> On 11-Sep-2003/13:58 -0500, B McAndrews <[EMAIL PROTECTED]> wrote:
>
>Could someone staighten me out here.  When did Unix based system become 
>the bastion of security?  In a former lifetime, I used to work on 
>VAX/VMS for classified (as in military) work.  I can't remember the 
>issues, but when we started moving off the VAX/VMS over to Unix 
>workstations, the IT security folks were not at all comfortable with the 
>security of Unix compared to the VAX/VMS.  Does anyone have any insights 
>as to why that might be?

Your IT security folks were wise.  The buffer overrun problem that is
common in Unix exploits simply does not exist in VMS.  I've been
managing VMS systems for 20 years and if I can remember correctly, there
were exactly 2 cases where DEC was forced to send out mandatory update
CDs to fix major security holes. Solaris, HP-UX, and Linux all
experience frequent major vulnerabilities that are usually quickly
patched (at least Linux is - HP and Solaris are *much* slower).

VMS has access control lists done right.  Linux, HP-UX, and Solaris all
have pretty limited implementations.  VMS has persona system services
and multiple privilege levels.  The other 3 have exactly 2 privilege
levels - either you're root or you're not.  VMS has access controls on
most objects - batch and print queues, devices, etc.  Unix doesn't.  In
many ways, NT/2k/XP has a better security implementation than Unix
(especially file access), although in other ways it's much worse (too
much stuff runs in a fully privileged mode and file protections are not
utilized the way it should be in order to maintain compability with
legacy applications).

That doesn't mean you can't run secure production environments on Unix -
if I told you that I'd obviously be bs'ing since a lot of people do it.
It's just that VMS makes it a lot easier.

If I installed a VMS system from its base distribution and put it naked
on the Internet, it would not be hacked - either soon or after many
months even if didn't apply any updates.  Most Unix distributions and
Windows will be hacked - either immediately after the system is probed
or within days afterwards as vulnerabilities are found unless patches
are continually applied.

To a very large extent, the security of the system is dependent on the
skills of the administrator.  You can screw up VMS - I've seen a case
where a developer wrote an application that accepted an arbitrary
command from an arbitrary host and executed it in a fully privileged
context without any sort of validation whatsoever.  You can screw up any
other kind of system the same way.  Good sysadmins that are able to
control their environments properly won't let that happen (some
sysadmins have the control but not the skills, and some have the skills
but not the control).  Similarly, if you don't patch your systems (it
usually doesn't matter what the OS is), you are asking for trouble.

-- 
Ed Wilts, Mounds View, MN, USA
mailto:[EMAIL PROTECTED]
Member #1, Red Hat Community Ambassador Program


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to