Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

Real Users know your home telephone number.


computers / comp.os.vms / Re: Kernel Transplantation

SubjectAuthor
* New CEO of VMS SoftwareSlo
+* Re: New CEO of VMS SoftwareArne Vajhøj
|`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
| `- Re: New CEO of VMS SoftwareArne Vajhøj
`* Re: New CEO of VMS SoftwareSimon Clubley
 +* Re: New CEO of VMS SoftwareArne Vajhøj
 |+* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||`* Re: New CEO of VMS SoftwareArne Vajhøj
 || `* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||  `* Re: New CEO of VMS SoftwareArne Vajhøj
 ||   `* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||    `* Re: New CEO of VMS SoftwareArne Vajhøj
 ||     `* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||      +* Re: New CEO of VMS SoftwareArne Vajhøj
 ||      |`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||      | `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      |  `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |   `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      |    `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |     +* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Dan Cross
 ||      |     |+* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |     ||`- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Dan Cross
 ||      |     |`- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)bill
 ||      |     `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      |      `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       +* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |+* Re: Kernel TransplantationMark Berryman
 ||      |       ||+- Re: Kernel TransplantationLawrence D'Oliveiro
 ||      |       ||`* Re: Kernel TransplantationSimon Clubley
 ||      |       || `- Re: Kernel TransplantationMark Berryman
 ||      |       |`* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       | `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  +* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |  |`* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  | +* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |  | |`* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  | | +- Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | | +* Re: Kernel TransplantationMark Berryman
 ||      |       |  | | |+- Re: Kernel TransplantationSimon Clubley
 ||      |       |  | | |+- Re: Kernel TransplantationDave Froble
 ||      |       |  | | |+- Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | | |+* Re: Kernel TransplantationLawrence D'Oliveiro
 ||      |       |  | | ||`* Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | | || +- Re: Kernel TransplantationLawrence D'Oliveiro
 ||      |       |  | | || `- Re: Kernel TransplantationDan Cross
 ||      |       |  | | |`- Re: Kernel TransplantationDan Cross
 ||      |       |  | | `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |  | |  `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  | |   `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |  | |    +- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Scott Dorsey
 ||      |       |  | |    `- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       |  | +* Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | |`* Re: Kernel TransplantationSimon Clubley
 ||      |       |  | | `- Re: Kernel TransplantationArne Vajhøj
 ||      |       |  | +* Re: Kernel TransplantationDave Froble
 ||      |       |  | |`- Re: Kernel TransplantationSimon Clubley
 ||      |       |  | `* Re: Kernel TransplantationMark Berryman
 ||      |       |  |  `* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |   `* Re: Kernel TransplantationMark Berryman
 ||      |       |  |    `* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |     +* Re: Kernel TransplantationStephen Hoffman
 ||      |       |  |     |`- Re: Kernel TransplantationLawrence D'Oliveiro
 ||      |       |  |     `* Re: Kernel TransplantationMark Berryman
 ||      |       |  |      `* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |       `* Re: Kernel TransplantationMark Berryman
 ||      |       |  |        +* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |        |`* Re: Kernel TransplantationStephen Hoffman
 ||      |       |  |        | `- Re: Kernel TransplantationMark Berryman
 ||      |       |  |        `* Re: Kernel TransplantationArne Vajhøj
 ||      |       |  |         +- Re: Kernel TransplantationHans Bachner
 ||      |       |  |         `* Re: Kernel TransplantationSimon Clubley
 ||      |       |  |          `- Re: Kernel TransplantationMark Berryman
 ||      |       |  `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |       |   `- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Simon Clubley
 ||      |       `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      |        `* Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||      |         `- Re: Kernel Transplantation (was: Re: New CEO of VMS Software)Stephen Hoffman
 ||      `* Re: New CEO of VMS SoftwareDan Cross
 ||       +* Re: New CEO of VMS SoftwareArne Vajhøj
 ||       |`- Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       +* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       |+* Re: New CEO of VMS SoftwareDan Cross
 ||       ||`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || +* Re: New CEO of VMS SoftwareRobert A. Brooks
 ||       || |`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || | +* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || | |`* Re: New CEO of VMS SoftwareArne Vajhøj
 ||       || | | `* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || | |  +* Re: New CEO of VMS SoftwareDan Cross
 ||       || | |  |+- Re: New CEO of VMS SoftwareArne Vajhøj
 ||       || | |  |`* Re: New CEO of VMS SoftwareLawrence D'Oliveiro
 ||       || | |  | `- Re: New CEO of VMS SoftwareDan Cross
 ||       || | |  `- Re: New CEO of VMS SoftwareArne Vajhøj
 ||       || | `* Re: 64-bit (was Re: New CEO of VMS Software)Stephen Hoffman
 ||       || |  +* Re: 64-bit (was Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||       || |  |+- Re: 64-bit (was Re: New CEO of VMS Software)Arne Vajhøj
 ||       || |  |`* Re: 64-bit (was Re: New CEO of VMS Software)Dave Froble
 ||       || |  | +- Re: 64-bit (was Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||       || |  | `* off topic: BASIC (was Re: 64-bit)mjos_examine
 ||       || |  |  +- Re: off topic: BASIC (was Re: 64-bit)Arne Vajhøj
 ||       || |  |  `* Re: BASIC (was Re: 64-bit)Lawrence D'Oliveiro
 ||       || |  +* Re: 64-bit (was Re: New CEO of VMS Software)Arne Vajhøj
 ||       || |  +* Re: 64-bit (was Re: New CEO of VMS Software)Lawrence D'Oliveiro
 ||       || |  `* Re: 64-bit (was Re: New CEO of VMS Software)Dave Froble
 ||       || +- Re: New CEO of VMS SoftwareDan Cross
 ||       || `- Re: New CEO of VMS SoftwareSingle Stage to Orbit
 ||       |`* Re: New CEO of VMS SoftwareArne Vajhøj
 ||       `* Re: New CEO of VMS Softwarebill
 |+- Re: New CEO of VMS SoftwareArne Vajhøj
 |`* Re: New CEO of VMS Softwaremjos_examine
 `* Re: New CEO of VMS SoftwareArne Vajhøj

