From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Newsgroup cliques? Newsgroups: alt.folklore.computers Date: Fri, 06 Dec 2002 14:15:48 GMTAnne & Lynn Wheeler writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Defeating telemarketers Newsgroups: alt.folklore.computers Date: Fri, 06 Dec 2002 15:54:10 GMTsomewhat related:
FTC moves to ease telemarketing calls
http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,76442,00.html
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: IBM OS source code Newsgroups: alt.folklore.computers Date: Fri, 06 Dec 2002 20:51:45 GMTpossibly of some interest ... answer to (email) question regarding operating source code availability:
all of cp/67 ... and all of vm/370 was delivered in machine readable source code ... and system could be built from the machine readable source code. this was up thru at least the late '70s. there was a large university (and other technician) community that created a large body of source code modifications and collected in "VMSHARE". Waterloo university managed the library of source code and distribution (60s and 70s had much less network connectivity .... so distribution was typically on some physical media like 9track tape). At one point there was an estimate that there was a much source code on the vmshare/waterloo tape as on the base product tape.
For some of the other IBM operating systems it wasn't quite so clean cut. They tended to have a much more complex source management and distribution system. Typically customers got a machine readible tape of the listings of the assembler/compiler ... but not machine readable of the actual source build. There was also readily available microfiche of the source listings (output of assembler/compiler) ... typically for debugging and binary patch fixes ... but it was less common to have all the source and libraries necessary to do a system build from scratch.
This all started to change with the antitrust case against ibm and with the ibm unbundling announcement june 23rd, 1969. After that point ... basic operating system components were still viewed as basically bundled ... but other components represented independent intellectual property. Things continued to change thru the '70s ... especially with the advent of mainframe clones in the mid-70s. The issue of operating system source code then started to become more and more proprietary because 1) operating system components weren't being charged for, 2) freely available source code was allowing other vendors to take and modify it ... with no visible corporate benefit (except to the competition), 3) the source code easily represented investment that ran to the hundreds of millions of dollars.
The late 70s and early 80s saw lots of user group discussions about the transition to the policy of OCO (object code only) ... the corporation attempting to protect investments that in aggregate ran to tens of billions of dollars.
in addition to waterloo university supporting vm source library
... tymshare corporation provided support for online vmshare
discussions (and later pcshare). these have been collected, archived
and online at:
http://vm.marist.edu/~vmshare/
for additional background ... try searching the vmshare archives for OCO, object code only, object-code-only, etc. .... which represented the transition away from source availability.
..... end
also during the 70s ... VM/370 shipped a monthly "PLC" tape (basically bug fixes and sometimes new function). The PLC tape included both the changed binaries as well as the incremental source code change files. Customers could either rebuild their system from the originally distributed binaries plus the latest PLC binaries (PLC contained accumulated changes of all PLC tapes since the original base release). Customers also had the option of rebuilding all or some subset using the incremental PLC source updates (also accumulated) plus the original source distribution.
misc. side note ... CP/67 & VM/370 source control system was in form
of "updates" ... base source file plus list of incremental update files
were combined prior to assembly/compile. Most people are more familiar
with the RCS/CVS that keeps the latest source file and effectively
"downdates" that can regress changes. The CP orientation was that base
source and appropriate source change (sort-of diff like) files were
combined on the fly. discussion of the CMS update command:
https://www.garlic.com/~lynn/2002n.html#39 CMS update
when I did the resource manager as a separate product in the mid-70s, they told me it was going to be the first "charged for" operating system code (aka guinea pig) ... and i got to spend six months on and off with the business people inventing the methodologies for operating system code pricing.
they also wanted me to ship on the same monthly PLC schedule as the
base product. However, I convinced them to let me do at three month
intervals rather than monthly intervals. Part of the reason was that
in addition to standard integrity stress testing ... I would also redo
performance regression tests that i used for the original product
validation (aka not only validate that system wouldn't fail because of
changes ... but also that performance & thruput weren't affected by
changes). A customer could build a system with a combination of the
resource manager distribution binaries and the base system
distribution binaries. They could also rebuild from source using
combination of the resource manager distribution PLC tape files,
resource manager distribution base distribution, base product
distribution PLC tape files, base product distribution files.
misc. stuff related to resource manager,
https://www.garlic.com/~lynn/2001e.html#45 VM/370 Resource Manager
somewhat related postings regarding benchmarking, workload proifiling,
capacity planning, etc
https://www.garlic.com/~lynn/submain.html#bench
and there was also the issue that I was nominally doing full time research at the science center and the Resource Manager product was more like a hobby ... and i had to somewhat beg time to provide product support, product release regression testing, etc.
as an aside ... one of the drivers for expanded use of (portable) UNIX in the '80s was that the (hardware) cost of building computing systems (of various types) was starting to significantly decrease; however the cost of creating proprietary operating system software hadn't similarly come down. A relatively quickly portable operating system was a huge investment avoidance that made possible the economics for some of the new system product offerings in the 80s.
some past threads with mention of OCO:
https://www.garlic.com/~lynn/94.html#11 REXX
https://www.garlic.com/~lynn/2000b.html#32 20th March 2000
https://www.garlic.com/~lynn/2001e.html#6 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001n.html#11 OCO
https://www.garlic.com/~lynn/2002c.html#4 Did Intel Bite Off More Than It Can Chew?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM OS source code Newsgroups: alt.folklore.computers Date: Fri, 06 Dec 2002 21:53:41 GMTAnne & Lynn Wheeler writes:
attach from above:
Browse entire NOTE VMSHIST 5/15/89 21:19:21
An Examination of the impacts of VMSHARE on individuals, VM community
& Society
Thanks so far for both the public appends I've been receiving in
addition to the private mail. Just to develop some of my ideas further
I've included some notes I've made in which I examine VMSHARE against
a set of criteria used in assessing the impacts of computer based
conferencing. I'd appreciate and enjoy very much if you have any
observations, disagreements or comments you'd care to make.
Kerr and Hiltz (1980) reported on a survey they carried out in
conjunction with experts in the field of computer based conferencing.
This survey was designed to examine what the impacts of
computer-mediated conferencing would be and how this related to the
overall impact of the computer on the way we live.
An impact in this context is defined as outcomes, effects or
consequences. Kerr and Hiltz further defined impacts into levels and
types and then hypothesized various effects that they felt were
intuitively held or could be found in the various literature. The
levels defined were: individual, group and societal. The types within
each of these levels were: cognitive, affective, and behavioural
... snip
besides the survey
https://www.garlic.com/~lynn/2001l.html#61 MVS History (all parts)
mentioned in
https://www.garlic.com/~lynn/2002o.html#75 They Got Mail: Not-So-Fond Farewells
part of the thread
https://www.garlic.com/~lynn/2002o.html#73 They Got Mail: Not-So-Fond Farewells
and
https://www.garlic.com/~lynn/2002k.html#39 Vnet: Unbelievable
hiltz and turoff were also brought in as consultants to do some
detailed study of the phenomena. there was also in depth study that
resulted in a stanford phd thesis; misc. refs:
https://www.garlic.com/~lynn/2002e.html#37 Would the value of knowledge and information be transferred or shared accurately across the different culture??????
https://www.garlic.com/~lynn/2002l.html#54 10 choices that were critical to the Net's success
https://www.garlic.com/~lynn/subnetwork.html#cmc
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Running z/VM 4.3 in LPAR & guest v-r or v=f Newsgroups: bit.listserv.vmesa-l Date: Sat, 7 Dec 2002 08:46:36 -0700At 12:01 AM 12/7/2002 -0600, wrote:
Basically both are using a page replacement algorithm that attempts to approximate LRU/least recently used. This is based on the assumption that the least recently used page has a high probability of continue to not be used ... and therefor is the best candidate to be replaced/removed.
When you operate an LRU infrastructure (virtual memory guest, database cache management, etc) the virtual subsystem characteristics can start to appear to violate LRU algorithm assumptions. The virtual guest (mvs, another vm, any cache manager, etc) will look around for a storage page that is not being used (LRU) and put the next page to be used in that slot). Now if the first level VM is also paging ... it will also tend to select the same not used page to be page-out. The situation can become very pathological where the page that VM is paging out is exactly the page that the virtual guest is most likely to use next.
A guest that implements a LRU replacement algorithm can start to exhibit behavior that looks more like MRU (i.e. the first level VM might be better off selecting the most recently used page for replacement ... rather than the least recently used page). Actually it is more bimodel ... a virtual guest that is doing paging with a LRU page replacement algorithm ... will have a strong tendency to use the most recently used pages and the least recently used pages .... and the pages "in the middle" (between the two extremes) are the most likely to not be used in the near future (aka the page replacement algorithm is attempting to infer the future page reference pattern based on past page reference use).
--
Anne & Lynn Wheeler lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM 029 predecessor--1050 communications Newsgroups: alt.folklore.computers Date: Sun, 08 Dec 2002 14:38:34 GMThancock4@bbs.cpcn.com (Jeff Nor Lisa) writes:
communicating 1052 could come with various attachments ... including paper tape punch/reader.
misc. prev. mentions of 1052:
https://www.garlic.com/~lynn/96.html#4a John Hartmann's Birthday Party
https://www.garlic.com/~lynn/96.html#9 cics
https://www.garlic.com/~lynn/96.html#12 IBM song
https://www.garlic.com/~lynn/96.html#30 interdata and perkin/elmer
https://www.garlic.com/~lynn/96.html#37 interdata & perkin/elmer machines
https://www.garlic.com/~lynn/96.html#39 Mainframes & Unix
https://www.garlic.com/~lynn/97.html#22 Pre S/360 IBM Operating Systems?
https://www.garlic.com/~lynn/98.html#32 Drive letters
https://www.garlic.com/~lynn/2000b.html#49 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2001.html#3 First video terminal?
https://www.garlic.com/~lynn/2001.html#15 IBM Model Numbers (was: First video terminal?)
https://www.garlic.com/~lynn/2001.html#17 IBM 1142 reader/punch (Re: First video terminal?)
https://www.garlic.com/~lynn/2001c.html#15 OS/360 (was LINUS for S/390)
https://www.garlic.com/~lynn/2001f.html#64 Converting Bitmap images
https://www.garlic.com/~lynn/2001f.html#78 HMC . . . does anyone out there like it ?
https://www.garlic.com/~lynn/2001g.html#32 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001i.html#30 IBM OS Timeline?
https://www.garlic.com/~lynn/2001i.html#34 IBM OS Timeline?
https://www.garlic.com/~lynn/2002d.html#30 Mainframers: Take back the light (spotlight, that is)
https://www.garlic.com/~lynn/2002j.html#16 Ever inflicted revenge on hardware ?
https://www.garlic.com/~lynn/2002l.html#55 The problem with installable operating systems
https://www.garlic.com/~lynn/2002o.html#21 IBM Selectric as printer
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: unix permissions Newsgroups: alt.folklore.computers Date: Sun, 08 Dec 2002 15:08:53 GMTCharles Shannon Hendrix writes:
both cp/67 and vm/370 saw a number of deployments in business critical
sensitive operations. misc. previous refs:
https://www.garlic.com/~lynn/2001m.html#12 Multics Nostalgia
https://www.garlic.com/~lynn/2001m.html#15 departmental servers
https://www.garlic.com/~lynn/2002l.html#42 Thirty Years Later: Lessons from the Multics Security Evaluation
https://www.garlic.com/~lynn/2002l.html#44 Thirty Years Later: Lessons from the Multics Security Evaluation
specifically on the subject of buffer overflow (also past thread of
how cots systems make society vulnerable
https://www.garlic.com/~lynn/2002l.html#45 Thirty Years Later: Lessons from the Multics Security Evaluation
other discussions of buffer overflow
https://www.garlic.com/~lynn/99.html#70 Series/1 as NCP (was: Re: System/1 ?)
https://www.garlic.com/~lynn/99.html#85 Perfect Code
https://www.garlic.com/~lynn/99.html#163 IBM Assembler 101
https://www.garlic.com/~lynn/99.html#219 Study says buffer overflow is most common security bug
and my favorite air force thread drift:
https://www.garlic.com/~lynn/subboyd.html#boyd
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: myths about Multics Newsgroups: alt.os.multics Date: Sun, 08 Dec 2002 15:25:27 GMTAndi Kleen writes:
recent postings on "IBM OS source code"
https://www.garlic.com/~lynn/2002p.html#2 IBM OS source code
in '88 there were still some stuff in transition from source
maintained (i.e. licensed distributed source) to OCO.
http://vm.marist.edu/~vmshare/read.cgi?fn=VMWKABS8&ft=NOTE&line=1
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Sci Fi again Newsgroups: alt.folklore.computers Date: Sun, 08 Dec 2002 15:44:43 GMTeugene@cse.ucsc.edu (Eugene Miya) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Sun, 08 Dec 2002 00:49:13 GMT"Odin" writes:
in a certificate credential world .... the CA issues a certificate in your name to some other person (aka traditional identity theft). They don't need your private key ... they just need a certificate that says they are you with any public key ... which they happen to have the private key for.
At a corporate level ... this is something of the issue with SSL domain name certificates. CAs nominally aren't the authoritative agency for the information certified in the certificate ... aka a CA typically checks with the agency responsible for the information as part of the certification process. If the authoritative agency says that it is ok, then a CA goes ahead and issues a certified certificate with the information they checked on. Just because information is in a certificate or on a driver's license doesn't make it magically perfect/true.
In the case of identity theft ... enuf information is acquired that allows them to get credentials in your name (whether it is a certificate or some other kind of credential).
In the case of SSL domain name server certificate ... it is actually something of a catch-22. One of the prime justifications for the whole SSL infrastructure with SSL domain name server certificates ... is because of integrity concerns with regard to the domain name infrastructure. However, the domain name infrastructure is the authoritative agency for domain names, aka when somebody applies to a CA for a SSL domain name server certificate ... the CA must check with the authoritative agency (the domain name infrastructure) as to the true owner of the domain name. If the domain name infrastructure has been compromised ... then it could be possible for people to fraudulently obtain an SSL domain name server certificate ... with their own key (since CAs rely on the domain name infrastructure as to the true owner of the domain name).
Now there are proposals to improve the integrity of the domain name infrastructure ... in large part so that CAs can better trust the integrity of the domain name infrastructure as to the information they certify in an SSL domain name server certificate. However, improving the integrity of the domain name infrastructure for CAs ... actually improves the domain name infrastructure for everybody ... lessoning the justification for wanting to have SSL domain name server certifications.
random refs:
https://www.garlic.com/~lynn/subintegrity.html#fraud
https://www.garlic.com/~lynn/subpubkey.html#sslcerts
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Sun, 08 Dec 2002 15:56:24 GMTHenrick Hellström writes:
once the primary database has been updated to point at the "front" entity ... they can obtain a certificate ... since the CA has to rely on the domain name infrastructure registration infrastructure.
some of the proposals to make this much less likely/possible (on behalf of the CA industry) ... as stated in the original posting ... go a long way to improving the integrity of the domain name infrastructure for everybody ... and also mitigating much of the need for having SSL domain name certificates in the first place.
https://www.garlic.com/~lynn/subpubkey.html#sslcerts
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Sun, 08 Dec 2002 17:27:26 GMTref:
so one of the proposals that has been put forward (by certification authority industry?) is that when somebody registers their domain name, they also register a public key. further communication with the domain name infrastructure by the domain name owner is done with digitally signed messages. this has the objective of removing some of the domain name take-over scenarios and raising the bar for various kinds of fraud.
now it also has an interesting sidelight that the proposal to improve
the integrity of certificate-based PKI is based on implementing a
certificate-less PKI ... aka aads:
https://www.garlic.com/~lynn/x959.html#aads
now another sidelight of this ... is the current domain name infrastructures already support generalized real-time information distribution (aka in addition to get binding between domain name and ip address ... the implementation also supports being able to get various other kinds of bindings). That opens up the gate so that domain name infrastructure could be used for not only distributing trusted ip-addresses but also for real-time trusted distribution of public keys (as an alternative to the stale, redundant, and superfluous method done via certificate-based PKI).
now if i can get both the ip-address and public key in a single transaction from the domain name infrastructure .... it is very close to being able to do SSL in a single round trip (i.e. piggy-back SSL selection options, encrypted session key, encrypted session data all in a single transmission). If the receiving server supports the defaulted selected SSL options ... then the SSL session is effectively setup at that moment ... and the server can respond. If this is transaction oriented ... it would be possible to then piggy back the session tear down in that single response transmission. The whole thing done in single transmission round-trip (slightly discounting the set-up/tear-down packet exchange round trips for base TCP).
So, the possible glitch here is mismatch in selected SSL options between the server and the client's selection. If this becames a significant issue for some servers ... then they could register their (possibly non-standard) SSL options along with the ip-address and the public key. The client can now get the ip-address and public key along with optional server SSL supported options ... in their single domain name lookup requests. The client then has real time information as to the server's ip-address, pubkic key, and supported SSL options all before even initiating the contact with the server. Encapsulated, piggy-backing of all necessary information that would occur in the existing SSL setup world but w/o certificates and w/o all the SSL protocol chatter.
https://www.garlic.com/~lynn/subpubkey.html#sslcerts
misc. past posts on minimal round-trip setup/teardonw protocol:
https://www.garlic.com/~lynn/99.html#0 Early tcp development?
https://www.garlic.com/~lynn/99.html#115 What is the use of OSI Reference Model?
https://www.garlic.com/~lynn/2000b.html#1 "Mainframe" Usage
https://www.garlic.com/~lynn/2000b.html#9 "Mainframe" Usage
https://www.garlic.com/~lynn/2000c.html#52 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2001b.html#57 I am fed up!
https://www.garlic.com/~lynn/2001e.html#24 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001n.html#15 Replace SNA communication to host with something else
https://www.garlic.com/~lynn/2002.html#3 The demise of compaq
https://www.garlic.com/~lynn/2002g.html#50 Why did OSI fail compared with TCP-IP?
https://www.garlic.com/~lynn/2002k.html#31 general networking is: DEC eNet: was Vnet : Unbelievable
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Sun, 08 Dec 2002 18:07:56 GMTHenrick Hellström writes:
at RFCs listed by click on Term (term->RFC#)
and in the Acronym fastpath click on "DNSSEC"
from above:
domain name system security (DNSSEC )
see also domain name system , security
3226 3225 3130 3110 3090 3008 3007 2931 2930 2845 2541 2540 2539 2538
2537 2536 2535 2137 206
my previous comments in thread
https://www.garlic.com/~lynn/2002p.html#11 Cirtificate Authorities 'CAs', how curruptable are they to
was highlighting the irony that various fixes to the domain name infrastructure in support of the certification authority industry ... plants the seeds for eliminating needing ssl domain name server certificates at all.
https://www.garlic.com/~lynn/subpubkey.html#sslcerts
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Multics on emulated systems? Newsgroups: alt.os.multics,alt.folklore.computers Date: Sun, 08 Dec 2002 17:52:35 GMTChristopher Browne writes:
from above:
1.4.3. Primos
Prime's Primos operating system shows a strong Multics influence. Bill
Poduska worked on Multics at MIT before founding Prime, and several
other senior Multicians worked at Prime. Poduska referred to Primos as
"Multics in a shoebox."
1.4.4. VOS
Stratus's VOS operating system shows a strong Multics influence. Bob
Freiburghouse, former Multics languages manager, was one of the
founders of Stratus; many Multicians are still Stratus
employees. (Stratus is now called Stratus Technologies.)
1.4.5. Apollo Domain
Bill Poduska went on from Prime to help found Apollo, and Domain was
known as "Multics in a Matchbox." Apollo's OS shows strong Multics
influence. For instance, the basic access to stuff on disk is via a
single-level store directly based on Multics. Supposedly some of the
motivation for the object-store style of file system came from Multics
too. [Frederick Roeber] [Jerry Saltzer adds:] In addition, it uses a
shared memory model, despite being distributed across a network. If
that isn't Multics influence, I don't know what is.
1.4.6. NTT DIPS
NTT undertook a massive effort to clone Multics, which led to their
DIPS (Denden Information Processing System) series of mainframes. DIPS
machines are still in widespread use in Japan today by NTT, but
everyone agrees that they are going away. I believe that Intermetrics
developed the DIPS PL/I compiler for NTT. [Carl Hoffman]
DIPS was an operating system developed by NTT and running on IBM S/370
clone machines built by Hitachi, Fujitsu and NEC. Sure, it was
inspired by Multics, but was not a clone, or you would call every
multi-user machine built after 1970 a Multics clone. [Jean Bellec]
1.4.7. Amber
Multics also influenced Amber, the operating system produced by the
S-1 project at Livermore between 1979 and 1986 or so. The original
Amber group was familiar with Multics as users - the original
development work was done on MIT-Multics - but I don't believe it
included anyone who'd actually worked on the Multics kernel itself.
The most important Multics influences were writing the operating
system in a high-level language, the single-level storage system, and
an emphasis on security, although rings were not present on the last
generation of S-1 machine. Amber was heavily influenced by critiques
of Multics such as the Multics Kernel Redesign Project. In its later
years, Amber made serious strides toward machine independence.
The developers hoped to make it "Multics done better," as reported in
a DATAMATION article. Jeff Broughton co- wrote the compiler for the
Pastel language used for Amber. [Jay Pattin]
1.4.8. GEMSOS
The Gemini GEMSOS secure operating system for the Intel architecture
was developed by Roger Schell to support a Multics-style segmented
environment in a system designed to meet A1 security requirements.
[Paul Karger]
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Multics on emulated systems? Newsgroups: alt.os.multics,alt.folklore.computers Date: Sun, 08 Dec 2002 21:35:45 GMTAnne & Lynn Wheeler writes:
customers eventually did get the company to continue with vm/370 as well as to come out with vm/xa (but some number of the good people wandered away because of the continuous corporate statements about product being dead).
random vmtool postings
https://www.garlic.com/~lynn/2001m.html#38 CMS under MVS
https://www.garlic.com/~lynn/2001m.html#47 TSS/360
https://www.garlic.com/~lynn/2001n.html#67 Hercules etc. IBM not just missing a great opportunity...
https://www.garlic.com/~lynn/2002e.html#27 moving on
https://www.garlic.com/~lynn/2002m.html#9 DOS history question
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Multics on emulated systems? Newsgroups: alt.folklore.computers,alt.os.multics Date: Mon, 09 Dec 2002 14:57:47 GMT"Douglas H. Quebbeman" writes:
minor related
https://www.garlic.com/~lynn/2002h.html#30 Multics hardware (was Re: "Soul of a New Machine" Computer?)
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: myths about Multics Newsgroups: alt.os.multics Date: Mon, 09 Dec 2002 15:09:52 GMThaynes@alumni.uark.edu (Jim Haynes) writes:
os/360 maint. tended to be with binary deck (compiled output) replacements and superzaps. zap'ing was selective modification of bytes in a binary deck. It was so common that many programs came with "zap" areas (say 80-256 bytes) in each program. You zap'ed some number of instructions into the zap-area with a return ... and then modified some inline instruction to branch to new instructions in the zap area. In extreme cases, customers might rekey (punch cards) source from the microfiche and compile/assemble
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Mon, 09 Dec 2002 18:45:47 GMTChristopher Browne writes:
in effect the domain name infrastructure is a generalized real-time information distribution system (akin to ldap ... but long before ldap come into existance) which isn't restricted to just ip-address information distribution (aka if you put an ip-address in the database for a domain name ... then that ip-address is tied to the domain name, if you put a phone number in the database for a domain name ... then the phone number is tied to the domain name, etc).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Mon, 09 Dec 2002 18:51:04 GMT... and the basis of registering the public key in the domain name database is something that the existing certification authorities have come up with as minimizing the ability to do domain name take-over exploits.
the problem is that you can certify a certification authority ... as much as you want ... and it doesn't really mean much if the authoritative agency that the certification authority has to rely on has a lot of vulnerabilities. in fact, there could be a case made that some amount of the certification of certification authorities ... is to distract attention from the fact that the sources of information that they are certifying ... have issues (aka the saying about integrity only be as strong as the weakest link .... have everybody pay attention to the fact that the crypto is very, very secure ... and hopefully they won't notice that there are major issues with the basic information).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Mon, 09 Dec 2002 19:04:49 GMTChristopher Browne writes:
isn't with the certificates, or the certificate chain, or the root certificate, or public keys or private keys.
the issue with the ssl certificates is how does a certification authority actually know who owns a domain. this is basically recorded in the domain name database(s) owned by the domain name infrastructure. A certification authority has to rely on the authoritative agency was to who actually owns the domain name (that authoritative agency is the domain name infrastructure).
again the integrity of the infrastructure is only as strong as its weakest link. why attack the crypto ... when there are possibly a zillion simpler things to attack.
so one suggestion from the certification authority industry to help improve the integrity of the domain name infrastructure ... and the information recorded in the domain name database(s) is to have a public key recorded in that database at the same time the domain name is registered. in some sense it can be like those "TIP" reporting programs where you tear a dollar bill in half and send in one half. You don't subseqently have to proove who you are ... you just need to be able to proove that you are the person that sent in the tip (and the other half of the dollar bill). In this case, you proove that you are the person that registered the database by signing something that can be verified with the registered public key.
however, once a public key is registered in the domain name database ... the binding of that public key to the domain name ... is as valid as the binding of the ip-address to the domain name (and is at least as strong a binding as any certification authority's binding that is the result of asking the domain name infrastructure as to who really owns the domain name).
now (again) the irony is that if the domain name infrastructure binds/registers a public key to a domain name entry ... in support of improving the integrity of the domain name infrastructure for use by the certification authority industry ... then in theory that same public key binding could be accessed directly ... w/o the need of having a certification authority industry (or certificates).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Mon, 09 Dec 2002 19:35:01 GMToh yes, slightly related thread on SSL
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Mon, 09 Dec 2002 20:27:03 GMTHenrick Hellström writes:
the integrity of the certificate is based on the magic crypto mumbo-jumbo.
the integrity of the information in the certificate is based on the integrity of the authoritative agency responsible for the information (the domain name infrastructure).
logically ... there is a master reference someplace, somewhere for pieces of information .... typically in something that looks like a database account record.
a certification authority ... certifies that it uses due diligence in acquiring that information from the authoritative agency responsible for the information and uses appropriate crypto strength & business processes for copying that information into a certificate. logically, a certificate is a R/O copy of (typically subset and possibly quite stale) some authoritative database piece of information.
the original purpose for certificates was for environments where the relying party was offline and had no recourse to directly contacting the authoritative agency as to the validity of some piece of information (aka analogy is the letters of credit in the days of sailing ships). These days, when matters of real value are involved, it is much more cost effective to use an online, real-time contact directly to the authoritative agency with regard to the information being verified (only resorting to offline, stale, subset information in a certificate when no other possible means was available).
