Deutsch English Français Italiano |
<1026ke1$hh9a$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> Newsgroups: comp.os.vms Subject: Re: Upcoming time boundary events Date: Mon, 9 Jun 2025 12:35:13 -0000 (UTC) Organization: A noiseless patient Spider Lines: 33 Message-ID: <1026ke1$hh9a$1@dont-email.me> References: <100fp4v$1nmtf$1@dont-email.me> <100omli$3t023$1@dont-email.me> <100qdop$6q13$1@dont-email.me> <100qg5t$3jb0$1@dont-email.me> <1014ad8$2jurh$1@dont-email.me> <101dnbj$omrq$1@dont-email.me> <mn.fae77e95a3bdb69b.104627@invalid.skynet.be> <101f0ei$1568p$1@dont-email.me> <mn.127a7e96667d7f35.104627@invalid.skynet.be> <mn.12887e9614a7408b.104627@invalid.skynet.be> <101k68r$39d9f$3@dont-email.me> <mn.1a747e96f898112d.104627@invalid.skynet.be> <101n4rj$34un$3@dont-email.me> <mn.226b7e96be736c6b.104627@invalid.skynet.be> <101qiik$13glj$4@dont-email.me> <mn.2a847e968448ca5d.104627@invalid.skynet.be> <101tau9$1qu8n$9@dont-email.me> Injection-Date: Mon, 09 Jun 2025 14:35:14 +0200 (CEST) Injection-Info: dont-email.me; posting-host="a76611de1834b59071e43341ddd7e55b"; logging-data="574762"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18JjHbdbU9Crx032+h/WgnOYvUgLbnf2d4=" User-Agent: slrn/0.9.8.1 (VMS/Multinet) Cancel-Lock: sha1:gCSDPpldUI+qZBFrBAhPySn+LCs= On 2025-06-05, Lawrence D'Oliveiro <ldo@nz.invalid> wrote: > On Thu, 05 Jun 2025 10:44:51 +0200, Marc Van Dyck wrote: > >> Lawrence D'Oliveiro laid this down on his screen : >>> >>> Basic security should be built into the core OS installation, not added >>> as an afterthought -- and an extra-cost one at that. >> >> There are already many security features available in OpenVMS. More than >> what many people need. There must be a trade-off. Building more stuff >> into the OS means that more customers pay for features they don't need. > > Look at what comes standard in the Linux kernel: cgroups, namespaces, > containers, virtualization, SELinux, AppArmor, the whole pluggable LSM > mechanism, seccomp, netfilter, EBPF ... and that?s just off the top of my > head. > It also has ASLR, KASLR, shells that don't have access to privileges outside of the privileges the user has, and encrypted filesystems. It also has secure password hashing algorithms and a central source of entropy, both of which have only recently been added to x86-64 VMS (but not added to the other VMS architectures). On a non-security level, it also has support for filesystems in user space, and pluggable kernel mode filesystems (which can be unloaded again without needing a reboot). Simon. -- Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP Walking destinations on a map are further away than they appear.