Pages:123456789101112131415161718
Re: Kernel Transplantation

<uoe4fd$di0$1@reader1.panix.com>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33197&group=comp.os.vms#33197

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.hispagatos.org!eternal-september.org!feeder3.eternal-september.org!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cross@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Fri, 19 Jan 2024 15:28:45 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <uoe4fd$di0$1@reader1.panix.com>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <uobmub$2m944$1@dont-email.me> <uoc27c$2o6et$3@dont-email.me> <uoc3gf$2oe4i$1@dont-email.me>
Injection-Date: Fri, 19 Jan 2024 15:28:45 -0000 (UTC)
Injection-Info: reader1.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="13888"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Fri, 19 Jan 2024 15:28 UTC

In article <uoc3gf$2oe4i$1@dont-email.me>,
Arne Vajhøj <arne@vajhoej.dk> wrote:
>On 1/18/2024 3:38 PM, Lawrence D'Oliveiro wrote:
>> DECnet had an address space so restricted, it make the 32-bit IP address
>> space seem expansive.
>
>16 bit is less than 32 bit.
>
>If DEC had known how large DECnet networks would become, then they
>would probably have chosen 32 bit.
>
>But it is difficult to predict the future.
>
>> And whose dumb idea was it to tie the DECnet address
>> to the MAC address?
>
>It is pretty smart. No need for an extra protocol.

IPv6 with SLAAC does the same thing. It's very convenient;
though of course the IPv6 address space is much larger than
either DECnet or IPv4.

- Dan C.

Re: Kernel Transplantation

<uoe4nu$di0$2@reader1.panix.com>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33198&group=comp.os.vms#33198

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cross@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Fri, 19 Jan 2024 15:33:18 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <uoe4nu$di0$2@reader1.panix.com>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me> <uobmub$2m944$1@dont-email.me>
Injection-Date: Fri, 19 Jan 2024 15:33:18 -0000 (UTC)
Injection-Info: reader1.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="13888"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Fri, 19 Jan 2024 15:33 UTC

In article <uobmub$2m944$1@dont-email.me>,
Mark Berryman <mark@theberrymans.com> wrote:
>On 1/18/24 6:06 AM, Simon Clubley wrote:
>> On 2024-01-17, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>>> On Wed, 17 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>>>> The server software with the vulnerability could be the DECnet stack
>>>> running on that server.
>>>
>>> Any reason why you think DECnet is particularly prone to introducing
>>> security holes, per se?
>>
>> Because, at best, it has only had a very small fraction of the effort
>> spent on probing it that the mainstream network stacks have had.
>
>Simon's postings would tend to indicate that he believes that anything
>not subject to constant probing by hundreds or thousands of hack.., er,
>security researchers is just full of latent bugs waiting to be discovered.

History has shown that Simon is mostly correct in that belief.

>It might help to remember that the IP stack was designed by committee
>and implemented by an even more diverse group, some good at programming,
>some not so much. DECnet, however, was designed and implemented by a
>much smaller group, which often leads to much better code. I suspect,
>but don't know for sure, that the designers and implementers were also
>essentially the same people. (They were also very good).

Which IP stack are you referring to? IP has been implemented
many times by many different groups; even on VMS!

>Also, once upon a time, DECnet was a more diverse network than the
>internet. Until the internet went public in the early 90s, it was quite
>limited in scope, consisting mainly of some government institutions,
>some government contractors, and some universities. DECnet, however,
>was used to implement a number of world-wide networks consisting of many
>diverse endpoints. There was some probing that went on but not a whole
>lot. For one, with DECnet the source was too easy to trace and, for
>another, if any of the probes were successful I never heard of it (I was
>on SPAN at the time). This was all DECnet phase IV. After the internet
>went public, these networks ran multiple protocols in parallel,
>including TCP/IP and DECnet. As DEC equipment was phased out at these
>sites, so was DECnet. But it somehow managed to survive without issue
>all those years. (The only known problems were caused by local
>misconfigurations by people who didn't read the manual and simply
>accepted defaults that should have been better. None were cause by the
>stack itself.)
>
>Finally, as I mentioned in an earlier post, it is trivial in today's
>world to isolate one's DECnet stack from anything other than trusted
>hosts. On any network where I have been involved, it some host were
>compromised, and if that host were to try to probe DECnet, none of its
>packets would even reach the DECnet interface of any host that was
>actually running DECnet.
>
>There are, after all, many ways to implement security.
>
>My two cents.

I dunno. I'd bet a month's salary that more packets travel
across the Internet in a day than have transitted DECnet ever.
That's a lot of testing and hardening.

This of course doesn't mean that DECnet implementations are
insecure, but it does mean they are a _lot_ less tested. It
could be that they're insecure and no one realizes because no
one has tested sufficiently. That means there's an element of
risk there that doesn't exist with e.g. the Linux or BSD TCP/IP
stacks.

- Dan C.

Re: Kernel Transplantation

<uoe7dl$377mb$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33199&group=comp.os.vms#33199

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mark@theberrymans.com (Mark Berryman)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Fri, 19 Jan 2024 09:19:00 -0700
Organization: A noiseless patient Spider
Lines: 42
Message-ID: <uoe7dl$377mb$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 19 Jan 2024 16:19:01 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6e9524a44049a6dc612cc2f3811cd5e3";
logging-data="3382987"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19bdt+5gg/TymgU5x21b5EQYz4aauCSf/Y="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:UnuqbS90ClNCqHt8T3d/ODoQUXs=
Content-Language: en-US
In-Reply-To: <uobr6j$2mtfn$1@dont-email.me>
 by: Mark Berryman - Fri, 19 Jan 2024 16:19 UTC

On 1/18/24 11:38 AM, Simon Clubley wrote:
> On 2024-01-18, Mark Berryman <mark@theberrymans.com> wrote:
>>
>> Sorry, I am only infrequently on this forum.
>>
>> On my system EVL runs with exactly the privs I specified earlier but I
>> did do some digging.
>>
>> EVL is started by netacp in whatever account netacp is running using the
>> command file sys$system:evl.com. EVL neither raises nor lowers privs.
>> The startup command file normally looks like this:
>> $ ! Copyright (c) 1987 Digital Equipment Corporation. All rights reserved.
>> $ SET NOON
>> $ IF "''EVL$COMMAND'" .NES. "" THEN EVL$COMMAND
>> $ RUN SYS$SYSTEM:EVL
>> $ PURGE/KEEP=3 EVL.LOG
>> $ LOGOUT/BRIEF
>>
>> However, sometime in the dim and distant past (meaning I no longer
>> remember when or why) I inserted this line:
>>
>> $ SET PROCESS/PRIVILEGES=(NOALL,SYSNAM,OPER,SYSPRV,NETMBX,TMPMBX)
>>
>> which is why EVL is limited in privs on my system. Anyone concerned can
>> make the same edit.
>>
>
> Because that command is being run in the same process as the EVL listener
> it will not help constrain an attacker. This is because all an attacker
> needs to do in their shellcode is to reenable those privileges.

IIRC, you managed to crash EVL using an insecure setup. Crashing a
process is much different that convincing a process to run bogus code
and, of course, simply crashing EVL causes its process to exit.

With a secure setup, you can't get your malformed packets into EVL.
However, if you'd like to show how you can get EVL to run bogus code, in
any setup, then you will have raised a very valid concern. Until then,
I have addressed what concern you have raised.

Mark Berryman

Re: Kernel Transplantation

<uoefud$38m82$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33200&group=comp.os.vms#33200

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Fri, 19 Jan 2024 18:44:29 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 55
Message-ID: <uoefud$38m82$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me> <uoe7dl$377mb$1@dont-email.me>
Injection-Date: Fri, 19 Jan 2024 18:44:29 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6cdbab2d3a21bf7591b4b73666130432";
logging-data="3430658"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+aY7mI8UJINbfsShlosFMgJzajVezjtJw="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:lfaiftTgsaTviVgejoiluUsfcuU=
 by: Simon Clubley - Fri, 19 Jan 2024 18:44 UTC

On 2024-01-19, Mark Berryman <mark@theberrymans.com> wrote:
> On 1/18/24 11:38 AM, Simon Clubley wrote:
>> On 2024-01-18, Mark Berryman <mark@theberrymans.com> wrote:
>>>
>>> Sorry, I am only infrequently on this forum.
>>>
>>> On my system EVL runs with exactly the privs I specified earlier but I
>>> did do some digging.
>>>
>>> EVL is started by netacp in whatever account netacp is running using the
>>> command file sys$system:evl.com. EVL neither raises nor lowers privs.
>>> The startup command file normally looks like this:
>>> $ ! Copyright (c) 1987 Digital Equipment Corporation. All rights reserved.
>>> $ SET NOON
>>> $ IF "''EVL$COMMAND'" .NES. "" THEN EVL$COMMAND
>>> $ RUN SYS$SYSTEM:EVL
>>> $ PURGE/KEEP=3 EVL.LOG
>>> $ LOGOUT/BRIEF
>>>
>>> However, sometime in the dim and distant past (meaning I no longer
>>> remember when or why) I inserted this line:
>>>
>>> $ SET PROCESS/PRIVILEGES=(NOALL,SYSNAM,OPER,SYSPRV,NETMBX,TMPMBX)
>>>
>>> which is why EVL is limited in privs on my system. Anyone concerned can
>>> make the same edit.
>>>
>>
>> Because that command is being run in the same process as the EVL listener
>> it will not help constrain an attacker. This is because all an attacker
>> needs to do in their shellcode is to reenable those privileges.
>
> IIRC, you managed to crash EVL using an insecure setup. Crashing a
> process is much different that convincing a process to run bogus code
> and, of course, simply crashing EVL causes its process to exit.
>

By "insecure setup", you mean using a network stack as supplied out of
the box by a vendor selling "the world's most secure operating system" ?

> With a secure setup, you can't get your malformed packets into EVL.
> However, if you'd like to show how you can get EVL to run bogus code, in
> any setup, then you will have raised a very valid concern. Until then,
> I have addressed what concern you have raised.
>

For my concern to be handled, they would also have to be permanently
removed from the list of authorised privileges, not just the list of
currently enabled privileges.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uoen4k$39ohi$9@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33201&group=comp.os.vms#33201

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: Fri, 19 Jan 2024 20:47:16 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 5
Message-ID: <uoen4k$39ohi$9@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me>
<uoc23d$2o6et$2@dont-email.me> <uodse3$355n9$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 19 Jan 2024 20:47:16 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="a99d1106c5a63aadcf4a9426eaf9b9d4";
logging-data="3465778"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18atNdSkEexDqGjduPKunpf"
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Cancel-Lock: sha1:ZzJ7VmHSrgLiBN4HCLQ6G0pOFqo=
 by: Lawrence D'Oliv - Fri, 19 Jan 2024 20:47 UTC

On Fri, 19 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:

> As I have already mentioned, that only protects data in transit.

Relevance being?

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uoet3n$3audo$5@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33203&group=comp.os.vms#33203

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: Fri, 19 Jan 2024 22:29:12 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 6
Message-ID: <uoet3n$3audo$5@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 19 Jan 2024 22:29:12 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="a99d1106c5a63aadcf4a9426eaf9b9d4";
logging-data="3504568"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/srKWc0drY3+eX3oEfo0ri"
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Cancel-Lock: sha1:+2R/mKnkDtWc2ITbaCz19U/Ukwo=
 by: Lawrence D'Oliv - Fri, 19 Jan 2024 22:29 UTC

On Thu, 11 Jan 2024 13:48:37 -0000 (UTC), Simon Clubley wrote:

> Things like SSL only protect data in motion.

How exactly is a network protocol supposed to operate when not “in
motion”?

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uof2s3$dh1$1@panix2.panix.com>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33204&group=comp.os.vms#33204

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.niel.me!tncsrv06.tnetconsulting.net!weretis.net!feeder6.news.weretis.net!panix!.POSTED.panix2.panix.com!panix2.panix.com!not-for-mail
From: kludge@panix.com (Scott Dorsey)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: 20 Jan 2024 00:07:31 -0000
Organization: Former users of Netcom shell (1989-2000)
Lines: 17
Message-ID: <uof2s3$dh1$1@panix2.panix.com>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email <uoen4k$39ohi$9@dont-email.me>
Injection-Info: reader1.panix.com; posting-host="panix2.panix.com:166.84.1.2";
logging-data="15523"; mail-complaints-to="abuse@panix.com"
 by: Scott Dorsey - Sat, 20 Jan 2024 00:07 UTC

Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
>On Fri, 19 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>
>> As I have already mentioned, that only protects data in transit.
>
>Relevance being?

Local attacks are still possible. Which is much less of a worry in most
environments, true. But it's an easy thing to avoid, and decnet did not.

I run phase IV on some machines that aren't critical and it works and is
convenient and well-integrated with the older VMS version in use. I would
not want to run it on a production system today but thanks to the efforts
of people at TGV and FTP Software I don't have to.
--scott
--
"C'est un Nagra. C'est suisse, et tres, tres precis."

Re: Kernel Transplantation

<uoffjn$3hdgv$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33206&group=comp.os.vms#33206

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: seaohveh@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Fri, 19 Jan 2024 22:44:55 -0500
Organization: HoffmanLabs LLC
Lines: 15
Message-ID: <uoffjn$3hdgv$1@dont-email.me>
References: <uo8jm3$20n2e$1@dont-email.me> <uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me> <uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: dont-email.me; posting-host="9a80900384b122e5ce479f3b626d90c3";
logging-data="3716639"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18s42ZRWOAtbwpWD46Knxfs1PZ4yBMAk7M="
User-Agent: Unison/2.2
Cancel-Lock: sha1:Rmc1bCoiGAERQtyS6HbGuhBx26M=
 by: Stephen Hoffman - Sat, 20 Jan 2024 03:44 UTC

On 2024-01-19 18:44:29 +0000, Simon Clubley said:

> By "insecure setup", you mean using a network stack as supplied out of
> the box by a vendor selling "the world's most secure operating system" ?

That DECnet uses cleartext credentials for network connections, both
within the cleartext network protocol, and usernames and passwords
stored within the hopefully-protected DECnet database, was straight out
of 1990.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: Kernel Transplantation

<uogtaf$3ode9$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33209&group=comp.os.vms#33209

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mark@theberrymans.com (Mark Berryman)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Sat, 20 Jan 2024 09:45:01 -0700
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <uogtaf$3ode9$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me>
<uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 20 Jan 2024 16:45:03 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6db0c0d5a3513a47c44ce67a7c99c0c5";
logging-data="3945929"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19UwYvMuKpgdFKhpFFi8u4lqrh3TZ2tfcc="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:baxlDJGsRWz5sXVjnw6kIxh9eFw=
Content-Language: en-US
In-Reply-To: <uoefud$38m82$1@dont-email.me>
 by: Mark Berryman - Sat, 20 Jan 2024 16:45 UTC

On 1/19/24 11:44 AM, Simon Clubley wrote:
> On 2024-01-19, Mark Berryman <mark@theberrymans.com> wrote:
..
..
..
>>> Because that command is being run in the same process as the EVL listener
>>> it will not help constrain an attacker. This is because all an attacker
>>> needs to do in their shellcode is to reenable those privileges.
>>
>> IIRC, you managed to crash EVL using an insecure setup. Crashing a
>> process is much different that convincing a process to run bogus code
>> and, of course, simply crashing EVL causes its process to exit.
>>
>
> By "insecure setup", you mean using a network stack as supplied out of
> the box by a vendor selling "the world's most secure operating system" ?

No, by insecure setup I mean you allowed an untrusted host, and one not
running DECnet, access to another host's DECnet stack.

Mark Berryman

Re: Kernel Transplantation

<uohddo$3r4em$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33212&group=comp.os.vms#33212

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Sat, 20 Jan 2024 21:19:52 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 10
Message-ID: <uohddo$3r4em$1@dont-email.me>
References: <uo8jm3$20n2e$1@dont-email.me> <uobl4r$2lupm$1@dont-email.me>
<uobr6j$2mtfn$1@dont-email.me> <uoe7dl$377mb$1@dont-email.me>
<uoefud$38m82$1@dont-email.me> <uoffjn$3hdgv$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 20 Jan 2024 21:19:52 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="e15dac640a9167fb7bc10933baa543b0";
logging-data="4035030"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+DyFJSzUFuT04c36TrfM3T"
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Cancel-Lock: sha1:urQyI/C4fT7zXIa1xnZ5pbC9CIo=
 by: Lawrence D'Oliv - Sat, 20 Jan 2024 21:19 UTC

On Fri, 19 Jan 2024 22:44:55 -0500, Stephen Hoffman wrote:

> That DECnet uses cleartext credentials for network connections, both
> within the cleartext network protocol, and usernames and passwords
> stored within the hopefully-protected DECnet database, was straight out
> of 1990.

We know how to mitigate that nowadays. Constrain it to a limited set of
mutually-trusted nodes, that cannot see anything else (via DECnet) anyway,
connected via trusted channels, most likely virtual.

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uolp9e$o1rq$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33220&group=comp.os.vms#33220

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: Mon, 22 Jan 2024 13:06:54 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 21
Message-ID: <uolp9e$o1rq$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uo9csc$26bvc$1@dont-email.me> <uob7oc$2jji6$1@dont-email.me> <uoc23d$2o6et$2@dont-email.me> <uodse3$355n9$1@dont-email.me> <uoen4k$39ohi$9@dont-email.me>
Injection-Date: Mon, 22 Jan 2024 13:06:54 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="54b7871daa3fa8bd7d6c948100edd384";
logging-data="788346"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18IhGcQrSEYFbzFDfinatXbiIsf6R31Fqc="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:kEcBBYmvj5N7HDkYRBXCvRDdjf0=
 by: Simon Clubley - Mon, 22 Jan 2024 13:06 UTC

On 2024-01-19, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
> On Fri, 19 Jan 2024 13:11:31 -0000 (UTC), Simon Clubley wrote:
>
>> As I have already mentioned, that only protects data in transit.
>
> Relevance being?

In view of the existing discussion about attacking the stack itself
and not any existing data transfers, that question doesn't even make
any sense.

