000 (UTC), Simon Clubley wrote:

> On 2024-01-17, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>
>> On Wed, 17 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>>> The server software with the vulnerability could be the DECnet stack
>>> running on that server.
>>
>> Any reason why you think DECnet is particularly prone to introducing
>> security holes, per se?
>
> Because, at best, it has only had a very small fraction of the effort
> spent on probing it that the mainstream network stacks have had.

But we already know it is an insecure protocol, and we already know how to
run such things securely, as I pointed out before.

Re: Kernel Transplantation

<uoc27c$2o6et$3@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33190&group=comp.os.vms#33190

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 20:38:04 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 11
Message-ID: <uoc27c$2o6et$3@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me>
<uobmub$2m944$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 18 Jan 2024 20:38:04 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="f05da8d0375bd152ab59cb890d40489a";
logging-data="2890205"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19arWYpeXBydr1SWSVpMaa3"
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Cancel-Lock: sha1:b47k95CYYrTG0A9+9dmD08bguig=
 by: Lawrence D'Oliv - Thu, 18 Jan 2024 20:38 UTC

On Thu, 18 Jan 2024 10:25:29 -0700, Mark Berryman wrote:

> DECnet, however, was designed and implemented by a
> much smaller group, which often leads to much better code.

Code (implementation) is one thing, design (protocol) is quite another.
DECnet had an address space so restricted, it make the 32-bit IP address
space seem expansive. And whose dumb idea was it to tie the DECnet address
to the MAC address? TCP/IP has ARP; even lowly AppleTalk had its own ARP-
equivalent; yet the clever DEC engineers never saw this as important for
their protocol stack.

Re: Kernel Transplantation

<uoc3gf$2oe4i$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33191&group=comp.os.vms#33191

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arne@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 15:59:59 -0500
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <uoc3gf$2oe4i$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me>
<uobmub$2m944$1@dont-email.me> <uoc27c$2o6et$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 18 Jan 2024 20:59:59 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6806900df0d41620935ae3fe0cde946c";
logging-data="2898066"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+Y/31enCscBfGBDatBZenZVEPBbpHVqK0="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:dh4fPLxmFQHY/fTQPjsxmNy4FJ0=
In-Reply-To: <uoc27c$2o6et$3@dont-email.me>
Content-Language: en-US
 by: Arne Vajhøj - Thu, 18 Jan 2024 20:59 UTC

On 1/18/2024 3:38 PM, Lawrence D'Oliveiro wrote:
> DECnet had an address space so restricted, it make the 32-bit IP address
> space seem expansive.

16 bit is less than 32 bit.

If DEC had known how large DECnet networks would become, then they
would probably have chosen 32 bit.

But it is difficult to predict the future.

> And whose dumb idea was it to tie the DECnet address
> to the MAC address?

It is pretty smart. No need for an extra protocol.

Arne

Re: Kernel Transplantation

<uoccj4$2ptkv$2@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33193&group=comp.os.vms#33193

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Thu, 18 Jan 2024 23:35:00 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 8
Message-ID: <uoccj4$2ptkv$2@dont-email.me>
References: <uoc3gf$2oe4i$1@dont-email.me>
<memo.20240118230218.3116P@jgd.cix.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 18 Jan 2024 23:35:00 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="a99d1106c5a63aadcf4a9426eaf9b9d4";
logging-data="2946719"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19G/7yg7GBvr6sqpEJXiE3v"
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Cancel-Lock: sha1:ucSte7Alh5E22sVwSbCohFk3cEU=
 by: Lawrence D'Oliv - Thu, 18 Jan 2024 23:35 UTC

On Thu, 18 Jan 2024 23:02 +0000 (GMT Standard Time), John Dallman wrote:

> Different objectives. Internet Protocol was designed to be able to be
> adaptable to almost any kind of computer. DECnet was only for DEC OSes.

Hard to see how tying the protocol address to the MAC address was a good
idea in any way.

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uodse3$355n9$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33196&group=comp.os.vms#33196

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: Fri, 19 Jan 2024 13:11:31 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 29
Message-ID: <uodse3$355n9$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me> <uoc23d$2o6et$2@dont-email.me>
Injection-Date: Fri, 19 Jan 2024 13:11:31 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6cdbab2d3a21bf7591b4b73666130432";
logging-data="3315433"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+DufCEO8olZeqVUpCcJbkNbPbjkZV3OOw="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:QOJLhth7x9YeK46Usj79xyUSfDc=
 by: Simon Clubley - Fri, 19 Jan 2024 13:11 UTC

On 2024-01-18, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
> On Thu, 18 Jan 2024 13:06:21 -0000 (UTC), Simon Clubley wrote:
>
>> On 2024-01-17, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>>
>>> On Wed, 17 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>>>> The server software with the vulnerability could be the DECnet stack
>>>> running on that server.
>>>
>>> Any reason why you think DECnet is particularly prone to introducing
>>> security holes, per se?
>>
>> Because, at best, it has only had a very small fraction of the effort
>> spent on probing it that the mainstream network stacks have had.
>
> But we already know it is an insecure protocol, and we already know how to
> run such things securely, as I pointed out before.

As I have already mentioned, that only protects data in transit.

If you can still reach the DECnet stack via the nice modern secure
protocol, you can still open your own connections to the DECnet stack
and launch attacks against the DECnet stack running on the server.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.


computers / comp.os.vms / Re: Kernel Transplantation

Pages:123456789101112131415161718
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor