Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

An elephant is a mouse with an operating system.


computers / comp.os.vms / Re: The main stream memory of DEC.

SubjectAuthor
* The main stream memory of DEC.John Vottero
+- Re: The main stream memory of DEC.Jan-Erik Söderholm
`* Re: The main stream memory of DEC.Rich Alderson
 +* Re: The main stream memory of DEC.gah4
 |`* Re: The main stream memory of DEC.John Dallman
 | +- Re: The main stream memory of DEC.John Dallman
 | +* Re: The main stream memory of DEC.Johnny Billquist
 | |+* Re: The main stream memory of DEC.Arne Vajhøj
 | ||+- Re: The main stream memory of DEC.Single Stage to Orbit
 | ||`* Re: The main stream memory of DEC.Johnny Billquist
 | || +* Re: The main stream memory of DEC.Simon Clubley
 | || |+* Re: The main stream memory of DEC.Arne Vajhøj
 | || ||+- Re: The main stream memory of DEC.Chris Townley
 | || ||+- Re: The main stream memory of DEC.gah4
 | || ||`- Re: The main stream memory of DEC.bill
 | || |`* Re: The main stream memory of DEC.Johnny Billquist
 | || | `* Re: The main stream memory of DEC.Simon Clubley
 | || |  +* Re: The main stream memory of DEC.Johnny Billquist
 | || |  |`* Re: The main stream memory of DEC.Dan Cross
 | || |  | `* Re: The main stream memory of DEC.Johnny Billquist
 | || |  |  +- Re: The main stream memory of DEC.Jake Hamby (Solid State Jake)
 | || |  |  `* Re: The main stream memory of DEC.Simon Clubley
 | || |  |   +* Re: The main stream memory of DEC.Jake Hamby (Solid State Jake)
 | || |  |   |`- Re: The main stream memory of DEC.gah4
 | || |  |   +- Re: The main stream memory of DEC.Arne Vajhøj
 | || |  |   +* Re: The main stream memory of DEC.Arne Vajhøj
 | || |  |   |`* Re: The main stream memory of DEC.Dan Cross
 | || |  |   | `* Re: The main stream memory of DEC.gah4
 | || |  |   |  `- Re: The main stream memory of DEC.Dan Cross
 | || |  |   `* Re: The main stream memory of DEC.Dan Cross
 | || |  |    `* Re: The main stream memory of DEC.Jake Hamby (Solid State Jake)
 | || |  |     `* Re: The main stream memory of DEC.Simon Clubley
 | || |  |      `* Re: The main stream memory of DEC.Dan Cross
 | || |  |       `- Re: The main stream memory of DEC.Simon Clubley
 | || |  `- Re: The main stream memory of DEC.Dan Cross
 | || `- Re: The main stream memory of DEC.Arne Vajhøj
 | |`- Re: The main stream memory of DEC.Scott Dorsey
 | `- Re: The main stream memory of DEC.Simon Clubley
 `- Re: The main stream memory of DEC.Johnny Billquist

Pages:12
The main stream memory of DEC.

<51af8364-075a-4f04-a72b-b9b529f1e8f1n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30378&group=comp.os.vms#30378

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:ad4:5890:0:b0:658:9fe1:f3f2 with SMTP id dz16-20020ad45890000000b006589fe1f3f2mr147277qvb.11.1696688584914;
Sat, 07 Oct 2023 07:23:04 -0700 (PDT)
X-Received: by 2002:a05:6871:4090:b0:1e5:66ce:9686 with SMTP id
kz16-20020a056871409000b001e566ce9686mr2527714oab.9.1696688584737; Sat, 07
Oct 2023 07:23:04 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!1.us.feeder.erje.net!feeder.erje.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Sat, 7 Oct 2023 07:23:04 -0700 (PDT)
Injection-Info: google-groups.googlegroups.com; posting-host=75.118.176.169; posting-account=26xMNAoAAADSdbM1FxNXx-EZrqJM_UCF
NNTP-Posting-Host: 75.118.176.169
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <51af8364-075a-4f04-a72b-b9b529f1e8f1n@googlegroups.com>
Subject: The main stream memory of DEC.
From: johnvott...@gmail.com (John Vottero)
Injection-Date: Sat, 07 Oct 2023 14:23:04 +0000
Content-Type: text/plain; charset="UTF-8"
X-Received-Bytes: 1132
 by: John Vottero - Sat, 7 Oct 2023 14:23 UTC

This is how the rest of the world views DEC and VMS:

https://arstechnica.com/gadgets/2023/10/long-gone-dec-is-still-powering-the-world-of-computing/

Re: The main stream memory of DEC.

<ufrrn0$2e9lf$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30380&group=comp.os.vms#30380

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: jan-erik...@telia.com (Jan-Erik Söderholm)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Sat, 7 Oct 2023 16:58:40 +0200
Organization: A noiseless patient Spider
Lines: 9
Message-ID: <ufrrn0$2e9lf$1@dont-email.me>
References: <51af8364-075a-4f04-a72b-b9b529f1e8f1n@googlegroups.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 7 Oct 2023 14:58:40 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="bba5a412468a6b565681b6d379dcc6fd";
logging-data="2565807"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/RnNoEAIqcCw/oJ2hgpa+n"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:RGSgYlMsTy17i6F0jMohn192Wdk=
In-Reply-To: <51af8364-075a-4f04-a72b-b9b529f1e8f1n@googlegroups.com>
Content-Language: sv
 by: Jan-Erik Söderholm - Sat, 7 Oct 2023 14:58 UTC

Den 2023-10-07 kl. 16:23, skrev John Vottero:
> This is how the rest of the world views DEC and VMS:
>
> https://arstechnica.com/gadgets/2023/10/long-gone-dec-is-still-powering-the-world-of-computing/

There is also a thread on the VSI Forum on that matter.
https://forum.vmssoftware.com/viewtopic.php?f=5&t=8866

Re: The main stream memory of DEC.

<mddsf6mhra2.fsf@panix5.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30386&group=comp.os.vms#30386

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.panix5-v6.panix.com!not-for-mail
From: new...@alderson.users.panix.com (Rich Alderson)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: 07 Oct 2023 20:49:41 -0400
Organization: PANIX Public Access Internet and UNIX, NYC
Lines: 15
Sender: alderson+news@panix5.panix.com
Message-ID: <mddsf6mhra2.fsf@panix5.panix.com>
References: <51af8364-075a-4f04-a72b-b9b529f1e8f1n@googlegroups.com>
Injection-Info: reader2.panix.com; posting-host="panix5-v6.panix.com:2001:470:30::a654:105";
logging-data="1597"; mail-complaints-to="abuse@panix.com"
X-Newsreader: Gnus v5.7/Emacs 22.3
 by: Rich Alderson - Sun, 8 Oct 2023 00:49 UTC

John Vottero <johnvottero@gmail.com> writes:

> This is how the rest of the world views DEC and VMS:

> https://arstechnica.com/gadgets/2023/10/long-gone-dec-is-still-powering-the-world-of-computing/

I saw this elsewhere (Bluesky or Mastodon or the bird).

Very nearly everything they have to say about the history is wrong.

--
Rich Alderson news@alderson.users.panix.com
Audendum est, et veritas investiganda; quam etiamsi non assequamur,
omnino tamen proprius, quam nunc sumus, ad eam perveniemus.
--Galen

Re: The main stream memory of DEC.

<371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30388&group=comp.os.vms#30388

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:244b:b0:777:f69:557 with SMTP id h11-20020a05620a244b00b007770f690557mr12175qkn.15.1696746908916;
Sat, 07 Oct 2023 23:35:08 -0700 (PDT)
X-Received: by 2002:a05:6870:7691:b0:1d0:ce36:3f0f with SMTP id
dx17-20020a056870769100b001d0ce363f0fmr4679259oab.10.1696746908509; Sat, 07
Oct 2023 23:35:08 -0700 (PDT)
Path: i2pn2.org!rocksolid2!news.neodome.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Sat, 7 Oct 2023 23:35:08 -0700 (PDT)
In-Reply-To: <mddsf6mhra2.fsf@panix5.panix.com>
Injection-Info: google-groups.googlegroups.com; posting-host=2601:602:9700:4689:4971:2811:5b77:5e8;
posting-account=gLDX1AkAAAA26M5HM-O3sVMAXdxK9FPA
NNTP-Posting-Host: 2601:602:9700:4689:4971:2811:5b77:5e8
References: <51af8364-075a-4f04-a72b-b9b529f1e8f1n@googlegroups.com> <mddsf6mhra2.fsf@panix5.panix.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
Subject: Re: The main stream memory of DEC.
From: gah...@u.washington.edu (gah4)
Injection-Date: Sun, 08 Oct 2023 06:35:08 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 2604
 by: gah4 - Sun, 8 Oct 2023 06:35 UTC

On Saturday, October 7, 2023 at 5:49:49 PM UTC-7, Rich Alderson wrote:
> John Vottero <johnv...@gmail.com> writes:
>
> > This is how the rest of the world views DEC and VMS:
>
> > https://arstechnica.com/gadgets/2023/10/long-gone-dec-is-still-powering-the-world-of-computing/
> I saw this elsewhere (Bluesky or Mastodon or the bird).
>
> Very nearly everything they have to say about the history is wrong.
It is well known that VMS people moved to working on NT.

How many ideas transferred is less obvious.

Many ideas on how to build modern processors were well known,
so it isn't so obvious that you can connect the origin of one to another.

There is a book that traces all of modern electronics to WW2 radar.

The radar receivers needed silicon point contact rectifiers.
Someone not so much later, had a silicon rod that rectified one
way on one end, and the other way on the other end.

That is, one end was p-type and the other end n-type.
Understanding that led, somewhat indirectly, to the bipolar
transistor and much of today's electronics.

They also trace much of computer technology to some computers
that were part of the early warning radar, to detect incoming Soviet
missiles.

No-one can be sure what would have happened differently
without WW2 radar, but it does make a good story.

Re: The main stream memory of DEC.

<memo.20231008084235.10140D@jgd.cix.co.uk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30389&group=comp.os.vms#30389

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: jgd...@cix.co.uk (John Dallman)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Sun, 8 Oct 2023 08:42 +0100 (BST)
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <memo.20231008084235.10140D@jgd.cix.co.uk>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
Reply-To: jgd@cix.co.uk
Injection-Info: dont-email.me; posting-host="8be0cd6a0b646fb846a4f166c7ae199e";
logging-data="3131889"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+dec8Onc2/yAAr2pauJh3pWy8tJytXQmI="
Cancel-Lock: sha1:HWaZHLnN2RfZMbLe0uTRj/zbs0M=
 by: John Dallman - Sun, 8 Oct 2023 07:42 UTC

In article <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>,
gah4@u.washington.edu (gah4) wrote:

> It is well known that VMS people moved to working on NT.
>
> How many ideas transferred is less obvious.

The actual relationship is with DEC's MICA. That was intended (in the
final version of the plan) to have a common kernel that could support VMS
and Ultrix environments. <https://en.wikipedia.org/wiki/DEC_MICA>

Windows NT originally had three "environmental subsystems", Win32, OS/2
(dropped at Windows XP) and POSIX (replaced by Interix, then Windows
Services for Linux).

The Windows NT kernel is quite VMS-like in its concepts, but the
implementation is very different, being written in C and using only user
and supervisor privilege levels. The API that it provides is not
published, except for the functions that device drivers use.
<https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>

John

Re: The main stream memory of DEC.

<memo.20231008095646.10140E@jgd.cix.co.uk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30390&group=comp.os.vms#30390

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.hispagatos.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: jgd...@cix.co.uk (John Dallman)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Sun, 8 Oct 2023 09:56 +0100 (BST)
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <memo.20231008095646.10140E@jgd.cix.co.uk>
References: <memo.20231008084235.10140D@jgd.cix.co.uk>
Reply-To: jgd@cix.co.uk
Injection-Info: dont-email.me; posting-host="8be0cd6a0b646fb846a4f166c7ae199e";
logging-data="3165686"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+4BOVJMaAXdDODuBO13sdT/p7TTbMRMSk="
Cancel-Lock: sha1:2kzKwmqFNhNjPDOlIUalclH1ohc=
 by: John Dallman - Sun, 8 Oct 2023 08:56 UTC

In article <memo.20231008084235.10140D@jgd.cix.co.uk>, jgd@cix.co.uk
(John Dallman) wrote:

> The actual relationship is with DEC's MICA. That was intended (in
> the final version of the plan) to have a common kernel that could
> support VMS and Ultrix environments. . . .

This idea was widespread in the 1990s. IBM's Workplace OS was planned to
unify MS-DOS, Windows, OS/2 and generic UNIX environments at first, and
add OS/400, AIX, Taligent and classic MacOS later.

<https://en.wikipedia.org/wiki/Workplace_OS>

Workplace OS was a comprehensive failure; the partial success with
Windows NT was achieved via huge development costs and more modest
objectives.

John

Re: The main stream memory of DEC.

<ufuc4s$hck$2@news.misty.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30392&group=comp.os.vms#30392

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!.POSTED.80-218-16-84.dclient.hispeed.ch!not-for-mail
From: bqt...@softjar.se (Johnny Billquist)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Sun, 8 Oct 2023 15:51:24 +0200
Organization: MGT Consulting
Message-ID: <ufuc4s$hck$2@news.misty.com>
References: <51af8364-075a-4f04-a72b-b9b529f1e8f1n@googlegroups.com>
<mddsf6mhra2.fsf@panix5.panix.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 8 Oct 2023 13:51:24 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="80-218-16-84.dclient.hispeed.ch:80.218.16.84";
logging-data="17812"; mail-complaints-to="abuse@misty.com"
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <mddsf6mhra2.fsf@panix5.panix.com>
 by: Johnny Billquist - Sun, 8 Oct 2023 13:51 UTC

On 2023-10-08 02:49, Rich Alderson wrote:
> John Vottero <johnvottero@gmail.com> writes:
>
>> This is how the rest of the world views DEC and VMS:
>
>> https://arstechnica.com/gadgets/2023/10/long-gone-dec-is-still-powering-the-world-of-computing/
>
> I saw this elsewhere (Bluesky or Mastodon or the bird).
>
> Very nearly everything they have to say about the history is wrong.

Yeah. While I like the fact that they tried, on a technical level there
was very little that was correct.

Johnny

Re: The main stream memory of DEC.

<ufuc9r$hck$3@news.misty.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30393&group=comp.os.vms#30393

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!.POSTED.80-218-16-84.dclient.hispeed.ch!not-for-mail
From: bqt...@softjar.se (Johnny Billquist)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Sun, 8 Oct 2023 15:54:03 +0200
Organization: MGT Consulting
Message-ID: <ufuc9r$hck$3@news.misty.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 8 Oct 2023 13:54:03 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="80-218-16-84.dclient.hispeed.ch:80.218.16.84";
logging-data="17812"; mail-complaints-to="abuse@misty.com"
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <memo.20231008084235.10140D@jgd.cix.co.uk>
 by: Johnny Billquist - Sun, 8 Oct 2023 13:54 UTC

On 2023-10-08 09:42, John Dallman wrote:
> In article <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>,
> gah4@u.washington.edu (gah4) wrote:
>
>> It is well known that VMS people moved to working on NT.
>>
>> How many ideas transferred is less obvious.
>
> The actual relationship is with DEC's MICA. That was intended (in the
> final version of the plan) to have a common kernel that could support VMS
> and Ultrix environments. <https://en.wikipedia.org/wiki/DEC_MICA>
>
> Windows NT originally had three "environmental subsystems", Win32, OS/2
> (dropped at Windows XP) and POSIX (replaced by Interix, then Windows
> Services for Linux).

Yes. And I think there is a foreword in some Windows-NT book by Dave
Cutler where he says as much himself. Spiritually descended from RSX via
VMS, but more directly from MICA.

> The Windows NT kernel is quite VMS-like in its concepts, but the
> implementation is very different, being written in C and using only user
> and supervisor privilege levels. The API that it provides is not
> published, except for the functions that device drivers use.
> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>

I wish people would stop getting so hung up on the different "privilege"
levels. That is such a minor detail in anything that it hardly matters.
I don't understand how it has become such a huge thing in VMS circuits.

Johnny

Re: The main stream memory of DEC.

<ufumla$36u7c$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30396&group=comp.os.vms#30396

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!usenet.network!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Sun, 8 Oct 2023 12:50:50 -0400
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <ufumla$36u7c$1@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 8 Oct 2023 16:50:50 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6b9462efcc3ba0703e081c229566458c";
logging-data="3373292"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+aI1DJ4kYHhJJb9uqD8rV3m9KW3rzpPO8="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:/lpjHpJH42f/i9crSYLICX9xsNU=
In-Reply-To: <ufuc9r$hck$3@news.misty.com>
Content-Language: en-US
 by: Arne Vajhøj - Sun, 8 Oct 2023 16:50 UTC

On 10/8/2023 9:54 AM, Johnny Billquist wrote:
> On 2023-10-08 09:42, John Dallman wrote:
>> The Windows NT kernel is quite VMS-like in its concepts, but the
>> implementation is very different, being written in C and using only user
>> and supervisor privilege levels. The API that it provides is not
>> published, except for the functions that device drivers use.
>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>
> I wish people would stop getting so hung up on the different "privilege"
> levels. That is such a minor detail in anything that it hardly matters.
> I don't understand how it has become such a huge thing in VMS circuits.

In many ways E is an implementation detail. I don't think
RMS running in K would mean a big difference for anything
else.

But I think the existence of S has implications beyond
internal implementation. It is what makes the VMS shell
model and process <> image possible. Without it it
seems likely that VMS would have had something fork like.

Arne

Re: The main stream memory of DEC.

<be8de159845c243f126b420c9b3936398b42b6b5.camel@munted.eu>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30397&group=comp.os.vms#30397

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!palladium.buellnet!not-for-mail
From: alex.bu...@munted.eu (Single Stage to Orbit)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Sun, 08 Oct 2023 18:06:04 +0100
Organization: One very high maintenance cat
Message-ID: <be8de159845c243f126b420c9b3936398b42b6b5.camel@munted.eu>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
<ufumla$36u7c$1@dont-email.me>
Reply-To: alex.buell@munted.eu
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Injection-Info: solani.org;
logging-data="11865"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Evolution 3.48.4
Cancel-Lock: sha1:WQ8XhdvM50IgLyKZg/olb4ST+HA=
X-User-ID: eJwNwgERwDAIA0BLXSCByaHQ+pew3T9NjzpclPP+Ijpr5eTZZwHdAWyeIsjp2BTcK+Vd4WWT85q1Lq69mvoAU8YVmQ==
In-Reply-To: <ufumla$36u7c$1@dont-email.me>
 by: Single Stage to Orbi - Sun, 8 Oct 2023 17:06 UTC

On Sun, 2023-10-08 at 12:50 -0400, Arne Vajhøj wrote:
> Without it it seems likely that VMS would have had something fork
> like.

Unix-like forks can fork off.

--
Tactical Nuclear Kittens

Re: The main stream memory of DEC.

<ug0hpg$70d$1@news.misty.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30403&group=comp.os.vms#30403

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!.POSTED.213.180.184.10!not-for-mail
From: bqt...@softjar.se (Johnny Billquist)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Mon, 9 Oct 2023 11:40:00 +0200
Organization: MGT Consulting
Message-ID: <ug0hpg$70d$1@news.misty.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
<ufumla$36u7c$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 9 Oct 2023 09:40:00 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="213.180.184.10";
logging-data="7181"; mail-complaints-to="abuse@misty.com"
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <ufumla$36u7c$1@dont-email.me>
 by: Johnny Billquist - Mon, 9 Oct 2023 09:40 UTC

On 2023-10-08 18:50, Arne Vajhøj wrote:
> On 10/8/2023 9:54 AM, Johnny Billquist wrote:
>> On 2023-10-08 09:42, John Dallman wrote:
>>> The Windows NT kernel is quite VMS-like in its concepts, but the
>>> implementation is very different, being written in C and using only user
>>> and supervisor privilege levels. The API that it provides is not
>>> published, except for the functions that device drivers use.
>>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>>
>> I wish people would stop getting so hung up on the different
>> "privilege" levels. That is such a minor detail in anything that it
>> hardly matters. I don't understand how it has become such a huge thing
>> in VMS circuits.
>
> In many ways E is an implementation detail. I don't think
> RMS running in K would mean a big difference for anything
> else.
>
> But I think the existence of S has implications beyond
> internal implementation. It is what makes the VMS shell
> model and process <> image possible. Without it it
> seems likely that VMS would have had something fork like.

No. As demonstrated by VMS on x86-64. No need. You can do that/solve
that with just two modes. The only real boundary is between user mode
and everything else.

Johnny

Re: The main stream memory of DEC.

<ug0tpv$3ta0a$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30409&group=comp.os.vms#30409

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Mon, 9 Oct 2023 13:05:03 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 50
Message-ID: <ug0tpv$3ta0a$1@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com> <ufumla$36u7c$1@dont-email.me> <ug0hpg$70d$1@news.misty.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 9 Oct 2023 13:05:03 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="255f7be9897f2c4828ac5841862ef280";
logging-data="4106250"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19K35Py3f93qdOl0mIFQlHwANI8sgLrYAg="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:xj4dKxjuzlqHDT4/vOj3wrtNeYc=
 by: Simon Clubley - Mon, 9 Oct 2023 13:05 UTC

On 2023-10-09, Johnny Billquist <bqt@softjar.se> wrote:
> On 2023-10-08 18:50, Arne Vajhøj wrote:
>> On 10/8/2023 9:54 AM, Johnny Billquist wrote:
>>> On 2023-10-08 09:42, John Dallman wrote:
>>>> The Windows NT kernel is quite VMS-like in its concepts, but the
>>>> implementation is very different, being written in C and using only user
>>>> and supervisor privilege levels. The API that it provides is not
>>>> published, except for the functions that device drivers use.
>>>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>>>
>>> I wish people would stop getting so hung up on the different
>>> "privilege" levels. That is such a minor detail in anything that it
>>> hardly matters. I don't understand how it has become such a huge thing
>>> in VMS circuits.