I gave you the benefit of the doubt (I'm like that :-)), but it is
clear you are either a troll or simply do not understand the issues
involved (and if it's the latter case, you probably don't even realise
fully what is it you don't understand).

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation (was: Re: New CEO of VMS Software)

<uolpb8$o1rq$2@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33221&group=comp.os.vms#33221

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation (was: Re: New CEO of VMS Software)
Date: Mon, 22 Jan 2024 13:07:53 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 15
Message-ID: <uolpb8$o1rq$2@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uoet3n$3audo$5@dont-email.me>
Injection-Date: Mon, 22 Jan 2024 13:07:53 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="54b7871daa3fa8bd7d6c948100edd384";
logging-data="788346"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/hJZRP0psaTbGEAyAKLKpFiQ7n7F+JTU8="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:0c3ppVWAg1HOl1Bj8PYKO29BWGg=
 by: Simon Clubley - Mon, 22 Jan 2024 13:07 UTC

On 2024-01-19, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
> On Thu, 11 Jan 2024 13:48:37 -0000 (UTC), Simon Clubley wrote:
>
>> Things like SSL only protect data in motion.
>
> How exactly is a network protocol supposed to operate when not ?in
> motion??

Yes, you are either trolling or simply do not understand.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation

<uolpkb$o1rq$3@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33222&group=comp.os.vms#33222

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Mon, 22 Jan 2024 13:12:43 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 31
Message-ID: <uolpkb$o1rq$3@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me> <uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me> <uogtaf$3ode9$1@dont-email.me>
Injection-Date: Mon, 22 Jan 2024 13:12:43 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="54b7871daa3fa8bd7d6c948100edd384";
logging-data="788346"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX190aQHS/O39TOWlVOuApzG7LeWCz/5/oNE="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:Qv4JhPRwEFrykkrON926A2G7IBg=
 by: Simon Clubley - Mon, 22 Jan 2024 13:12 UTC

On 2024-01-20, Mark Berryman <mark@theberrymans.com> wrote:
> On 1/19/24 11:44 AM, Simon Clubley wrote:
>> On 2024-01-19, Mark Berryman <mark@theberrymans.com> wrote:
> .
> .
> .
>>>> Because that command is being run in the same process as the EVL listener
>>>> it will not help constrain an attacker. This is because all an attacker
>>>> needs to do in their shellcode is to reenable those privileges.
>>>
>>> IIRC, you managed to crash EVL using an insecure setup. Crashing a
>>> process is much different that convincing a process to run bogus code
>>> and, of course, simply crashing EVL causes its process to exit.
>>>
>>
>> By "insecure setup", you mean using a network stack as supplied out of
>> the box by a vendor selling "the world's most secure operating system" ?
>
> No, by insecure setup I mean you allowed an untrusted host, and one not
> running DECnet, access to another host's DECnet stack.
>

Oh, I see Mark. So you mean just like every public node on the Internet is
supposed to handle without instantly falling over ? :-) (And which gets
fixed when something unexpected is found ?)

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation

<uomgav$saoq$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33228&group=comp.os.vms#33228

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mark@theberrymans.com (Mark Berryman)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Mon, 22 Jan 2024 12:40:14 -0700
Organization: A noiseless patient Spider
Lines: 54
Message-ID: <uomgav$saoq$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me>
<uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me>
<uogtaf$3ode9$1@dont-email.me> <uolpkb$o1rq$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 22 Jan 2024 19:40:15 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="fa05aa04a0db1622187497d35239fb3a";
logging-data="928538"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19gSMGqAt51JmJsAYWLsEZ6xLe2Zloteow="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:MfFlctZy9qMBLix40SORApmRtHQ=
In-Reply-To: <uolpkb$o1rq$3@dont-email.me>
Content-Language: en-US
 by: Mark Berryman - Mon, 22 Jan 2024 19:40 UTC

On 1/22/24 6:12 AM, Simon Clubley wrote:
> On 2024-01-20, Mark Berryman <mark@theberrymans.com> wrote:
>> On 1/19/24 11:44 AM, Simon Clubley wrote:
>>> On 2024-01-19, Mark Berryman <mark@theberrymans.com> wrote:
>> .
>> .
>> .
>>>>> Because that command is being run in the same process as the EVL listener
>>>>> it will not help constrain an attacker. This is because all an attacker
>>>>> needs to do in their shellcode is to reenable those privileges.
>>>>
>>>> IIRC, you managed to crash EVL using an insecure setup. Crashing a
>>>> process is much different that convincing a process to run bogus code
>>>> and, of course, simply crashing EVL causes its process to exit.
>>>>
>>>
>>> By "insecure setup", you mean using a network stack as supplied out of
>>> the box by a vendor selling "the world's most secure operating system" ?
>>
>> No, by insecure setup I mean you allowed an untrusted host, and one not
>> running DECnet, access to another host's DECnet stack.
>>
>
> Oh, I see Mark. So you mean just like every public node on the Internet is
> supposed to handle without instantly falling over ? :-) (And which gets
> fixed when something unexpected is found ?)
Most likely, every public node on the Internet is behind a firewall,
which severely limits what packets can reach a given node and, depending
on the quality of the firewall, the nature of those packets (i.e. good
firewalls can detect and reject malformed packets).

Sadly, when an IP-based attack makes it through the firewall and into a
host, the host typically does worse than "fall over". It lets the
attacker in where the attacker can then do all kinds of nefarious
things. This is often not detected until long after the fact. If there
has ever been a successful attack from an external source on a VMS
system that allowed the attacker to muck around on that system, I am not
aware of it. Are you?

The purpose of a firewall is to protect the IP stack of the hosts behind
it. I merely suggested a couple of ways one can firewall one's DECnet
traffic, and thereby protect that stack. Nothing unusual or exceptional
about it.

I ran a VMS host fully exposed to the Internet with DECnet phase V on it
for years without issue. It was a honeypot so it wanted to see as many
attack attempts as possible. It was running WASD instead of Apache so
none of the attacks on the web port succeeded and none of the attacks on
the ports used by DECnet ever caused an issue. So, real word
experience, not guess work. And, no, I wouldn't try this with any other
platform.

Mark Berryman

Re: Kernel Transplantation

<uoof0k$19omv$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33232&group=comp.os.vms#33232

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Tue, 23 Jan 2024 13:29:56 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 51
Message-ID: <uoof0k$19omv$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me> <uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me> <uogtaf$3ode9$1@dont-email.me> <uolpkb$o1rq$3@dont-email.me> <uomgav$saoq$1@dont-email.me>
Injection-Date: Tue, 23 Jan 2024 13:29:56 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="3cc52bdb500684c393fdd76d954079ce";
logging-data="1368799"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+48zpjtsF4+ekUz0e2/dEioZ5scu/mBPw="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:kg73nRnj/SzN28KulF3AKouvRCY=
 by: Simon Clubley - Tue, 23 Jan 2024 13:29 UTC

On 2024-01-22, Mark Berryman <mark@theberrymans.com> wrote:
>
> Sadly, when an IP-based attack makes it through the firewall and into a
> host, the host typically does worse than "fall over". It lets the
> attacker in where the attacker can then do all kinds of nefarious
> things. This is often not detected until long after the fact. If there
> has ever been a successful attack from an external source on a VMS
> system that allowed the attacker to muck around on that system, I am not
> aware of it. Are you?
>

I know that Stephen has mentioned he has had to clean up compromised VMS
systems for clients, but I don't recall him stating the infection origin.
I suspect, given the nature of VMS systems and the people who manage them,
such details are kept private however.

The biggest external problem I have ever had to personally deal with was
that the UCX stack still had an SMTP open relay with no way of restricting
it, when the rest of the world had moved on and this was very, very, no
longer acceptable.

It's been too long, so I don't recall how I fixed that. I could have waited
for a later version of UCX before enabling this, or I could have put a Linux
email server in front of the VMS system.

I do know this was about the time I finally abandoned the idea of directly
attaching a webserver running on a VMS system to the Internet and placing
it instead behind a Linux webserver, but I can't remember how I fixed the
open relay issue.

> The purpose of a firewall is to protect the IP stack of the hosts behind
> it. I merely suggested a couple of ways one can firewall one's DECnet
> traffic, and thereby protect that stack. Nothing unusual or exceptional
> about it.
>
> I ran a VMS host fully exposed to the Internet with DECnet phase V on it
> for years without issue. It was a honeypot so it wanted to see as many
> attack attempts as possible. It was running WASD instead of Apache so
> none of the attacks on the web port succeeded and none of the attacks on
> the ports used by DECnet ever caused an issue. So, real word
> experience, not guess work. And, no, I wouldn't try this with any other
> platform.
>

I assume this was way after the DECnet worms were no longer a thing... :-)

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation

<uopdpk$1fa8c$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33233&group=comp.os.vms#33233

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.nntp4.net!news.gegeweb.eu!gegeweb.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: seaohveh@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Tue, 23 Jan 2024 17:15:16 -0500
Organization: HoffmanLabs LLC
Lines: 21
Message-ID: <uopdpk$1fa8c$1@dont-email.me>
References: <uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me> <uogtaf$3ode9$1@dont-email.me> <uolpkb$o1rq$3@dont-email.me> <uomgav$saoq$1@dont-email.me> <uoof0k$19omv$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: dont-email.me; posting-host="9f89b908d903731f96bb98becbc02fde";
logging-data="1550604"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/3DUUyB7nQiuubAJySiN4j3g/sppvfOIw="
User-Agent: Unison/2.2
Cancel-Lock: sha1:6lCRSFqw9QbvmoG6YsrfulmLB6I=
 by: Stephen Hoffman - Tue, 23 Jan 2024 22:15 UTC

On 2024-01-23 13:29:56 +0000, Simon Clubley said:

> The biggest external problem I have ever had to personally deal with
> was that the UCX stack still had an SMTP open relay with no way of
> restricting it, when the rest of the world had moved on and this was
> very, very, no longer acceptable.

Last I checked, the 💩 default for TCP/IP Services SMTP mail server was
a 💩 open relay. With no diagnostics. Reproducer was trivially simple:
delete (or mis-locate) the SMTP configuration file.

With no TLS and no STARTTLS support to be found anywhere in the TCP/IP
mail server, last I checked.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: Kernel Transplantation

<uopk1o$1g5mo$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33235&group=comp.os.vms#33235

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arne@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Tue, 23 Jan 2024 19:01:59 -0500
Organization: A noiseless patient Spider
Lines: 39
Message-ID: <uopk1o$1g5mo$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me>
<uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me>
<uogtaf$3ode9$1@dont-email.me> <uolpkb$o1rq$3@dont-email.me>
<uomgav$saoq$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 24 Jan 2024 00:02:00 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="efbc6ad7defc70a0a3c2148bcc6c8242";
logging-data="1578712"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19l+Ye5HqCv+qCF6ML/cLJkMKY9BH/E9w8="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:u2BceVsdFratpCeYjkeVWmdXJMM=
In-Reply-To: <uomgav$saoq$1@dont-email.me>
Content-Language: en-US
 by: Arne Vajhøj - Wed, 24 Jan 2024 00:01 UTC

On 1/22/2024 2:40 PM, Mark Berryman wrote:
> Most likely, every public node on the Internet is behind a firewall,
> which severely limits what packets can reach a given node and, depending
> on the quality of the firewall, the nature of those packets (i.e. good
> firewalls can detect and reject malformed packets).
>
> Sadly, when an IP-based attack makes it through the firewall and into a
> host, the host typically does worse than "fall over".  It lets the
> attacker in where the attacker can then do all kinds of nefarious
> things.  This is often not detected until long after the fact.  If there
> has ever been a successful attack from an external source on a VMS
> system that allowed the attacker to muck around on that system, I am not
> aware of it.  Are you?

Long time ago: yes.

> The purpose of a firewall is to protect the IP stack of the hosts behind
> it.  I merely suggested a couple of ways one can firewall one's DECnet
> traffic, and thereby protect that stack.

Internet is IP only and firewalls does never pass DECnet traffic, so
no DECnet attacks that way.

DECnet attacks has to either be local or get in via IP and propagate
via DECnet.