The specific issue with the SSL domain name certificates ... is that something was wanted quickly ... and while the domain name infrastructure was online and realtime ... there were issues with integrity that didn't look like could be quickly resolved ... so the SSL domain name certificates were a temporary solution pending being able to improve the integrity of a (legacy) domain name infrastructure.
However, one of there still remained a significant issue that the certification authority industry were as dependent on the integrity and quality of the information of the domain name infrastructure as the whole rest of the internet.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Mon, 09 Dec 2002 21:06:57 GMT"DD" writes:
this is similar to the kerberos pk-init draft .... public key is registered for the userid at the time the userid is defined ... there is no requirement to know who you are (aka identification) just that you are the entity that established/owns the userid (aka authentication).
the ISP and employee online environments are likely to either be a) a radius infrastructure or b) a kerberos infrastructure (both of which can be certificate-less public key for authentication).
so for employee case. is it better to establish a public key in the employee data base ... and do real-time transactions against that employee database entry ... or to have a (potentially very stale) copy of a subset of that information in a credential targeted for offline use.
so one use might be door-badge system. Some door-badge systems (especially in low-value environments) are offline operations. However, high value operations tend to have online, real-time checking. So a possible issue for target certificate environments are offline and/or very low value operations ... where it doesn't justify to utilize a real-time online environment.
There are two things going against the offline scenario: a) online costs are dropping significantly and online is becoming worldwide ubiquitous (one way or another), b) there is a negative feedback scenario, if the certificates are only used for low-value or no-value operations ... it isn't likely that people are going to pay much for them; if people won't pay much for them, it limits the kind of infrastructure that a CA is able to afford; if the CA can only afford to operate a cut-rate infrastructure; the applicability/usefulness of such certificates becomes even further reduced, people are even going to pay less for a certificate that has even lower value, which means less money for a CA infrastructure, when reduces the value of the certificate.
the other way of looking at it ... is that things of value are not only moving to online ... but moving to various kinds of aggregation and/or patterns of activity. financial transactions are online, aggregation operations ... i.e. not just a value bound on a single transaction ... but value bound on the aggregation of any number of transactions. if you touch the online database ... with the master of the information that is contained in a stale, redundant, superfluous certificate ... is it better for a business process to use the realtime information in the record it has just read ... or the stale information in a certificate that come via who knows what?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cost of computing in 1958? Newsgroups: alt.folklore.computers Date: Tue, 10 Dec 2002 14:33:34 GMTTony Lima writes:
the shortcoming that easy to understand/modify code ... was it tended to become very dirty by people making easy modifications (some programming law of entropy?).
lynn@garlic.com somewhere else recently wrote:
long ago and far away i liked to try and rewrite code to add new
function so that the basic function appeared to be implemented in much
shorter path length and much less code ... and the added new function
appeared to have been implemented in zero pathlength with no
instructions. some of the problems that arose was that traditional
maint. (by others) might result in some things stop working for no
apparent reason (sometimes this could be 10-15 years later). I once
had somebody track me down ten years after a custom kernel had
disappeared into AT&T longlines ... looking for help.
in any case, KISS seems to be out of style ... another observation
somebody recently made ... strong sense that simplifying problems is
not nearly as profitable as other approaches.
random kiss references:
https://www.garlic.com/~lynn/99.html#228 Attacks on a PKI
https://www.garlic.com/~lynn/aadsm10.htm#hackhome Hackers Targeting Home Computers
https://www.garlic.com/~lynn/aadsm10.htm#boyd AN AGILITY-BASED OODA MODEL FOR THE e-COMMERCE/e-BUSINESS ENTERPRISE
https://www.garlic.com/~lynn/aadsm11.htm#10 Federated Identity Management: Sorting out the possibilities
https://www.garlic.com/~lynn/aadsm11.htm#30 Proposal: A replacement for 3D Secure
https://www.garlic.com/~lynn/aadsm12.htm#19 TCPA not virtualizable during ownership change (Re: Overcoming the potential downside of TCPA)
https://www.garlic.com/~lynn/aadsm2.htm#mcomfort Human Nature
https://www.garlic.com/~lynn/aadsm3.htm#kiss1 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss2 Common misconceptions, was Re: KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp-00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss3 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss4 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss5 Common misconceptions, was Re: KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss6 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss7 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss8 KISS for PKIX
https://www.garlic.com/~lynn/aadsm3.htm#kiss9 KISS for PKIX .... password/digital signature
https://www.garlic.com/~lynn/aadsm3.htm#kiss10 KISS for PKIX. (authentication/authorization seperation)
https://www.garlic.com/~lynn/aadsm5.htm#liex509 Lie in X.BlaBla...
https://www.garlic.com/~lynn/aadsm7.htm#3dsecure 3D Secure Vulnerabilities?
https://www.garlic.com/~lynn/aadsm8.htm#softpki10 Software for PKI
https://www.garlic.com/~lynn/aadsmail.htm#comfort AADS & X9.59 performance and algorithm key sizes
https://www.garlic.com/~lynn/aepay3.htm#gaping gaping holes in security
https://www.garlic.com/~lynn/aepay7.htm#nonrep3 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#3dsecure4 3D Secure Vulnerabilities? Photo ID's and Payment Infrastructure
https://www.garlic.com/~lynn/2001.html#18 Disk caching and file systems. Disk history...people forget
https://www.garlic.com/~lynn/2001i.html#51 DARPA was: Short Watson Biography
https://www.garlic.com/~lynn/2001l.html#1 Why is UNIX semi-immune to viral infection?
https://www.garlic.com/~lynn/2001l.html#3 SUNW at $8 good buy?
https://www.garlic.com/~lynn/2002b.html#22 Infiniband's impact was Re: Intel's 64-bit strategy
https://www.garlic.com/~lynn/2002b.html#44 PDP-10 Archive migration plan
https://www.garlic.com/~lynn/2002b.html#59 Computer Naming Conventions
https://www.garlic.com/~lynn/2002c.html#15 Opinion on smartcard security requested
https://www.garlic.com/~lynn/2002d.html#0 VAX, M68K complex instructions (was Re: Did Intel Bite Off MoreThan It Can Chew?)
https://www.garlic.com/~lynn/2002d.html#1 OS Workloads : Interactive etc
https://www.garlic.com/~lynn/2002e.html#26 Crazy idea: has it been done?
https://www.garlic.com/~lynn/2002e.html#29 Crazy idea: has it been done?
https://www.garlic.com/~lynn/2002i.html#62 subjective Q. - what's the most secure OS?
https://www.garlic.com/~lynn/2002k.html#11 Serious vulnerablity in several common SSL implementations?
https://www.garlic.com/~lynn/2002k.html#43 how to build tamper-proof unix server?
https://www.garlic.com/~lynn/2002k.html#44 how to build tamper-proof unix server?
https://www.garlic.com/~lynn/2002m.html#20 A new e-commerce security proposal
https://www.garlic.com/~lynn/2002m.html#27 Root certificate definition
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: I'll see your deep-fried mars-bar.. Newsgroups: alt.folklore.computers Date: Tue, 10 Dec 2002 14:59:49 GMTjmfbahciv writes:
there is the stanford joke ... i think involving mccarthy and minsky and some others at some chinese place on university ... and minsky talking about some stanford phd thesis in preparation and asking a number of questions ... and mccarthy saying something to the effect that everybody understands that ... here lets ask the waiter (of course the waiter happens to be the author). After monthly SLAC meetings, the Oasis or the Blue Goose were typically the choice.
in san jose ... we frequently did pizza ... and for awhile had a real thing for the first Chuck E. Cheese (just off blossom).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: I'll see your deep-fried mars-bar.. Newsgroups: alt.folklore.computers Date: Wed, 11 Dec 2002 14:09:32 GMTjmfbahciv writes:
both oasis and blue goose are probably considered much more of peanut shells and beer place.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Wed, 11 Dec 2002 17:27:56 GMTrecent threads in some other places related to this subject:
and some relation to parts of previous threads:
https://www.garlic.com/~lynn/aepay10.htm#62 VeriSign unveils new online identity verification services
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Secure you PC or get kicked off the net? Newsgroups: alt.computer.security,alt.security,comp.security.firewalls Date: Thu, 12 Dec 2002 15:21:31 GMTcolonel_flagg@NOSOUPFORJ00internetwarzone.org (Colonel Sam Flagg, U.S. Army Intelligence (ret)) writes:
one of the issues brought up is similar to the automobile industry ... nobody will pay for safety features. a combination of personal liability, liability premiums adjusted for kind of vehicle and gov. mandated security features has accomplished quite a bit.
one possible translation of presonal liability is that ISPs automatically adjust the monthly bill based on various kinds of activity (like if your computer is part of certain kinds of attacks, you get zap'ed for operating an unsafe vehicle as well as reckless driving).
the driving licensing issue, in part is because individual shortcomings in a car can have significant consequences like loss of life ... so a minimum level of competency has been deemed necessary. However in the auto analogy, being hit with much higher insurance premiums as well as fines for both a) operating unsafe vehicle and b) reckless driving has been a significant mitigating factor ... along with some gov. mandated safety standards.
https://www.garlic.com/~lynn/2001m.html#27 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
https://www.garlic.com/~lynn/2001m.html#28 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
https://www.garlic.com/~lynn/2001m.html#29 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
https://www.garlic.com/~lynn/2001m.html#30 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
so, lets say that you recklessly drive (program some threat) and/or operate an unsafe vehicle (virus takes over your machine) on the internet ... you just get hit with much larger charges.
people then are motivated to buy original equipment with appropriate safty measures and/or have aftermarket equipment installed. People don't need to understand the technology ... any more than many people understand details of auto technology. appropriate original equipment and aftermarket safety features may even come with warranties that re-imburse the person for safety failures that result in hitting the person's pocket book.
one of the issues raised in the previous thread was can individual ISP be relied upon to enforce the traffic laws and appropriately collect fines (aka boundary packet filtering & virus checking rules are appropriately installed and customers get hit with additional charges for everything that trips the filters).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Western Union data communications? Newsgroups: alt.folklore.computers Date: Thu, 12 Dec 2002 15:44:36 GMTJoel Gallun writes:
another issue was satellites designed to fit in the cargo bay of the shuttle ... and shuttle launch shutdown after the accident ... and a lot of the business wandering away to fiber. the other was some satellites getting larger than what would fit in the shuttle bay ... and needing to find alternative launch capability that supported larger form factor satellites.
we (aka hsdt/high speed data transport) ... had small high speed
backbone running with fiber links as well as three hsdt tdma
earthstations (two were in northern us with 4.5m dishes ... one in
southern us that needed 7m dish). I had done some amount of protocol
optimization as well as rate-based pacing algorithm for high speed
activity misc. hsdt posts:
https://www.garlic.com/~lynn/subnetwork.html#hsdt
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Vector display systems Newsgroups: alt.folklore.computers Date: Wed, 11 Dec 2002 22:28:13 GMTibm had these 2250s in the 60s. the university that i was at had a 2250 with its own controller and directly attached to ibm mainframe channel.
the science center had a 2250m4 ... which was a 2250 with a 1130. somebody ported space wars to the science center's 1130 & played on the 2250 (two person; had the keyboard split in have and each player had a set of keys for the various functions).
ibm eventually came out with a replacement called the 3250 ... which i believe were relogo'ed from sanders. The later replacement, 5080 was also possibly relogo'ed from sanders.
attempt to use search engine didn't come up with much:
http://www-2.cs.cmu.edu/afs/cs/usr/ph/www/nyit/morrison/1960s.txt
http://www.upfrontezine.com/1999/upf-135.htm
A graphics device earlier than 3250 was the 3277ga (aka graphics attachment) ... a relogo'ed tektronics device ... that had special attachment into the side of 3277 terminal display. It basically used the 3272 channel attached bcontrollerb for high data rates from the processor.
note in the following:
http://www.nfrpartners.com/comphistory/
edit, moved to & 2250 ref. fixed
https://web.archive.org/web/20030115091035/http://home.maine.rr.com/jhcphoto/
the picture identified as "2250 being used as operator console" is 9track tape drive.
at the bottom of the above page are pictures of 3250 and 5080.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Sci Fi again Newsgroups: alt.folklore.computers Date: Thu, 12 Dec 2002 19:06:40 GMTeugene@cse.ucsc.edu (Eugene Miya) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Western Union data communications? Newsgroups: alt.folklore.computers Date: Thu, 12 Dec 2002 19:15:34 GMTAnne & Lynn Wheeler writes:
and ha/cmp could be considered outgrowth of marrying hsdt to earlier
experience in tightly-coupled & loosely-coupled systems:
https://www.garlic.com/~lynn/subtopic.html#hacmp
as well as later electronic commerce stuff:
https://www.garlic.com/~lynn/aadsm5.htm#asrn3
https://www.garlic.com/~lynn/aadsm5.htm#asrn2
previous postings on connecting threads:
https://www.garlic.com/~lynn/2001i.html#52 misc loosely-coupled, sysplex, cluster, supercomputer, & electronic commerce
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Western Union data communications? Newsgroups: alt.folklore.computers Date: Thu, 12 Dec 2002 19:45:12 GMTAnne & Lynn Wheeler writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Western Union data communications? Newsgroups: alt.folklore.computers Date: Thu, 12 Dec 2002 21:27:57 GMTjchausler writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: VSE (Was: Re: Refusal to change was Re: LE and COBOL) Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Fri, 13 Dec 2002 02:06:53 GMTted.macneil@mobile.rogers.com (ted.macneil) writes:
the profs group picked up a number of different applications and smashed them all together. the email application they picked up was primitive/early version of an application called vmsg. later when the author of vmsg questioned why they were using such an early/primitive version in the product ... there was some difference of opinion ... however the author was able to demonstrate that his initials existed in an internal control field in all PROFS (aka VMSG) messages. After that he stopped open source distribution and only shared source with me and one other.
misc. profs &/or vmsg refs:
https://www.garlic.com/~lynn/99.html#35 why is there an "@" key?
https://www.garlic.com/~lynn/2000c.html#46 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000e.html#20 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2001j.html#35 Military Interest in Supercomputer AI
https://www.garlic.com/~lynn/2001k.html#35 Newbie TOPS-10 7.03 question
https://www.garlic.com/~lynn/2001k.html#39 Newbie TOPS-10 7.03 question
https://www.garlic.com/~lynn/2001k.html#40 Newbie TOPS-10 7.03 question
https://www.garlic.com/~lynn/2001k.html#56 E-mail 30 years old this autumn
https://www.garlic.com/~lynn/2002f.html#14 Mail system scalability (Was: Re: Itanium troubles)
https://www.garlic.com/~lynn/2002h.html#58 history of CMS
https://www.garlic.com/~lynn/2002h.html#59 history of CMS
https://www.garlic.com/~lynn/2002h.html#64 history of CMS
https://www.garlic.com/~lynn/2002i.html#50 CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002j.html#4 HONE, , misc
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: I'll see your deep-fried mars-bar.. Newsgroups: alt.folklore.computers Date: Fri, 13 Dec 2002 22:25:19 GMT"Charlie Gibbs" writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: January 7, 2003: "25 years of Hennessy & Patterson" PARC auditorium, Palo Alto Newsgroups: alt.folklore.computers Date: Fri, 13 Dec 2002 23:58:43 GMT... forwarded ....
old_systems_guy@yahoo.com (John Mashey) writes:
This is sponsored by Computer History Museum,
www.computerhistory.org/events/latest,
keep an eye on website for details in a couple
weeks (this is an early warning for comp.arch fans).
Host/interviewer - mash, really @ heymash.com.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Newbie: Two quesions about mainframes. Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Sat, 14 Dec 2002 22:32:04 GMTdunklervater@yahoo.com (DV) writes:
misc. apl refs:
https://www.garlic.com/~lynn/subtopic.html#hone
other examples are various general commercial time-sharing services based on cp/67 and later vm/370 ... that depended on general users couldn't crash &/or compromise the system (tymshare, idc, ncss, etc).
lots of random postings about commercial time-sharing
https://www.garlic.com/~lynn/2000b.html#61 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000d.html#40 360 CPU meters (was Re: Early IBM-PC sales proj..
https://www.garlic.com/~lynn/2000e.html#9 Checkpointing (was spice on clusters)
https://www.garlic.com/~lynn/2000f.html#52 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000f.html#69 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000g.html#4 virtualizable 360, was TSS ancient history
https://www.garlic.com/~lynn/2000g.html#22 No more innovation? Get serious
https://www.garlic.com/~lynn/2000g.html#31 stupid user stories
https://www.garlic.com/~lynn/2001b.html#15 Linux IA-64 interrupts [was Re: Itanium benchmarks ...]
https://www.garlic.com/~lynn/2001b.html#50 IBM 705 computer manual
https://www.garlic.com/~lynn/2001g.html#30 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001g.html#32 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001g.html#33 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001g.html#35 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001h.html#35 D
https://www.garlic.com/~lynn/2001h.html#59 Blinkenlights
https://www.garlic.com/~lynn/2001i.html#44 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001m.html#1 ASR33/35 Controls
https://www.garlic.com/~lynn/2001m.html#44 Call for folklore - was Re: So it's cyclical.
https://www.garlic.com/~lynn/2001m.html#51 Author seeks help - net in 1981
https://www.garlic.com/~lynn/2001m.html#54 Author seeks help - net in 1981
https://www.garlic.com/~lynn/2001m.html#55 TSS/360
https://www.garlic.com/~lynn/2001n.html#10 TSS/360
https://www.garlic.com/~lynn/2002b.html#2 Microcode? (& index searching)
https://www.garlic.com/~lynn/2002c.html#44 cp/67 (coss-post warning)
https://www.garlic.com/~lynn/2002e.html#47 Multics_Security
https://www.garlic.com/~lynn/2002f.html#59 Blade architectures
https://www.garlic.com/~lynn/2002g.html#4 markup vs wysiwyg (was: Re: learning how to use a computer)
https://www.garlic.com/~lynn/2002h.html#34 Computers in Science Fiction
https://www.garlic.com/~lynn/2002h.html#43 IBM doing anything for 50th Anniv?
https://www.garlic.com/~lynn/2002h.html#50 crossreferenced program code listings
https://www.garlic.com/~lynn/2002h.html#60 Java, C++ (was Re: Is HTML dead?)
https://www.garlic.com/~lynn/2002i.html#44 Unisys A11 worth keeping?
https://www.garlic.com/~lynn/2002i.html#48 CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002i.html#62 subjective Q. - what's the most secure OS?
https://www.garlic.com/~lynn/2002i.html#63 Hercules and System/390 - do we need it?
https://www.garlic.com/~lynn/2002i.html#64 Hercules and System/390 - do we need it?
https://www.garlic.com/~lynn/2002i.html#69 Hercules and System/390 - do we need it?
https://www.garlic.com/~lynn/2002l.html#53 10 choices that were critical to the Net's success
https://www.garlic.com/~lynn/2002l.html#56 10 choices that were critical to the Net's success
https://www.garlic.com/~lynn/2002l.html#61 10 choices that were critical to the Net's success
https://www.garlic.com/~lynn/2002l.html#62 Itanium2 performance data from SGI
https://www.garlic.com/~lynn/2002l.html#64 10 choices that were critical to the Net's success
https://www.garlic.com/~lynn/2002m.html#61 The next big things that weren't
https://www.garlic.com/~lynn/2002n.html#27 why does wait state exist?
https://www.garlic.com/~lynn/2002n.html#32 why does wait state exist?
https://www.garlic.com/~lynn/2002n.html#54 SHARE MVT Project anniversary
https://www.garlic.com/~lynn/2002n.html#67 Mainframe Spreadsheets - 1980's History
https://www.garlic.com/~lynn/2002n.html#73 Home mainframes
there has also been some discussion about the security evaluated
version of VAX/VMS was done by implementating some sort of virtual
machine layer for (secure) vms. random secure vms refs:
https://www.garlic.com/~lynn/2002i.html#62 subjective Q. - what's the most secure OS?
https://www.garlic.com/~lynn/2002m.html#72 Whatever happened to C2 "Orange Book" Windows security?
https://www.garlic.com/~lynn/2002m.html#76 Whatever happened to C2 "Orange Book" Windows security?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: 20th anniversary of the internet (fwd) Newsgroups: alt.folklore.computers Date: Sun, 15 Dec 2002 12:44:40 GMTsomewhat related discussions:
index of rfcs
https://www.garlic.com/~lynn/rfcietff.htm
forwarded:
From: Bob Braden <braden@ISI.EDU>
Date: Sat, 14 Dec 2002 10:08:38 -0800 (PST)
To: ietf@ietf.org
Cc: internet-history@postel.org
Subject: The 20th anniversary of the Internet
We ought not to let pass unnoticed the impending 20th anniversary of
the Internet. The most logical date of origin of the Internet is
January 1, 1983, when the ARPANET officially switched from the NCP
protocol to TCP/IP. Six months later, the ARPANET was split into the
two subnets ARPANET and MILNET, which were connected by Internet
gateways (routers).
The planning for the January 1983 switchover was fully documented in
Jon Postel in RFC 801. The week-by-week progress of the transition was
reported in a series of 15 RFCs, in the range RFC 842 - RFC 876, by
UCLA student David Smallberg.
There may still be a few remaining T shirts that read, "I Survived the
TCP/IP Transition". People sometimes question that any geeks would
have been in machine rooms on January 1. Believe it!! Some geeks got
very little sleep for a few days (and that was before the work "geek"
was invented, I believe.)
So, on New Year's Eve, hoist one for the 20th anniversary of the
Internet.
Bob Braden
____________________________________________________
Routers brought to you by Bob Hinden of BBN.
Prominent survivors included Dan Lynch of Interop fame.
And of course Vint Cerf was working the Levers of Power at
ARPA.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: 20th anniversary of the internet (fwd) Newsgroups: alt.folklore.computers Date: Sun, 15 Dec 2002 18:29:19 GMTin addition to previous posts about the transition
another one (and while i have the 1/9 memo, i haven't found a copy of
the referenced 1/7 memo)
Date: 9 Jan 83 0:13:36-EST (Sun)
From: G. B. Reilly <reilly@udel-relay>
To: pn-liaisons at udel-relay
cc: csnet-mc at bbn-unix, mimno at bbn-unix
Subject: Re: Problems with TCP cutover
Via: UDel; 9 Jan 83 18:21-PDT
Via: rand-relay; 10 Jan 83 6:30-EST
Dear Site Liaisons,
Because the University of Delware's Relay is dually connected in the
ARPAnet (both NCP and TCP/IP access) most of the sites mentioned in
Nancy Mimno's message of January 7, 1983 still accessible to CSNET Phonenet
sites.
Specifically, we still exchange mail with CMU, MIT and Stanford. To
the best of my knowledge, NYU, Yale and Rochester will only be accessible
at some future date as TCP/IP hosts.
Brendan Reilly
East Coast Relay Liaison
... snip ... top of post, old email index
and something slightly different from the period
Date: 22 Nov 1982 10:40:54-PST (Monday)
From: Lynn Wheeler <WHEELER@IBM-SJ>
To: ???@mit-ai
Subject: IBM CSNET background info
following append is background info on IBM CSNET:
Welcome to CSNET! The link is still experimental. Delivery seems to
be certain, but may be delayed for a day or so sometimes. I thought
it more important to make this link available as early as possible
instead of having everything perfect.
Mail can be sent to CSNET using the MAIL EXEC. The exec gets
information about you from PROFILE MAIL, so please edit this file
to customize it for you. The MAIL EXEC should NOT be edited.
Invoke the MAIL exec by simply typing 'mail'. It will ask you for the
To:, Subject:, and CC: (optional) fields. It will pick a number <n>
that's not in use on your disk and save the message as
P<userid>.MAIL<n>. Enter the body of the message (end by hitting
ENTER twice), then exit from XEDIT or RED by saying FILE. The exec
will ask you if you want to submit the mail, and send it to IBMCSNET
if you do.
The exec requires that you have REX installed (do REX I), and uses the
XEDIT or RED editor. If you make any changes to improve this exec,
please initial them in a comment and send the exec back to me.
The MAIL EXEC saves your mail message as the file P<name>.MAIL<n>,
where n is some number that doesn't conflict with previous messages
that you have on your disk. If you want it to pick a different <n>,
or a free <n> larger than some number, just call the MAIL exec with
that number as a parameter (e.g., 'MAIL 11').
Received mail will be sent to your reader as files with name
L<time-stamp>.MAIL. When you read them in with RD or VRDR, they will
automatically be added to your mail log. The "L" stands for Local
mail, and the "P" in outgoing mail stands for POBox mail, i.e. mail
going to the "P.O. boxes" in the CSNET relay. Please send a short
acknowledgment to IBMCSNET when you have successfully received a
message, so I can delete it from the disk. This will later be
automated as well.
Addresses are formed in the following way: If your userid is on
SJRLVM1, then your address is <userid>@IBM-SJ. If you are on some
other machine in San Jose, your address is <userid>.<nodeid>@IBM-SJ,
and if you are at some other location use <userid>.<nodeid>@IBM. IBM
and IBM-SJ are synonyms right now, but may not be so in the future,
hence the distinction. Alternately, if you have an alias in NAMES
RMSG on the SJRLVM1 system disk, people may send mail to you also at
address <alias>@IBM-SJ. In outgoing mail, you actual userid will appear.
I will NOT administer any additions to NAMES RMSG during this try-out
period.
The address as formed above is a valid CSNET address. When you send
a message to the Arpanet, any address in the message header of the form
<anystring>@<csnet-host> will be automatically converted to the form
that has to be used when sending a message to you from the Arpanet,
namely: <anystring>.<csnet-host>@UDel-Relay. This conversion will
NOT be made for addresses contained in the text.
Do not send any classified material on this network. If you
correspond with anyone connected with a competitor, you should
probably send him/her a message explaining that anything he sends will
be considered non-proprietary. A permanent record will exist of all
messages that enter or exit the network, containg sender and
recipient, the length of the message, and the time it was
sent/received. In addition, the content of messages can be inspected
at any time by an auditor. During the trial-out period messages will
to some extent be handled manually by me, so you might want to avoid
information of a personal nature (which you might want to avoid
anyway, since messages may be viewed by network administrators in
several places).
Send all mail and acknowledgments to SJRLVM1(IBMCSNET), but send
comments and questions to SJRLVM1(?????).
P.S. You can test the connection out by sending a message to yourself.
It will be sent to the relay and returned at the next poll. The
relay polls three times a day, at 3pm, 8 pm, and 2 am. I may get to us
anywhere between 0-2 hours after this start time, depending on load.
Let me know if you have any problems, and remember: Be understanding!
... snip ... top of post, old email index, HSDT email
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Linux paging Newsgroups: bit.listserv.ibm-main Date: Sun, 15 Dec 2002 18:40:36 GMToldtimer@WANADOO.FR (Bruno Sugliani) writes:
LPARS was a minior extension of pr/sm ... not actually requiring the VM operating system to be present with a limited set of specific options.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Music to craft code by ... Newsgroups: alt.folklore.computers Date: Sun, 15 Dec 2002 18:33:44 GMTresearchers find brain center of music appreication
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Beyond 8+3 ... Newsgroups: alt.folklore.computers Date: Sun, 15 Dec 2002 19:58:43 GMTlars@bearnip.com (Lars Duening) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: cost of crossing kernel/user boundary Newsgroups: comp.arch Date: Sun, 15 Dec 2002 20:24:25 GMTOliver Dain writes:
attempting to address this stuff in hardware, try the whole access register stuff. it somewhat started out as
1) some of the 3033 cross-memory stuff ... which was a solution to running out of addressability with both kernel & application resident in the same 16mbyte address space (originally data)
2) moving system services library code resident in application space to different address space and some limited changes in privileges (w/o having to go all the way to kernel mode) ... effectively trying to have some of the efficiencies of subroutine library call with some of the things that happen for change of privileges that come with a kernel call
3) high cost of forcing things thru single/common kernel interrupt structure
misc past cross-memory &/or access register postings (in the foloowing
there are some URL pointers to access register detailed implementation
description in POP):
https://www.garlic.com/~lynn/98.html#11 S/360 operating systems geneaology
https://www.garlic.com/~lynn/98.html#36 What is MVS/ESA?
https://www.garlic.com/~lynn/2000c.html#35 What level of computer is needed for a computer to Love?
https://www.garlic.com/~lynn/2000c.html#83 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000c.html#84 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000d.html#28 RS/6000 vs. System/390 architecture?
https://www.garlic.com/~lynn/2000e.html#57 Why not an IBM zSeries workstation?
https://www.garlic.com/~lynn/2000g.html#28 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2001d.html#28 Very CISC Instuctions (Was: why the machine word size ...)
https://www.garlic.com/~lynn/2001d.html#30 Very CISC Instuctions (Was: why the machine word size ...)
https://www.garlic.com/~lynn/2001h.html#73 Most complex instructions
https://www.garlic.com/~lynn/2001k.html#16 Minimalist design (was Re: Parity - why even or odd)
https://www.garlic.com/~lynn/2002d.html#51 Hardest Mistake in Comp Arch to Fix
https://www.garlic.com/~lynn/2002g.html#5 Black magic in POWER5
https://www.garlic.com/~lynn/2002g.html#17 Black magic in POWER5
https://www.garlic.com/~lynn/2002h.html#21 PowerPC Mainframe
https://www.garlic.com/~lynn/2002l.html#57 Handling variable page sizes?
includes url pointer to pop ... plus table of contents of some of the factilities
https://www.garlic.com/~lynn/2002n.html#74 Everything you wanted to know about z900 from IBM
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Linux paging Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 16 Dec 2002 00:35:30 GMTjcewing@ACM.ORG (Joel C. Ewing) writes:
Starting with 370/158 & 370/168 there was microcode enhancement called VM-assist ... that specific setting in control register put the machine in virtual machine mode ... and certain "supervisor" instructions had the additional microcode changes so that they would be executed in either real-machine mode or virtual-machine mode. Also in the same time-frame ... the 370/148 got both VM-assist microcode enhancements as well as an extended set of processor instructions that implemented parts of the CP kernel.
The 158 & 168 machines were horizontal microcode instructions
... where thruput was typically measured in avg. 370 instruction per
machine cycle. An example was that in the transition from 165 to the
168 they manage to drop the avg. 370 instructions per machine cycle
from 2.1 to 1.6. The low & mid range 370s were verticle microcode
machines ... their programming is much more like current
microprocessors and they were rated in avg. number of microcode
instructions per 370 instruction which ran about ten. Basically for
the 148 ... in addition to the VM-assist type things done for 158/168
(certain privilege instructions were given microcode that implemented
both real machine & virtual machine modes) ... certain CP kernel code
sequences were dropped into microcode (typically on a byte-for-byte
basis with a ten to one performance speed-up). The CP kernel then
had new "B2" opcodes inserted it it which would invoke the new kind
of microcode operations. boot/ipl would determine if it wasn't running
on a machine and no-op all these "B2" instructions if necessary. More
on the mcode for the 148 (and follow-on machines)):
https://www.garlic.com/~lynn/94.html#21 370 ECPS VM microcode assist
https://www.garlic.com/~lynn/94.html#27 370 ECPS VM microcode assist
https://www.garlic.com/~lynn/94.html#28 370 ECPS VM microcode assist
As an aside, CP kernel has always had a unique (for os/360 derived operating systems) that the kernel code didn't operate in the same address space as the application (virtual machine). As a result, CP required an instruction that both changed address space and changed privilege state (problem/supervisor) in a single instruction. MVS with kernel code occupying the same address space as the application didn't have this requirement.
Along comes 3081 and 370-XA ... the VM microcode assists from the
earlier machines was greatly extended with the SIE instruction
.... which basically had a whole list of virtual machine related
control blocks and put the machine in virtual machine mode (as opposed
to putting the machine into problem-state ... with a special control
register contents which was checked by the microcode of various
privilege instructions). various past SIE instruction postings:
https://www.garlic.com/~lynn/94.html#37 SIE instruction (S/390)
https://www.garlic.com/~lynn/2000b.html#51 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#52 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2001h.html#71 IBM 9020 FAA/ATC Systems from 1960's
https://www.garlic.com/~lynn/2001h.html#73 Most complex instructions
https://www.garlic.com/~lynn/2001m.html#38 CMS under MVS
https://www.garlic.com/~lynn/2001m.html#53 TSS/360
https://www.garlic.com/~lynn/2002b.html#6 Microcode?
https://www.garlic.com/~lynn/2002b.html#44 PDP-10 Archive migration plan
https://www.garlic.com/~lynn/2002o.html#15 Home mainframes
https://www.garlic.com/~lynn/2002o.html#18 Everything you wanted to know about z900 from IBM
I had first started doing something i made up in the '60s which i called fastpath, basically special optimized code sequences ... in places like the interrupt handlers and other highly used locations. Sometimes this got 100:1 performance improvement for the most common case (as opposed to 10:1 that the ecps microcode changes got). However,
I gave a number of talks at SHARE and BayBunch (bay area VM user group
meeting held monthly at SLAC) about the effects of doing fastpath in
interrupt handlers for various special code sequences and the
difference between highly optimized CP paths versis microcode assists
(one of the savings in microcode assists for privilege instruction
execution was not having to save/restore registers and other house
keeping ... that the microcode could avoid). somewhat related recent
posting about crossing kernel/user boundary
https://www.garlic.com/~lynn/2002p.html#43 cost of crossing kernel/user boundary
various old fastpath postings
https://www.garlic.com/~lynn/94.html#2 Schedulers
https://www.garlic.com/~lynn/94.html#54 How Do the Old Mainframes
https://www.garlic.com/~lynn/95.html#1 pathlengths
https://www.garlic.com/~lynn/96.html#0a Cache
https://www.garlic.com/~lynn/97.html#22 Pre S/360 IBM Operating Systems?
https://www.garlic.com/~lynn/97.html#28 IA64 Self Virtualizable?
In any case, a couple of Amdahl baybunch attendees said that they were going to do a greatly enhanced SIE type implementation for special case of virtual machine that didn't page (i.e. there was one real page for every virtual page) based on some of my analysis. they touted the Amdahl macrocode feature for the implementation. The high-end horizontal microcode machines were extremely difficult to microcode. Macrocode on the Amdahl machines was a special intermediate mode .... that used a restricted subset of the 370 instruction set that code be easily loaded into the personality of the machine ... and also had the characteristic that it had its own state/registers. Without the difficult programming typically associated with horizontal microcoding ... they could finish a complete virtual machine mode for all privilege instructions.
when they finished ... they gave a baybunch presentation on basically what was a new state ... problem state, privilege state, and effectively an extended version of the SIE instruction with complete coverage of all privilege instructions running in virtual machine mode (for the special case of where the CP kernel didn't page the virtual machine ... there was a real page for every virtual machine page) ... and allowed some operating system (say MVS) to run in a subset of the machine (at effectively no degradation) ... shared with a VM operating system.
PR/SM was the IBM reaction.
LPARs are an extension of PR/SM
slightly related recent posting on vmesa-l mailing list
https://www.garlic.com/~lynn/2002p.html#4 Running z/VM 4.3 in LPAR & guest v-r or v-f
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Linux paging Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 16 Dec 2002 04:04:16 GMTedjaffe@PHOENIXSOFTWARE.COM (Edward E. Jaffe) writes:
aix/370 (& aix/ps2) was port of UCLA's locus .. process migration, distributed file system, ala nfs, but with distributed file cachine, ala afs ... but supported partial file caching (compared to full file caching of afs).
in some sense it was all the stuff that SAA wanted to be.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Linux paging Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 16 Dec 2002 04:17:59 GMTibm-main@LDWOREN.NET (Leonard Woren) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Linux paging Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 16 Dec 2002 04:52:40 GMTanother aspect of the assurance/integrity question is security types issues. this came up recently in a thread here with regard to virtual machine paradigm being able to provide isolation and possibly compartmentalism from a security standpont.
the example was the number of production timesharing services cited in
the above ... including HONE which was the internal online system that
all branch offices operated off of ... and observation that starting
with the 370 115/125 ... it was not possible to order a machine w/o
using HONE:
https://www.garlic.com/~lynn/subtopic.html#hone
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Linux paging Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 16 Dec 2002 04:34:27 GMTibm-main@LDWOREN.NET (Leonard Woren) writes:
1) provided for a single instruction switch from the CP kernel privilege state and the CP address space (remember CP kernel doesn't reside in the address space of the virtual machine) to the virtual machine mode and the virtual machine address space.
2) made the transaction from VM-assist paradigm (the micrcode of each privilege instruction checking for the control register indication that if a privilege instruction was executed in non-privilege mode ... it checks CR6 for indication that it is in VM-assist mode) ... to the invokation of the SIE instruction used for indicating that the machine is operating in virtual machine mode.
it wasn't the dispatching in the sense of selecting the next task to
run ... but it was the part of the dispatcher code that switched
registers, address space registers, psws, etc to the virtual machine.
it is basically equivalent of the following piece segment of code
... from the analysis for the 148/4341 ECPS microcode:
https://www.garlic.com/~lynn/94.html#21 370 ECPS VM microcode assist
path count time percent
(mics) cp
dsp+8d2 to dsp+c84 67488 374. 9.75
from 'unstio' end to enter problem state
pr/sm was pretty much ibm re-action to Amdahl's implementation (which
for Amdahl was greatly simplified by being able to do the implementation
in "macrocode"). previous post
https://www.garlic.com/~lynn/2002p.html#44 Linux paging
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Linux paging Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 16 Dec 2002 15:45:55 GMTpa3efu@YAHOO.COM (Jan Jaeger) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Mon, 16 Dec 2002 16:30:23 GMTpgut001@cs.auckland.ac.nz (Peter Gutmann) writes:
one problem is that a signing only key could still be utilized in two different modes a) authentication and b) digital signing. The problem is that if a signing only key is ever used for authentication (say like signing something in a challenge/response type protocol) then can it ever be trusted in a digital signing context where it is implied that the person approves the content of the thing being signed. In a challenge/response scenario, the person isn't actually likely to look at the bits being signed ... and so therefor can't be assumed to be approving the meaning of the bits being signed (like in a legal contract). Then you start to get into all sorts of complications is could a legal contract be substituted for the bits in a challenge/response ... and the digital signature starts to have further cracks.
misc. recent discussion on the subject:
https://www.garlic.com/~lynn/aadsm12.htm#5 NEWS: 3D-Secure and Passport
https://www.garlic.com/~lynn/aadsm12.htm#12 TOC for world bank e-security paper
https://www.garlic.com/~lynn/aadsm12.htm#24 Interests of online banks and their users [was Re: Cryptogram: Palladium Only for DRM]
https://www.garlic.com/~lynn/aadsm12.htm#30 Employee Certificates - Security Issues
https://www.garlic.com/~lynn/aadsm12.htm#37 Legal entities who sign
https://www.garlic.com/~lynn/aadsm12.htm#38 Legal entities who sign
https://www.garlic.com/~lynn/aadsm12.htm#54 TTPs & AADS Was: First Data Unit Says It's Untangling Authentication
https://www.garlic.com/~lynn/aadsm12.htm#59 e-Government uses "Authority-stamp-signatures"
the other scenario is keys used for encryption. it isn't much of a problem with encryption for data in flight/transit since that is very transitory. the issue is a corporate context where the key may be used for encryption of data at rest ... and that data at rest represents significant corporate assets. most corporations will have typically invested lots of money in various kinds of backups and disaster recovery scenarios with no single point of failure. From a corporate disaster recovery ... would the person and/or the key represent a single point of failure ... that could result in loss of significant corporate assets.
signing keys and encrypting keys are fundamentally totally different business process ... even tho they rely on similar technology. there are some business reasons for establishing that a signing key may be available to one and only one person. there are also significant business reasons (like disaster recovery) for establishing that encryption keys are NEVER only available to one and only one person.
there is sometimes a confusion because the two totally different business operations rely on similar technology ... that the business rules for both should be similar. This is where people confuse business rules based on the similarity of the technology rather than based on fundamental business processes.
when talking about encrypting keys involving encryption of corporate assets (typically at rest, rather than in transit) ... they would be foolish to have single point of failure (the person and/or key). they go to a great deal of trouble not to have a single point of failure and frequently have implemented extensive (and expensive) no-single-point-of-failure, disaster/recovery plans. in these cases where corporate data encrypted under control of such keys ... it is purely business decisions whether the person is responsible for generating such a key pair (and registering both) or the corporate facility is responsible for generating the key pair (and issuing them).
this is all totally independent of whether certification authorities are necessary for use of public keys in any of these business processes. There are lots of reasons why there might be registration authorities for public keys (both the signing kind and the encrypting kind) as well as registration authorities for private keys (for the encrypting kind). But just because there may be need for lots of registration authorities (public, private, distributed, one for each business process, etc) doesn't necessarily follow that there is also a requirement for certification authorities in the sense that such certification authorities sell/issue public key certificates (as defined in most traditional PKI definitions).
lots of references to certificate-less public key infrastructure:
https://www.garlic.com/~lynn/x959.html#aads
https://www.garlic.com/~lynn/subpubkey.html#publickey
misc. recent postings related to certificate-less pki operation:
https://www.garlic.com/~lynn/aadsm12.htm#6 NEWS: 3D-Secure and Passport
https://www.garlic.com/~lynn/aadsm12.htm#22 draft-ietf-pkix-warranty-ext-01
https://www.garlic.com/~lynn/aadsm12.htm#26 I-D ACTION:draft-ietf-pkix-usergroup-01.txt
https://www.garlic.com/~lynn/aadsm12.htm#27 Employee Certificates - Security Issues
https://www.garlic.com/~lynn/aadsm12.htm#28 Employee Certificates - Security Issues
https://www.garlic.com/~lynn/aadsm12.htm#32 Employee Certificates - Security Issues
https://www.garlic.com/~lynn/aadsm12.htm#39 Identification = Payment Transaction?
https://www.garlic.com/~lynn/aadsm12.htm#41 I-D ACTION:draft-ietf-pkix-sim-00.txt
https://www.garlic.com/~lynn/aadsm12.htm#42 draft-ietf-pkix-warranty-extn-01.txt
https://www.garlic.com/~lynn/aadsm12.htm#51 Frist Data Unit Says It's Untangling Authentication
https://www.garlic.com/~lynn/aadsm12.htm#54 TTPs & AADS Was: First Data Unit Says It's Untangling Authentication
https://www.garlic.com/~lynn/aepay10.htm#31 some certification & authentication landscape summary from recent threads
https://www.garlic.com/~lynn/aepay10.htm#35 some certification & authentication landscape summary from recent threads
https://www.garlic.com/~lynn/aepay10.htm#46 x9.73 Cryptographic Message Syntax
https://www.garlic.com/~lynn/aepay10.htm#65 eBay Customers Targetted by Credit Card Scam
https://www.garlic.com/~lynn/2002o.html#57 Certificate Authority: Industry vs. Government
https://www.garlic.com/~lynn/2002o.html#67 smartcard+fingerprint
https://www.garlic.com/~lynn/2002p.html#11 Cirtificate Authorities 'CAs', how curruptable are they to
https://www.garlic.com/~lynn/2002p.html#21 Cirtificate Authorities 'CAs', how curruptable are they to
https://www.garlic.com/~lynn/2002p.html#22 Cirtificate Authorities 'CAs', how curruptable are they to
random disaster/recover & points of failure postings:
https://www.garlic.com/~lynn/93.html#28 Log Structured filesystems -- think twice
https://www.garlic.com/~lynn/94.html#16 Dual-ported disks?
https://www.garlic.com/~lynn/94.html#33a High Speed Data Transport (HSDT)
https://www.garlic.com/~lynn/96.html#8 Why Do Mainframes Exist ???
https://www.garlic.com/~lynn/96.html#31 Mainframes & Unix
https://www.garlic.com/~lynn/99.html#34 why is there an "@" key?
https://www.garlic.com/~lynn/99.html#67 System/1 ?
https://www.garlic.com/~lynn/99.html#145 Q: S/390 on PowerPC?
https://www.garlic.com/~lynn/99.html#184 Clustering systems
https://www.garlic.com/~lynn/99.html#207 Life-Advancing Work of Timothy Berners-Lee
https://www.garlic.com/~lynn/aadsm2.htm#availability A different architecture? (was Re: certificate path
https://www.garlic.com/~lynn/aadsm8.htm#softpki9 Software for PKI
https://www.garlic.com/~lynn/aadsm9.htm#pkcs12 A PKI Question: PKCS11-> PKCS12
https://www.garlic.com/~lynn/aadsm9.htm#pkcs12d A PKI Question: PKCS11-> PKCS12
https://www.garlic.com/~lynn/aepay2.htm#cadis disaster recovery cross-posting
https://www.garlic.com/~lynn/aadsmail.htm#mfraud AADS, X9.59, security, flaws, privacy
https://www.garlic.com/~lynn/aadsm10.htm#diskcrypt Looking back ten years: Another Cypherpunks failure (fwd)
https://www.garlic.com/~lynn/2001.html#33 Where do the filesystem and RAID system belong?
https://www.garlic.com/~lynn/2001.html#34 Competitors to SABRE?
https://www.garlic.com/~lynn/2001d.html#46 anyone have digital certificates sample code
https://www.garlic.com/~lynn/2001f.html#15 Medical data confidentiality on network comms
https://www.garlic.com/~lynn/2001i.html#31 3745 and SNI
https://www.garlic.com/~lynn/2001i.html#52 misc loosely-coupled, sysplex, cluster, supercomputer, & electronic commerce
https://www.garlic.com/~lynn/2001k.html#13 HP-UX will not be ported to Alpha (no surprise)exit
https://www.garlic.com/~lynn/2001l.html#14 mainframe question
https://www.garlic.com/~lynn/2002.html#44 Calculating a Gigalapse
https://www.garlic.com/~lynn/2002c.html#7 Opinion on smartcard security requested
https://www.garlic.com/~lynn/2002d.html#43 Mainframers: Take back the light (spotlight, that is)
https://www.garlic.com/~lynn/2002e.html#10 Deleting files and emails at Arthur Andersen and Enron
https://www.garlic.com/~lynn/2002e.html#67 Blade architectures
https://www.garlic.com/~lynn/2002e.html#68 Blade architectures
https://www.garlic.com/~lynn/2002f.html#4 Blade architectures
https://www.garlic.com/~lynn/2002h.html#40 [survey] Possestional Security
https://www.garlic.com/~lynn/2002j.html#43 Killer Hard Drives - Shrapnel?
https://www.garlic.com/~lynn/2002k.html#8 Avoiding JCL Space Abends
https://www.garlic.com/~lynn/2002l.html#5 What good is RSA when using passwords ?
https://www.garlic.com/~lynn/2002l.html#15 Large Banking is the only chance for Mainframe
https://www.garlic.com/~lynn/2002m.html#22 DOS history question
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Linux paging Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 16 Dec 2002 15:45:55 GMTpa3efu@YAHOO.COM (Jan Jaeger) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they to nepotsim between Govt and Priv industry? This may be the fatal flaw... per getting keys. Newsgroups: sci.crypt Date: Mon, 16 Dec 2002 17:49:44 GMTI would further assert that it would be possible to use the same signing key for both authentication and signatures ... since the necessary business process for signatures required to establish intent, agrees, approves, and/or authorizes, would provide the distinction.
in the following, I've asserted that the same token (with the same key) could be used for
authentication and authorization in all x9.59 financial transactions
as well as authentication in at least
• all (public key) Radius (challenge/response) transactions • all Kerberos (pk-init) authentication transastion • all SSH authentication transactions
x9.59 financial transactions carry with it additional business processes that would establish both authentication as well as some sense of approval/agreement/authorization.
single signing key/token discussion:
https://www.garlic.com/~lynn/aepay10.htm#65 eBay Customers Targetted by Credit Card Scam
https://www.garlic.com/~lynn/aepay10.htm#66 eBay Customers Targetted by Credit Card Scam
and some recent posts with respect to necessity of using certificates:
https://www.garlic.com/~lynn/aepay10.htm#60 First Data Unit Says It's Untangling Authentication
https://www.garlic.com/~lynn/aepay10.htm#61 First Data Unit Says It's Untangling Authentication
https://www.garlic.com/~lynn/aepay10.htm#62 VeriSign unveils new online identity verification services
https://www.garlic.com/~lynn/aadsm12.htm#26 I-D ACTION:draft-ietf-pkix-usergroup-01.txt
https://www.garlic.com/~lynn/aadsm12.htm#56 TTPs & AADS Was: First Data Unit Says It's Untangling Authentication
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Free Desktop Cyber emulation on PC before Christmas Newsgroups: comp.sys.cdc,alt.folklore.computers Date: Mon, 16 Dec 2002 20:42:56 GMTCBFalconer writes:
was adaptive FEC. we had been working with cyclotomics at the time (berkeley, lots of the cdrom standard work ... bought up in the period by kodak because of the cdrom & optical disk encoding work). on a signal with nominal BER of 10**-9 ... 15/16ths reed-solomon gave about six orders magnitude signal improvement ... aka effective BER of 10**-15. cdrom uses interleaving to handle some of the burst/scratch type errors. the issue of kinds of interleaving ... typically is based on profile of expected error characteristics.
for transmission the idea ... that cyclotomics was also using with some FM radio applications ... was that on uncorrectable packet ... rather than resend the original packet (over the 15/16s reed-solomon encoded transmission) was to transmit the 1/2rate viterbi encoding of the original packet. if transmission quality dropped too badly ... then switch from transmitting the 1/2rate viterbi encoding on error ... to transmitting the 1/2rate viterbi as part of each packet.
idea was that for intermittent errors ... the transmission of the 1/2rate viterbi encoding used the same bandwidth as retransmitting the original packet ... but was much more resilient to additional errors. Under high error conditions ... just go ahead and cut the effective thruput by always transmitting the 1/2rate viterbi encoding with the original packet.
random refs:
https://www.garlic.com/~lynn/93.html#28 Log Structured filesystems -- think twice
https://www.garlic.com/~lynn/99.html#115 What is the use of OSI Reference Model?
https://www.garlic.com/~lynn/99.html#210 AES cyphers leak information like sieves
https://www.garlic.com/~lynn/2000c.html#38 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2001.html#1 4M pages are a bad idea (was Re: AMD 64bit Hammer CPU and VM)
https://www.garlic.com/~lynn/2001b.html#80 Disks size growing while disk count shrinking = bad performance
https://www.garlic.com/~lynn/2001k.html#71 Encryption + Error Correction
https://www.garlic.com/~lynn/2002e.html#53 Mainframers: Take back the light (spotlight, that is)
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Newbie: Two quesions about mainframes. Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 16 Dec 2002 22:35:17 GMT"T.R." writes:
from someplace .... in theory there is no difference between theory and practice but in practice there is.
in practice a batch system tends to have a lot of stuff that is specified/bound early and a lot of automagical procedures to recover from various kinds of processing failures and keep going w/o human intervention.
in practice an interactive system tends to have a lof of stuff bound late and/or default ... and when there is an exception ... generate an error message for a person to respond to.
a batch system tends to have a fundamental philosophy that there isn't a person running the program and therefor there isn't a person to respond to exceptions/faults. in order to establish the context for automatgical process, there tends to be a lot of early/explicit specifications (like DD cards). many of the complaints of some of the poor interactive characteristics of various "online" operations in a batch machine environment ... have to do with the large amounts of things that don't default.
one approach to trying to carve out a interactive environment in a batch oriented system (as opposed to offering online capability for doing batch oriented work) is to pre-allocate some subset of the resources ... and then run as a subsystem, some environment that was built from the ground up that there was a human to interact with ... as opposed to built from the ground up that there was no human. An example of that is running Linux systems in LPAR or VM partition of a mainframe machine.
note that the opposite is also true ... systems that originally grew up assuming "a human is present" paradigm ... sometimes have difficulty deliverying five-nines consistent operation, day after day, in say a dim/dark room environment (not only at the system level ... but also at application levels).
mainframe systems tend to sometimes have human someplace in the vacinity in the role of an operator (basically a human that is suppose to respond to certain operator like requests .... possibly like mounting a tape). a prominant financial processing center cited the two things that gave them one hundred percent availability (at the time over a six year period) were
automated operator
ims hot standy
basically ims hot standby provided them disaster survivability ... across three geographically distributed datacenters.
the other was that previously some number of application level faults had been because of human mistakes. automated operator went a long ways towards totally eliminated human equation totally from operational environment.
randomly related past post:
https://www.garlic.com/~lynn/94.html#2 Schedulers
https://www.garlic.com/~lynn/96.html#8 Why Do Mainframes Exist ???
https://www.garlic.com/~lynn/98.html#4 VSE or MVS
https://www.garlic.com/~lynn/98.html#18 Reviving the OS/360 thread (Questions about OS/360)
https://www.garlic.com/~lynn/98.html#51 Mainframes suck? (was Re: Possibly OT: Disney Computing)
https://www.garlic.com/~lynn/99.html#16 Old Computers
https://www.garlic.com/~lynn/99.html#71 High Availabilty on S/390
https://www.garlic.com/~lynn/99.html#107 Computer History
https://www.garlic.com/~lynn/99.html#128 Examples of non-relational databases
https://www.garlic.com/~lynn/99.html#136a checks (was S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#197 Computing As She Really Is. Was: Re: Life-Advancing Work of Timothy Berners-Lee
https://www.garlic.com/~lynn/2000.html#22 Computer of the century
https://www.garlic.com/~lynn/2000.html#83 Ux's good points.
https://www.garlic.com/~lynn/2000f.html#12 Amdahl Exits Mainframe Market
https://www.garlic.com/~lynn/2000f.html#58 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2000f.html#66 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2001.html#43 Life as a programmer--1960, 1965?
https://www.garlic.com/~lynn/2001c.html#13 LINUS for S/390
https://www.garlic.com/~lynn/2001d.html#70 Pentium 4 Prefetch engine?
https://www.garlic.com/~lynn/2001d.html#71 Pentium 4 Prefetch engine?
https://www.garlic.com/~lynn/2001e.html#44 Where are IBM z390 SPECint2000 results?
https://www.garlic.com/~lynn/2001e.html#47 Where are IBM z390 SPECint2000 results?
https://www.garlic.com/~lynn/2001h.html#8 VM: checking some myths.
https://www.garlic.com/~lynn/2001i.html#34 IBM OS Timeline?
https://www.garlic.com/~lynn/2001k.html#14 HP-UX will not be ported to Alpha (no surprise)exit
https://www.garlic.com/~lynn/2001k.html#18 HP-UX will not be ported to Alpha (no surprise)exit
https://www.garlic.com/~lynn/2001l.html#47 five-nines
https://www.garlic.com/~lynn/2001n.html#47 Sysplex Info
https://www.garlic.com/~lynn/2001n.html#85 The demise of compaq
https://www.garlic.com/~lynn/2002.html#1 The demise of compaq
https://www.garlic.com/~lynn/2002.html#24 Buffer overflow
https://www.garlic.com/~lynn/2002e.html#68 Blade architectures
https://www.garlic.com/~lynn/2002h.html#73 Where did text file line ending characters begin?
https://www.garlic.com/~lynn/2002i.html#3 DCAS [Was: Re: 'atomic' memops?]
https://www.garlic.com/~lynn/2002l.html#62 Itanium2 performance data from SGI
https://www.garlic.com/~lynn/2002n.html#27 why does wait state exist?
https://www.garlic.com/~lynn/2002n.html#41 Home mainframes
https://www.garlic.com/~lynn/2002o.html#14 Home mainframes
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Running z/VM 4.3 in LPAR & guest v-r or v=f Newsgroups: bit.listserv.vmesa-l Date: Mon, 16 Dec 2002 08:23:24 -0700somewhat related thread in ibm-main ng/ml
--
Anne & Lynn Wheeler lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: cost of crossing kernel/user boundary Newsgroups: comp.arch,comp.programming.threads Date: Tue, 17 Dec 2002 13:50:13 GMTJoseph Seigh writes:
I did a number of things as an undergraduate. One was ... when the available saveareas were exhausted ... call "extend" for another 4k storage block to make available for additional saveareas. This had slight downside on debugging. In the original implementation ... it was possible to easily pick out of contiguous area of storage ... all currently in use ... and previously used, but available saveareas (which could provide additional debugging information). Dynamically extended saveareas were a little bit harder to explain.
The other thing i did as undergraduate was recognize that high percentage of total time was spent in the SVC call/return processing ... especially the allocation and deallocation of saveareas. Part of the analysis was determining that a large number of kernel calls were to "closed" subroutines ... they would perform some function and always immediately return (w/o making any call). I created two fixed saveareas in page zero (balrsave & freesave) for use by closed subroutines and change the call/return sequence for those routines to do a direct branch & link (BALR) to the routine instead of svc linkage ... and to use the fixed save areas. While the SVC interrupt was more expensive than BALR instruction ... the majority of the time spent in the SVC interrupt handler wasn't the instruction itself but the savearea management. The biggest performance boost came from eliminating the savearea management.
One more thing that I did (during the summer job I had at BCS) was introduce the pageable kernel routines. Both CP/67 and VM/370 kernels ran in "real" addressing mode (but PSW changes to/from virtual machines would switch in & out of virtual address mode). The issue was how to allow (low usage) parts of the kernel to page. The process I creates was to very carefully identity routines that were 4k or less and make sure that when kernel was initially built, make sure that they didn't cross 4k page boundary. Then all such routines were placed by the kernel build routine after a known, fixed address ("CPEND" or later "DMKCPE"). I then built a dummy address space table for the kernel.
If the svc call handler was processing a "to" address that was larger than CPEND ... it would first make a call to page fetch on the routine's entry address (using the dummy address table) with option to increment the page lock count, It would then do the standard savearea stuff and then branch to the translated address (not the original address). On svc return, the handler would check to see if the svc interrupt address (where the return was coming from) was larger than CPEND ... and if so, do a page unlock (decrement page lock count) on the svc interrupt address (entry and exit had to be in the same 4k area keeping the page lock counts consistent).
some amount of the stuff I did while an undergraduate ... was incorporated into the standard cp/67 source code distribution (some of the fastpath stuff, tty/ascii terminal support, misc. other stuff. Other of the stuff ... like balr linkages weren't incorporated into cp/67 distribution until after i joined the science center. The pageable kernel changes never made it out in the cp/67 distribution but was part of the standard vm/370 distribution.
random refs:
https://www.garlic.com/~lynn/2001b.html#23 Linux IA-64 interrupts [was Re: Itanium benchmarks ...]
https://www.garlic.com/~lynn/2001l.html#32 mainframe question
https://www.garlic.com/~lynn/2002b.html#44 PDP-10 Archive migration plan
https://www.garlic.com/~lynn/2002n.html#71 bps loader, was PLX
some early performance numbers regarding early kernel changes:
https://www.garlic.com/~lynn/94.html#18 CP/67 & OS MFT14
https://www.garlic.com/~lynn/94.html#20 CP/67 & OS MFT14
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cirtificate Authorities 'CAs', how curruptable are they tonepotsim between Govt and Priv industry? This may be the fatal flaw... pergetting keys. Newsgroups: sci.crypt Date: Tue, 17 Dec 2002 14:11:36 GMTMichael Amling writes:
(legal) signatures typically carries with it the meaning that the human intended to sign something including having read, understood, and agrees with the content of the thing that they are signing.
the issue isn't so much what it is you are using to represent the difference between a digital signature event and an authentication event .... the issue is how can you show a direct business process relationship between the setting of such a bit and the human having read, understood and agreeing to the content being signed (and the bit can't be set otherwise).
a little piece of the thread:
https://www.garlic.com/~lynn/aadsm12.htm#59 e-Government uses "Authority-stamp-signatures"
the comment about disservice was reply to the above ... and could probably found in the pkix mailing list archive.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: AMP vs SMP Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Tue, 17 Dec 2002 15:47:40 GMTChris_Craddock@BMC.COM (Craddock, Chris) writes:
the 360/67 multiprocessor was a different beast. is was designed to support 4-way multiprocessing ... but I know of only one 3-way that was actually built and the rest were 2-way. Multiprocessor 360/67 had something called a channel controller. By the switches on the panel, channels, processors, and memory banks could be reconfigured. The settings of the switches were available to the software in control registers (the 3-way also had the ability to change the settings of the switches by loading control registers). All memory was shared by every processor (as in the 360/65) but also every channel was shared/addresable by every processor (as later found in XA/3081). The 360/67 also supported 24-bit virtual addressing and 32-bit virtual addressing.
Cambridge Science Center did a lot of work on fine grain multiprocessing locking ... most of the pioneering work being done by Charlie ... and it is in fact Charlie who invented the compare&swap instruction. The original mnemonic for the instruction was CAS which was chosen because they are charlie's initials (i.e. started with CAS ... and then had to invent the part about compare&swap to match the initials). Before compare&swap was shipped in 370 ... it was extended to compare&swap and compare double & swap and the mnemonic changes to CS and CDS.
The initial 370 15x & 16x multiprocessors followed in the path of the 360/65 (and step backward from the technology of the 360/67). The concept of a multiprocessor being a machine that could be split into two independently operating single processor was continued. Later in the 158 & 168 life cycle, reduced cost version of the MP were made available called asymmetric/attached processor or AP. Only one of the processors had channels, the "attached processor" didn't have any installed channels. These also weren't multiprocessors in the traditional sense, not having the ability to be split into two independently operating single processor systems.
In the mid-70s there were two internal SMP projects (that I worked on), one involving 5-way SMP using 370/125 hardware base and a 16-way SMP using 370/158 hardware base. These never made it as products. One of the major product issues was that the various non-vm370 operating systems would of had extreme difficulty in coming up with more than two-way processor support at the time. Some of the POK engineers got hammered by executives when it was realized they were working with us (and that their "mainstream" operating systems couldn't support the hardware).
Also spent some time with the group working on an 2-way for the 370/195. This was more like some of the thread stuff going on with some of the current microprocessors. There were very few codes that would keep the 195 pipeline full. The 2-way effort would create duplicated registers, two PSWs, and misc. other stuff ... but all the existing hardware would pretty much stay the same. There would be one additional bit added to instructions processed in the pipeline (indicating with i-stream/psw the instruction was from). The idea was that two independent i-streams had somewhat better chance of keeping the 195 pipeline full.
The 3081 broke the multiprocessor tradition in that it didn't have fully duplicated hardware allowing the processor to be split into two independently operationg single processors. Originally the 3081 wasn't even going to have a single processor version. However, eventually a 3083 was produced primarily for the airline/tpf industry (acp/tpf didn't have multiprocessing support). The 370, 303x, & 308x duplex machines had a ten percent cycle slow-down (to allow for cross-cache communication) compared to their single processor versions (i.e. the hardware of a two-way ran at 1.8 times the processing power of a single processor). There was additional slow-downs if there was actually cross-cache communications (i.e. the base slow-down was just to allow for the slow-down ... when communication actually occurred, things slowed down further). The airline/TPF industry were either using 3081 with one processor ... or running with VM ang running pairs of TPF under VM. The 3083 gave them slightly less expensive 3081 (and the cache slow-down for multiprocessing mode was removed ... so the 3083 was nearly 15 percent faster than a single 3081 processor).
Eventually the 3084 was produced (two 3081s connected together) for a 4-way (it was possible to split a 3084 into two independently operating 3081s). The 3084 penalty was even larger since each cache had to be able to communicate with three other caches instead of just one other cache.
Part of the scale-up issues (in number of real processors) in a complex has been the implementation of (very) strong memory consistency protocols in the caches. Other machines have gone to larger scaling configurations, in part by relaxing some of the cache memory consistency issues (and/or by having individual processors that were relatively slower than the performance of the cross-cache technology being used).
misc past smp postings
https://www.garlic.com/~lynn/subtopic.html#smp
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: AMP vs SMP Newsgroups: bit.listserv.ibm-main Date: Tue, 17 Dec 2002 16:30:41 GMTeells@US.IBM.COM (John Eells) writes:
the 303x channel director was a 158 processor w/o the 370 microcode and only the 370 channel microcode
the 3031 was a 158 processor with only the 370 microcode and adapted to use the 303x channel director (since they both shared memory the processor memory ... the 3031 & 303x channel directory might be considered sort of a multiprocessor).
the 3032 was a 168 processor repackaged to use the 303x channel director.
the 3033 started out using the 168 wiring diagram but instead of being mapped to technology with 4circuits/chip ... it was mapped to technology that was about 20% faster and had about 10times as many circuits per chip. as a straight technology remap, the 3033 would have been 20% faster than the 168 (say 3.6mips instead of 3mips). late in the development there was some selective redo of the design to take advantage of more onchip processing ... resulting in more like a 50% faster (4.5mips).
random past mentions of 303x:
https://www.garlic.com/~lynn/93.html#14 S/360 addressing
https://www.garlic.com/~lynn/94.html#7 IBM 7090 (360s, 370s, apl, etc)
https://www.garlic.com/~lynn/95.html#3 What is an IBM 137/148 ???
https://www.garlic.com/~lynn/97.html#20 Why Mainframes?
https://www.garlic.com/~lynn/98.html#50 Edsger Dijkstra: the blackest week of his professional life
https://www.garlic.com/~lynn/99.html#7 IBM S/360
https://www.garlic.com/~lynn/99.html#74 Read if over 40 and have Mainframe background
https://www.garlic.com/~lynn/99.html#75 Read if over 40 and have Mainframe background
https://www.garlic.com/~lynn/99.html#103 IBM 9020 computers used by FAA (was Re: EPO stories (was: HELP IT'S HOT!!!!!))
https://www.garlic.com/~lynn/99.html#110 OS/360 names and error codes (was: Humorous and/or Interesting Opcodes)
https://www.garlic.com/~lynn/99.html#112 OS/360 names and error codes (was: Humorous and/or Interesting Opcodes)
https://www.garlic.com/~lynn/99.html#187 Merced Processor Support at it again
https://www.garlic.com/~lynn/99.html#188 Merced Processor Support at it again
https://www.garlic.com/~lynn/99.html#190 Merced Processor Support at it again
https://www.garlic.com/~lynn/2000.html#78 Mainframe operating systems
https://www.garlic.com/~lynn/2000b.html#37 How to learn assembler language for OS/390 ?
https://www.garlic.com/~lynn/2000b.html#65 oddly portable machines
https://www.garlic.com/~lynn/2000c.html#35 What level of computer is needed for a computer to Love?
https://www.garlic.com/~lynn/2000c.html#44 WHAT IS A MAINFRAME???
https://www.garlic.com/~lynn/2000c.html#69 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000c.html#75 Does the word "mainframe" still have a meaning?></pre>
https://www.garlic.com/~lynn/2000c.html#83 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000d.html#0 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000d.html#7 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000d.html#11 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000d.html#12 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000d.html#21 S/360 development burnout?
https://www.garlic.com/~lynn/2000d.html#61 "all-out" vs less aggressive designs (was: Re: 36 to 32 bit transition)
https://www.garlic.com/~lynn/2000d.html#82 "all-out" vs less aggressive designs (was: Re: 36 to 32 bit transition)
https://www.garlic.com/~lynn/2000e.html#57 Why not an IBM zSeries workstation?
https://www.garlic.com/~lynn/2000e.html#58 Why not an IBM zSeries workstation?
https://www.garlic.com/~lynn/2000g.html#11 360/370 instruction cycle time
https://www.garlic.com/~lynn/2000g.html#28 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2000g.html#29 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2001.html#63 Are the L1 and L2 caches flushed on a page fault ?
https://www.garlic.com/~lynn/2001b.html#37 John Mashey's greatest hits
https://www.garlic.com/~lynn/2001b.html#39 John Mashey's greatest hits
https://www.garlic.com/~lynn/2001b.html#69 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001b.html#83 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001c.html#1 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001c.html#3 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001e.html#9 MIP rating on old S/370s
https://www.garlic.com/~lynn/2001i.html#13 GETMAIN R/RU (was: An IEABRC Adventure)
https://www.garlic.com/~lynn/2001j.html#3 YKYGOW...
https://www.garlic.com/~lynn/2001k.html#8 Minimalist design (was Re: Parity - why even or odd)
https://www.garlic.com/~lynn/2001l.html#24 mainframe question
https://www.garlic.com/~lynn/2001l.html#32 mainframe question
https://www.garlic.com/~lynn/2001m.html#15 departmental servers
https://www.garlic.com/~lynn/2001n.html#39 195 was: Computer Typesetting Was: Movies with source code
https://www.garlic.com/~lynn/2002.html#36 a.f.c history checkup... (was What specifications will the standard year 2001 PC have?)
https://www.garlic.com/~lynn/2002.html#48 Microcode?
https://www.garlic.com/~lynn/2002b.html#0 Microcode?
https://www.garlic.com/~lynn/2002b.html#2 Microcode? (& index searching)
https://www.garlic.com/~lynn/2002c.html#40 using >=4GB of memory on a 32-bit processor
https://www.garlic.com/~lynn/2002d.html#7 IBM Mainframe at home
https://www.garlic.com/~lynn/2002d.html#10 IBM Mainframe at home
https://www.garlic.com/~lynn/2002d.html#51 Hardest Mistake in Comp Arch to Fix
https://www.garlic.com/~lynn/2002f.html#8 Is AMD doing an Intel?
https://www.garlic.com/~lynn/2002g.html#17 Black magic in POWER5
https://www.garlic.com/~lynn/2002i.html#7 CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002i.html#19 CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002i.html#21 CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002i.html#22 CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002i.html#23 CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002i.html#37 IBM was: CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002j.html#30 Weird
https://www.garlic.com/~lynn/2002k.html#4 misc. old benchmarks (4331 & 11/750)
https://www.garlic.com/~lynn/2002l.html#57 Handling variable page sizes?
https://www.garlic.com/~lynn/2002m.html#2 Handling variable page sizes?
https://www.garlic.com/~lynn/2002m.html#75 New Book
https://www.garlic.com/~lynn/2002n.html#10 Coherent TLBs
https://www.garlic.com/~lynn/2002n.html#58 IBM S/370-168, 195, and 3033
https://www.garlic.com/~lynn/2002n.html#59 IBM S/370-168, 195, and 3033
https://www.garlic.com/~lynn/2002n.html#63 Help me find pics of a UNIVAC please
https://www.garlic.com/~lynn/2002n.html#73 Home mainframes
https://www.garlic.com/~lynn/2002p.html#43 cost of crossing kernel/user boundary
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: 20th Anniversary Of The Internet Newsgroups: bit.listserv.ibm-main Date: Tue, 17 Dec 2002 16:39:08 GMTand for something completely different see mention at:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: 20th anniversary of the internet (fwd) Newsgroups: alt.folklore.computers Date: Tue, 17 Dec 2002 17:23:18 GMTrandom other email from the period ... also slightly related (includes list of CMU machines):
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: cost of crossing kernel/user boundary Newsgroups: comp.arch,comp.programming.threads,alt.folklore.computers Date: Tue, 17 Dec 2002 19:59:45 GMT"glen herrmannsfeldt" writes:
random past references to optimized MFT (& MVT) system builds that
got me three times thruput improvement for specific test job mix.
note that the os/360 thruput optimization work that i did as an
undergraduate was pretty much independent of the cp/67 work (performance
& function).
https://www.garlic.com/~lynn/94.html#18 CP/67 & OS MFT14
https://www.garlic.com/~lynn/94.html#20 CP/67 & OS MFT14
https://www.garlic.com/~lynn/97.html#22 Pre S/360 IBM Operating Systems?
https://www.garlic.com/~lynn/97.html#28 IA64 Self Virtualizable?
https://www.garlic.com/~lynn/98.html#21 Reviving the OS/360 thread (Questions about OS/360)
https://www.garlic.com/~lynn/99.html#93 MVS vs HASP vs JES (was 2821)
https://www.garlic.com/~lynn/2000c.html#10 IBM 1460
https://www.garlic.com/~lynn/2000d.html#50 Navy orders supercomputer
https://www.garlic.com/~lynn/2001.html#26 Disk caching and file systems. Disk history...people forget
https://www.garlic.com/~lynn/2001b.html#23 Linux IA-64 interrupts [was Re: Itanium benchmarks ...]
https://www.garlic.com/~lynn/2001f.html#26 Price of core memory
https://www.garlic.com/~lynn/2001h.html#12 checking some myths.
https://www.garlic.com/~lynn/2001i.html#30 IBM OS Timeline?
https://www.garlic.com/~lynn/2001k.html#37 Is anybody out there still writting BAL 370.
https://www.garlic.com/~lynn/2002b.html#23 Infiniband's impact was Re: Intel's 64-bit strategy
https://www.garlic.com/~lynn/2002b.html#24 Infiniband's impact was Re: Intel's 64-bit strategy
https://www.garlic.com/~lynn/2002c.html#45 cp/67 addenda (cross-post warning)
https://www.garlic.com/~lynn/2002c.html#51 cp/67 addenda (cross-post warning)
https://www.garlic.com/~lynn/2002m.html#3 The problem with installable operating systems
https://www.garlic.com/~lynn/2002n.html#29 why does wait state exist?
https://www.garlic.com/~lynn/2002n.html#71 bps loader, was PLX
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Newbie: Two quesions about mainframes. Newsgroups: alt.folklore.computers,bit.listserv.ibm-main Date: Wed, 18 Dec 2002 14:17:11 GMTjmfbahciv writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: cost of crossing kernel/user boundary Newsgroups: comp.arch,comp.programming.threads,alt.folklore.computers Date: Wed, 18 Dec 2002 14:36:43 GMTAnne & Lynn Wheeler writes:
there were other bits and pieces besides paging & scheduling algorithms ... there were bits and pieces of other stuff like i redid the kernel serialization primitive that eliminated a lot of the timing-dependent failures that had been occurring. I also created a dummy virtual memory table for each logged on user (in addition to their normal virtual address space tables). the kernel tended to have a lot of control blocks for each process (including their virtual memory tables themselves) .... for inactive processes i would copy a bunch of these tables into the process's dummy address table and use that to page the tables out to secondary storage (freeing up the fixed storage). This was somewhat analogous to the system dummy page table used to page kernel code.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/