Hello,
I am doing investigation about security for "latecomers" VMS users (Vax, Alpha, Itanium on HP licence).
It seems being a not-so-little number of users. And for them, to adapt
to the fast cycles about security (SSH, SSL for example) is a challenge.
I know the Process Software offer for that, able to work with everything
on VMS. Are there other offers, methods, Open Source initiatives...?
Every idea, information welcomed.
Hello,
I am doing investigation about security for "latecomers" VMS users (Vax, Alpha, Itanium on HP licence).
It seems being a not-so-little number of users. And for them, to adapt
to the fast cycles about security (SSH, SSL for example) is a challenge.
I know the Process Software offer for that, able to work with everything
on VMS. Are there other offers, methods, Open Source initiatives...?
Every idea, information welcomed.
I am doing investigation about security for "latecomers" VMS users (Vax, Alpha, Itanium on HP licence).
It seems being a not-so-little number of users. And for them, to adapt
to the fast cycles about security (SSH, SSL for example) is a challenge.
I know the Process Software offer for that, able to work with everything
on VMS. Are there other offers, methods, Open Source initiatives...?
Every idea, information welcomed.
There are two consistent approaches to that:
A) Always update to supported version. For VMS that
-a-a means VSI VMS On Alpha, Itanium or x86-64. And expect
-a-a VSI to close vulnerabilities when they are found.
B) Live by the "If it ain't broke, don't fix it" mantra.
-a-a Old OS, old TCP/IP, old everything. Security is not
-a-a provided by the system but around the system. Network
-a-a security, physical security etc. mitigate the risk from
-a-a the old stuff. This is not a great solution, but it may
-a-a be possible to achieve an acceptable security level. Not
-a-a all servers are running internet web servers.
But it sounds like they are asking for the inconsistent:
C) Keep the old OS as is without updating it, but always
-a-a update the software packages on it.
Difficult to provide. Many/most software packages will
not support very old VMS versions. For business reasons:
too few customers to make a business case. For technical
reasons: the software package need newer C RTL or
newer system services or something else new.
A) Windows 11 with latest Edge/Chrome/FF.
It could be as simple as aThanks a lot for all your advice.
Raspberry Pi with two NICs, one on the company network and configured to allow only SSH with modern ciphers, the other connected to the VMS
system using Telnet.
I am doing investigation about security for "latecomers" VMS users
(Vax, Alpha, Itanium on HP licence).
It seems being a not-so-little number of users. And for them, to adapt
to the fast cycles about security (SSH, SSL for example) is a challenge.
I know the Process Software offer for that, able to work with
everything on VMS.
Are there other offers, methods, Open Source initiatives...?
On 2026-02-06 09:31:59 +0000, gcalliet said:
I am doing investigation about security for "latecomers" VMS users
(Vax, Alpha, Itanium on HP licence).
What are configurations coasting with un- or semi-maintained servers.
Yes, I am aware of industrial and SCADA environments, and regulatory environments, etc., and those typically don't get the sorts of security changes being discussed here. They get isolated.
Or they get upgraded to VSI OpenVMS x86-64, or get incrementally ported
over to Linux servers or such.
It seems being a not-so-little number of users. And for them, to adapt
to the fast cycles about security (SSH, SSL for example) is a challenge.
It's much less of a challenge when the gear is not locked onto old
hardware and old software versions.
The overhead of adding (backporting) and maintaining security increases
as time passes too, and the site usually attempts to isolate the older
and more vulnerable servers.
Or starts a modernization plan.
I know the Process Software offer for that, able to work with
everything on VMS.
I'd not want to try implementing modern security particularly with a
VAX, if performance is a consideration. VAX gear is ~35 years old, and
slow. Usual approach is isolation, locked-down firewalls, and ongoing reviews.
Alpha and Itanium are less bad here, performance wise.
Are there other offers, methods, Open Source initiatives...?
Basically, no.
OpenSSL does have a recent / current port to OpenVMS, there are the WASD-related pieces, but pragmatically most things available on OpenVMS
are usually just very dated.-a Porting the code gets harder the further back, too. There's other fun waiting too, probably including Xpdf and
JBIG2, and the ever-popular CVE-2013-4786 for iLO:
rCLHPSBHF02981 rev.4 - HPE Integrated Lights-Out 2, 3, 4, 5 (iLO 2, iLO 3, iLO 4, and iLO 5) and HPE Superdome Flex RMC - IPMI 2.0 RCMP+
Authentication Remote Password Hash Vulnerability (RAKP)rCY
TL;DR: ask the iLO nicely for a weakly-hashed IPMI password, then crack
it offline.
On at least some of these boxes, the iLO command that blocks this
particular access:
MP:CM> sa -lanipmi d
https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c04197764
If you have HPE OneView around, also check: CVE-2025-37164
There are other vulnerabilities in some of the older versions of some
HP/HPE apps for OpenVMS, too. Fixes never got ported. Some I've verified vulnerable from proof-of-concepts.
Usual recommendation: Segment and restrict access to these OpenVMS boxes ("don't expose OpenVMS to the internet", etc), disable IPMI iLO access,
set up a bastion host, etc. Get going on a modernization or migration plan.
I've done some app retrofits here too, such as removing telnet
connections that had failed audits, replacing those with TLS
connections. But that was not on VAX.
On 2/6/26 3:31 AM, gcalliet wrote:Hello,
Hello,
I am doing investigation about security for "latecomers" VMS users
(Vax, Alpha, Itanium on HP licence).
It seems being a not-so-little number of users. And for them, to adapt
to the fast cycles about security (SSH, SSL for example) is a challenge.
I know the Process Software offer for that, able to work with
everything on VMS. Are there other offers, methods, Open Source
initiatives...?
Every idea, information welcomed.
If they are on recent enough Alpha or Itanium, they can probably build current OpenSSL from source.-a No, I don't know what "recent enough"
would be exactly.
They could approach VSI and ask them to offer their port of OpenSSH as a separate product for HP versions of VMS. But it's probably easier just
going to Process Software, who already has the capability.
Since not touching the systems seems to be a priority (otherwise why run
VAX or pre-VSI releases?), it might be easier to change what's around
the systems, such as with a hardware proxy.-a It could be as simple as a Raspberry Pi with two NICs, one on the company network and configured to allow only SSH with modern ciphers, the other connected to the VMS
system using Telnet.-a The VMS connection could just as easily be
something other than ethernet, such as serial.-a At which point you've
got a home-grown terminal server.-a Surely someone already sells terminal servers that do this, but I don't know the market.
Some questions from an ignorant: how transfering a ssh (external)
session to a telnet or serial (VMS) session? how the ssh session on
the Pi knows about the login/password on VMS?
And as usual, the issue is between the "must" and the "can".
I am not at all a good programmer for internet. I was specialized on internal programmation, and I don't know why, I have always ignored everything about the network.
Have you some tracks for me doing this home-grown terminal server with Raspery Pi. I do like the idea, and getting the hardware is simple. But except for the term proxy, of wich I have some idea - but it is worth
only for web access - I'm very far from just the beginning of the
operation.
Some questions from an ignorant: how transfering a ssh (external)
session to a telnet or serial (VMS) session? how the ssh session on the
Pi knows about the login/password on VMS?
On all that I think you have much more intuition than me, and perhaps
some way to get documentation or even contacts.
If you can't maintain your tools, you're headed for increasing costs
and increasing trouble.
Sooner or later the management strategy of deny, delay, deceive, and distract enters remission and updates and migrations can ensue, or the project implodes, or the business implodes.
I've been doing training on OpenVMS and related custom topics, such as covering how an experienced C programmer can program C on OpenVMS, or networking- or security-related topics.
Le 12/02/2026 a 21:21, Stephen Hoffman a ocrita:
I've been doing training on OpenVMS and related custom topics, such as
covering how an experienced C programmer can program C on OpenVMS, or
networking- or security-related topics.
(Not any real project now, not any personal found, not very fluent in engish, but)
Do you go giving theses trainings? How do you do it?
Or the pieces and parts of and how to manage your particular newly- installed AlphaServer or whatever box, for that matter.
On 2/15/2026 11:17 AM, Stephen Hoffman wrote:
Or the pieces and parts of and how to manage your particular newly-
installed AlphaServer or whatever box, for that matter.
"newly-installed AlphaServer" - sounds like a few days has gone by
since then ....
:-)
Arne
On 2026-02-12 12:40:56 +0000, gcalliet said:
And as usual, the issue is between the "must" and the "can".
Rock versus Hard Place.
If you can't maintain your tools, you're headed for increasing costs
and increasing trouble.
[snip]
Here? Bastion hosts, network isolation, ongoing network scans for >shenanigans. And plans for and budgets for maintenance and upgrades. >Otherwise, the scheduled downtime becomes unscheduled downtime.
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 59 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 19:27:29 |
| Calls: | 810 |
| Calls today: | 1 |
| Files: | 1,287 |
| D/L today: |
10 files (21,017K bytes) |
| Messages: | 194,198 |