> I ran a VMS host fully exposed to the Internet with DECnet phase V on it
> for years without issue.  It was a honeypot so it wanted to see as many
> attack attempts as possible.  It was running WASD instead of Apache so
> none of the attacks on the web port succeeded and none of the attacks on
> the ports used by DECnet ever caused an issue.

I was not even aware that DECnet used ports.

And how did DECnet traffic come in via the internet?

Arne

Re: Kernel Transplantation

<l1cg4gFfa2fU1@mid.individual.net>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33237&group=comp.os.vms#33237

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!usenet.network!eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: hans@bachner.priv.at (Hans Bachner)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Wed, 24 Jan 2024 14:03:13 +0100
Lines: 44
Message-ID: <l1cg4gFfa2fU1@mid.individual.net>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me>
<un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me>
<un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me>
<un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me>
<un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me>
<un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me>
<unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me>
<uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me>
<unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me>
<unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me>
<uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me>
<uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me>
<uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me>
<uogtaf$3ode9$1@dont-email.me> <uolpkb$o1rq$3@dont-email.me>
<uomgav$saoq$1@dont-email.me> <uopk1o$1g5mo$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net F8zXU+DU/CUpoA0NU5lC8whDRRXaPcv2/Iw662VivOXBAW60E=
Cancel-Lock: sha1:rtdtNOIue95bifmL02y7rTc6qfI= sha256:EYUEZngU2Cziq73bkyX9QQI9QVwd0/15Scv+e+E4tuc=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.15.1
Content-Language: de-AT, en-US
In-Reply-To: <uopk1o$1g5mo$1@dont-email.me>
 by: Hans Bachner - Wed, 24 Jan 2024 13:03 UTC

Arne Vajhøj schrieb am 24.01.2024 um 01:01:
> On 1/22/2024 2:40 PM, Mark Berryman wrote:
>> Most likely, every public node on the Internet is behind a firewall,
>> which severely limits what packets can reach a given node and,
>> depending on the quality of the firewall, the nature of those packets
>> (i.e. good firewalls can detect and reject malformed packets).
>>
>> Sadly, when an IP-based attack makes it through the firewall and into
>> a host, the host typically does worse than "fall over".  It lets the
>> attacker in where the attacker can then do all kinds of nefarious
>> things.  This is often not detected until long after the fact.  If
>> there has ever been a successful attack from an external source on a
>> VMS system that allowed the attacker to muck around on that system, I
>> am not aware of it.  Are you?
>
> Long time ago: yes.
>
>> The purpose of a firewall is to protect the IP stack of the hosts
>> behind it.  I merely suggested a couple of ways one can firewall one's
>> DECnet traffic, and thereby protect that stack.
>
> Internet is IP only and firewalls does never pass DECnet traffic, so
> no DECnet attacks that way.
>
> DECnet attacks has to either be local or get in via IP and propagate
> via DECnet.
>
>> I ran a VMS host fully exposed to the Internet with DECnet phase V on
>> it for years without issue.  It was a honeypot so it wanted to see as
>> many attack attempts as possible.  It was running WASD instead of
>> Apache so none of the attacks on the web port succeeded and none of
>> the attacks on the ports used by DECnet ever caused an issue.
>
> I was not even aware that DECnet used ports.
>
> And how did DECnet traffic come in via the internet?
Mark mentioned DECnet phase V which often/mostly uses DECnet over IP
enabled and so uses IP ports.

While there will be rarely incoming DECnet traffic, the ports for DECnet
over IP may be attacked.

Hans.

Re: Kernel Transplantation

<uor29p$1qhls$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33238&group=comp.os.vms#33238

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Wed, 24 Jan 2024 13:11:21 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 33
Message-ID: <uor29p$1qhls$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com> <un6dla$3m1ra$1@dont-email.me> <un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me> <un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me> <un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me> <un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me> <un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me> <una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me> <unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me> <unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me> <unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me> <unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me> <uo8jm3$20n2e$1@dont-email.me> <uobl4r$2lupm$1@dont-email.me> <uobr6j$2mtfn$1@dont-email.me> <uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me> <uogtaf$3ode9$1@dont-email.me> <uolpkb$o1rq$3@dont-email.me> <uomgav$saoq$1@dont-email.me> <uopk1o$1g5mo$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 24 Jan 2024 13:11:21 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="828e1b0da5e836aa1de0181c916b0c4f";
logging-data="1918652"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19KIOJkuTWljOscfg7RbVlLOhy8wTq9HQw="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:XUslb8aHcgRSIwCiKTrdgQtByr0=
 by: Simon Clubley - Wed, 24 Jan 2024 13:11 UTC

On 2024-01-23, Arne Vajhøj <arne@vajhoej.dk> wrote:
> On 1/22/2024 2:40 PM, Mark Berryman wrote:
>> I ran a VMS host fully exposed to the Internet with DECnet phase V on it
>> for years without issue.  It was a honeypot so it wanted to see as many
>> attack attempts as possible.  It was running WASD instead of Apache so
>> none of the attacks on the web port succeeded and none of the attacks on
>> the ports used by DECnet ever caused an issue.
>
> I was not even aware that DECnet used ports.
>

They are called objects, but they are really numbered ports, just like
TCP/IP. However, I suspect Mark is talking about the TCP/IP ports used
as a transport for DECnet packets, in the same way as SSH can be used
to transport X11 traffic.

> And how did DECnet traffic come in via the internet?
>

I suspect the implementation Mark is using encapsulates the DECnet
traffic in a little custom TCP/IP-based protocol, which is then routed
over one or more TCP/IP ports to its destination before the encapsulation
is reversed and the DECnet packets delivered to the target DECnet stack.