Because, if done properly (unlike the way VMS did it), it could have
had real isolation, and hence security, benefits.

A comparable example would be how the isolation built into microkernel
designs has real security benefits.

>>
>> In many ways E is an implementation detail. I don't think
>> RMS running in K would mean a big difference for anything
>> else.
>>
>> But I think the existence of S has implications beyond
>> internal implementation. It is what makes the VMS shell
>> model and process <> image possible. Without it it
>> seems likely that VMS would have had something fork like.

That is not a good thing. The Unix approach is better, especially in
today's security environment.

>
> No. As demonstrated by VMS on x86-64. No need. You can do that/solve
> that with just two modes. The only real boundary is between user mode
> and everything else.
>

As far as most of x86-64 VMS is concerned, it still does have 4 modes.

It's just that 2 of them are emulated in the very lowest levels of
x86-64 VMS.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: The main stream memory of DEC.

<ug0tua$3ta0a$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30410&group=comp.os.vms#30410

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Mon, 9 Oct 2023 13:07:22 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 35
Message-ID: <ug0tua$3ta0a$2@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <memo.20231008084235.10140D@jgd.cix.co.uk>
Injection-Date: Mon, 9 Oct 2023 13:07:22 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="255f7be9897f2c4828ac5841862ef280";
logging-data="4106250"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX188M2C5FPxMWp7X6ua07SYp9w52gJgIASY="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:AmjLtqjiX6u9n+AsOEQzcGRdr/M=
 by: Simon Clubley - Mon, 9 Oct 2023 13:07 UTC

On 2023-10-08, John Dallman <jgd@cix.co.uk> wrote:
> In article <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>,
> gah4@u.washington.edu (gah4) wrote:
>
>> It is well known that VMS people moved to working on NT.
>>
>> How many ideas transferred is less obvious.
>
> The actual relationship is with DEC's MICA. That was intended (in the
> final version of the plan) to have a common kernel that could support VMS
> and Ultrix environments. <https://en.wikipedia.org/wiki/DEC_MICA>
>

There's also the small matter of what the "P" in AXP is alleged to stand
for. :-)

> Windows NT originally had three "environmental subsystems", Win32, OS/2
> (dropped at Windows XP) and POSIX (replaced by Interix, then Windows
> Services for Linux).
>
> The Windows NT kernel is quite VMS-like in its concepts, but the
> implementation is very different, being written in C and using only user
> and supervisor privilege levels. The API that it provides is not
> published, except for the functions that device drivers use.
><https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>

However, I thought WNT took its internal OO model from MICA (or at
least was inspired by it).

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: The main stream memory of DEC.

<ug19is$eib$1@panix2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30412&group=comp.os.vms#30412

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.panix2.panix.com!panix2.panix.com!not-for-mail
From: klu...@panix.com (Scott Dorsey)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: 9 Oct 2023 16:26:04 -0000
Organization: Former users of Netcom shell (1989-2000)
Lines: 15
Message-ID: <ug19is$eib$1@panix2.panix.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
Injection-Info: reader2.panix.com; posting-host="panix2.panix.com:166.84.1.2";
logging-data="18218"; mail-complaints-to="abuse@panix.com"
 by: Scott Dorsey - Mon, 9 Oct 2023 16:26 UTC

Johnny Billquist <bqt@softjar.se> wrote:
>I wish people would stop getting so hung up on the different "privilege"
>levels. That is such a minor detail in anything that it hardly matters.
>I don't understand how it has become such a huge thing in VMS circuits.

It has become a huge thing because these days it is a unique thing. A lot
of operating systems used to have multiple levels, but not many (any?) are
left. So when people whose experience is limited to Windows and Unix look
at VMS architecturally this is the first thing they see as being very strange.

So many of the specific practices discussed in the Red Book no longer even
exist in operating systems classes today.
--scott
--
"C'est un Nagra. C'est suisse, et tres, tres precis."

Re: The main stream memory of DEC.

<ug1mh5$3m3r$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30419&group=comp.os.vms#30419

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Mon, 9 Oct 2023 16:06:59 -0400
Organization: A noiseless patient Spider
Lines: 40
Message-ID: <ug1mh5$3m3r$1@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
<ufumla$36u7c$1@dont-email.me> <ug0hpg$70d$1@news.misty.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 9 Oct 2023 20:07:01 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="f6fe0106f256b3883e43562b80eb3823";
logging-data="120955"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/IrKzc+uFrZ4AXEOOXJN2B24AjmCUzxYs="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:r9ANva5+JSY6vVxT54EN4OguvFo=
In-Reply-To: <ug0hpg$70d$1@news.misty.com>
Content-Language: en-US
 by: Arne Vajhøj - Mon, 9 Oct 2023 20:06 UTC

On 10/9/2023 5:40 AM, Johnny Billquist wrote:
> On 2023-10-08 18:50, Arne Vajhøj wrote:
>> On 10/8/2023 9:54 AM, Johnny Billquist wrote:
>>> On 2023-10-08 09:42, John Dallman wrote:
>>>> The Windows NT kernel is quite VMS-like in its concepts, but the
>>>> implementation is very different, being written in C and using only
>>>> user
>>>> and supervisor privilege levels. The API that it provides is not
>>>> published, except for the functions that device drivers use.
>>>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>>>
>>> I wish people would stop getting so hung up on the different
>>> "privilege" levels. That is such a minor detail in anything that it
>>> hardly matters. I don't understand how it has become such a huge
>>> thing in VMS circuits.
>>
>> In many ways E is an implementation detail. I don't think
>> RMS running in K would mean a big difference for anything
>> else.
>>
>> But I think the existence of S has implications beyond
>> internal implementation. It is what makes the VMS shell
>> model and process <> image possible. Without it it
>> seems likely that VMS would have had something fork like.
>
> No. As demonstrated by VMS on x86-64. No need. You can do that/solve
> that with just two modes. The only real boundary is between user mode
> and everything else.

VMS x86-64 has still 4 modes and it still enables
DCL in P1 space.

The x86-64 only proved that the 4 modes in the OS do
not require 4 modes in HW.

Arne

Re: The main stream memory of DEC.

<ug1na9$3s1s$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30420&group=comp.os.vms#30420

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Mon, 9 Oct 2023 16:20:23 -0400
Organization: A noiseless patient Spider
Lines: 51
Message-ID: <ug1na9$3s1s$1@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
<ufumla$36u7c$1@dont-email.me> <ug0hpg$70d$1@news.misty.com>
<ug0tpv$3ta0a$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 9 Oct 2023 20:20:25 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="f6fe0106f256b3883e43562b80eb3823";
logging-data="127036"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19FlXFB447qRzniVibZR+PuS57V33/XqNg="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:e7loVawAKems2FWGfG4uurGyB+o=
In-Reply-To: <ug0tpv$3ta0a$1@dont-email.me>
Content-Language: en-US
 by: Arne Vajhøj - Mon, 9 Oct 2023 20:20 UTC

On 10/9/2023 9:05 AM, Simon Clubley wrote:
> On 2023-10-09, Johnny Billquist <bqt@softjar.se> wrote:
>> On 2023-10-08 18:50, Arne Vajhøj wrote:
>>> On 10/8/2023 9:54 AM, Johnny Billquist wrote:
>>>> On 2023-10-08 09:42, John Dallman wrote:
>>>>> The Windows NT kernel is quite VMS-like in its concepts, but the
>>>>> implementation is very different, being written in C and using only user
>>>>> and supervisor privilege levels. The API that it provides is not
>>>>> published, except for the functions that device drivers use.
>>>>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>>>>
>>>> I wish people would stop getting so hung up on the different
>>>> "privilege" levels. That is such a minor detail in anything that it
>>>> hardly matters. I don't understand how it has become such a huge thing
>>>> in VMS circuits.
>
> Because, if done properly (unlike the way VMS did it), it could have
> had real isolation, and hence security, benefits.
>
> A comparable example would be how the isolation built into microkernel
> designs has real security benefits.
>
>>>
>>> In many ways E is an implementation detail. I don't think
>>> RMS running in K would mean a big difference for anything
>>> else.
>>>
>>> But I think the existence of S has implications beyond
>>> internal implementation. It is what makes the VMS shell
>>> model and process <> image possible. Without it it
>>> seems likely that VMS would have had something fork like.
>
> That is not a good thing. The Unix approach is better, especially in
> today's security environment.

Remember that VMS was designed just before MIT decided to
enable password on the accounts on the systems in their
computer lab (per the old Stallman story).

It was a different time.

If MIT considered it appropriate to not have passwords
on all their accounts on the systems in their
computer lab, then DEC deciding not to block access
from S to more privileged modes seems not a big thing.

45 years later the world is very different.

Arne

Re: The main stream memory of DEC.

<ug1vvv$3r1ue$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30424&group=comp.os.vms#30424

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: new...@cct-net.co.uk (Chris Townley)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Mon, 9 Oct 2023 23:48:31 +0100
Organization: A noiseless patient Spider
Lines: 61
Message-ID: <ug1vvv$3r1ue$1@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
<ufumla$36u7c$1@dont-email.me> <ug0hpg$70d$1@news.misty.com>
<ug0tpv$3ta0a$1@dont-email.me> <ug1na9$3s1s$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 9 Oct 2023 22:48:31 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="69c323e9335371ddc9692e03df3f82a8";
logging-data="4032462"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18fHyzj8uh8hPkDkdDTMUdQzI5s3U58a5s="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:i/gN+ypZkkwLUeVghEJRBD76ZEE=
Content-Language: en-GB
In-Reply-To: <ug1na9$3s1s$1@dont-email.me>
 by: Chris Townley - Mon, 9 Oct 2023 22:48 UTC

On 09/10/2023 21:20, Arne Vajhøj wrote:
> On 10/9/2023 9:05 AM, Simon Clubley wrote:
>> On 2023-10-09, Johnny Billquist <bqt@softjar.se> wrote:
>>> On 2023-10-08 18:50, Arne Vajhøj wrote:
>>>> On 10/8/2023 9:54 AM, Johnny Billquist wrote:
>>>>> On 2023-10-08 09:42, John Dallman wrote:
>>>>>> The Windows NT kernel is quite VMS-like in its concepts, but the
>>>>>> implementation is very different, being written in C and using
>>>>>> only user
>>>>>> and supervisor privilege levels. The API that it provides is not
>>>>>> published, except for the functions that device drivers use.
>>>>>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>>>>>
>>>>> I wish people would stop getting so hung up on the different
>>>>> "privilege" levels. That is such a minor detail in anything that it
>>>>> hardly matters. I don't understand how it has become such a huge thing
>>>>> in VMS circuits.
>>
>> Because, if done properly (unlike the way VMS did it), it could have
>> had real isolation, and hence security, benefits.
>>
>> A comparable example would be how the isolation built into microkernel
>> designs has real security benefits.
>>
>>>>
>>>> In many ways E is an implementation detail. I don't think
>>>> RMS running in K would mean a big difference for anything
>>>> else.
>>>>
>>>> But I think the existence of S has implications beyond
>>>> internal implementation. It is what makes the VMS shell
>>>> model and process <> image possible. Without it it
>>>> seems likely that VMS would have had something fork like.
>>
>> That is not a good thing. The Unix approach is better, especially in
>> today's security environment.
>
> Remember that VMS was designed just before MIT decided to
> enable password on the accounts on the systems in their
> computer lab (per the old Stallman story).
>
> It was a different time.
>
> If MIT considered it appropriate to not have passwords
> on all their accounts on the systems in their
> computer lab, then DEC deciding not to block access
> from S to more privileged modes seems not a big thing.
>
> 45 years later the world is very different.
>
> Arne
>
>

When I started with PDP 11/44 there were no passwords at all - just
hello 100,1 for the application, or...
All the user terminals were auto-login

--
Chris

Re: The main stream memory of DEC.

<e63acc65-bbb1-4123-9a38-db5ca7fdc52en@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30435&group=comp.os.vms#30435

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:ad4:4f4c:0:b0:66c:1822:b357 with SMTP id eu12-20020ad44f4c000000b0066c1822b357mr71099qvb.5.1696901621910;
Mon, 09 Oct 2023 18:33:41 -0700 (PDT)
X-Received: by 2002:a05:6808:2001:b0:3ac:b428:844d with SMTP id
q1-20020a056808200100b003acb428844dmr8747782oiw.8.1696901621746; Mon, 09 Oct
2023 18:33:41 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!border-2.nntp.ord.giganews.com!border-1.nntp.ord.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Mon, 9 Oct 2023 18:33:41 -0700 (PDT)
In-Reply-To: <ug1na9$3s1s$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=2601:602:9700:4689:7d74:eb51:93bf:1bed;
posting-account=gLDX1AkAAAA26M5HM-O3sVMAXdxK9FPA
NNTP-Posting-Host: 2601:602:9700:4689:7d74:eb51:93bf:1bed
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
<ufumla$36u7c$1@dont-email.me> <ug0hpg$70d$1@news.misty.com>
<ug0tpv$3ta0a$1@dont-email.me> <ug1na9$3s1s$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <e63acc65-bbb1-4123-9a38-db5ca7fdc52en@googlegroups.com>
Subject: Re: The main stream memory of DEC.
From: gah...@u.washington.edu (gah4)
Injection-Date: Tue, 10 Oct 2023 01:33:41 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Lines: 25
 by: gah4 - Tue, 10 Oct 2023 01:33 UTC

On Monday, October 9, 2023 at 1:20:28 PM UTC-7, Arne Vajhøj wrote:

(snip)

> Remember that VMS was designed just before MIT decided to
> enable password on the accounts on the systems in their
> computer lab (per the old Stallman story).
> It was a different time.
> If MIT considered it appropriate to not have passwords
> on all their accounts on the systems in their
> computer lab, then DEC deciding not to block access
> from S to more privileged modes seems not a big thing.
> 45 years later the world is very different.

Systems I remember from about 45 years ago had passwords
for users, but all files were world readable.

Everyone was, more or less, on the same side, working for
the same overall organization.

Re: The main stream memory of DEC.

