From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Passwords multiply as users' rage rises Newsgroups: alt.folklore.computers Date: Mon, 08 Sep 2003 04:35:14 GMTPasswords multiply as users' rage rises
Technology: As logins get more complex, people may be ones in need of memory upgrade.
.... and lighter side from past discussions:
https://www.garlic.com/~lynn/2001d.html#51 OT Re: A beautiful morning in AFM.
https://www.garlic.com/~lynn/2001d.html#52 OT Re: A beautiful morning in AFM.
https://www.garlic.com/~lynn/2001d.html#53 April Fools Day
https://www.garlic.com/~lynn/2001d.html#62 OT Re: A beautiful morning in AFM.
and a bunch of more serious discussions about shared-secret paradigms
(aka passwords, pins, etc):
https://www.garlic.com/~lynn/aadsm10.htm#biometrics biometrics
https://www.garlic.com/~lynn/aadsm10.htm#bio3 biometrics (addenda)
https://www.garlic.com/~lynn/aadsm10.htm#bio5 biometrics
https://www.garlic.com/~lynn/aadsm10.htm#bio6 biometrics
https://www.garlic.com/~lynn/aadsm10.htm#bio7 biometrics
https://www.garlic.com/~lynn/aadsm10.htm#bio8 biometrics (addenda)
https://www.garlic.com/~lynn/aadsm11.htm#17 Alternative to Microsoft Passport: Sunshine vs Hai
https://www.garlic.com/~lynn/aadsm11.htm#20 IBM alternative to PKI?
https://www.garlic.com/~lynn/aadsm12.htm#4 NEWS: 3D-Secure and Passport
https://www.garlic.com/~lynn/aadsm12.htm#5 NEWS: 3D-Secure and Passport
https://www.garlic.com/~lynn/aadsm12.htm#8 [3d-secure] 3D Secure and EMV
https://www.garlic.com/~lynn/aadsm12.htm#57 eBay Customers Targetted by Credit Card Scam
https://www.garlic.com/~lynn/aadsm12.htm#60 signing & authentication (was Credit Card Scam)
https://www.garlic.com/~lynn/aadsm13.htm#14 A challenge (addenda)
https://www.garlic.com/~lynn/aadsm13.htm#16 A challenge
https://www.garlic.com/~lynn/aadsm13.htm#23 Certificate Policies (was Re: Trivial PKI Question)
https://www.garlic.com/~lynn/aadsm14.htm#1 Who's afraid of Mallory Wolf?
https://www.garlic.com/~lynn/aadsm14.htm#4 Who's afraid of Mallory Wolf?
https://www.garlic.com/~lynn/aadsm14.htm#23 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm14.htm#26 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm14.htm#28 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm14.htm#29 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm14.htm#30 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm14.htm#31 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm14.htm#32 An attack on paypal
https://www.garlic.com/~lynn/aadsm14.htm#33 An attack on paypal
https://www.garlic.com/~lynn/aadsm14.htm#34 virus attack on banks (was attack on paypal)
https://www.garlic.com/~lynn/aadsm14.htm#35 The real problem that https has conspicuously failed to fix
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Password / access rights check Newsgroups: sci.crypt Date: Mon, 08 Sep 2003 14:28:23 GMTalex221@pisem.net (Alex Prokhorov) writes:
pointer to current news article on passwords (shared-secrets)
https://www.garlic.com/~lynn/2003m.html#0 Passwords multiply as users' rage
some multics literature includes some discussion that security can't
be added on, it has to be designed in:
https://www.garlic.com/~lynn/2002l.html#42 Thirty Years Later: Lessons from the Multics Security Evaluation
https://www.garlic.com/~lynn/2002l.html#44 Thirty Years Later: Lessons from the Multics Security Evaluation
some recent radius discussions
https://www.garlic.com/~lynn/2003b.html#65 Storing digital IDs on token for use with Outlook
https://www.garlic.com/~lynn/2003e.html#59 Security in RADIUS (RFC2865)
https://www.garlic.com/~lynn/2003j.html#25 Idea for secure login
misc. past radius musings:
https://www.garlic.com/~lynn/subpubkey.html#radius
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Seven of Nine Newsgroups: alt.folklore.computers Date: Mon, 08 Sep 2003 18:30:11 GMTPete Fenelon writes:
also, group cohesiveness is a refugee of the incompetent.
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Password / access rights check Newsgroups: sci.crypt Date: Tue, 09 Sep 2003 15:03:14 GMT"Ben Mord" writes:
the air force study with respect to multics is that it is hard to add-on qualtiy security. it is possible to patch bugs, but software products can be large enuf, that if things aren't done right from the start ... you can have hundreds or tens of thousands of little bug opportunities needing fixing that go on forever i.e. is the possibilty that each little bug gets fixed an indication of quality security ... or is that you are having to constantly fix little bugs an indication of poor security. There was a recent article on one of the security web pages about how many bugs per month are too many.
a trivial example might be that it could always be possible to add on initial authentication .... but unless there is only a single permission granularity (you either have access to everything or you have access to nothing), permissions may be a much more difficult thing to add.
Unless it is designed in from the start, it is much harder to add in fine granularity permissions that may even dynamically change based on context. fine-grain permissions can be much more difficult to add on after the fact.
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM Manuals from the 1940's and 1950's Newsgroups: alt.folklore.computers,comp.lang.pl1 Date: Tue, 09 Sep 2003 21:46:51 GMT"John W. Kennedy" writes:
There is story that CSC was trying to get a 360/50 to hardware modify
for virtual memory ... but they were all going to the FAA ... so had
to settle for 360/40 ... which is where CP/40 came from. Later when
360/67 was available ... they ported CP/40 to 360/67 and renamed it
CP/67 (which then became vm/370 ... and eventually z/VM). past cp/40
refs
https://www.garlic.com/~lynn/2002b.html#64 ... the need for a Museum of Computer Software
https://www.garlic.com/~lynn/2002c.html#39 VAX, M68K complex instructions (was Re: Did Intel Bite Off More Than It Can Chew?)
https://www.garlic.com/~lynn/2002f.html#30 Computers in Science Fiction
more of the story can be found in melinda's historical reference:
https://www.leeandmelindavarian.com/Melinda#VMHist
some number of past sabre/pars/acp/tpf threads (note: past
faa/9020 threads at very end):
https://www.garlic.com/~lynn/96.html#29 Mainframes & Unix
https://www.garlic.com/~lynn/99.html#24 BA Solves Y2K (Was: Re: Chinese Solve Y2K)
https://www.garlic.com/~lynn/99.html#100 Why won't the AS/400 die? Or, It's 1999 why do I have to learn how to use
https://www.garlic.com/~lynn/99.html#136a checks (was S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#152 Uptime (was Re: Q: S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#233 Computer of the century
https://www.garlic.com/~lynn/2000.html#0 2000 = millennium?
https://www.garlic.com/~lynn/2000.html#31 Computer of the century
https://www.garlic.com/~lynn/2000.html#94 Those who do not learn from history...
https://www.garlic.com/~lynn/2000b.html#20 How many Megaflops and when?
https://www.garlic.com/~lynn/2000b.html#61 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#65 oddly portable machines
https://www.garlic.com/~lynn/2000e.html#21 Competitors to SABRE? Big Iron
https://www.garlic.com/~lynn/2000e.html#22 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000f.html#20 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#28 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#32 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#34 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#37 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#38 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#48 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#51 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#58 Disk drive behavior
https://www.garlic.com/~lynn/2001b.html#37 John Mashey's greatest hits
https://www.garlic.com/~lynn/2001e.html#2 Block oriented I/O over IP
https://www.garlic.com/~lynn/2001g.html#35 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001g.html#45 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001g.html#46 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#47 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#49 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001h.html#76 Other oddball IBM System 360's ?
https://www.garlic.com/~lynn/2001n.html#0 TSS/360
https://www.garlic.com/~lynn/2002c.html#9 IBM Doesn't Make Small MP's Anymore
https://www.garlic.com/~lynn/2002g.html#2 Computers in Science Fiction
https://www.garlic.com/~lynn/2002g.html#3 Why are Mainframe Computers really still in use at all?
https://www.garlic.com/~lynn/2002h.html#43 IBM doing anything for 50th Anniv?
https://www.garlic.com/~lynn/2002i.html#63 Hercules and System/390 - do we need it?
https://www.garlic.com/~lynn/2002i.html#83 HONE
https://www.garlic.com/~lynn/2002j.html#28 ibm history note from vmshare
https://www.garlic.com/~lynn/2002n.html#29 why does wait state exist?
https://www.garlic.com/~lynn/2002o.html#28 TPF
https://www.garlic.com/~lynn/2002p.html#58 AMP vs SMP
https://www.garlic.com/~lynn/2003.html#48 InfiniBand Group Sharply, Evenly Divided
https://www.garlic.com/~lynn/2003g.html#30 One Processor is bad?
https://www.garlic.com/~lynn/2003g.html#32 One Processor is bad?
https://www.garlic.com/~lynn/2003g.html#37 Lisp Machines
https://www.garlic.com/~lynn/2003j.html#2 Fix the shuttle or fly it unmanned
some number of past 9020/faa threads:
https://www.garlic.com/~lynn/98.html#23 Fear of Multiprocessing?
https://www.garlic.com/~lynn/99.html#102 IBM 9020 computers used by FAA (was Re: EPO stories (was: HELP IT'S HOT!!!!!))
https://www.garlic.com/~lynn/99.html#103 IBM 9020 computers used by FAA (was Re: EPO stories (was: HELP IT'S HOT!!!!!))
https://www.garlic.com/~lynn/99.html#108 IBM 9020 computers used by FAA (was Re: EPO stories (was: HELP IT'S HOT!!!!!))
https://www.garlic.com/~lynn/2000b.html#82 write rings
https://www.garlic.com/~lynn/2000e.html#3 Ridiculous
https://www.garlic.com/~lynn/2001.html#3 First video terminal?
https://www.garlic.com/~lynn/2001b.html#9 "HAL's Legacy and the Vision of 2001: A Space Odyssey"
https://www.garlic.com/~lynn/2001h.html#15 IBM 9020 FAA/ATC Systems from 1960's
https://www.garlic.com/~lynn/2001h.html#17 IBM 9020 FAA/ATC Systems from 1960's
https://www.garlic.com/~lynn/2001h.html#71 IBM 9020 FAA/ATC Systems from 1960's
https://www.garlic.com/~lynn/2001i.html#2 Most complex instructions (was Re: IBM 9020 FAA/ATC Systems from 1960's)
https://www.garlic.com/~lynn/2001i.html#3 Most complex instructions (was Re: IBM 9020 FAA/ATC Systems from 1960's)
https://www.garlic.com/~lynn/2001i.html#14 IBM 9020 FAA/ATC Systems from 1960's
https://www.garlic.com/~lynn/2001i.html#15 IBM 9020 FAA/ATC Systems from 1960's
https://www.garlic.com/~lynn/2002.html#36 a.f.c history checkup... (was What specifications will the standard year 2001 PC have?)
https://www.garlic.com/~lynn/2002f.html#29 Computers in Science Fiction
https://www.garlic.com/~lynn/2002g.html#16 Why are Mainframe Computers really still in use at all?
https://www.garlic.com/~lynn/2003l.html#14 Cost of patching "unsustainable"
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cryptoengines with usage accounting Newsgroups: sci.crypt Date: Tue, 09 Sep 2003 23:26:22 GMT"Ernst Lippe" <ernstl-at-planet-dot-nl@ignore.this> writes:
the late '80s and early '90s chips had no good random source and used EEPROM that had duty cycle in 10k writes to 30k write range.
you can get chips these days that have duty cycle with EEPROM rated for 800k writes and above. At hundred uses times per day and ten writes per usage, or thousand writes per day ... that has life cycle over two years. Using it five times per day and even ten writes per usage gives life cycle over forty years. Historically, getting writes down to one or two per usage and five uses per day ... increases life cycle to over 200 years.
aads chip strawman
https://www.garlic.com/~lynn/x959.html#aads
slightly related (trusted hardware token reference towards end of post):
https://www.garlic.com/~lynn/aadsm15.htm#6
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: The real history of comp arch: the short form Newsgroups: alt.folklore.computers Date: Wed, 10 Sep 2003 03:46:49 GMT"del cecchi" writes:
it is missing names for 2301, 2303, 2311, 2314, 2321, 3340-70, 3344, 3830, 3880-23
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM Manuals from the 1940's and 1950's Newsgroups: alt.folklore.computers Date: Wed, 10 Sep 2003 19:16:47 GMTLon Stowell writes:
misc burma shave websites:
http://www.mc.cc.md.us/Departments/hpolscrv/mthomas.htm
http://www.lincolnhighwayassoc.org/iowa/shaver/1930.html
http://www.lincolnhighwayassoc.org/iowa/shaver/1953.html
http://www.webcom.com/duane/bscontst.html
http://www.geocities.com/Heartland/Plains/6271/spoof003.html
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: post-doomsday computing Newsgroups: alt.folklore.computers Date: Wed, 10 Sep 2003 20:44:55 GMTstanb45@dial.pipex.com (Stan Barr) writes:
most recent mini-air
Subject: mini-AIR Sept 2003 -- Breakfast similarity, Murphy and the Law PLEASE FORWARD/POST AS APPROPRIATE ================================================================ mini-Annals of Improbable Research ("mini-AIR") Issue Number 2003-09 September, 2003 ISSN 1076-500X Key words: improbable research, science humor, Ig Nobel, AIR, the ---------------------------------------------------------------- A free newsletter of tidbits too tiny to fit in the Annals of Improbable Research (AIR), the journal of inflated research and personalities =============================================================--
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OSI not quite dead yet Newsgroups: sci.crypt Date: Thu, 11 Sep 2003 15:08:13 GMTpgut001@cs.auckland.ac.nz (Peter Gutmann) writes:
You can have "Internet-Drafts" which aren't yet RFCs
http://www.ietf.org/ID.html
and then there is a process that progresses them to an RFC as "Proposed Standard". The next stage is "Draft Standard". Possibly in the past, a larger percentage made to "Proposed Standard" that could easily transition to "Draft Standard"(???)
see
https://www.garlic.com/~lynn/rfcietff.htm
and scroll down to the standards overview ... or
https://www.garlic.com/~lynn/rfcietf.htm#overview
i.e. (from above):
Draft Standard Protocol
A specification from which at least two independent and interoperable
implementations from different code bases have been developed, and for
which sufficient successful operational experience has been obtained,
may be elevated to the "Draft Standard" level. For the purposes of
this section, "interoperable" means to be functionally equivalent or
interchangeable components of the system or process in which they are
used. If patented or otherwise controlled technology is required for
implementation, the separate implementations must also have resulted
from separate exercise of the licensing process. Elevation to Draft
Standard is a major advance in status, indicating a strong belief that
the specification is mature and will be useful.