That means the attacks would be limited to malformed TCP/IP packets
unless the attacker was also running a DECnet stack and the same TCP/IP
DECnet encapsulation protocol.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Kernel Transplantation

<uorap4$1rv9t$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33240&group=comp.os.vms#33240

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!usenet.network!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mark@theberrymans.com (Mark Berryman)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Wed, 24 Jan 2024 08:36:03 -0700
Organization: A noiseless patient Spider
Lines: 37
Message-ID: <uorap4$1rv9t$1@dont-email.me>
References: <035d195c-5549-42d4-b6bb-c136280933den@googlegroups.com>
<un6gv0$3mgu1$1@dont-email.me> <un70ns$3otot$2@dont-email.me>
<un758i$3pjg7$1@dont-email.me> <un7aun$3qam7$1@dont-email.me>
<un7lsa$3rlut$1@dont-email.me> <un7n5d$3rocu$2@dont-email.me>
<un7oh6$3rv3j$1@dont-email.me> <un7ren$3s7nl$1@dont-email.me>
<un7rso$3s6ss$1@dont-email.me> <un818j$l6e$1@dont-email.me>
<una8l0$b8m8$1@dont-email.me> <unaf2a$bpv5$6@dont-email.me>
<unc6kb$n3h1$1@dont-email.me> <uncbv2$ns66$1@dont-email.me>
<unk710$24f0u$1@dont-email.me> <unkg6p$25ql0$1@dont-email.me>
<unm6op$2gm0n$2@dont-email.me> <unmtqd$2k7pr$5@dont-email.me>
<unorjl$30on5$2@dont-email.me> <uo6rg1$1k5at$1@dont-email.me>
<uo8jm3$20n2e$1@dont-email.me> <uobl4r$2lupm$1@dont-email.me>
<uobr6j$2mtfn$1@dont-email.me> <uoe7dl$377mb$1@dont-email.me>
<uoefud$38m82$1@dont-email.me> <uogtaf$3ode9$1@dont-email.me>
<uolpkb$o1rq$3@dont-email.me> <uomgav$saoq$1@dont-email.me>
<uopk1o$1g5mo$1@dont-email.me> <uor29p$1qhls$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 24 Jan 2024 15:36:05 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="58f705225aaf823654067f0e9a6ecd67";
logging-data="1965373"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18jBE/QfBMUh5Jw/ILbSBbehf7dvQSUzzk="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:M9bSfFViAkywugpPG7t5GwmNlPs=
In-Reply-To: <uor29p$1qhls$1@dont-email.me>
Content-Language: en-US
 by: Mark Berryman - Wed, 24 Jan 2024 15:36 UTC

On 1/24/24 6:11 AM, Simon Clubley wrote:
> On 2024-01-23, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> On 1/22/2024 2:40 PM, Mark Berryman wrote:
>>> I ran a VMS host fully exposed to the Internet with DECnet phase V on it
>>> for years without issue.  It was a honeypot so it wanted to see as many
>>> attack attempts as possible.  It was running WASD instead of Apache so
>>> none of the attacks on the web port succeeded and none of the attacks on
>>> the ports used by DECnet ever caused an issue.
>>
>> I was not even aware that DECnet used ports.
>>
>
> They are called objects, but they are really numbered ports, just like
> TCP/IP. However, I suspect Mark is talking about the TCP/IP ports used
> as a transport for DECnet packets, in the same way as SSH can be used
> to transport X11 traffic.
>
>> And how did DECnet traffic come in via the internet?
>>
>
> I suspect the implementation Mark is using encapsulates the DECnet
> traffic in a little custom TCP/IP-based protocol, which is then routed
> over one or more TCP/IP ports to its destination before the encapsulation
> is reversed and the DECnet packets delivered to the target DECnet stack.
>
> That means the attacks would be limited to malformed TCP/IP packets
> unless the attacker was also running a DECnet stack and the same TCP/IP
> DECnet encapsulation protocol.

No, as I mentioned in a previous message, it was DECnet Phase V, which
supports DECnet over IP. An attacker would not need to be running
DECnet. The attacks simply tried to attack the ports used by DECnet
phase V. And, as I mentioned, none of those attack attempts caused an
issue for the DECnet stack.

Mark Berryman

Re: Kernel Transplantation

<uorbch$1s2hj$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=33241&group=comp.os.vms#33241

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mark@theberrymans.com (Mark Berryman)
Newsgroups: comp.os.vms
Subject: Re: Kernel Transplantation
Date: Wed, 24 Jan 2024 08:46:24 -0700
Organization: A noiseless patient Spider
Lines: 28
Message-ID: <uorbch$1s2hj$1@dont-email.me>
References: <uoe7dl$377mb$1@dont-email.me> <uoefud$38m82$1@dont-email.me>
<uogtaf$3ode9$1@dont-email.me> <uolpkb$o1rq$3@dont-email.me>
<uomgav$saoq$1@dont-email.me> <uoof0k$19omv$1@dont-email.me>
<uopdpk$1fa8c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 24 Jan 2024 15:46:25 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="58f705225aaf823654067f0e9a6ecd67";
logging-data="1968691"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+RrA7+y4ZjD4tZMhtFt8txDLuZ6UEbur4="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:fwaF4t+41MvrJhDbSfFXoHWF6jg=
Content-Language: en-US
In-Reply-To: <uopdpk$1fa8c$1@dont-email.me>
 by: Mark Berryman - Wed, 24 Jan 2024 15:46 UTC

On 1/23/24 3:15 PM, Stephen Hoffman wrote:
> On 2024-01-23 13:29:56 +0000, Simon Clubley said:
>
>
>
>> The biggest external problem I have ever had to personally deal with
>> was that the UCX stack still had an SMTP open relay with no way of
>> restricting it, when the rest of the world had moved on and this was
>> very, very, no longer acceptable.
>
> Last I checked, the 💩 default for TCP/IP Services SMTP mail server was
> a 💩 open relay. With no diagnostics. Reproducer was trivially simple:
> delete (or mis-locate) the SMTP configuration file.
>
> With no TLS and no STARTTLS support to be found anywhere in the TCP/IP
> mail server, last I checked.

The applications that come with TCP/IP Services are but one of the many
reasons that I have stated in the past that, if you are really concerned
about security, you don't run TCP/IP Services, you run Multinet. And,
at least for mail, if Multinet is not an option then try PMDF.

I no longer have the resources to bang on TCP/IP Services V6 that I once
had but, for any earlier version, yes - there were issues. I really
hope VSI has, or will, address them in the new version.

Mark Berryman

Pages:123456789101112131415161718
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor