> On Dec 2, 2017, at 5:48 AM, Doug Jackson via cctech <cct...@classiccmp.org> 
> wrote:
> 
> Camiel,
> 
> Without sounding super negative (my day job as a security consultant let's
> me do that  enough...)  I would be especially wary of connecting anything
> with a 10 year old stack to the modern internet.  The range of automatic
> attacks based on what the state of the OS was when it was last patched is
> staggering.

That's true to a point.  On the other hand, many attacks require that the 
machine is running on Intel instruction set hardware, and most of them also 
depend on the OS being Windows.

While bugs happen, the level of security competence applied by VMS engineering 
is quite high compared to the usual "hack it till it no longer crashes" 
practice seen all too often nowadays.  That applies especially to network 
protocol implementations.

If the issue is design defects in the protocol specifications, such as may be 
found in various revisions of SSL, then having a good OS is not a complete 
answer.  Even there, it can help; for example, I suspect that the "heartbreak" 
attack on older SSL stacks, if it were operable on VMS, wouldn't get you very 
far because of OS and instruction set differences.  Certainly script kiddy 
attacks would not work.

        paul


Reply via email to