....
After additional process and deliberation a "Draft Standard" may
eventually achieve "Standard" status. For a current list of
standards, see
https://www.garlic.com/~lynn/rfcietff.htm
IETF Standards
https://www.garlic.com/~lynn/rfcstd.htm#ietfstd
As part of the above lists, I include how "old" the RFC is. There are supposedly certain requirement to make progress within 24 months. RFC951, BOOTP has been a "Draft Standard" for 215 months (for the heck of it, ages over 24 months, I list in bold) and RFC698, Telnet extended ASCII option, has been "Proposed Standard" for 337 months.
RFCs are never changed. If you have a RFC that documents a "Proposed Standard" and it gets updated as part of transition to "Draft Standard", the updated documented will be released as a new RFC and the previous RFC will be listed as obsoleted. An example is the regular process of updating STD1 that lists the current standards RFC. RFCs aren't necessarily numbered in cronological order. The email RFC replacements numbers (for RFC821/STD10 & RFC822/STD11) were reserved early so that they would have 2821 & 2822.
For a view of some of the inter-relations, see the overview of DNS
activity
http://www.dns.net/dnsrd/
http://www.dns.net/dnsrd/docs/id.html
http://www.dns.net/dnsrd/rfc/
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OSI not quite dead yet Newsgroups: sci.crypt Date: Thu, 11 Sep 2003 15:19:16 GMToh yes, and other agendas can go on in IETF meetings .... some past discussion regarding VPN:
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: AES-128 good enough for medical data? Newsgroups: comp.sys.mac.system,sci.crypt Date: Thu, 11 Sep 2003 20:24:44 GMTJoe Peschel writes:
However, if you were using a DES key to protect a whole infrastructure ... then an attack on that DES key can create a systemic risk that puts the whole infrastructure at risk ... which possibly could represent much more at risk than the cost of an attack.
minor reference to security proportional to risk:
https://www.garlic.com/~lynn/2001h.html#61
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Seven of Nine Newsgroups: alt.folklore.computers Date: Fri, 12 Sep 2003 00:17:27 GMTPeter Flass writes:
one large telco once lost month of long distance billing that way ... but managed to avoid bankruptcy; they were taking backups every night ... but found that there was some problem with the backup process and there was no good data on the tapes.
i once lost some data that had been backed up in triplicate .... but all three tapes were in the same datacenter tape library .... and the datacenter had some procedural problem with operators mounting randomly selected tapes as scratch.
random backup stories:
https://www.garlic.com/~lynn/submain.html#backup
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Cost of patching "unsustainable" Newsgroups: comp.arch Date: Fri, 12 Sep 2003 00:51:23 GMTeugene@cse.ucsc.edu (Eugene Miya) writes:
IRS is the tax return (paper-work) processor of the US gov ... but they see little actual money.
somewhere along the way i've heard comments about one of the
contractors on IRS modernization ... drastically underestimating the
sophistication of all that old 360 assembler code. somewhat random URL
from search engine:
http://www.fcw.com/fcw/articles/2001/0108/web-irs-01-12-01.asp
http://www.fcw.com/fcw/articles/2002/0304/web-irs-03-07-02.asp
http://www.informationweek.com/575/75mtirs.htm
http://www.informationweek.com/575/75mtir2.htm
http://www.senate.gov/~finance/2-2whit.htm
http://www.whitehouse.gov/news/usbudget/blueprint/bud28.html
http://www.computerworld.com/governmenttopics/government/story/0,10801,81708,00.html
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Seven of Nine Newsgroups: alt.folklore.computers Date: Sat, 13 Sep 2003 22:04:05 GMTab528@freenet.carleton.ca (Heinz W. Wiggeshoff) writes:
3d tic-tac-toe on tx-0 graphics screen in the 50s
http://coyote.csusm.edu/lynniebhist/comphist.htm
and
http://memex.org/cm-archive10.html
the following from above:
Les Earnest writes:
I vaguely recall that someone at Bell Labs built a relay computer that
played tic-tac-toe sometime in the late 1940s or early 1950s. The
TX-0 computer at MIT also had a tic-tac-toe game when I started
playing with it in 1959. It displayed the board on its CRT and you
selected moves by pointing with a lite pen.
...
but tic-tac-toe wasn't war game(?).
spacewar was ported to 2250m4/1130 at cambridge science center in the late '60s
random spacewar refs:
https://www.garlic.com/~lynn/97.html#2 IBM 1130 (was Re: IBM 7090--used for business or science?)
https://www.garlic.com/~lynn/2000b.html#67 oddly portable machines
https://www.garlic.com/~lynn/2000g.html#24 A question for you old guys -- IBM 1130 information
https://www.garlic.com/~lynn/2001b.html#71 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001f.html#10 5-player Spacewar?
https://www.garlic.com/~lynn/2001f.html#12 5-player Spacewar?
https://www.garlic.com/~lynn/2001f.html#13 5-player Spacewar?
https://www.garlic.com/~lynn/2001f.html#14 5-player Spacewar?
https://www.garlic.com/~lynn/2001f.html#51 Logo (was Re: 5-player Spacewar?)
https://www.garlic.com/~lynn/2001h.html#8 VM: checking some myths.
https://www.garlic.com/~lynn/2001j.html#26 Help needed on conversion from VM to OS390
https://www.garlic.com/~lynn/2002g.html#57 Amiga Rexx
https://www.garlic.com/~lynn/2002i.html#20 6600 Console was Re: CDC6600 - just how powerful a machine was
https://www.garlic.com/~lynn/2002j.html#22 Computer Terminal Design Over the Years
https://www.garlic.com/~lynn/2002o.html#17 PLX
https://www.garlic.com/~lynn/2003c.html#0 Wanted: Weird Programming Language
https://www.garlic.com/~lynn/2003c.html#62 Re : OT: One for the historians - 360/91
https://www.garlic.com/~lynn/2003c.html#72 OT: One for the historians - 360/91
https://www.garlic.com/~lynn/2003d.html#28 Why only 24 bits on S/360?
https://www.garlic.com/~lynn/2003d.html#38 The PDP-1 - games machine?
https://www.garlic.com/~lynn/2003f.html#39 1130 Games WAS Re: Any DEC 340 Display System Doco ?
https://www.garlic.com/~lynn/2003g.html#7 Any DEC 340 Display System Doco ?
https://www.garlic.com/~lynn/2003i.html#27 instant messaging
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IEFBR14 Problems... Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Sun, 14 Sep 2003 13:42:10 GMTvbandke@BSP-GMBH.COM (Volker Bandke) writes:
misc. past iefbr14 threads:
https://www.garlic.com/~lynn/99.html#81 Perfect Code
https://www.garlic.com/~lynn/99.html#85 Perfect Code
https://www.garlic.com/~lynn/99.html#96 IEFBR14 cookie from www.ibm.com
https://www.garlic.com/~lynn/2001e.html#60 Estimate JCL overhead
https://www.garlic.com/~lynn/2001n.html#48 The demise of compaq
one thread mentioning 4k storage protect keys
https://www.garlic.com/~lynn/2000e.html#57 Why not an IBM zSeries workstation?
a74 workstation had 4k storage protect keys
https://www.garlic.com/~lynn/2000e.html#55 Why not an IBM zSeries workstation?
https://www.garlic.com/~lynn/2000e.html#56 Why not an IBM zSeries workstation?
https://www.garlic.com/~lynn/2001i.html#19 Very CISC Instuctions (Was: why the machine word size ...)
https://www.garlic.com/~lynn/2001i.html#51 DARPA was: Short Watson Biography
https://www.garlic.com/~lynn/2002d.html#4 IBM Mainframe at home
https://www.garlic.com/~lynn/2002l.html#27 End of Moore's law and how it can influence job market
https://www.garlic.com/~lynn/2003f.html#56 ECPS:VM DISPx instructions
https://www.garlic.com/~lynn/2003h.html#40 IBM system 370
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OSI not quite dead yet Newsgroups: sci.crypt Date: Mon, 15 Sep 2003 13:54:51 GMTunoriginal_username@yahoo.com (Le Chaud Lapin) writes:
minor previous posts on the subject
https://www.garlic.com/~lynn/subnetwork.html#xtphsp
i would also claim that the whole cp/40, cp/67, vm/370 virtual machine stuff ... vis-a-vis time-sharing made a lot of progress .. originally by a small group of people. The corporate "official" time-sharing effort supposedly had something like 1200 people working on it at its peak ... and hardly anybody has heard of it today (tss/360) ... while cp/40 and cp/67 (along with cms) had most of it done with something like 12 people (two orders of magnitude difference).
minor 545 tech sq. ref
https://www.garlic.com/~lynn/subtopic.html#545tech
and some reference to early use of cp/67 by time-sharing service
bureaus:
https://www.garlic.com/~lynn/submain.html#timeshare Misc. commercial time-sharing
in fact, i've made some claim that really new innovation is almost always done by very, very few people ... it is when the innovation becomes adopted that large number of other people become involve.
slightly related thread on things like system/r, relational database,
gml/sgml/htm, etc.
https://www.garlic.com/~lynn/aadsm15.htm#11 Resolving an identifier into a meaning
https://www.garlic.com/~lynn/aadsm15.htm#12 Resolving an identifier into a meaning
https://www.garlic.com/~lynn/aadsm15.htm#13 Resolving an identifier into a meaning
https://www.garlic.com/~lynn/aadsm15.htm#14 Resolving an identifier into a meaning
https://www.garlic.com/~lynn/aadsm15.htm#15 Resolving an identifier into a meaning
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Throughput vs. response time Newsgroups: comp.arch Date: Tue, 16 Sep 2003 12:23:52 GMTnmm1@cus.cam.ac.uk (Nick Maclaren) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Threat Analysis and Threat Trees Newsgroups: sci.crypt Date: Tue, 16 Sep 2003 12:31:09 GMTDavid Garnier writes:
some of the following have the selectable URLs
Security
Terms merged from: AFSEC, AJP, CC1, CC2, CC21 (CC site), CIAO, FCv1,
FIPS140, IATF V3 (IATF site), IEEE610, ITSEC, Intel, JTC1/SC27 (sc27
site), KeyAll, MSC, NIST 800-37, NCSC/TG004, NIAP, NSA Intrusion,
NSTISSC/CNSS, online security study, RFC1983, RFC2504, RFC2647,
RFC2828, TCSEC, TDI, TNI, and misc. Updated 20021108 with terms from
CIAO. Updated 20021205 with terms from 800-37 glossary.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Throughput vs. response time Newsgroups: comp.arch Date: Tue, 16 Sep 2003 19:19:29 GMTBernd Paysan writes:
also there was something about if the response was longer than initially expected ... the human response was twice the system delay (presumably up to some threshold) ... something about attention started to wander ... and the longer the delay ... the futher attention wandered ... and the longer it took to refocus on the initial subject. So if response was normally .10 seconds and it started to look like five minutes ... the person got up and went for coffee.
random refs:
https://www.garlic.com/~lynn/2000b.html#20 How many Megaflops and when?
https://www.garlic.com/~lynn/2000c.html#64 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2001m.html#19 3270 protocol
https://www.garlic.com/~lynn/2002i.html#48 CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002k.html#6 IBM 327x terminals and controllers (was Re: Itanium2 power
https://www.garlic.com/~lynn/2003k.html#22 What is timesharing, anyway?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: 360 Microde Floating Point Fix Newsgroups: comp.arch,alt.folklore.computers Date: Thu, 18 Sep 2003 14:18:36 GMTPetter Gustad writes:
earlier ... there was a lot of air bearing simulation work done on
disk engineering 3033 developing disk "floating head" technology.
https://www.garlic.com/~lynn/2002j.html#30 Weird
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Drivers License required for surfing? Newsgroups: alt.comp.virus,alt.computer.security,comp.security.firewalls,comp.security.misc Date: Thu, 18 Sep 2003 14:35:05 GMT"Fred_McGriff" writes:
individuals are required to carry accident insurance for their PC ... and while specific kinds of operating systems may not actually be street illegal ... they could be sufficiently prone to certain kinds of damage to require significanlty higher insurance permiums.
random past threads on this subject:
https://www.garlic.com/~lynn/2001m.html#27 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
https://www.garlic.com/~lynn/2001m.html#28 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
https://www.garlic.com/~lynn/2001m.html#29 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
https://www.garlic.com/~lynn/2001m.html#30 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
https://www.garlic.com/~lynn/2001m.html#31 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
https://www.garlic.com/~lynn/2003i.html#17 Spam Bomb
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Seven of Nine Newsgroups: alt.folklore.computers Date: Thu, 18 Sep 2003 18:39:42 GMTSteve O'Hara-Smith writes:
possibly first time I saw space invaders was when the first chucky cheese opened in I believe had been a supermarket (on kooser) behind the shopping center off blossom hill road (west of almaden x-way)
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Intel iAPX 432 Newsgroups: comp.arch Date: Fri, 19 Sep 2003 13:19:36 GMT"Brian Catlin" writes:
significant larger project was FS which was eventually canceled w/o
even being announced:
https://www.garlic.com/~lynn/submain.html#futuresys
(there was supposedly a joke about any other company would have gone
belly-up if they had spent as much money on such an
unsuccessful/canceled project). it did see some rebirth as the s/38
.... which evolved into as/400 and now appears using power/pc chips.
not 432 books/specs online ... but some past threads with some
reference to hardcopy manuals:
https://www.garlic.com/~lynn/2000d.html#57 iAPX-432 (was: 36 to 32 bit transition
https://www.garlic.com/~lynn/2000d.html#62 iAPX-432 (was: 36 to 32 bit transition
https://www.garlic.com/~lynn/2000e.html#6 Ridiculous
https://www.garlic.com/~lynn/2000f.html#48 Famous Machines and Software that didn't
https://www.garlic.com/~lynn/2001.html#54 FBA History Question (was: RE: What's the meaning of track overfl ow?)
https://www.garlic.com/~lynn/2001g.html#36 What was object oriented in iAPX432?
https://www.garlic.com/~lynn/2001k.html#2 Minimalist design (was Re: Parity - why even or odd)
https://www.garlic.com/~lynn/2002d.html#27 iAPX432 today?
https://www.garlic.com/~lynn/2002d.html#46 IBM Mainframe at home
https://www.garlic.com/~lynn/2002f.html#42 Blade architectures
https://www.garlic.com/~lynn/2002i.html#60 Unisys A11 worth keeping?
https://www.garlic.com/~lynn/2002k.html#16 s/w was: How will current AI/robot stories play when AIs are
https://www.garlic.com/~lynn/2002l.html#19 Computer Architectures
https://www.garlic.com/~lynn/2002o.html#5 Anyone here ever use the iAPX432 ?
https://www.garlic.com/~lynn/2002q.html#11 computers and alcohol
https://www.garlic.com/~lynn/2003.html#5 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003.html#6 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003c.html#17 difference between itanium and alpha
https://www.garlic.com/~lynn/2003e.html#54 Reviving Multics
https://www.garlic.com/~lynn/2003e.html#55 Reviving Multics
https://www.garlic.com/~lynn/2003e.html#56 Reviving Multics
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Intel iAPX 432 Newsgroups: comp.arch,alt.folklore.computers Date: Fri, 19 Sep 2003 19:30:27 GMTPaul Repacholi writes:
random recent threads w/keykos:
https://www.garlic.com/~lynn/2003h.html#41 Segments, capabilities, buffer overrun attacks
https://www.garlic.com/~lynn/2003i.html#15 two pi, four phase, 370 clone
https://www.garlic.com/~lynn/2003j.html#20 A Dark Day
https://www.garlic.com/~lynn/2003k.html#50 Slashdot: O'Reilly On The Importance Of The Mainframe Heritage
https://www.garlic.com/~lynn/2003l.html#19 Secure OS Thoughts
https://www.garlic.com/~lynn/2003l.html#22 Secure OS Thoughts
https://www.garlic.com/~lynn/2003l.html#26 Secure OS Thoughts
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Microsoft Internet Patch Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Sat, 20 Sep 2003 14:05:03 GMTefinnell@SEEBECK.UA.EDU (Edward J. Finnell, III , Ed) writes:
was larger than internet/arpanet until about mid-85. at the time of the cut-over to internet(working) protocol on 1/1/83 ... there were around 240 arpanet nodes .. while the internal network was approaching 1000. Almost all of the internal nodes were VM/CMS ... in part because of severe limitations and problems in the MVS/JES networking capability:
1) JES had traditional homogeneous networking architecture/design somewhat similar to arpanet (prior to internetoking protocol). JES was so bad that different versions of JES might not even interoperate ... there is the incident of a JES file from San Jose flowing thru the internal network to Hursley and bringing down Hursley MVS system.
2) VM/CMS networking had essentially gateway layer from the start (and no real practical network node limitation) the JES homogeneous support was so bad .. there was whole body of VM network drivers that talked to different versions of JES ... and eventually the various VM network drivers were given the implementation task of creating canonical JES network headers and making sure that what was delivered to a specific JES system was at the correct format as a MVS crash avoidance mechanism.
3) original JES network product announcement implemented network node definitions in the psuedo device table ... which was limited to 255 definitions max; as a result a typical JES node had 200 or fewer network definitions. at the time JES raised the network node definition limit to 1000, the internal network was well over 1000 nodes. The JES network node limitation including trashing files if either the destination node or the originating node wasn't in the table ... which made it extremely difficult to use JES as any sort of intermediate node (a local JES might have all the definitions of the local nodes and could deliver files ... but it would still trash a file if it originated from a node not in the definition).
one of the downsides of the bitnet/earn deployment was the vm networking code was soon restricted to only shipping JES networking compatible drivers ... and none of the (original) native VM network drivers (minimizing the comparison of VM having full, interoperable, heterogeneous networking support as compared to the much more limited JES homogeneous networking support).
i believe the first occurance of scripting email exploit was around '74 ... where somebody sent an email that was an exec file with the filename of some normal system command. The CMS command lookup (inheriied from CTSS?, early '60s) was that command lookup was regular/consistent across all kinds of script/exec files, executables as well as kernel calls ... it was even possible to create an exec file on local, private filesystem that was the same name as an internal SVC/kernel call (aka it was also possible to invoke internal SVC/kernel calls directly from command line).
In any case, somebody could read a file from the network, place it in their local filesystem ... and it could be an exec file with the same filename as a system executable or even a kernel call ... which would get invoked anytime that command was invoked.
Until the most recent activity ... exploits were approximately 1/3rd social engineering, 1/3rd buffer overlows, 1/3rd scripting files loaded from the network.
this most recent activity is sort of a combinationt of social engineering and network executable ... so it isn't an actual automatic scripting exploit; requiring social engineering to convince the recipient to manual invoke the command (somewhat was the case of the xmas exec).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Microsoft Internet Patch Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Sat, 20 Sep 2003 14:10:14 GMTPaulW@ENET.COM (Paul Wendt) writes:
minor past profs refs:
https://www.garlic.com/~lynn/2000c.html#46 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2001k.html#35 Newbie TOPS-10 7.03 question
https://www.garlic.com/~lynn/2001k.html#39 Newbie TOPS-10 7.03 question
https://www.garlic.com/~lynn/2001k.html#56 E-mail 30 years old this autumn
https://www.garlic.com/~lynn/2002f.html#14 Mail system scalability (Was: Re: Itanium troubles)
https://www.garlic.com/~lynn/2002h.html#58 history of CMS
https://www.garlic.com/~lynn/2002h.html#59 history of CMS
https://www.garlic.com/~lynn/2002h.html#64 history of CMS
https://www.garlic.com/~lynn/2002i.html#50 CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002p.html#34 VSE (Was: Re: Refusal to change was Re: LE and COBOL)
https://www.garlic.com/~lynn/2003b.html#45 hyperblock drift, was filesystem structure (long warning)
https://www.garlic.com/~lynn/2003j.html#56 Goodbye PROFS
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Microsoft Internet Patch Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Sat, 20 Sep 2003 14:24:07 GMTibm-main@LDWOREN.NET (Leonard Woren) writes:
the harder was that 370 virtual memory tables were significantly different than 360/67 .... so 370 virtual memory tables had to be remapped to 360/67 tables.
then to test that code ... a version was cp/67 was modified to run in 370 hardware (rather than 360/67 hardware). This was operational and regularly tested a year before engineering hardware was available for 370 virtual memory.
It was used to test the original 370 engineering model with virtual memory hardware support (something that had a knife-switch as an IPL/boot button). Turns out the engineers had a bug ... they had reversed the implementation of two of the B2 opccdes ... which required patching the kernel (modified CP/67) to correctly boot on the machine.
misc. past discussion of the cp/67 support 370 virtual memory
https://www.garlic.com/~lynn/94.html#48 Rethinking Virtual Memory
https://www.garlic.com/~lynn/95.html#3 What is an IBM 137/148 ???
https://www.garlic.com/~lynn/97.html#27 IA64 Self Virtualizable?
https://www.garlic.com/~lynn/99.html#7 IBM S/360
https://www.garlic.com/~lynn/99.html#33 why is there an "@" key?
https://www.garlic.com/~lynn/2000.html#68 Mainframe operating systems
https://www.garlic.com/~lynn/2000e.html#15 internet preceeds Gore in office.
https://www.garlic.com/~lynn/2000g.html#16 360/370 instruction cycle time
https://www.garlic.com/~lynn/2001h.html#19 checking some myths.
https://www.garlic.com/~lynn/2001i.html#43 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001k.html#29 HP Compaq merger, here we go again.
https://www.garlic.com/~lynn/2002c.html#39 VAX, M68K complex instructions (was Re: Did Intel Bite Off More Than It Can Chew?)
https://www.garlic.com/~lynn/2002h.html#50 crossreferenced program code listings
https://www.garlic.com/~lynn/2002j.html#0 HONE was .. Hercules and System/390 - do we need it?
https://www.garlic.com/~lynn/2002j.html#70 hone acronym (cross post)
https://www.garlic.com/~lynn/2003b.html#0 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003g.html#14 Page Table - per OS/Process
https://www.garlic.com/~lynn/2003g.html#18 Multiple layers of virtual address translation
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: SR 15,15 Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Sat, 20 Sep 2003 20:22:39 GMTibm-main@LDWOREN.NET (Leonard Woren) writes:
this certain 37xx product supported 56kbit links and would support multiple 56kbit in "fat pipes". When they did a survey to find out the 37xx "fat pipe" install base .. they found lots of two-56kbit fat pipes, lots of three-56kbit fat pipes, lots of four-56kbit fat pipes and little or no five-56kbit fat pipes.
so the conclusion was that customers didn't need the bandwidth for more that 200kbit ... and would only be very slowly be growing to T1. Also ignore all the 2701 T1s and the S/1 zirpel T1s.
what they apparently failed to see was that tariff for five 56kbit lines was about the same as a full T1 (aka 1.5mbits or over 25 56kbit lines) ... customers would just buy a T1 and used it with a product that supported T1. An extremely cursory survey of mainframe non-37xx configurations easily turned up 200 T1 lines in 1986 (or as many that supposedly wouldn't be reached in total for the whole country before 1991).
it was also a little out of sync with the NSFNET1 T1 backbone (minor
ref to NSFNET1 program and award announcement):
https://www.garlic.com/~lynn/internet.htm#nsfnet
https://www.garlic.com/~lynn/internet.htm#0
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: SR 15,15 Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Sun, 21 Sep 2003 14:03:01 GMTIBM-MAIN@ISHAM-RESEARCH.COM (Phil Payne) writes:
370/168 had 128 entry table look aside buffer with a 3bit identifier for each entry ... for a seven-entry "STO-stack" ... i.e. 3-bits, 8 identifiers ... one for unused entries and seven for which STO the entry was associated with.
The machines were considered to be STO-associative ... i.e. virtual addresses and the table look aside entries were identified as being with a specific segment table (represented by the segment table origin address).
when segment register 1 was reloaded with different STO ... it was checked for being in the STO-stack ... and if so, continued as that STO; if not, one of the entries in the STO-stack was scavanged and all the related entries in the table look aside buffer invalidated.
dual-address space was introduced for 3033. there was the various performance trade-offs between having hardware assist moving data between address space (as well as somewhat alleviating pressure on the common area) against increase in the pressure/use of the entries in the STO-stack (hardware assist for cross-memory moves was at the expense of increasing the nominal number of STO entries needed in normal execution period).
The increased pressure on TLB entries somewhat caused by multiple address space instruction architecture and a STO-associative hardware implementation ... when MVS was in large part a PTO architecture became more & more of a problem ... aka over half the TLB entries tended to be duplicated because half of each MVS address space was composed of identiable page table entries.
Original 370 architecture had regular architecture that allowed for STO-associative hardware implementation or even a STE/PTO associative hardware implementation i.e. rather than associate each TLB entry with a specific segment table or address space .... associate each TLB with a specific segment table entry ... page table origin address.
MVS was somewhat of a cludge from a operating system architecture ... that was partly left over from os/360 days with the kernel code occupying the same address space as the application. Part of the enormouse pressure on 24-bit address in MVS systems ... is that later versions of MVS/370 had the kernel occupying 8mbytes of each address space and some installations had common area growing to 4mbytes ... leaving only 4mbytes of the address space for application execution.
discussion of common system bit from early '80s
https://www.garlic.com/~lynn/2002m.html#0 Handling variable page sizes?
this was case of adapting the hardware to the MVS operating system kludge ... having an environment where certain segment table entries can be flagged as being "common" across all virtual memory address spaces ... aka the operating system would enforce the rule that segments flagged as common ... would be unique across all address spaces loaded. Then TLB hardware could treat TLB entries from segments flagged as common as not being address space unique ... they were the same in all address spaces.
past threads on sto-stack and/or dual-address space
https://www.garlic.com/~lynn/94.html#46 Rethinking Virtual Memory
https://www.garlic.com/~lynn/99.html#204 Core (word usage) was anti-equipment etc
https://www.garlic.com/~lynn/2000c.html#84 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000e.html#58 Why not an IBM zSeries workstation?
https://www.garlic.com/~lynn/2000g.html#10 360/370 instruction cycle time
https://www.garlic.com/~lynn/2001g.html#8 Test and Set (TS) vs Compare and Swap (CS)
https://www.garlic.com/~lynn/2001i.html#13 GETMAIN R/RU (was: An IEABRC Adventure)
https://www.garlic.com/~lynn/2002c.html#40 using >=4GB of memory on a 32-bit processor
https://www.garlic.com/~lynn/2002d.html#51 Hardest Mistake in Comp Arch to Fix
https://www.garlic.com/~lynn/2002g.html#17 Black magic in POWER5
https://www.garlic.com/~lynn/2002g.html#18 Black magic in POWER5
https://www.garlic.com/~lynn/2002l.html#51 Handling variable page sizes?
https://www.garlic.com/~lynn/2002l.html#57 Handling variable page sizes?
https://www.garlic.com/~lynn/2002l.html#60 Handling variable page sizes?
https://www.garlic.com/~lynn/2002n.html#58 IBM S/370-168, 195, and 3033
https://www.garlic.com/~lynn/2002q.html#1 Linux paging
https://www.garlic.com/~lynn/2003c.html#13 Unused address bits
https://www.garlic.com/~lynn/2003d.html#53 Reviving Multics
https://www.garlic.com/~lynn/2003d.html#69 unix
https://www.garlic.com/~lynn/2003e.html#0 Resolved: There Are No Programs With >32 Bits of Text
https://www.garlic.com/~lynn/2003g.html#12 Page Table - per OS/Process
https://www.garlic.com/~lynn/2003g.html#13 Page Table - per OS/Process
https://www.garlic.com/~lynn/2003g.html#23 price ov IBM virtual address box??
https://www.garlic.com/~lynn/2003h.html#37 Does PowerPC 970 has Tagged TLBs (Address Space Identifiers)
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Fw: Mail delivery failed: returning message to sender Newsgroups: bit.listserv.ibm-main Date: Mon, 22 Sep 2003 00:36:10 GMTrichard.higson@GT.OWL.DE (Richard Higson) writes:
it isn't question as to level of technology ... but whether it is unsafe and/or hazard.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: SR 15,15 was: IEFBR14 Problems... Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 22 Sep 2003 13:15:23 GMTGerald.Kaiser@WW-INFORMATIK.DE (Kaiser, Gerald , IRB-BS) writes:
The flagship operating system for 360/67 was tss/360 ... which at its
peak had comparable number of people working on it as os/360. lots of
history about ctss, multics, 360/67, modified 360/40 with virtual
memory, tss/360, cp/67 (original virtual machine operating system),
cms (originally referred to as cambridge monitor system but renamed to
conversational monitor system as part of transition to vm/370).
https://www.leeandmelindavarian.com/Melinda#VMHist
during that period, cms, cp/40, cp/67 had about 1/100th as many
developers writing software for it as tss/360. all of this was
going on csc, 4th floor, 545 tech sq.
https://www.garlic.com/~lynn/subtopic.html#545tech
Also where GML originated (which has since spawned SGML, HTML, XML,
FSML, SAML, etc, etc) and the internal network.
some of information from 360/67 reference "blue card" (including
bas/basr instructions and control register assignment):
https://www.garlic.com/~lynn/2001c.html#15 OS/360 (was LINUS for S/390)
misc. other references to 360/67 "blue card":
https://www.garlic.com/~lynn/2001.html#69 what is interrupt mask register?
https://www.garlic.com/~lynn/2001.html#71 what is interrupt mask register?
https://www.garlic.com/~lynn/2001d.html#42 IBM was/is: Imitation...
https://www.garlic.com/~lynn/2002f.html#54 WATFOR's Silver Anniversary
https://www.garlic.com/~lynn/2003l.html#25 IBM Manuals from the 1940's and 1950's
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: SR 15,15 was: IEFBR14 Problems... Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 22 Sep 2003 17:42:39 GMTtjpo@AIRBORNE.COM (Patrick O'Keefe) writes:
One of the IBM SEs on the Boeing account (out of the Seattle branch office) did a stripped-down CP using the "DIL" (?) instruction on standard (non-virtual memory) machine. DIL(?) had base & bound, contiguous storage relocation (think of it as an early form of LPARS). I believe he did some of his testing 3rd shift on one of the machines in the seattle datacenter (on the "first" floor).
TSS/360 was the mainstream operating system for the 360/67 and at one point had numbers approaching that of os/360 working on it.
cp/67 was done at cambridge science center ... with something like 1/100th the number of people working on tss/360.
MTS was another virtual memory system for 360/67 done at univ. of michigan.
Starting sometime in '70 ... the DP division started pioneering hone at three datacenters at 1) 1133 westchester, 2) someplace in chicago, and 3) wilshire blvd. ... allowing testing of 370 operating systems on 360/67.
As previously mentioned, one of the earliest applications of the
internal network was a joint CSC/Endicott project to provide virtual
370 machine support (both non-virtual memory as well as virtual
memory) ... running on 360/67. This started out as a series of changes
to the CP/67 kernel to simulate the new (non-virtual memory) 370
instructions. This set of code was used by the emerging HONE operation
at the three DP datacenters with 360/67s. The rest of the code
provided full virtual memory 370 simulation ... and a set of
modifications to cp/67 to make it run on 370 architecture instead of
360/67 architecture (this later set of code was operational for a year
before the first engineering 370 hardware was available with virtual
memory support).
https://www.garlic.com/~lynn/2003m.html#27 Microsoft Internet Patch
HONE was moved to 370s and US HONE operations were eventually
consolidated in Cal ... with one of the largest time-sharing service
bureau operations in the world (supporting all field and branch
people). HONE was also cloned for branch, sales, marketing, and field
support people around the world (I hand carried and installed some of
the early deployments). misc. hone refs:
https://www.garlic.com/~lynn/subtopic.html#hone
random mentions of MTS:
https://www.garlic.com/~lynn/93.html#23 MTS & LLMPS?
https://www.garlic.com/~lynn/93.html#25 MTS & LLMPS?
https://www.garlic.com/~lynn/93.html#26 MTS & LLMPS?
https://www.garlic.com/~lynn/98.html#15 S/360 operating systems geneaology
https://www.garlic.com/~lynn/2000.html#91 Ux's good points.
https://www.garlic.com/~lynn/2000b.html#61 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000c.html#44 WHAT IS A MAINFRAME???
https://www.garlic.com/~lynn/2000f.html#52 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000g.html#0 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2001m.html#55 TSS/360
https://www.garlic.com/~lynn/2001n.html#45 Valid reference on lunar mission data being unreadable?
https://www.garlic.com/~lynn/2002i.html#63 Hercules and System/390 - do we need it?
https://www.garlic.com/~lynn/2002n.html#54 SHARE MVT Project anniversary
https://www.garlic.com/~lynn/2002n.html#64 PLX
https://www.garlic.com/~lynn/2003b.html#0 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003b.html#10 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003f.html#41 SLAC 370 Pascal compiler found
https://www.garlic.com/~lynn/2003j.html#54 June 23, 1969: IBM "unbundles" software
https://www.garlic.com/~lynn/2003k.html#5 What is timesharing, anyway?
https://www.garlic.com/~lynn/2003l.html#30 Secure OS Thoughts
https://www.garlic.com/~lynn/2003l.html#41 Secure OS Thoughts
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: MAD Programming Language Newsgroups: alt.folklore.computers Date: Mon, 22 Sep 2003 17:13:01 GMTTom Van Vleck writes:
Harold then joined NCSS ... when they formed cp/67 time-sharing
service bureau ... june of '68 ... slightly related:
http://www.decosta.com/Nomad/tales/history.html
some other people from Lincoln Labs and others formed another cp/67
time-sharing service bureau (IDC) some months later. misc. previous
postings regarding time-sharing service bureau
https://www.garlic.com/~lynn/submain.html#timeshare
it was on harold's implementation that i did the dynamic adaptive,
fairshare, non-fairshare, pathlength, etc. stuff in late '68 and '69.
lots of old performance and scheduling posts:
https://www.garlic.com/~lynn/subtopic.html#fairshare
and the "clock" replacement stuff
https://www.garlic.com/~lynn/subtopic.html#wsclock
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: SR 15,15 was: IEFBR14 Problems... Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 22 Sep 2003 17:54:20 GMTJMckown@UICIINSCTR.COM (McKown, John) writes:
some past posts referrning quotes in the above about the perception
that virtual memory in atlas "didn't work":
https://www.garlic.com/~lynn/2000.html#52 Correct usage of "Image" ???
https://www.garlic.com/~lynn/2000c.html#79 Unisys vs IBM mainframe comparisons
https://www.garlic.com/~lynn/2000f.html#78 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2001h.html#10 VM: checking some myths.
https://www.garlic.com/~lynn/2001h.html#26 TECO Critique
https://www.garlic.com/~lynn/2002.html#42 a.f.c history checkup... (was What specifications will the standard year 2001 PC have?)
https://www.garlic.com/~lynn/2003.html#72 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003b.html#0 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003b.html#1 Disk drives as commodities. Was Re: Yamhill
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: SR 15,15 was: IEFBR14 Problems... Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 22 Sep 2003 19:25:42 GMT"Glen Herrmannsfeldt" writes:
Load Multiple Control LMC RS M, A, S, D P B8 Store Multiple Control STMC RS M, P, A, S B0 Load Real Address LRA RX M, A, S B1 Branch and Store BASR RR 0D Branch and Store BAS RX 4D Search List (RPQ) SLT RS P, A, S, Relo A2and basr/bas Branch and Save instructions from
are 0D and 4D op-codes (as in 360/67)
from above programming notes:
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DZ9ZR001/5.3.3.1?SHELF=DZ9ZBK01&DT=20020416112421#SPTBSMNTS
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DZ9ZR001/5.3.3.2?SHELF=DZ9ZBK01&DT=20020416112421#SPTSBIPN
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DZ9ZR001/5.3.3?SHELF=DZ9ZBK01&DT=20020416112421#HDR05AH24
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: S/360 undocumented instructions? Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Tue, 23 Sep 2003 15:59:22 GMTcharlie@ELEKTRO.CMHNET.ORG (Charlie Smith) writes:
cp/67 (and then vm/370) co-opted the diagnose instruction for virtual machine usage ... i.e. defining virtual machine model depenedent diagnose instruction (i.e. diagnose instruction operational definition defined specific for a virtual machine model).
cambridge science center was trying to get a 360/50 to make the hardware modifications to support virtual memory ... however because so many 360/50s were going to FAA for the air traffic control system ... they had to settle for a 360/40 (this was all pending availability of the official virtual memory machine ... the 360/67). cambridge built cp/40 on the 360/40 ... and then converted it to cp/67 when 360/67 became available.
random past mention of cp/40 & virtual memoy on 360/40:
https://www.garlic.com/~lynn/94.html#46 Rethinking Virtual Memory
https://www.garlic.com/~lynn/2000c.html#79 Unisys vs IBM mainframe comparisons
https://www.garlic.com/~lynn/2000f.html#59 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2000f.html#63 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000f.html#78 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2001b.html#29 z900 and Virtual Machine Theory
https://www.garlic.com/~lynn/2001h.html#10 VM: checking some myths.
https://www.garlic.com/~lynn/2001m.html#47 TSS/360
https://www.garlic.com/~lynn/2002b.html#6 Microcode?
https://www.garlic.com/~lynn/2002b.html#64 ... the need for a Museum of Computer Software
https://www.garlic.com/~lynn/2002c.html#8 TOPS-10 logins (Was Re: HP-2000F - want to know more about it)
https://www.garlic.com/~lynn/2002c.html#39 VAX, M68K complex instructions (was Re: Did Intel Bite Off More Than It Can Chew?)
https://www.garlic.com/~lynn/2002c.html#44 cp/67 (coss-post warning)
https://www.garlic.com/~lynn/2002c.html#45 cp/67 addenda (cross-post warning)
https://www.garlic.com/~lynn/2002h.html#59 history of CMS
https://www.garlic.com/~lynn/2002n.html#28 why does wait state exist?
https://www.garlic.com/~lynn/2003b.html#0 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003g.html#31 Lisp Machines
https://www.garlic.com/~lynn/2003g.html#33 price ov IBM virtual address box??
https://www.garlic.com/~lynn/2003k.html#48 Who said DAT?
https://www.garlic.com/~lynn/2003l.html#25 IBM Manuals from the 1940's and 1950's
https://www.garlic.com/~lynn/2003m.html#4 IBM Manuals from the 1940's and 1950's
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: S/360 undocumented instructions? Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Tue, 23 Sep 2003 17:16:10 GMTibm-main@LDWOREN.NET (Leonard Woren) writes:
370/148 was much later. 148 had faster floating point and a lot more room for microcode. virgil/tully (138/148) went with operating system microcode assists ... for both VS/1 and VM/370. We were given that there was about 6kbytes of microcode left to develope VM/370 microcode assist ... and that instruction bytes translated from 370 to microcde on about 1 for 1 ... however, for equivalent function ... the 148 microcode implementation ran approximately ten times faster than the equivalent implementation in 370 (for a whole slew of reasons). The VM/370 microcode assist increased performance by 1) 370 to microcode ten times speed up (for all code) and 2) for virtual machine emulation of priviledge instructions ... eliminating the priviledge interrupt into the vm/370 kernel, register saving, restoring, context switch, etc.
Note that on the high-end machines (168, 3033, etc) ... 370 instruction emulation had progressed until it was effectively one-for-one. 370/165 had about 2.1 machine cycles per 370 instruction, this was optimized in 370/168 until it was about 1.6 machine cycles per 370 instruction. By 3033 it was around one for one. There were even cases on 3033 that translation from 370 instruction stream into microcode actually ran slower. The 3081 had situations were 370 translation into microcode ran significantly slower because the microcode might have to be "paged" in off a picollo hard disk.
The vm/370 microcode assist on 138/148 for supervisor/kernel code translated into microcode was referred to as ECPS. The other part was additonal virtual machine assist of priviledge instructions by operating systems running in virtual machine (subset of all the stuff seen in current day LPAR support).
some past posts on the roller lights:
https://www.garlic.com/~lynn/99.html#204 Core (word usage) was anti-equipment etc
https://www.garlic.com/~lynn/2002n.html#15 Tweaking old computers?
https://www.garlic.com/~lynn/2003g.html#20 price ov IBM virtual address box??
lots of past ecps refs:
https://www.garlic.com/~lynn/94.html#21 370 ECPS VM microcode assist
https://www.garlic.com/~lynn/94.html#27 370 ECPS VM microcode assist
https://www.garlic.com/~lynn/94.html#28 370 ECPS VM microcode assist
https://www.garlic.com/~lynn/2000.html#12 I'm overwhelmed
https://www.garlic.com/~lynn/2000c.html#50 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000c.html#76 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000e.html#6 Ridiculous
https://www.garlic.com/~lynn/2000g.html#7 360/370 instruction cycle time
https://www.garlic.com/~lynn/2001b.html#29 z900 and Virtual Machine Theory
https://www.garlic.com/~lynn/2001b.html#83 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001i.html#2 Most complex instructions (was Re: IBM 9020 FAA/ATC Systems from 1960's)
https://www.garlic.com/~lynn/2001i.html#3 Most complex instructions (was Re: IBM 9020 FAA/ATC Systems from 1960's)
https://www.garlic.com/~lynn/2002e.html#75 Computers in Science Fiction
https://www.garlic.com/~lynn/2002f.html#57 IBM competes with Sun w/new Chips
https://www.garlic.com/~lynn/2002i.html#80 HONE
https://www.garlic.com/~lynn/2002j.html#5 HONE, xxx#, misc
https://www.garlic.com/~lynn/2002l.html#51 Handling variable page sizes?
https://www.garlic.com/~lynn/2002l.html#62 Itanium2 performance data from SGI
https://www.garlic.com/~lynn/2002o.html#15 Home mainframes
https://www.garlic.com/~lynn/2002o.html#16 Home mainframes
https://www.garlic.com/~lynn/2002p.html#44 Linux paging
https://www.garlic.com/~lynn/2002p.html#48 Linux paging
https://www.garlic.com/~lynn/2003.html#4 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003.html#5 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003.html#6 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003.html#7 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003.html#14 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003.html#15 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003.html#16 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003.html#17 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003.html#61 MIDAS
https://www.garlic.com/~lynn/2003d.html#21 PDP10 and RISC
https://www.garlic.com/~lynn/2003e.html#56 Reviving Multics
https://www.garlic.com/~lynn/2003f.html#21 "Super-Cheap" Supercomputing
https://www.garlic.com/~lynn/2003f.html#43 ECPS:VM DISPx instructions
https://www.garlic.com/~lynn/2003f.html#47 ECPS:VM DISPx instructions
https://www.garlic.com/~lynn/2003f.html#52 ECPS:VM DISPx instructions
https://www.garlic.com/~lynn/2003f.html#54 ECPS:VM DISPx instructions
https://www.garlic.com/~lynn/2003f.html#56 ECPS:VM DISPx instructions
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Questioning risks of using the same key for authentication and encryption Newsgroups: sci.crypt Date: Tue, 23 Sep 2003 21:11:55 GMT"Paul Sheer" writes:
1) encryption and authentication are different business processes with different business requirements. in a corporate or institutional setting ... there is likely a business requirement for escrowing encryption keys involved in encrypting data at rest (corporate requirement for no-signle-point-of-failure and the ability to always be able to recover corporate assets) ... while there may be a total different business requirement that an authentication operation can only be under under control of specific person
2) there have been some early vague notions that authentication, digital signatures, and non-repudiation are related business processes. "legal" digital signature and non-repudiation tend to carry with it the requirement that not only could the signature only have originated with a specific entity ... but that entity also intended to "sign" some contents and furthermore demonstrates some agreement with any terms and conditions that might be specified in the contents being signed. encryption somewhat implies a business process that can willy-nilly encrypt strings of bits w/o necessarily requiring any awareness of the contents being encrypted.
the use of the same key for totally different business process purposes can be a bad idea when there is requirement for incompatible management of the key(s) and processes associated with the different business purposes.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: S/360 undocumented instructions? Newsgroups: bit.listserv.ibm-main Date: Wed, 24 Sep 2003 01:54:26 GMTedgould@AMERITECH.NET (Edward A. Gould) writes:
misc. past refs to the 1655:
https://www.garlic.com/~lynn/2001c.html#17 database (or b-tree) page sizes
https://www.garlic.com/~lynn/2001l.html#53 mainframe question
https://www.garlic.com/~lynn/2002.html#31 index searching
https://www.garlic.com/~lynn/2002i.html#17 AS/400 and MVS - clarification please
https://www.garlic.com/~lynn/2002l.html#40 Do any architectures use instruction count instead of timer
https://www.garlic.com/~lynn/2003b.html#15 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003b.html#17 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003c.html#55 HASP assembly: What the heck is an MVT ABEND 422?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: MAD Programming Language Newsgroups: alt.folklore.computers Date: Wed, 24 Sep 2003 16:50:56 GMTTom Van Vleck writes:
release 2 of cp/67 simplified things into two level queue ... "interactive" and "the rest". Task placed into interactive queue were ahead of "the rest" ... until they used a predetermined amount of cpu ... went idle ... or had another terminal i/o.
various cpu bound applications created extremly pathological and uncontrolled system-wide thruput characteristics.
One of the culprits was the CMS "BLIP" command which would do a terminal I/O (that did nothing more than "wiggle" the 2741 type-ball) after every two seconds of CPU use. A little creative hacking and the CPU-use interval could be reduced to a couple hundred milliseconds.
For the fairshare/non-fairshare dynamic, adaptive feedback scheduling ... I implemented smooth recent CPU utilization tracking and priority scheduling based on advisery deadlines (i.e. tasks were ordered for dispatching by their advisery deadline ... not something close to "interfactive" FIFO before all "the rest" FIFO). The advisery deadline was based on a number of things, including recent resource consumption, projected CPU use, as well as fairshare and non-fairshare administrative specifications. Part of the whole trick was being able to accumualte recent, smoothed resource usage ... and the advisery deadline in shorter pathlength than the existing much more simple minded implementation.
One of the characteristics was that live load situations became much more predictable ... with the elimination of whole classes of pathelogical situations. In effect, "interactive" had a slight preference as long as the task wasn't exceeding its resource allocation. Lots of "think time" (no recent cpu use) plus interactive was much more predictable.
misc. past
https://www.garlic.com/~lynn/subtopic.html#fairshare
some past posts with regard to CMS "BLIP"
https://www.garlic.com/~lynn/2000g.html#12 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2002i.html#56 wrt code first, document later
https://www.garlic.com/~lynn/2003b.html#71 Early attempts at console humor?
https://www.garlic.com/~lynn/2003b.html#72 Early attempts at console humor?
https://www.garlic.com/~lynn/2003c.html#16 Early attempts at console humor?
https://www.garlic.com/~lynn/2003c.html#18 Early attempts at console humor?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Issues in Using Virtual Address for addressing the Cache Newsgroups: comp.arch,alt.folklore.computers Date: Wed, 24 Sep 2003 18:43:32 GMT"Del Cecchi" writes:
some number of installations that had been running dos/vs under vm/370 on 168-1 and upgraded to 168-3 actually saw a significant performance degradation (because on entry to cp kernel it would always reload control registers to default specifying 4k-page mode ... and only load control registers for 2k-page mode when it was dispatching a virtual machine that was running in 2k-page mode.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: S/360 undocumented instructions? Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Wed, 24 Sep 2003 18:59:47 GMT"Glen Herrmannsfeldt" writes:
2303 and 2301 drums were very similar ... except 2303 transferred data on a single read/write head ... while the 2301 transferred data on four read/write heads in parallel ... resulting in four times the transfer rate ... possibly be construed as an early/simple form of RAID parallel transfer.
for a while, csc had a heavily loaded 360/67 that would support 70-80 users with sub-second response and hit 300 page I/O transfers per second ... with nominal avg rate of 150 page I/O transfers per second.
some old threads comparing heavily loaded cp/67 360/67 configuration
and 3081k configuration running similar workload (but separated in
time by 10-15 years):
https://www.garlic.com/~lynn/93.html#31 Big I/O or Kicking the Mainframe out the Door
https://www.garlic.com/~lynn/95.html#10 Virtual Memory (A return to the past?)
https://www.garlic.com/~lynn/98.html#46 The god old days(???)
https://www.garlic.com/~lynn/99.html#4 IBM S/360
https://www.garlic.com/~lynn/99.html#103 IBM 9020 computers used by FAA (was Re: EPO stories (was: HELP IT'S HOT!!!!!))
https://www.garlic.com/~lynn/99.html#190 Merced Processor Support at it again
https://www.garlic.com/~lynn/2001f.html#62 any 70's era supercomputers that ran as slow as today's supercomputers?
https://www.garlic.com/~lynn/2001l.html#40 MVS History (all parts)
https://www.garlic.com/~lynn/2001l.html#61 MVS History (all parts)
https://www.garlic.com/~lynn/2001m.html#23 Smallest Storage Capacity Hard Disk?
https://www.garlic.com/~lynn/2002.html#5 index searching
https://www.garlic.com/~lynn/2002b.html#11 Microcode? (& index searching)
https://www.garlic.com/~lynn/2002b.html#20 index searching
https://www.garlic.com/~lynn/2002e.html#8 What are some impressive page rates?
https://www.garlic.com/~lynn/2002e.html#9 What are some impressive page rates?
https://www.garlic.com/~lynn/2002i.html#16 AS/400 and MVS - clarification please
https://www.garlic.com/~lynn/2002n.html#58 IBM S/370-168, 195, and 3033
https://www.garlic.com/~lynn/2003.html#21 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003d.html#21 PDP10 and RISC
https://www.garlic.com/~lynn/2003f.html#50 Alpha performance, why?
random previous mentions of 2321
https://www.garlic.com/~lynn/2000.html#9 Computer of the century
https://www.garlic.com/~lynn/2000b.html#41 How to learn assembler language for OS/390 ?
https://www.garlic.com/~lynn/2001.html#17 IBM 1142 reader/punch (Re: First video terminal?)
https://www.garlic.com/~lynn/2001.html#51 Competitors to SABRE?
https://www.garlic.com/~lynn/2001l.html#63 MVS History (all parts)
https://www.garlic.com/~lynn/2002.html#16 index searching
https://www.garlic.com/~lynn/2002.html#22 index searching
https://www.garlic.com/~lynn/2002f.html#3 Increased Paging in 64-bit
https://www.garlic.com/~lynn/2002g.html#84 Questions on IBM Model 1630
https://www.garlic.com/~lynn/2002i.html#26 : Re: AS/400 and MVS - clarification please
https://www.garlic.com/~lynn/2002i.html#31 : Re: AS/400 and MVS - clarification please
https://www.garlic.com/~lynn/2002i.html#33 "Mass Storage System"
https://www.garlic.com/~lynn/2002m.html#40 Wanted: the SOUNDS of classic computing
https://www.garlic.com/~lynn/2002o.html#3 PLX
https://www.garlic.com/~lynn/2002o.html#9 PLX
https://www.garlic.com/~lynn/2003.html#70 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003.html#72 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003b.html#7 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003b.html#9 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003b.html#18 Card Columns
https://www.garlic.com/~lynn/2003c.html#36 "average" DASD Blocksize
https://www.garlic.com/~lynn/2003c.html#61 RFC 3092
https://www.garlic.com/~lynn/2003f.html#28 New RFC 3514 addresses malicious network traffic
https://www.garlic.com/~lynn/2003k.html#36 What is timesharing, anyway?
https://www.garlic.com/~lynn/2003m.html#6 The real history of comp arch: the short form
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: S/360 undocumented instructions? Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Thu, 25 Sep 2003 14:33:14 GMTRick.Fochtman@CLEARINGCORP.COM (Rick Fochtman) writes:
for 3380 disk drive 3mbyte/sec, a new controller was cutter/3880.
the 3830 was a horizontal microcode machine ... the 3880 controller was implemented with much slower vertical, "jib-prime" microprocessor. While the 3380/3880 was much faster transfer than 3330/3830, the processor was slower ... requiring custom dedicated hardware for data-flow ... leaving the jig-prime the task of handling just control operations.
3880 q/a acceptance required that its performance was within five
percent of 3830. The acceptance test was done in STL with a one pack
vs1 system. The problem was that the first time 3880 was used with
full string of drives ... there was significant performance
degradation compared to 3830 ... turns out it was a 16 drive string of
3330s that was recabled from 3830 controller to 3880 controller ..d.
misc. tales from bldg 14 disk engineering an bldg 15 product test:
https://www.garlic.com/~lynn/subtopic.html#disk
What had happened was that the jib-prime was so much slower than the 3830 ... the jib-prime was coded to signal operation complete to the channel ... before the 3880 had finished its cleanup. This resulted in two problems:
1) if an error was discovered during post-complete cleanup ... the controller generated an unsolicited unit check ... which was violation of the architecture ... and they had to come up with some other strategy.
2) the operation complete to the CPU ... in an heavily loaded multi-drive string ... the processor typically had queued requests for some drive connected thru the same controller and it would immediately try to start the operation. Since the 3880 was actually still busy, the controller then would signal SM+BUSY (controller busy) and at some later time time signal CUE. In a busy system this resulted in just about doubling the number of SIOs and interrupts (compared to the same configuration with 3830) ... in addition to increased delay for all operations. The original acceptance tests with a single drive VS1 system didn't encounter the immediate controller redrive problem. Since we diagnosed this in bldg. 15 six months prior to first customer ship ... there was some window of additional changes before the product showed up in customer installations.
Note that the slower microprocessor in cutter/3880 propagated other kinds of performance related problems. One was a significant latency when the 3880 was hit by two succesive I/O operations on different channel interfaces and the jib-prime had to do significant internal bookkeeping overhead (one the order of millisecond) to switch channel interfaces.
misc. lists of disks & controllers:
https://www.garlic.com/~lynn/2001l.html#53 mainframe question
https://www.garlic.com/~lynn/2001l.html#54 mainframe question
https://www.garlic.com/~lynn/2001l.html#63 MVS History (all parts)
https://www.garlic.com/~lynn/2002o.html#3 PLX
https://www.garlic.com/~lynn/2003b.html#3 Disk drives as commodities. Was Re: Yamhill
https://www.garlic.com/~lynn/2003b.html#7 Disk drives as commodities. Was Re: Yamhill
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: MAD Programming Language Newsgroups: alt.folklore.computers Date: Fri, 26 Sep 2003 11:29:26 GMTBrian Inglis writes:
what I did circa '69 (undergraduate ... but ibm shipped in products) for dynamic, adaptive, fairshare/non-fairshare, etc ... was to calculate an advisery deadline dispatching priority ... and all tasks (regardless of queue, interactive, batch, etc) were odered by their advisery deadline dispatching priority.
the advisery deadline was the current time plus an increment placing it some time in the future ... at which time they should have consumed the allocated resources ... and the process would be repeated.
the "increment" was a calculation based on their administrative priority, smooth avg. of recently used resources compared to target administrative resournce consumption ... and the size of CPU allocation for this queue stay. To the extent that "interactive" tasks had a "nearer" deadline than "outer" tasks ... was based on the amount of cpu/quanta being allocated was significantly smaller.
In effect, "interactive" no longer got better dispatching priority to consume more cpu resources .... however they were allowed to consume their target resources in much smaller, more frequent increments; but the "more frequent" calculation was strictly proportional to the size of the allocation. as previously mentioned ... one of the tricks in all this implementation was to actually use fewer instructions than the much more simple minded approach that it replaced.
minor refs:
https://www.garlic.com/~lynn/subtopic.html#fairshare
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
Internet trivia, 20th anniv: https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: MAD Programming Language Newsgroups: alt.folklore.computers Date: Mon, 29 Sep 2003 19:18:46 GMTMorten Reistad writes:
as an aside ... one of the LAN benefits ... was that a number of places started running into "floor" loading limits with the weight of 327x coax cables ... snaking thru all the cable trays.
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OSI protocol header Newsgroups: comp.protocols.tcp-ip Date: Mon, 29 Sep 2003 19:49:17 GMTtcs_ganesh@yahoo.com (Ganesh) writes:
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Intel 860 and 960, was iAPX 432 Newsgroups: alt.folklore.computers,comp.arch Date: Mon, 29 Sep 2003 20:55:58 GMTEric Smith <eric-no-spam-for-me@brouhaha.com> writes:
and NT started as an i860 project?
http://www.winsupersite.com/reviews/winserver2k3_gold1.asp
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Thoughts on Utility Computing? Newsgroups: comp.arch,alt.folklore.computers Date: Tue, 30 Sep 2003 14:46:44 GMT"Harlan Messinger" writes:
recent blurb on "virtual server services"
http://news.com.com/2100-7339_3-5083775.html?tag=nefd_top
or time-sharing service bureau by any other name
misc. past posts on time-sharing service bureaus
https://www.garlic.com/~lynn/submain.html#timeshare
previous post in this thread
https://www.garlic.com/~lynn/2003l.html#34 Thoughts on Utility Computing?
--
Anne & Lynn Wheeler - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: public key vs passwd authentication? Newsgroups: comp.security.ssh Date: Tue, 30 Sep 2003 18:32:55 GMTdkoleary writes:
it is possible to substitute public keys in place of passwords and perform digital signature authentication .... eliminating the problem with humans having to remember hundreds of different shared-secrets.
The very straight forward process is to register public keys in lieu of registering passwords and perform digital signature authentication in lieu of password comparison. This has the advantage of maintaining all the existing business processes while addresses the extremely significant human factors problems associated with shared-secrets.
However, most people have been exposed to public keys and digital signature authentication in the context of certificates, certification authorities and PKIs. A horrendous problem with the PKI scenario is that it creates significant new business processes and security operations. Nominally, certication authorities were invented to insert a certification authority inbetween the normal relying party (entity checking the password) and key owner (entity supplying the password) ... to address situations where there was no prior relationship between the relying party and the key owner ... and the relying party had no realtime/online access to the certificaiton authority (aka the letters of credit model from the days of sailing ships).
In situations where there is existing business relationship between the relying party (aka entity checking the password) and the key owner (entity supplying the password), it is trivial to show that the changes necessitated by a certification authority are redundant and superfluous (not to mention typically unnecessary, complex, and expensive).
Simple public key upgrade of existing authentication processes
(besides SSH) are public key authentication by radius:
https://www.garlic.com/~lynn/subpubkey.html#radius
and kerberos pkinit
https://www.garlic.com/~lynn/subpubkey.html#kerberos
internet draft that specifies certificate-less public key operation.
other generalized comments about public key certificate-less operation
for maintaining existing business processes while changing technology
from shared-secret paradigm to non-shared-secret paradigm
https://www.garlic.com/~lynn/x959.html#aads
some discussion of relying-party-only certificates (common method of
intergrating PKI-based operations into existing business process)
being redundant and superfluous:
https://www.garlic.com/~lynn/subpubkey.html#rpo
misc pieces of recent threads related to the subject:
https://www.garlic.com/~lynn/aadsm15.htm#1 invoicing with PKI
https://www.garlic.com/~lynn/aadsm15.htm#2 Is cryptography where security took the wrong branch?
https://www.garlic.com/~lynn/aadsm15.htm#3 Is cryptography where security took the wrong branch?
https://www.garlic.com/~lynn/aadsm15.htm#4 Is cryptography where security took the wrong branch?
https://www.garlic.com/~lynn/aadsm15.htm#5 Is cryptography where security took the wrong branch?
https://www.garlic.com/~lynn/aadsm15.htm#7 Is cryptography where security took the wrong branch?
https://www.garlic.com/~lynn/aadsm15.htm#8 Is cryptography where security took the wrong branch?
https://www.garlic.com/~lynn/aadsm15.htm#9 Is cryptography where security took the wrong branch?
https://www.garlic.com/~lynn/aadsm15.htm#10 Is cryptography where security took the wrong branch?
https://www.garlic.com/~lynn/aadsm15.htm#16 End of the line for Ireland's dotcom star
https://www.garlic.com/~lynn/aepay12.htm#22 some X9.59 (and little FSTC) ... from crypto mailing list ... fyi
https://www.garlic.com/~lynn/aepay12.htm#31 End of the line for Ireland's dotcom star
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: public key vs passwd authentication? Newsgroups: comp.security.ssh Date: Wed, 01 Oct 2003 02:50:25 GMTMichael Sierchio writes:
single-sign-on systems have typically been used to address the issue of a plethora of passwords within a single organization or security domain. however, they haven't been very successful at cross business interoperability (like between a local ISP and my employer or bank).
>From RFC2289 ... see reference below ... basically, an institution provides a unique seed for initialization to the entity. THe entity combines the seed, their passphrase and iteratively encodes the combination with a hash algorithm (like SHA-1) possibly a couple hundred times. They then register the count and the resulting value with the institution. When logging on .... the institution sends a challenge in the form of the count decremented by one and the original seed. The entity then repeats the iterative hash encoding the number of specified times (which is one less than previous) and transmits the result. The institution receives the result and performs the hash encoding one more time ... and checks it with the recorded value. If it matches, the entity is authenticated; the institution then stores the decremented count and replaces the recorded hash value with the latest received value.
So what are the advantages of public key over OTP?:
1) digital signature authenticates both the entity as well as the message and 2) digital signature can operate with message originating from the sender w/o real time communcation.
#1) in the RADIUS implementation reference discussed at:
https://www.garlic.com/~lynn/subpubkey.html#radius
one of the issues is a server impersonation as a form of MITM attack. The MITM listens passively on the previous transmission. For the current scenario, the MITM impersonates the server and transmits the challenge (optianable from the previous evesdropping) and receives the results; the MITM impersonating the server then simulates a transmission error and totally hijacks the session.
In the above referenced RADIUS server "challenge" there is a unique number, easily a combination of date/time and random number, sent as the challenge. In the public key version, the entity logging on, digital sings the unique challenge. While it is possible to do a server impersonation to get a digitally signed value, it is not possible to predict the actual challenge that the server will use (defeating an actual MITM exploit). In OTP, it is possible to predict server challenges based on information gained from evesdropping.
#2) The x9a10 working group was given the requirement to preserve the
integrity of the financial infrastructure for all electronic retail
transactions. In the X9.59 case
https://www.garlic.com/~lynn/x959.html#x959
the client originates the message (w/o any real-time chatter with the server) and digitally signs it, then transmits it to the server. The server eventually receives the message and authenticates both the integrity of the message and the entity sending the message using the recorded public key and returns an approval.
There are two ways of preventing replay attacks: a) real-time challenge response chatter between the entities and 2) recording of previous transactions (and typically including date/time in the message). Some number of asynchronous operations and/or operations requiring a single round-trip implementation use logging as a replay defense.
Public key advantage vis-a-vis OTP
1) no count-down re-initialization
2) works in unique challenge/response paradigm
3) authenticates entity as well as integrity of message
4) works in non-challenge/response paradigm involving things like
single round-trip transactions (where server uses something
like a transaction log to prevent replay attacks).
aka, it would be possible to use the same public key for all login
authentications (as in OTP) where real-time challenge/response is used
(say with RADIUS public key or Kerberos certificate-less PKINIT, or
digital signature SSH as well as somewhat more resistent to some kinds
of MITM attacks) as well as message/transaction authentication
requiring both message integrity authentication as well as entity
authentication (including various kinds of financial transactions, ala
x9.59).
one-time password ref:
http://www.ietf.org/html.charters/otp-charter.html
also go to
https://www.garlic.com/~lynn/rfcietff.htm
and click on Term (term->RFC#) in RFCs listed by section
then click "OTP" in the Acronym fastpath which will bring up:
one-time password (OTP)
see also password
2444 2289 2243 1938 1760
clicking any of the RFC numbers will bring up the RFC summary in the
lower frame. clicking on the ".txt=nnnn" field will retrieve the
actual RFC.
also in the Acronym fastpath is RADIUS:
remote authentication dial in user service (RADIUS )
see also authentication , network access server , network services
3580 3579 3576 3575 3162 2882 2869 2868 2867 2866 2865 2809 2621 2620
2619 2618 2548 2139 2138 2059 2058
and/or scroll to Kerberos:
kerberos
see also authentication , security
3244 3129 2942 2712 2623 1964 1510 1411
also of interest would be to scroll to
Authentication, Authorization and Accounting
see also accounting , authentication , authorization
3588 3539 3127 2989 2977 2906 2905 2904 2903
also see:
http://www.ietf.org/html.charters/aaa-charter.html
http://www.aaaarch.org/index.html
ssh:
http://www.ietf.org/html.charters/secsh-charter.html
http://www.ietf.org/internet-drafts/draft-ietf-secsh-userauth-17.txt
kerberos:
http://www.ietf.org/html.charters/krb-wg-charter.html
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: public key vs passwd authentication? Newsgroups: comp.security.ssh Date: Wed, 01 Oct 2003 14:20:30 GMT"Lyal Collins" writes:
a password used to unlock a private key (although doesn't necessarily have to imply a PKI and/or certificate-based operation) is a "secret".
a password used to directly log into a system, is a shared-secret.
frequently there is reference to 3-factor authentication:
• something you have
• something you know
• something you are
a secrets are vulnerable to social engineering ... but getting you you
to dilvulge a shared-secret directly compromises the access. any kind
of secret (something you know) is vulnerable to social
engineering. However, a 2-factor authentication requires that both a)
something you know (aka the secret) is compromised and b) something
you have is compromised. In the private-key scenario, the container
for the private key has to be obtained (something you have), in
addtion to the secret (something you know).
It is actually possible to have a digital signature based protocol with two-factor authentication that is identical whether the private key is contained in a file on your PC or in a hardware token that nominally never leaves your possesion. Then the protocol is identical and the issue of the hardware token is purely the degree and cost of risk management (as opposed to requiring that both the protocol and the end-points be subject to risk management decisions).
the use of shared-secrets creates enormous human operatonal difficulties because of the requirement to avoid using the same shared-secret across different security domains .... leading to problems of not remembering, social engineering, recording them in ways that are vulnerable to compromise, etc.
In the case of current credit card operation over the network, the
account number is effectively a shared-secret. Electronic harvesting
of the merchant transaction file can put hundreds of thousands of
accounts at risk. The use of x9.59 digital signed transactions removes
the ability to generate fraudulant transactions just by harvesting the
transaction file. misc. reference to security proportional to risk:
https://www.garlic.com/~lynn/2001h.html#61 Security Proportional To Risk
In an x9.59 like environment, with the end-points and the protocol specified with digital signature, then the degree of risk can become one of institutional and/or personal choice .... whether or not your private key is contained in a PC file or a hardware token. If a hardware token, what kind of hardware token and the degree of tamper resistance ... aka given the same fixed digital signature environment, private key containers could run the risk spectrum from nearly was weak as a one-factor, shared-secret to orders of magnitude stronger.
It is possible to deploy a two-factor authentication scheme (using a non-shared-secret) that is nearly as vulnerable to social engineering exploit as a one-factor authentication, shared-secret scheme (i.e. get a person to divulge both the password for the private key file and transmit their private key file) ... however, it can eliminate much of the other vulnerabilities that shared-secret schemes are notoriously subject to (human inability to deal with exploding numbers of shared-secrets, massive harvesting of shared-secret aggregations, etc). Once such a digital signature infrastructure is deployed, it would be possible to perform a risk evaluation on an account by account basis to determine the cost/benefit of a better private key container ... with no impact to the rest of the infrastructre.
In the case of the merchant credit card file ... the existing process of harvesting a single merchant transaction file can directly enable fraudulant transaction against each individual accounts (potentially hundreds of thousands). Changing that to digitally signed X9.59 transactions with private key contained in hardware token, would require physically obtaining a hundred thousand individual hardware tokens and each associated password (at least six orders of magnitude more difficult).
misc. fraud references:
https://www.garlic.com/~lynn/subintegrity.html#fraud
lots of identity theft references ... a large percentage of identity
theft is havesting of files containing massive numbers of shared-secrets that directly enable subsequent fraud. Many of these are now
being categorized as account fraud within the overall identity fraud
classification.
https://www.garlic.com/~lynn/aadsm7.htm#idcard AGAINST ID CARDS
https://www.garlic.com/~lynn/aadsm7.htm#idcard2 AGAINST ID CARDS
https://www.garlic.com/~lynn/aadsm7.htm#rhose9 when a fraud is a sale, Re: Rubber hose attack
https://www.garlic.com/~lynn/aadsm8.htm#rhose16 when a fraud is a sale, Re: Rubber hose attack
https://www.garlic.com/~lynn/aadsm12.htm#22 draft-ietf-pkix-warranty-ext-01
https://www.garlic.com/~lynn/aadsm12.htm#41 I-D ACTION:draft-ietf-pkix-sim-00.txt
https://www.garlic.com/~lynn/aadsm12.htm#44 Identity Theft More Often an Inside Job
https://www.garlic.com/~lynn/aadsm14.htm#9 "Marginot Web" (SSL, payments, etc)
https://www.garlic.com/~lynn/aadsm14.htm#12 Tackling security threats from within
https://www.garlic.com/~lynn/aadsm14.htm#22 Identity Theft Losses Expected to Hit $2 Trillion by 2005
https://www.garlic.com/~lynn/aadsm14.htm#51 Feds, industry warn of spike in ID theft scams
https://www.garlic.com/~lynn/aadsm14.htm#53 IT Managers Critical Front in War on Identity Theft
https://www.garlic.com/~lynn/aepay10.htm#1 Identity theft tops Consumer fraud complaints
https://www.garlic.com/~lynn/aepay10.htm#16 Worker Accused of Selling Colleagues' ID's Online (credit card scam)
https://www.garlic.com/~lynn/aepay10.htm#41 ATM Scams - Whose Liability Is It, Anyway?
https://www.garlic.com/~lynn/aepay10.htm#62 VeriSign unveils new online identity verification services
https://www.garlic.com/~lynn/aepay11.htm#0 identity, fingerprint, from comp.risks
https://www.garlic.com/~lynn/aepay11.htm#3 Ministers to Act on Rise in Identity Theft
https://www.garlic.com/~lynn/aepay11.htm#6 A Look into Banking Trends for 2003
https://www.garlic.com/~lynn/aepay11.htm#7 FTC says incidence of ID theft jumped in 2002
https://www.garlic.com/~lynn/aepay11.htm#8 Internet Consumer Fraud Continues to Rise
https://www.garlic.com/~lynn/aepay11.htm#12 Star study: Identity Theft In The United States: An Update
https://www.garlic.com/~lynn/aepay11.htm#14 More Identity Theft ... Security Stands in Line Behind Other Priorities
https://www.garlic.com/~lynn/aepay11.htm#17 Criminals using high-tech methods for old-style crimes
https://www.garlic.com/~lynn/aepay11.htm#32 Don't-Ask-Don't-Tell E-commerce
https://www.garlic.com/~lynn/aepay11.htm#33 Spam's Being Used For Identity Theft And Blackmail, Symantec Says
https://www.garlic.com/~lynn/aepay11.htm#41 Be Prepared: Gartner Outlines Top Security Risks
https://www.garlic.com/~lynn/aepay11.htm#47 Actual Losses To Identity Fraud Top $1 Billion
https://www.garlic.com/~lynn/aepay11.htm#49 A More Anonymous Internet
https://www.garlic.com/~lynn/aepay11.htm#50 Concern Grows About ID Theft
https://www.garlic.com/~lynn/aepay11.htm#61 HIPAA, privacy, identity theft
https://www.garlic.com/~lynn/aepay11.htm#62 HIPAA, privacy, identity theft (addenda)
https://www.garlic.com/~lynn/aepay11.htm#65 E-merchants Turn Fraud-busters (somewhat related)
https://www.garlic.com/~lynn/aepay11.htm#66 Confusing Authentication and Identiification?
https://www.garlic.com/~lynn/aepay12.htm#4 Confusing business process, payment, authentication and identification
https://www.garlic.com/~lynn/aepay12.htm#5 Law aims to reduce identity theft
https://www.garlic.com/~lynn/aepay12.htm#12 Identity theft rockets 80 per cent
https://www.garlic.com/~lynn/aepay12.htm#14 Technology and Crime, Criminal Intelligence Service Canada - 2003
https://www.garlic.com/~lynn/aepay12.htm#19 Tech firms band together on ID theft
https://www.garlic.com/~lynn/aepay12.htm#21 FTC Says ID Theft Greater Problem Than Originally Thought
https://www.garlic.com/~lynn/aepay12.htm#24 More on the ID theft saga
https://www.garlic.com/~lynn/aepay12.htm#26 Bank One Calls Attention to ID Theft
https://www.garlic.com/~lynn/aepay12.htm#30 ID Theft Often Goes Unrecognized
https://www.garlic.com/~lynn/2001d.html#19 [Newbie] Authentication vs. Authorisation?
https://www.garlic.com/~lynn/2001k.html#6 Is VeriSign lying???
https://www.garlic.com/~lynn/2001k.html#34 A thought on passwords
https://www.garlic.com/~lynn/2001l.html#29 voice encryption box (STU-III for the masses)
https://www.garlic.com/~lynn/2002n.html#30 Help! Good protocol for national ID card?
https://www.garlic.com/~lynn/2002p.html#9 Cirtificate Authorities 'CAs', how curruptable are they to
https://www.garlic.com/~lynn/2002p.html#10 Cirtificate Authorities 'CAs', how curruptable are they to
misc. past 3-factor authentication postings:
https://www.garlic.com/~lynn/aadsm5.htm#shock revised Shocking Truth about Digital Signatures
https://www.garlic.com/~lynn/aadsm5.htm#shock2 revised Shocking Truth about Digital Signatures
https://www.garlic.com/~lynn/aadsm7.htm#rhose12 when a fraud is a sale, Re: Rubber hose attack
https://www.garlic.com/~lynn/aadsm7.htm#rhose13 when a fraud is a sale, Re: Rubber hose attack
https://www.garlic.com/~lynn/aadsm7.htm#rhose14 when a fraud is a sale, Re: Rubber hose attack
https://www.garlic.com/~lynn/aadsm7.htm#rhose15 when a fraud is a sale, Re: Rubber hose attack
https://www.garlic.com/~lynn/aadsm8.htm#softpki8 Software for PKI
https://www.garlic.com/~lynn/aadsm10.htm#cfppki17 CFP: PKI research workshop
https://www.garlic.com/~lynn/aadsm10.htm#cfppki18 CFP: PKI research workshop
https://www.garlic.com/~lynn/aadsm10.htm#bio6 biometrics
https://www.garlic.com/~lynn/aadsm10.htm#keygen2 Welome to the Internet, here's your private key
https://www.garlic.com/~lynn/aadsm11.htm#5 Meaning of Non-repudiation
https://www.garlic.com/~lynn/aadsm12.htm#24 Interests of online banks and their users [was Re: Cryptogram: Palladium Only for DRM]
https://www.garlic.com/~lynn/aadsm14.htm#23 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm14.htm#39 An attack on paypal
https://www.garlic.com/~lynn/aepay7.htm#3dsecure 3D Secure Vulnerabilities? Photo ID's and Payment Infrastructure
https://www.garlic.com/~lynn/aepay10.htm#65 eBay Customers Targetted by Credit Card Scam
https://www.garlic.com/~lynn/aepay11.htm#53 Authentication white paper
https://www.garlic.com/~lynn/aepay11.htm#55 FINREAD ... and as an aside
https://www.garlic.com/~lynn/2000f.html#65 Cryptogram Newsletter is off the wall?
https://www.garlic.com/~lynn/2001c.html#39 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001d.html#19 [Newbie] Authentication vs. Authorisation?
https://www.garlic.com/~lynn/2001g.html#1 distributed authentication
https://www.garlic.com/~lynn/2001g.html#11 FREE X.509 Certificates
https://www.garlic.com/~lynn/2001j.html#52 Are client certificates really secure?
https://www.garlic.com/~lynn/2001k.html#34 A thought on passwords
https://www.garlic.com/~lynn/2001k.html#61 I-net banking security
https://www.garlic.com/~lynn/2002c.html#7 Opinion on smartcard security requested
https://www.garlic.com/~lynn/2002c.html#10 Opinion on smartcard security requested
https://www.garlic.com/~lynn/2002e.html#18 Opinion on smartcard security requested
https://www.garlic.com/~lynn/2002e.html#36 Crypting with Fingerprints ?
https://www.garlic.com/~lynn/2002h.html#41 Biometric authentication for intranet websites?
https://www.garlic.com/~lynn/2002i.html#65 privileged IDs and non-privileged IDs
https://www.garlic.com/~lynn/2002n.html#30 Help! Good protocol for national ID card?
https://www.garlic.com/~lynn/2002o.html#57 Certificate Authority: Industry vs. Government
https://www.garlic.com/~lynn/2002o.html#62 Certificate Authority: Industry vs. Government
https://www.garlic.com/~lynn/2002o.html#67 smartcard+fingerprint
https://www.garlic.com/~lynn/2003i.html#1 Two-factor authentication with SSH?
https://www.garlic.com/~lynn/2003i.html#2 Two-factor authentication with SSH?
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: public key vs passwd authentication? Newsgroups: comp.security.ssh Date: Wed, 01 Oct 2003 14:55:58 GMTAnne & Lynn Wheeler writes:
digital signatures are a useful technology since they can both demonstrate that you posses the private key container (authenticating that the electronic transmission originated from you) as well as the integrity of the message in a single operation. As a result the same exact digital signature technology can be used in both a strong form of challenge/response where the challenge can be both
unpredictable and dynamically change
The use of digital signatures is a particularly efficient method of establishing the something you have (and at the same time being able to demonstrate message integrity).
The actual something you have ... can vary on an account by account basis ... meeting specific business needs and risk management profiles. In this scenario, the degree of risk countermeasures for a specific account can be based on the selection of private key container.
Note that none of these considerations and factors either require PKI,
certification authorities, and/or certificates .... which can be
considered a totally orthogonal business issue. It is trivially
possible to deploy a digital signature based two-factor authentication
mechanism w/o resorting to PKI business infrastructure in anyway what
so ever ... i.e. certificate-less radius, certificate-less kerberos,
and/or certificate-less ssh.
https://www.garlic.com/~lynn/2003m.html#49 public key vs passwd authentication
https://www.garlic.com/~lynn/2003m.html#50 public key vs passwd authentication
https://www.garlic.com/~lynn/2003m.html#51 public key vs passwd authentication
Once something like a digital signature, two-factor authentication infrastructure is deployed (radius, kerberios, ssh, x9.59, etc), it is then possible for individuals to select the integrity of their private key container (pc file or hardware token) w/o impacting other aspects of the protocol (it can become purely an individual security/risk decision). For instance, it is possible to obtain a hardware token that manages a private key such that it can never become known (exploits require obtaining physical possesion of the hardware token).
Again, none of this specific digital signature factors related to the structure and/or security operation even remotely involve PKI, certification authorities, and/or certificates. PKIs, CAs, and certificates are a business process (analogous to the letters of credit from sailing ship days) that were designed to create some trust for two, otherwise, totally unrelated entities that had no previous business interaction and no direct and/or online way of referring to mutually trusted party. They are trivially shown to be redundant and superfluous in almost all present day business interactions involving an existing business relationship (bank/customer, employee/employer, IPS/customer, etc) or have direct timely-access to trusted third party (POS online debit and credit transactions).
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: model 91/CRJE and IKJLEW Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Wed, 01 Oct 2003 15:34:25 GMTPaulW@ENET.COM (Paul Wendt) writes:
I had previously added TTY support to CP/67 ... and had tried to implement dynamic terminal recognition (between TTY and 2741). After it seemed to be working, the IBM CE got around to telling me that they had taken short-cut on the 2702 and hardwired the oscilator to individual ports. While it was possible to use the 2702 SAD command to dynamically change the association of the line scanner type to each individual line ... it wasn't actually possible to change the baud rate on a line (since it was hard wired).
THis in turn kicked off the university effort where four of
us got blamed for originating the PCM controller business:
https://www.garlic.com/~lynn/submain.html#360pcm
starting with an Interdata/3, reverse engineering the 360 channel interface, building our own channel interface for the Interdata/3 and writing 2702 emulator for the Interdata/3. All in order to get dynamic terminal type (and baud rate) identification.
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Thoughts on Utility Computing? Newsgroups: comp.arch,alt.folklore.computers Date: Wed, 01 Oct 2003 20:07:55 GMTAnne & Lynn Wheeler writes:
when I was asked to perform due diligence on gnosis was that the fine grain capabiilty wasn't done so much for security isolation (that was also needed in an open time-sharing service bureau operation) .... but that they were trying to tie the fine grain capabilities to accounting/charging operation.
the cp/67 (and then vm/370) virtual machine operation that were used as basis for security isolation at a number of these service bureaus had only relatively gross resource consumption accounting. One of the stated goals that I was given for gnosis was that 3rd party clients could deploy a broad spectrum of applications and services on the time-sharing service bureau platform .... and that gnosis would be able to perform usage accounting by their customers on an application and service basis (remitting charges to the 3rd party clients) ... aka fine grain capabilities weren't so much a security construct (which it also provided) but an usage accounting construct.
misc. past gnosis/keykos postings:
https://www.garlic.com/~lynn/2000f.html#69 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000g.html#22 No more innovation? Get serious
https://www.garlic.com/~lynn/2001b.html#73 7090 vs. 7094 etc.
https://www.garlic.com/~lynn/2001g.html#33 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001g.html#35 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001n.html#10 TSS/360
https://www.garlic.com/~lynn/2002f.html#59 Blade architectures
https://www.garlic.com/~lynn/2002g.html#0 Blade architectures
https://www.garlic.com/~lynn/2002g.html#4 markup vs wysiwyg (was: Re: learning how to use a computer)
https://www.garlic.com/~lynn/2002h.html#43 IBM doing anything for 50th Anniv?
https://www.garlic.com/~lynn/2002i.html#63 Hercules and System/390 - do we need it?
https://www.garlic.com/~lynn/2002j.html#75 30th b'day
https://www.garlic.com/~lynn/2003g.html#18 Multiple layers of virtual address translation
https://www.garlic.com/~lynn/2003h.html#41 Segments, capabilities, buffer overrun attacks
https://www.garlic.com/~lynn/2003i.html#15 two pi, four phase, 370 clone
https://www.garlic.com/~lynn/2003k.html#50 Slashdot: O'Reilly On The Importance Of The Mainframe Heritage
https://www.garlic.com/~lynn/2003l.html#19 Secure OS Thoughts
https://www.garlic.com/~lynn/2003l.html#22 Secure OS Thoughts
https://www.garlic.com/~lynn/2003l.html#26 Secure OS Thoughts
https://www.garlic.com/~lynn/2003m.html#24 Intel iAPX 432
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: public key vs passwd authentication? Newsgroups: comp.security.ssh Date: Wed, 01 Oct 2003 21:23:22 GMTdkoleary writes:
digital signature technology ... as an authentication mechanism can be deployed within existing business processes that are currently used to support password authentication ... as simply as registering public keys in lieu of registering passwords. Then it is strictly a technology authentication issue ... not a business process issue.
a significant problem frequently sometimes has been the equating digital signatures authentication (which is purely better technology, w/o changing the business processes) and PKIs (which is almost totally a business process change issue).
PKI certificates are there purely as a trust propagation mechanism, analogous to letters of credit (from the days of sailing ships); establishing trust between two parties that had absolutely no previous business relationship and/or any direct recourse to a trusted third party.
The difficulty has been
letters of credit have typically been done within the environment of ongoing financial operations. PKI has frequently attempted to establish trust propagation as a totally free standing business operation.
some of the more grandiose claims for certificates (possibly attempting to support offline trust propagation as a free standing business) would be considered analogous to claiming that it was impossible to have a valid contract w/o letters of credit and/or money couldn't be spent w/o letters of credit.
letters of credit (and certificates, PKIs, certification authorities) have been there as a trust propagation mechanism when there hasn't been any other recourse. however the modern business world has hundreds of mechanisms that can create trust w/o having to resort to a certificate.
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: model 91/CRJE and IKJLEW Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Thu, 02 Oct 2003 13:18:55 GMTIBM-MAIN@ISHAM-RESEARCH.COM (Phil Payne) writes:
An ancillary issue was that TSO performance was so bad ... that the TSO users didn't notice the severe addtional response penalty of running in an MVS environment (or that they had just become accustomed to it). This was also reflected in the CERN (follow the thread of GML originating at CSC thru CERN to HTML and back to Cambridge & W3C for XML, et al) TSO/CMS comparison report presented at SHARE. The TSO comparison was so bad, that the copies of the report internally were classified IBM Confidential Restricted and available on a strictly need to know basis only.
In the early 80s, an attempt to provide MVS with FBA support to
migrate it to modern(?) architecture disks was met with a claim that
even provided with fully integrated and tested code to take it thru
the product process would still cost $26m:
https://www.garlic.com/~lynn/97.html#16 Why Mainframes?
https://www.garlic.com/~lynn/99.html#75 Read if over 40 and have Mainframe background
https://www.garlic.com/~lynn/2000.html#86 Ux's good points.
https://www.garlic.com/~lynn/2001.html#54 FBA History Question (was: RE: What's the meaning of track overfl ow?)
https://www.garlic.com/~lynn/2001d.html#64 VTOC/VTOC INDEX/VVDS and performance (expansion of VTOC position)
https://www.garlic.com/~lynn/2003.html#15 vax6k.openecs.org rebirth
past references to cern tso/cms report:
https://www.garlic.com/~lynn/98.html#28 Drive letters
https://www.garlic.com/~lynn/2000f.html#61 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2001f.html#49 any 70's era supercomputers that ran as slow as today's supercompu
https://www.garlic.com/~lynn/2001h.html#11 checking some myths.
https://www.garlic.com/~lynn/2001i.html#30 IBM OS Timeline?
https://www.garlic.com/~lynn/2001m.html#19 3270 protocol
https://www.garlic.com/~lynn/2001n.html#37 Hercules etc. IBM not just missing a great opportunity...
https://www.garlic.com/~lynn/2002g.html#67 Coulda, Woulda, Shoudda moments?
https://www.garlic.com/~lynn/2002h.html#14 Why did OSI fail compared with TCP-IP?
https://www.garlic.com/~lynn/2002h.html#51 Why did OSI fail compared with TCP-IP?
https://www.garlic.com/~lynn/2002j.html#64 vm marketing (cross post)
https://www.garlic.com/~lynn/2002n.html#37 VR vs. Portable Computing
https://www.garlic.com/~lynn/2002n.html#54 SHARE MVT Project anniversary
https://www.garlic.com/~lynn/2002n.html#73 Home mainframes
https://www.garlic.com/~lynn/2002o.html#54 XML, AI, Cyc, psych, and literature
https://www.garlic.com/~lynn/2003c.html#53 HASP assembly: What the heck is an MVT ABEND 422?
https://www.garlic.com/~lynn/2003c.html#69 OT: One for the historians - 360/91
https://www.garlic.com/~lynn/2003g.html#22 303x, idals, dat, disk head settle, and other rambling folklore
https://www.garlic.com/~lynn/2003h.html#19 Why did TCP become popular ?
https://www.garlic.com/~lynn/2003i.html#14 instant messaging
https://www.garlic.com/~lynn/2003k.html#13 What is timesharing, anyway?
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: wsmr-simtel20 shut down 10 years ago today Newsgroups: alt.folklore.computers,comp.os.cpm Date: Thu, 02 Oct 2003 17:39:48 GMTwiesje_janssen@zonnet.nl (wiesje janssen) writes:
other past bitnet/earn (& some internal network) references:
https://www.garlic.com/~lynn/subnetwork.html#bitnet
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: The End of Not-Moore's Law? Newsgroups: comp.arch Date: Thu, 02 Oct 2003 17:41:54 GMTjbs writes:
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: SR 15,15 Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Thu, 02 Oct 2003 18:02:13 GMTAnne & Lynn Wheeler writes:
a definition that was distributed on a friday from raleigh regarding a new online discussion list:
low-speed <9.6kbits medium-speed 19.2kbits high-speed 56kbits very high-speed 1.5mbitsseen on the wall of a conference room in tokyo the following monday
low-speed <20mbits medium-speed 100mbits high-speed 200-300mbits very high-speed >600mbitsabove taken from old posting in a.f.c
other high speed data transport (HSDT) project references:
https://www.garlic.com/~lynn/subnetwork.html#hsdt
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: S/360 undocumented instructions? Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Fri, 03 Oct 2003 15:59:34 GMTibm-main@LDWOREN.NET (Leonard Woren) writes:
it wasn't really a multiprocessor ... just a second PSW, addtional set of registers, each instruction as part of decode would have a one-bit flag indicating the instruction stream.
misc. past refs to 195 dual i-stream (going on 30 years ago):
https://www.garlic.com/~lynn/94.html#38 IBM 370/195
https://www.garlic.com/~lynn/99.html#73 The Chronology
https://www.garlic.com/~lynn/99.html#97 Power4 = 2 cpu's on die?
https://www.garlic.com/~lynn/2000g.html#15 360/370 instruction cycle time
https://www.garlic.com/~lynn/2001j.html#27 Pentium 4 SMT "Hyperthreading"
https://www.garlic.com/~lynn/2001n.html#63 Hyper-Threading Technology - Intel information.
https://www.garlic.com/~lynn/2002g.html#70 Pipelining in the past
https://www.garlic.com/~lynn/2002g.html#76 Pipelining in the past
https://www.garlic.com/~lynn/2003l.html#48 IBM Manuals from the 1940's and 1950's
--
Anne & Lynn Wheeler | https://www.garlic.com/~lynn/
Internet trivia 20th anv https://www.garlic.com/~lynn/rfcietff.htm