<ug3oml$2oe$2@news.misty.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30441&group=comp.os.vms#30441

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!.POSTED.10.184.180.213.static.wline.lns.sme.cust.swisscom.ch!not-for-mail
From: bqt...@softjar.se (Johnny Billquist)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Tue, 10 Oct 2023 16:56:20 +0200
Organization: MGT Consulting
Message-ID: <ug3oml$2oe$2@news.misty.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
<ufumla$36u7c$1@dont-email.me> <ug0hpg$70d$1@news.misty.com>
<ug0tpv$3ta0a$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 10 Oct 2023 14:56:21 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="10.184.180.213.static.wline.lns.sme.cust.swisscom.ch:213.180.184.10";
logging-data="2830"; mail-complaints-to="abuse@misty.com"
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <ug0tpv$3ta0a$1@dont-email.me>
 by: Johnny Billquist - Tue, 10 Oct 2023 14:56 UTC

On 2023-10-09 15:05, Simon Clubley wrote:
> On 2023-10-09, Johnny Billquist <bqt@softjar.se> wrote:
>> On 2023-10-08 18:50, Arne Vajhøj wrote:
>>> On 10/8/2023 9:54 AM, Johnny Billquist wrote:
>>>> On 2023-10-08 09:42, John Dallman wrote:
>>>>> The Windows NT kernel is quite VMS-like in its concepts, but the
>>>>> implementation is very different, being written in C and using only user
>>>>> and supervisor privilege levels. The API that it provides is not
>>>>> published, except for the functions that device drivers use.
>>>>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>>>>
>>>> I wish people would stop getting so hung up on the different
>>>> "privilege" levels. That is such a minor detail in anything that it
>>>> hardly matters. I don't understand how it has become such a huge thing
>>>> in VMS circuits.
>
> Because, if done properly (unlike the way VMS did it), it could have
> had real isolation, and hence security, benefits.

I don't really agree. It's not as if you magically can do some new fancy
security stuff with more levels that is not possible otherwise. Thinking
this way is mostly self-delusions. Another belief in some silver bullet
that could just solve all the problems.

> A comparable example would be how the isolation built into microkernel
> designs has real security benefits.

I don't see any comparison. And microkernels can also be done with just
two modes of the processor.

>>> In many ways E is an implementation detail. I don't think
>>> RMS running in K would mean a big difference for anything
>>> else.
>>>
>>> But I think the existence of S has implications beyond
>>> internal implementation. It is what makes the VMS shell
>>> model and process <> image possible. Without it it
>>> seems likely that VMS would have had something fork like.
>
> That is not a good thing. The Unix approach is better, especially in
> today's security environment.

What kind of Unix security are you thinking about here?
Fork? Or just that shells are normal programs?
DCL being a privileged piece of code means that there are security
implications, yes. Shells not requiring any special privileges makes it
easier to keep safe.

Historically, Unix was much worse than VMS ever was. Anything that
wanted to know anything about the system had to go and read through
/dev/kmem, which meant that any and all data was possible to read. The
security leaks of that can't even be described in words. And the only
privilege was root, which meant you could do everything. And anything
that wanted to do anything out of the ordinary then had to run as root.
Don't even start on counting the number of exploits based on that
detail... Including various forks done in processes that ran as root,
where people managed to figure out one way or another to fool the
process to fork and exec something unintentional, leading to privilege
escalations. Starting with just your path variable...

>> No. As demonstrated by VMS on x86-64. No need. You can do that/solve
>> that with just two modes. The only real boundary is between user mode
>> and everything else.
>>
>
> As far as most of x86-64 VMS is concerned, it still does have 4 modes.
>
> It's just that 2 of them are emulated in the very lowest levels of
> x86-64 VMS.

Yes. But that shows how little those 4 modes actually matter. VAX could
have had just two modes, and played with the mapping from day 1, and
never even mentioned the terms "executive" and "supervisor". It was just
a convenient help in the hardware on the VAX to make this a bit simpler.

Johnny

Re: The main stream memory of DEC.

<ug42d3$18sge$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30442&group=comp.os.vms#30442

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Tue, 10 Oct 2023 17:41:55 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 75
Message-ID: <ug42d3$18sge$1@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com> <ufumla$36u7c$1@dont-email.me> <ug0hpg$70d$1@news.misty.com> <ug0tpv$3ta0a$1@dont-email.me> <ug3oml$2oe$2@news.misty.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 10 Oct 2023 17:41:55 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="67e4d2a0bb7eb331fe242a80f20445d2";
logging-data="1339918"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18jumRfcH59oyX9XaR0iJdzl1671SlLA+c="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:VnjB9gW0SwCBPJ8rsyni1xPZYoM=
 by: Simon Clubley - Tue, 10 Oct 2023 17:41 UTC

On 2023-10-10, Johnny Billquist <bqt@softjar.se> wrote:
> On 2023-10-09 15:05, Simon Clubley wrote:
>> On 2023-10-09, Johnny Billquist <bqt@softjar.se> wrote:
>>> On 2023-10-08 18:50, Arne Vajhøj wrote:
>>>> On 10/8/2023 9:54 AM, Johnny Billquist wrote:
>>>>> On 2023-10-08 09:42, John Dallman wrote:
>>>>>> The Windows NT kernel is quite VMS-like in its concepts, but the
>>>>>> implementation is very different, being written in C and using only user
>>>>>> and supervisor privilege levels. The API that it provides is not
>>>>>> published, except for the functions that device drivers use.
>>>>>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>>>>>
>>>>> I wish people would stop getting so hung up on the different
>>>>> "privilege" levels. That is such a minor detail in anything that it
>>>>> hardly matters. I don't understand how it has become such a huge thing
>>>>> in VMS circuits.
>>
>> Because, if done properly (unlike the way VMS did it), it could have
>> had real isolation, and hence security, benefits.
>
> I don't really agree. It's not as if you magically can do some new fancy
> security stuff with more levels that is not possible otherwise. Thinking
> this way is mostly self-delusions. Another belief in some silver bullet
> that could just solve all the problems.
>
>> A comparable example would be how the isolation built into microkernel
>> designs has real security benefits.
>
> I don't see any comparison. And microkernels can also be done with just
> two modes of the processor.
>

The comparison is that, instead of stuffing all of the kernel code into one
fully privileged address space (ie: kernel mode), in a microkernel the
kernel code is broken up into multiple, lesser privileged, address spaces
all of which are isolated from each other.

Likewise, if the various modes had been used properly, you could have had
a version of VMS with chunks of it properly isolated from each other.

>> That is not a good thing. The Unix approach is better, especially in
>> today's security environment.
>
> What kind of Unix security are you thinking about here?
> Fork? Or just that shells are normal programs?
> DCL being a privileged piece of code means that there are security
> implications, yes. Shells not requiring any special privileges makes it
> easier to keep safe.
>

Yes. Everything should be as unprivileged as possible so if it gets
compromised, it could help reduce the damage which can be done.

> Historically, Unix was much worse than VMS ever was. Anything that
> wanted to know anything about the system had to go and read through
> /dev/kmem, which meant that any and all data was possible to read. The
> security leaks of that can't even be described in words. And the only
> privilege was root, which meant you could do everything. And anything
> that wanted to do anything out of the ordinary then had to run as root.
> Don't even start on counting the number of exploits based on that
> detail... Including various forks done in processes that ran as root,
> where people managed to figure out one way or another to fool the
> process to fork and exec something unintentional, leading to privilege
> escalations. Starting with just your path variable...
>

We don't compare the security on version 1.0 of VMS with the security
of modern VMS versions. Likewise, stuff done in the Unix of the 1970s
is not applicable in 2023 unless modern-way Unix still has the same issues.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: The main stream memory of DEC.

<kolhg8F7vgjU3@mid.individual.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30443&group=comp.os.vms#30443

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: bill.gun...@gmail.com (bill)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Tue, 10 Oct 2023 13:55:19 -0400
Lines: 71
Message-ID: <kolhg8F7vgjU3@mid.individual.net>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
<ufumla$36u7c$1@dont-email.me> <ug0hpg$70d$1@news.misty.com>
<ug0tpv$3ta0a$1@dont-email.me> <ug1na9$3s1s$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net qZLWAircQjNoxJUmKwk1xAask10m1LSHlzv/swrcYrAWLaMJPi
Cancel-Lock: sha1:OssXWmi31no2iAJow4K+PMWKzRU= sha256:xyc+7jOjzpkeKeFWTuCj2EG/v8pwR945RVdmZt+mJgk=
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <ug1na9$3s1s$1@dont-email.me>
 by: bill - Tue, 10 Oct 2023 17:55 UTC

On 10/9/2023 4:20 PM, Arne Vajhøj wrote:
> On 10/9/2023 9:05 AM, Simon Clubley wrote:
>> On 2023-10-09, Johnny Billquist <bqt@softjar.se> wrote:
>>> On 2023-10-08 18:50, Arne Vajhøj wrote:
>>>> On 10/8/2023 9:54 AM, Johnny Billquist wrote:
>>>>> On 2023-10-08 09:42, John Dallman wrote:
>>>>>> The Windows NT kernel is quite VMS-like in its concepts, but the
>>>>>> implementation is very different, being written in C and using
>>>>>> only user
>>>>>> and supervisor privilege levels. The API that it provides is not
>>>>>> published, except for the functions that device drivers use.
>>>>>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>>>>>
>>>>> I wish people would stop getting so hung up on the different
>>>>> "privilege" levels. That is such a minor detail in anything that it
>>>>> hardly matters. I don't understand how it has become such a huge thing
>>>>> in VMS circuits.
>>
>> Because, if done properly (unlike the way VMS did it), it could have
>> had real isolation, and hence security, benefits.
>>
>> A comparable example would be how the isolation built into microkernel
>> designs has real security benefits.
>>
>>>>
>>>> In many ways E is an implementation detail. I don't think
>>>> RMS running in K would mean a big difference for anything
>>>> else.
>>>>
>>>> But I think the existence of S has implications beyond
>>>> internal implementation. It is what makes the VMS shell
>>>> model and process <> image possible. Without it it
>>>> seems likely that VMS would have had something fork like.
>>
>> That is not a good thing. The Unix approach is better, especially in
>> today's security environment.
>
> Remember that VMS was designed just before MIT decided to
> enable password on the accounts on the systems in their
> computer lab (per the old Stallman story).
>
> It was a different time.
>
> If MIT considered it appropriate to not have passwords
> on all their accounts on the systems in their
> computer lab, then DEC deciding not to block access
> from S to more privileged modes seems not a big thing.
>

Actually, until the 414s most places didn't require passwords including
ARPANET. Most people's userid was their name (mine was "bill" until
2115. Still is on most of my home machines. But I have always had
a password. Just call me paranoid.) Learning userids was trivial,
Just use finger!! And then you had rlogin making it easy to jump around
from machine to machine once you compromised any of them.

I remember when the announcement that passwords would be required on
ARPANET. Many places went ballistic. How could you impose such a
hardship on users.

Times have definitely changed and not for the better.

> 45 years later the world is very different.
>
> Arne
>
>

bill

Re: The main stream memory of DEC.

<ug4hod$2h6$1@news.misty.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30452&group=comp.os.vms#30452

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!.POSTED.80-218-16-84.dclient.hispeed.ch!not-for-mail
From: bqt...@softjar.se (Johnny Billquist)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Wed, 11 Oct 2023 00:03:57 +0200
Organization: MGT Consulting
Message-ID: <ug4hod$2h6$1@news.misty.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<memo.20231008084235.10140D@jgd.cix.co.uk> <ufuc9r$hck$3@news.misty.com>
<ufumla$36u7c$1@dont-email.me> <ug0hpg$70d$1@news.misty.com>
<ug0tpv$3ta0a$1@dont-email.me> <ug3oml$2oe$2@news.misty.com>
<ug42d3$18sge$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 10 Oct 2023 22:03:57 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="80-218-16-84.dclient.hispeed.ch:80.218.16.84";
logging-data="2598"; mail-complaints-to="abuse@misty.com"
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <ug42d3$18sge$1@dont-email.me>
 by: Johnny Billquist - Tue, 10 Oct 2023 22:03 UTC

On 2023-10-10 19:41, Simon Clubley wrote:
> On 2023-10-10, Johnny Billquist <bqt@softjar.se> wrote:
>> On 2023-10-09 15:05, Simon Clubley wrote:
>>> On 2023-10-09, Johnny Billquist <bqt@softjar.se> wrote:
>>>> On 2023-10-08 18:50, Arne Vajhøj wrote:
>>>>> On 10/8/2023 9:54 AM, Johnny Billquist wrote:
>>>>>> On 2023-10-08 09:42, John Dallman wrote:
>>>>>>> The Windows NT kernel is quite VMS-like in its concepts, but the
>>>>>>> implementation is very different, being written in C and using only user
>>>>>>> and supervisor privilege levels. The API that it provides is not
>>>>>>> published, except for the functions that device drivers use.
>>>>>>> <https://en.wikipedia.org/wiki/Architecture_of_Windows_NT>
>>>>>>
>>>>>> I wish people would stop getting so hung up on the different
>>>>>> "privilege" levels. That is such a minor detail in anything that it
>>>>>> hardly matters. I don't understand how it has become such a huge thing
>>>>>> in VMS circuits.
>>>
>>> Because, if done properly (unlike the way VMS did it), it could have
>>> had real isolation, and hence security, benefits.
>>
>> I don't really agree. It's not as if you magically can do some new fancy
>> security stuff with more levels that is not possible otherwise. Thinking
>> this way is mostly self-delusions. Another belief in some silver bullet
>> that could just solve all the problems.
>>
>>> A comparable example would be how the isolation built into microkernel
>>> designs has real security benefits.
>>
>> I don't see any comparison. And microkernels can also be done with just
>> two modes of the processor.
>>
>
> The comparison is that, instead of stuffing all of the kernel code into one
> fully privileged address space (ie: kernel mode), in a microkernel the
> kernel code is broken up into multiple, lesser privileged, address spaces
> all of which are isolated from each other.
>
> Likewise, if the various modes had been used properly, you could have had
> a version of VMS with chunks of it properly isolated from each other.

I don't think the processor modes is really usable for that isloation of
thing in the first place, so I think it's a false comparison.
Don't try to get things used for something they are not meant for, or
fit for...

>>> That is not a good thing. The Unix approach is better, especially in
>>> today's security environment.
>>
>> What kind of Unix security are you thinking about here?
>> Fork? Or just that shells are normal programs?
>> DCL being a privileged piece of code means that there are security
>> implications, yes. Shells not requiring any special privileges makes it
>> easier to keep safe.
>>
>
> Yes. Everything should be as unprivileged as possible so if it gets
> compromised, it could help reduce the damage which can be done.

I certainly agree with that.

>> Historically, Unix was much worse than VMS ever was. Anything that
>> wanted to know anything about the system had to go and read through
>> /dev/kmem, which meant that any and all data was possible to read. The
>> security leaks of that can't even be described in words. And the only
>> privilege was root, which meant you could do everything. And anything
>> that wanted to do anything out of the ordinary then had to run as root.
>> Don't even start on counting the number of exploits based on that
>> detail... Including various forks done in processes that ran as root,
>> where people managed to figure out one way or another to fool the
>> process to fork and exec something unintentional, leading to privilege
>> escalations. Starting with just your path variable...
>>
>
> We don't compare the security on version 1.0 of VMS with the security
> of modern VMS versions. Likewise, stuff done in the Unix of the 1970s
> is not applicable in 2023 unless modern-way Unix still has the same issues.

The root privileges, and related fallout is still relevant in Unix
today, even if things are better than they used to be.

Johnny

Re: The main stream memory of DEC.

<ug94co$s3r$2@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30491&group=comp.os.vms#30491

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Thu, 12 Oct 2023 15:46:32 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <ug94co$s3r$2@reader2.panix.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <ug0tpv$3ta0a$1@dont-email.me> <ug3oml$2oe$2@news.misty.com> <ug42d3$18sge$1@dont-email.me>
Injection-Date: Thu, 12 Oct 2023 15:46:32 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="28795"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Thu, 12 Oct 2023 15:46 UTC

In article <ug42d3$18sge$1@dont-email.me>,
Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
>We don't compare the security on version 1.0 of VMS with the security
>of modern VMS versions. Likewise, stuff done in the Unix of the 1970s
>is not applicable in 2023 unless modern-way Unix still has the same issues.

Unix is still a security dumpster fire. The concept of UID 0
being uniquely (and totally) privileged still very much exists,
and `fork` allows one to leak state to unprivileged code
trivially. Then there's setuid....

The idea that you can get access to kernel memory via a special
device file is (IMHO) less relevant, but combined with the other
things it's particularly dangerous.

Unix was not designed with security as a primary goal, and many
of the consequences of its early design still stand.

And none of this even begins to discuss implementation issues,
such as memory-unsafe code in critical security paths, or
susceptibility to speculation-related side-channel attacks,
as opposed to purely architectural issues.

Ironically, much of this was fixed in plan9 (at least in the
architectural model), and some of the relevant changes have been
retrofitted into e.g. Linux, but the older issues persist. They
_can_ be sandboxed much more effectively these days, though, and
by any reasonable metric, modern Linux is pretty secure. It
could be _better_, but as you point out, it's nothing like 1970s
and 80s Unix.

- Dan C.

Re: The main stream memory of DEC.

<ug94hn$s3r$3@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30492&group=comp.os.vms#30492

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Thu, 12 Oct 2023 15:49:11 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <ug94hn$s3r$3@reader2.panix.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <ug3oml$2oe$2@news.misty.com> <ug42d3$18sge$1@dont-email.me> <ug4hod$2h6$1@news.misty.com>
Injection-Date: Thu, 12 Oct 2023 15:49:11 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="28795"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Thu, 12 Oct 2023 15:49 UTC

In article <ug4hod$2h6$1@news.misty.com>,
Johnny Billquist <bqt@softjar.se> wrote:
>On 2023-10-10 19:41, Simon Clubley wrote:
>> Likewise, if the various modes had been used properly, you could have had
>> a version of VMS with chunks of it properly isolated from each other.
>
>I don't think the processor modes is really usable for that isloation of
>thing in the first place, so I think it's a false comparison.
>Don't try to get things used for something they are not meant for, or
>fit for...

I got the impression that's roughly what Simon was saying. The
architectural privilege levels on the VAX weren't as useful as
initially thought.

>[snip]
>>> Historically, Unix was much worse than VMS ever was. Anything that
>>> wanted to know anything about the system had to go and read through
>>> /dev/kmem, which meant that any and all data was possible to read. The
>>> security leaks of that can't even be described in words. And the only
>>> privilege was root, which meant you could do everything. And anything
>>> that wanted to do anything out of the ordinary then had to run as root.
>>> Don't even start on counting the number of exploits based on that
>>> detail... Including various forks done in processes that ran as root,
>>> where people managed to figure out one way or another to fool the
>>> process to fork and exec something unintentional, leading to privilege
>>> escalations. Starting with just your path variable...
>>>
>>
>> We don't compare the security on version 1.0 of VMS with the security
>> of modern VMS versions. Likewise, stuff done in the Unix of the 1970s
>> is not applicable in 2023 unless modern-way Unix still has the same issues.
>
>The root privileges, and related fallout is still relevant in Unix
>today, even if things are better than they used to be.

Indeed. But modern Unix's also have capability systems that can
obviate much of the need for root. It's possible to run complex
network services on low ports without resorting to being `root`,
for instance.

- Dan C.

Re: The main stream memory of DEC.

<ug983m$p7b$1@news.misty.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30493&group=comp.os.vms#30493

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!.POSTED.10.184.180.213.static.wline.lns.sme.cust.swisscom.ch!not-for-mail
From: bqt...@softjar.se (Johnny Billquist)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Thu, 12 Oct 2023 18:49:58 +0200
Organization: MGT Consulting
Message-ID: <ug983m$p7b$1@news.misty.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<ug3oml$2oe$2@news.misty.com> <ug42d3$18sge$1@dont-email.me>
<ug4hod$2h6$1@news.misty.com> <ug94hn$s3r$3@reader2.panix.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 12 Oct 2023 16:49:58 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="10.184.180.213.static.wline.lns.sme.cust.swisscom.ch:213.180.184.10";
logging-data="25835"; mail-complaints-to="abuse@misty.com"
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <ug94hn$s3r$3@reader2.panix.com>
 by: Johnny Billquist - Thu, 12 Oct 2023 16:49 UTC

On 2023-10-12 17:49, Dan Cross wrote:
> In article <ug4hod$2h6$1@news.misty.com>,
> Johnny Billquist <bqt@softjar.se> wrote:
>> On 2023-10-10 19:41, Simon Clubley wrote:
>>> Likewise, if the various modes had been used properly, you could have had
>>> a version of VMS with chunks of it properly isolated from each other.
>>
>> I don't think the processor modes is really usable for that isloation of
>> thing in the first place, so I think it's a false comparison.
>> Don't try to get things used for something they are not meant for, or
>> fit for...
>
> I got the impression that's roughly what Simon was saying. The
> architectural privilege levels on the VAX weren't as useful as
> initially thought.

I got the impression that he was complaining that VMS did not make use
of the modes in a "good enough" way from a security point of view.

My point is that this is not what the different processor modes are
meaningful for. They are a nice way to add some extra safety, and
structure things in a sortof ordered way. But you should not try to make
them your security mechanism.
Anything beyond user is equivalent from a security point of view. Trying
to make the other modes imply different security layers is not really
useful, for multiple reasons.

>> The root privileges, and related fallout is still relevant in Unix
>> today, even if things are better than they used to be.
>
> Indeed. But modern Unix's also have capability systems that can
> obviate much of the need for root. It's possible to run complex
> network services on low ports without resorting to being `root`,
> for instance.

Yes. Capabilities are an effort to avoid having everything run as root.
But root still exists, and shortcircuit all the security systems.
And getting rid of is in itself equially scary. Who knows how stuck your
system might become if root were to go away. Everything is so basically
dependent on root existing and being special, still.

Johnny


computers / comp.os.vms / Re: The main stream memory of DEC.

Pages:12
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor