Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

The generation of random numbers is too important to be left to chance.


computers / comp.os.vms / Re: The main stream memory of DEC.

SubjectAuthor
* The main stream memory of DEC.John Vottero
+- Re: The main stream memory of DEC.Jan-Erik Söderholm
`* Re: The main stream memory of DEC.Rich Alderson
 +* Re: The main stream memory of DEC.gah4
 |`* Re: The main stream memory of DEC.John Dallman
 | +- Re: The main stream memory of DEC.John Dallman
 | +* Re: The main stream memory of DEC.Johnny Billquist
 | |+* Re: The main stream memory of DEC.Arne Vajhøj
 | ||+- Re: The main stream memory of DEC.Single Stage to Orbit
 | ||`* Re: The main stream memory of DEC.Johnny Billquist
 | || +* Re: The main stream memory of DEC.Simon Clubley
 | || |+* Re: The main stream memory of DEC.Arne Vajhøj
 | || ||+- Re: The main stream memory of DEC.Chris Townley
 | || ||+- Re: The main stream memory of DEC.gah4
 | || ||`- Re: The main stream memory of DEC.bill
 | || |`* Re: The main stream memory of DEC.Johnny Billquist
 | || | `* Re: The main stream memory of DEC.Simon Clubley
 | || |  +* Re: The main stream memory of DEC.Johnny Billquist
 | || |  |`* Re: The main stream memory of DEC.Dan Cross
 | || |  | `* Re: The main stream memory of DEC.Johnny Billquist
 | || |  |  +- Re: The main stream memory of DEC.Jake Hamby (Solid State Jake)
 | || |  |  `* Re: The main stream memory of DEC.Simon Clubley
 | || |  |   +* Re: The main stream memory of DEC.Jake Hamby (Solid State Jake)
 | || |  |   |`- Re: The main stream memory of DEC.gah4
 | || |  |   +- Re: The main stream memory of DEC.Arne Vajhøj
 | || |  |   +* Re: The main stream memory of DEC.Arne Vajhøj
 | || |  |   |`* Re: The main stream memory of DEC.Dan Cross
 | || |  |   | `* Re: The main stream memory of DEC.gah4
 | || |  |   |  `- Re: The main stream memory of DEC.Dan Cross
 | || |  |   `* Re: The main stream memory of DEC.Dan Cross
 | || |  |    `* Re: The main stream memory of DEC.Jake Hamby (Solid State Jake)
 | || |  |     `* Re: The main stream memory of DEC.Simon Clubley
 | || |  |      `* Re: The main stream memory of DEC.Dan Cross
 | || |  |       `- Re: The main stream memory of DEC.Simon Clubley
 | || |  `- Re: The main stream memory of DEC.Dan Cross
 | || `- Re: The main stream memory of DEC.Arne Vajhøj
 | |`- Re: The main stream memory of DEC.Scott Dorsey
 | `- Re: The main stream memory of DEC.Simon Clubley
 `- Re: The main stream memory of DEC.Johnny Billquist

Pages:12
Re: The main stream memory of DEC.

<e0226933-d224-466f-9b8a-81c53c4f7d40n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30494&group=comp.os.vms#30494

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:2908:b0:777:2780:536f with SMTP id m8-20020a05620a290800b007772780536fmr183360qkp.13.1697130994981;
Thu, 12 Oct 2023 10:16:34 -0700 (PDT)
X-Received: by 2002:a05:6871:8a1:b0:1e9:c7eb:16f8 with SMTP id
r33-20020a05687108a100b001e9c7eb16f8mr473388oaq.10.1697130994668; Thu, 12 Oct
2023 10:16:34 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!proxad.net!feeder1-2.proxad.net!209.85.160.216.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 12 Oct 2023 10:16:34 -0700 (PDT)
In-Reply-To: <ug983m$p7b$1@news.misty.com>
Injection-Info: google-groups.googlegroups.com; posting-host=2600:1700:46b0:abc0:1416:51e9:f91c:e4e2;
posting-account=OGFVHQoAAAASiNAamRQec8BtkuXxYFnQ
NNTP-Posting-Host: 2600:1700:46b0:abc0:1416:51e9:f91c:e4e2
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<ug3oml$2oe$2@news.misty.com> <ug42d3$18sge$1@dont-email.me>
<ug4hod$2h6$1@news.misty.com> <ug94hn$s3r$3@reader2.panix.com> <ug983m$p7b$1@news.misty.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <e0226933-d224-466f-9b8a-81c53c4f7d40n@googlegroups.com>
Subject: Re: The main stream memory of DEC.
From: jake.ha...@gmail.com (Jake Hamby (Solid State Jake))
Injection-Date: Thu, 12 Oct 2023 17:16:34 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
 by: Jake Hamby (Solid St - Thu, 12 Oct 2023 17:16 UTC

On Thursday, October 12, 2023 at 9:50:02 AM UTC-7, Johnny Billquist wrote:
> On 2023-10-12 17:49, Dan Cross wrote:
> > In article <ug4hod$2h6$1...@news.misty.com>,
> > Johnny Billquist <b...@softjar.se> wrote:
> >> On 2023-10-10 19:41, Simon Clubley wrote:
> >> The root privileges, and related fallout is still relevant in Unix
> >> today, even if things are better than they used to be.
> >
> > Indeed. But modern Unix's also have capability systems that can
> > obviate much of the need for root. It's possible to run complex
> > network services on low ports without resorting to being `root`,
> > for instance.
>
> Yes. Capabilities are an effort to avoid having everything run as root.
> But root still exists, and shortcircuit all the security systems.
> And getting rid of is in itself equially scary. Who knows how stuck your
> system might become if root were to go away. Everything is so basically
> dependent on root existing and being special, still.

Yep. In the days before Linux capabilities(7) and Solaris privileges(5), there wasn't a good way to bind network services to low ports without making the executable setuid root. The same for accessing raw sockets, raising a process to realtime priority, etc..

I've always thought that VMS was very innovative in having a 64-bit mask of privilege bits and providing various ways to attach them to both users and to privileged shareable images (Linux attaches caps to executables and scripts, while Solaris can also associate its privileges with user accounts).

I have very little experience with Solaris privileges (RBAC), other than knowing it has them, and that there are commands to display and edit the rights profile database, which is stored in /etc files, and to change roles. Here's a good quick guide to using RBAC:

https://linux-unix-invasion.blogspot.com/2014/09/solaris-11-configuring-rbac.html

Solaris 11 lets you completely disable root user logins and assign a "solaris.system.maintenance" authorization to admin users so that they can log in as themselves for maintenance, even in single-user mode. But UID 0 still exists, and I assume that many if not most UNIX daemons are still running as UID 0 in Solaris.

https://blogs.oracle.com/solaris/post/completely-disabling-root-logins-on-solaris-11

From an auditing standpoint, I think both OpenVMS and Solaris have a better approach than Linux, which puts its caps in extended filesystem attributes attached to the executable receiving them. On Solaris, everything's in /etc files with Solaris commands to manipulate them, and on VMS, user privileges are part of SYSUAF.DAT, while privileged shareables have to be installed on each boot so you can audit the install commands in your startup scripts to see what will persist across a reboot.

The downside of Linux and VMS is the list of caps/privs isn't perfect and could benefit from improvements. In the Linux world, there's active development in creating new caps, but then you need to have a newer Linux kernel and cap-utils to take advantage.

The overloaded catch-all Linux cap is CAP_SYS_ADMIN, and the capabilities(7) man page has a note that CAP_SYS_ADMIN is overloaded, and a further "Notes to kernel developers" explaining the goals of governing new kernel features by capabilities and warning:

* Don't choose CAP_SYS_ADMIN if you can possibly avoid it! A vast proportion of existing capability checks are associated with this capability (see the partial list above). It can plausibly be called "the new root", since on the one hand, it confers a wide range of powers, and on the other hand, its broad scope means that this is the capability that is required by many privileged programs. Don't make the problem worse. The only new features that should be associated with CAP_SYS_ADMIN are ones that closely match existing uses in that silo.

I think the VMS privilege bits haven't been changed in decades. I looked up what privilege you need to bind to a low TCP/IP port:

"The process must have SYSPRV, BYPASS, or OPER privilege to bind port numbers 1 to 1023."

It looks like SYSPRV is the closest equivalent to UID 0, and then the DEC TCP/IP developers added two additional vaguely related privileges with fewer powers so developers would have a choice. Linux has a CAP_NET_BIND_SERVICE to enable this one specific privilege, which is ideally the way to go. There are enough free bits in the VMS privilege mask that I think it'd be possible and desirable to take advantage of them in future versions of the OS.

Regards,
Jake Hamby

Re: The main stream memory of DEC.

<ug9dsd$2l4dl$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30497&group=comp.os.vms#30497

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Thu, 12 Oct 2023 18:28:29 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 45
Message-ID: <ug9dsd$2l4dl$1@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <ug3oml$2oe$2@news.misty.com> <ug42d3$18sge$1@dont-email.me> <ug4hod$2h6$1@news.misty.com> <ug94hn$s3r$3@reader2.panix.com> <ug983m$p7b$1@news.misty.com>
Injection-Date: Thu, 12 Oct 2023 18:28:29 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="916896e1bad1ac13dd0f6c530f72a5e3";
logging-data="2789813"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18yMKb3BtUAHyvimT9OnnSyvzLGqj87ukI="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:EJFJvL6UwWx+9hwaZn5LNwiRmns=
 by: Simon Clubley - Thu, 12 Oct 2023 18:28 UTC

On 2023-10-12, Johnny Billquist <bqt@softjar.se> wrote:
> On 2023-10-12 17:49, Dan Cross wrote:
>> In article <ug4hod$2h6$1@news.misty.com>,
>> Johnny Billquist <bqt@softjar.se> wrote:
>>> On 2023-10-10 19:41, Simon Clubley wrote:
>>>> Likewise, if the various modes had been used properly, you could have had
>>>> a version of VMS with chunks of it properly isolated from each other.
>>>
>>> I don't think the processor modes is really usable for that isloation of
>>> thing in the first place, so I think it's a false comparison.
>>> Don't try to get things used for something they are not meant for, or
>>> fit for...
>>
>> I got the impression that's roughly what Simon was saying. The
>> architectural privilege levels on the VAX weren't as useful as
>> initially thought.
>
> I got the impression that he was complaining that VMS did not make use
> of the modes in a "good enough" way from a security point of view.
>

You are both correct.

Johnny is right in that I am saying the VMS usage of these extra modes
is horrible and doesn't really add anything from a security point of
view.

Dan is right in that I am saying that even if VMS had used these extra
modes properly for isolation purposes, the design would still not be as
good or as flexible as a purely software microkernel design.

I don't recall seeing anything post-VAX that attempts to do in hardware
what VAX did. All the current high-integrity stuff seems to be based on
microkernel designs (for example, the work done on seL4).

The closest I see anyone doing anything in hardware is the LPAR stuff
that z/Architecture implements, and I see that as isolation _between_
systems instead of the isolation _within_ a system that microkernel
designs provide.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: The main stream memory of DEC.

<87419da5-7d52-4934-8ab4-720fea7279b8n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30500&group=comp.os.vms#30500

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:622a:1aa2:b0:417:d657:9fd7 with SMTP id s34-20020a05622a1aa200b00417d6579fd7mr390980qtc.9.1697138894309;
Thu, 12 Oct 2023 12:28:14 -0700 (PDT)
X-Received: by 2002:a05:6808:18a3:b0:3ae:2710:cf87 with SMTP id
bi35-20020a05680818a300b003ae2710cf87mr12780010oib.7.1697138893932; Thu, 12
Oct 2023 12:28:13 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 12 Oct 2023 12:28:13 -0700 (PDT)
In-Reply-To: <ug9dsd$2l4dl$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=2600:1700:46b0:abc0:1416:51e9:f91c:e4e2;
posting-account=OGFVHQoAAAASiNAamRQec8BtkuXxYFnQ
NNTP-Posting-Host: 2600:1700:46b0:abc0:1416:51e9:f91c:e4e2
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<ug3oml$2oe$2@news.misty.com> <ug42d3$18sge$1@dont-email.me>
<ug4hod$2h6$1@news.misty.com> <ug94hn$s3r$3@reader2.panix.com>
<ug983m$p7b$1@news.misty.com> <ug9dsd$2l4dl$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <87419da5-7d52-4934-8ab4-720fea7279b8n@googlegroups.com>
Subject: Re: The main stream memory of DEC.
From: jake.ha...@gmail.com (Jake Hamby (Solid State Jake))
Injection-Date: Thu, 12 Oct 2023 19:28:14 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 3938
 by: Jake Hamby (Solid St - Thu, 12 Oct 2023 19:28 UTC

On Thursday, October 12, 2023 at 11:28:33 AM UTC-7, Simon Clubley wrote:
>
> I don't recall seeing anything post-VAX that attempts to do in hardware
> what VAX did. All the current high-integrity stuff seems to be based on
> microkernel designs (for example, the work done on seL4).
>
> The closest I see anyone doing anything in hardware is the LPAR stuff
> that z/Architecture implements, and I see that as isolation _between_
> systems instead of the isolation _within_ a system that microkernel
> designs provide.

z/OS leverages one unique feature of S/390 that I believe predates VAX, storage protect keys:

https://www.ibm.com/docs/en/zos-basic-skills?topic=storage-what-is-protection

https://www.ibm.com/docs/en/zos/3.1.0?topic=authorization-selecting-storage-key

In addition to paged virtual memory, there's an additional storage key check. Each 4K memory page can have a key from 0 to 15, and programs have to have a matching storage key, or key 0, to access the page. User code runs in key 8, and uses MMU page mappings to protect user address spaces from other users (like UNIX/VMS/Windows).

I believe this feature gets disabled on any CPU cores that users license from IBM to run Linux (which costs less than a fully-functional CPU core) because Linux doesn't have any idea what to do with storage protect keys anyway ("storage" always refers to RAM in z/OS, while "DASD" is used for on-disk storage) and it stops IBM OSs from running.

The concept seems similar to VAX's 4 rings in terms of protecting access to shared memory regions. Shared memory between code running in different privilege rings appears to be a weak spot for VMS privilege escalation vulnerabilities, based on the ones that have been discovered.

Mainframes can be extremely secure when properly configured, but the permission model (and everything else about z/OS) is so strange that if you aren't an expert, you could easily write vulnerable code or misconfigure the system if you don't understand how everything fits together.

The difference between the two approaches seems to be that with z/OS, the sysadmin and the OS internally can allocate one of 16 keys required to access each 4K page, while VAX/VMS has four sets of permission bits for each page, one for each mode. Either way, it's an extra layer of security limiting who can access a memory region on a per-process basis.

Regards,
Jake Hamby

Re: The main stream memory of DEC.

<ug9i1c$2lvsn$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30502&group=comp.os.vms#30502

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Thu, 12 Oct 2023 15:39:27 -0400
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <ug9i1c$2lvsn$1@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<ug3oml$2oe$2@news.misty.com> <ug42d3$18sge$1@dont-email.me>
<ug4hod$2h6$1@news.misty.com> <ug94hn$s3r$3@reader2.panix.com>
<ug983m$p7b$1@news.misty.com> <ug9dsd$2l4dl$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 12 Oct 2023 19:39:24 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="218ac2e57fe29ee6512eb4178de0c42e";
logging-data="2817943"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/40UUWv2bPeP4WMUsY7w8lrHQ+irFyg54="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:nRwqenkvLgfW9wcyVMAfRK1kEhA=
In-Reply-To: <ug9dsd$2l4dl$1@dont-email.me>
Content-Language: en-US
 by: Arne Vajhøj - Thu, 12 Oct 2023 19:39 UTC

On 10/12/2023 2:28 PM, Simon Clubley wrote:
> The closest I see anyone doing anything in hardware is the LPAR stuff
> that z/Architecture implements, and I see that as isolation _between_
> systems instead of the isolation _within_ a system that microkernel
> designs provide.

Totally different thing.

The equivalent from the VMS world to LPAR must be Galaxy (even though
I suspect there are differences).

Arne

Re: The main stream memory of DEC.

<ug9i6c$2lvsn$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30503&group=comp.os.vms#30503

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Thu, 12 Oct 2023 15:42:06 -0400
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <ug9i6c$2lvsn$2@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<ug3oml$2oe$2@news.misty.com> <ug42d3$18sge$1@dont-email.me>
<ug4hod$2h6$1@news.misty.com> <ug94hn$s3r$3@reader2.panix.com>
<ug983m$p7b$1@news.misty.com> <ug9dsd$2l4dl$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 12 Oct 2023 19:42:04 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="218ac2e57fe29ee6512eb4178de0c42e";
logging-data="2817943"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+nzVRJtHSHvbdD7h3R7Zub7GAPoySym0M="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:hOqI0mFEoJPoQ7WJtrs3e5y1ExA=
In-Reply-To: <ug9dsd$2l4dl$1@dont-email.me>
Content-Language: en-US
 by: Arne Vajhøj - Thu, 12 Oct 2023 19:42 UTC

On 10/12/2023 2:28 PM, Simon Clubley wrote:
> I don't recall seeing anything post-VAX that attempts to do in hardware
> what VAX did. All the current high-integrity stuff seems to be based on
> microkernel designs (for example, the work done on seL4).

Moderns CPU's has become crazy fast but are also pretty
boring/uniform in design.

Even though if understand it correct then x86 did have 4 modes
and it was first with x86-64 they went for 2 modes.

Arne

Re: The main stream memory of DEC.

<be8e9bdc-607a-47c6-bfda-dba030c4439fn@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30505&group=comp.os.vms#30505

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a0c:f6cc:0:b0:66c:fef0:ce80 with SMTP id d12-20020a0cf6cc000000b0066cfef0ce80mr145496qvo.4.1697140468056;
Thu, 12 Oct 2023 12:54:28 -0700 (PDT)
X-Received: by 2002:a9d:6357:0:b0:6bb:1c29:f0fa with SMTP id
y23-20020a9d6357000000b006bb1c29f0famr7961526otk.5.1697140467736; Thu, 12 Oct
2023 12:54:27 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 12 Oct 2023 12:54:27 -0700 (PDT)
In-Reply-To: <87419da5-7d52-4934-8ab4-720fea7279b8n@googlegroups.com>
Injection-Info: google-groups.googlegroups.com; posting-host=2601:602:9700:4689:610d:241a:9217:6192;
posting-account=gLDX1AkAAAA26M5HM-O3sVMAXdxK9FPA
NNTP-Posting-Host: 2601:602:9700:4689:610d:241a:9217:6192
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<ug3oml$2oe$2@news.misty.com> <ug42d3$18sge$1@dont-email.me>
<ug4hod$2h6$1@news.misty.com> <ug94hn$s3r$3@reader2.panix.com>
<ug983m$p7b$1@news.misty.com> <ug9dsd$2l4dl$1@dont-email.me> <87419da5-7d52-4934-8ab4-720fea7279b8n@googlegroups.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <be8e9bdc-607a-47c6-bfda-dba030c4439fn@googlegroups.com>
Subject: Re: The main stream memory of DEC.
From: gah...@u.washington.edu (gah4)
Injection-Date: Thu, 12 Oct 2023 19:54:28 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 4144
 by: gah4 - Thu, 12 Oct 2023 19:54 UTC

On Thursday, October 12, 2023 at 12:28:15 PM UTC-7, Jake Hamby (Solid State Jake) wrote:

(snip)

> z/OS leverages one unique feature of S/390 that I believe predates VAX, storage protect keys:

> https://www.ibm.com/docs/en/zos-basic-skills?topic=storage-what-is-protection
> https://www.ibm.com/docs/en/zos/3.1.0?topic=authorization-selecting-storage-key

Protect keys go back to S/360 and OS/360. Well, they were optional on the lower
models of S/360.

OS/360 runs in a single real address space. Storage keys are the only protection
against reading or writing someone else's memory space.

OS/360 MVT could have at most 15 different user programs running at once.
Mostly with memory sizes, that wasn't much of a problem.

For S/360, and much of S/370 years, keys are on 2K blocks.

Sometime later, the "4K key feature(sic)" was added.

By the way, the first use of IC memory in a commercially available
computer is the key storage on the 360/91. 16 bit SRAM chips.

> In addition to paged virtual memory, there's an additional storage key check.
> Each 4K memory page can have a key from 0 to 15, and programs have to have a
> matching storage key, or key 0, to access the page. User code runs in key 8, and uses
> MMU page mappings to protect user address spaces from other users
> (like UNIX/VMS/Windows).

Virtual storage and page (and segment) protection allow the system
to block access other than protection keys. So, yes, at least for the OS
that I know, key 8 is used for usual user jobs. Other keys for other parts
of the system.

OS/VS2 1.x (SVS) was based on MVT, which ran user jobs in one big
virtual address space. I suspect for that, the keys were still used.

With MVS, user jobs had their own address space, though all of the OS
is still addressable. Much of the system depends on users executing
things like access methods in system space, but user readable.

> I believe this feature gets disabled on any CPU cores that users license from IBM to run Linux (which costs less than a fully-functional CPU core) because Linux doesn't have any idea what to do with storage protect keys anyway ("storage" always refers to RAM in z/OS, while "DASD" is used for on-disk storage) and it stops IBM OSs from running.

Interesting way to do it.

> The concept seems similar to VAX's 4 rings in terms of protecting access to shared memory regions. Shared memory between code running in different privilege rings appears to be a weak spot for VMS privilege escalation vulnerabilities, based on the ones that have been discovered.

(snip)

Re: The main stream memory of DEC.

<ug9k9v$7id$1@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30507&group=comp.os.vms#30507

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Thu, 12 Oct 2023 20:18:07 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <ug9k9v$7id$1@reader2.panix.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <ug94hn$s3r$3@reader2.panix.com> <ug983m$p7b$1@news.misty.com> <ug9dsd$2l4dl$1@dont-email.me>
Injection-Date: Thu, 12 Oct 2023 20:18:07 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="7757"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Thu, 12 Oct 2023 20:18 UTC

In article <ug9dsd$2l4dl$1@dont-email.me>,
Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
>On 2023-10-12, Johnny Billquist <bqt@softjar.se> wrote:
>> On 2023-10-12 17:49, Dan Cross wrote:
>>> In article <ug4hod$2h6$1@news.misty.com>,
>>> Johnny Billquist <bqt@softjar.se> wrote:
>>>> On 2023-10-10 19:41, Simon Clubley wrote:
>>>>> Likewise, if the various modes had been used properly, you could have had
>>>>> a version of VMS with chunks of it properly isolated from each other.
>>>>
>>>> I don't think the processor modes is really usable for that isloation of
>>>> thing in the first place, so I think it's a false comparison.
>>>> Don't try to get things used for something they are not meant for, or
>>>> fit for...
>>>
>>> I got the impression that's roughly what Simon was saying. The
>>> architectural privilege levels on the VAX weren't as useful as
>>> initially thought.
>>
>> I got the impression that he was complaining that VMS did not make use
>> of the modes in a "good enough" way from a security point of view.
>
>You are both correct.
>
>Johnny is right in that I am saying the VMS usage of these extra modes
>is horrible and doesn't really add anything from a security point of
>view.
>
>Dan is right in that I am saying that even if VMS had used these extra
>modes properly for isolation purposes, the design would still not be as
>good or as flexible as a purely software microkernel design.

Ok, good to understand.

>I don't recall seeing anything post-VAX that attempts to do in hardware
>what VAX did. All the current high-integrity stuff seems to be based on
>microkernel designs (for example, the work done on seL4).
>
>The closest I see anyone doing anything in hardware is the LPAR stuff
>that z/Architecture implements, and I see that as isolation _between_
>systems instead of the isolation _within_ a system that microkernel
>designs provide.

I see a lot of work being done with virtualization that amounts
to essentially an extra ring; even RISC-V has 3 modes. Perhaps
that is actually what is desired, though; a different ring of
protection, but one that actually means something.

- Dan C.

Re: The main stream memory of DEC.

<ug9kfq$7id$2@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30508&group=comp.os.vms#30508

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Thu, 12 Oct 2023 20:21:14 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <ug9kfq$7id$2@reader2.panix.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <ug983m$p7b$1@news.misty.com> <ug9dsd$2l4dl$1@dont-email.me> <ug9i6c$2lvsn$2@dont-email.me>
Injection-Date: Thu, 12 Oct 2023 20:21:14 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="7757"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Thu, 12 Oct 2023 20:21 UTC

In article <ug9i6c$2lvsn$2@dont-email.me>,
Arne Vajhøj <arne@vajhoej.dk> wrote:
>On 10/12/2023 2:28 PM, Simon Clubley wrote:
>> I don't recall seeing anything post-VAX that attempts to do in hardware
>> what VAX did. All the current high-integrity stuff seems to be based on
>> microkernel designs (for example, the work done on seL4).
>
>Moderns CPU's has become crazy fast but are also pretty
>boring/uniform in design.
>
>Even though if understand it correct then x86 did have 4 modes
>and it was first with x86-64 they went for 2 modes.

x86_64 still has 4 rings; two of them just aren't meaningfully
useful. Come to think of it, that was mostly true of x86, as
well.

- Dan C.

Re: The main stream memory of DEC.

<fac73ab2-29cf-4751-8fd7-bed3c80f6988n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30512&group=comp.os.vms#30512

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a37:e309:0:b0:774:20c6:7c30 with SMTP id y9-20020a37e309000000b0077420c67c30mr345000qki.12.1697146455251;
Thu, 12 Oct 2023 14:34:15 -0700 (PDT)
X-Received: by 2002:a05:6830:1357:b0:6bc:f328:696a with SMTP id
r23-20020a056830135700b006bcf328696amr7754237otq.0.1697146455072; Thu, 12 Oct
2023 14:34:15 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 12 Oct 2023 14:34:14 -0700 (PDT)
In-Reply-To: <ug9k9v$7id$1@reader2.panix.com>
Injection-Info: google-groups.googlegroups.com; posting-host=2600:1700:46b0:abc0:1416:51e9:f91c:e4e2;
posting-account=OGFVHQoAAAASiNAamRQec8BtkuXxYFnQ
NNTP-Posting-Host: 2600:1700:46b0:abc0:1416:51e9:f91c:e4e2
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<ug94hn$s3r$3@reader2.panix.com> <ug983m$p7b$1@news.misty.com>
<ug9dsd$2l4dl$1@dont-email.me> <ug9k9v$7id$1@reader2.panix.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <fac73ab2-29cf-4751-8fd7-bed3c80f6988n@googlegroups.com>
Subject: Re: The main stream memory of DEC.
From: jake.ha...@gmail.com (Jake Hamby (Solid State Jake))
Injection-Date: Thu, 12 Oct 2023 21:34:15 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 2007
 by: Jake Hamby (Solid St - Thu, 12 Oct 2023 21:34 UTC

On Thursday, October 12, 2023 at 1:18:11 PM UTC-7, Dan Cross wrote:
>
> I see a lot of work being done with virtualization that amounts
> to essentially an extra ring; even RISC-V has 3 modes. Perhaps
> that is actually what is desired, though; a different ring of
> protection, but one that actually means something.

I know AArch64 has an extra "secure" ring above the hypervisor ring:

EL0 = apps
EL1 = guest OS
EL2 = hypervisor
EL3 = secure monitor/firmware

I also know that POWER9 added a very similar feature called "ultravisor" mode.

https://docs.kernel.org/powerpc/ultravisor.html

Regards,
Jake Hamby

Re: The main stream memory of DEC.

<7b196588-cd3b-4ee3-812c-27227c7df15dn@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30514&group=comp.os.vms#30514

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:ad4:4e43:0:b0:65c:fede:2373 with SMTP id eb3-20020ad44e43000000b0065cfede2373mr390333qvb.10.1697150010818;
Thu, 12 Oct 2023 15:33:30 -0700 (PDT)
X-Received: by 2002:a05:6870:610a:b0:1e9:9340:2bb9 with SMTP id
s10-20020a056870610a00b001e993402bb9mr2531007oae.4.1697150010642; Thu, 12 Oct
2023 15:33:30 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 12 Oct 2023 15:33:30 -0700 (PDT)
In-Reply-To: <ug9kfq$7id$2@reader2.panix.com>
Injection-Info: google-groups.googlegroups.com; posting-host=2601:602:9700:4689:610d:241a:9217:6192;
posting-account=gLDX1AkAAAA26M5HM-O3sVMAXdxK9FPA
NNTP-Posting-Host: 2601:602:9700:4689:610d:241a:9217:6192
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com>
<ug983m$p7b$1@news.misty.com> <ug9dsd$2l4dl$1@dont-email.me>
<ug9i6c$2lvsn$2@dont-email.me> <ug9kfq$7id$2@reader2.panix.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <7b196588-cd3b-4ee3-812c-27227c7df15dn@googlegroups.com>
Subject: Re: The main stream memory of DEC.
From: gah...@u.washington.edu (gah4)
Injection-Date: Thu, 12 Oct 2023 22:33:30 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 1739
 by: gah4 - Thu, 12 Oct 2023 22:33 UTC

On Thursday, October 12, 2023 at 1:21:17 PM UTC-7, Dan Cross wrote:

(snip)

> x86_64 still has 4 rings; two of them just aren't meaningfully
> useful. Come to think of it, that was mostly true of x86, as
> well.
I remember that OS/2 used ring 2 to allow some programs the
ability to do I/O directly to I/O devices. I don't remember now
how much control over which I/O devices it had.

Re: The main stream memory of DEC.

<ugbdjh$364ml$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30521&group=comp.os.vms#30521

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Fri, 13 Oct 2023 12:36:02 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 28
Message-ID: <ugbdjh$364ml$2@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <ug94hn$s3r$3@reader2.panix.com> <ug983m$p7b$1@news.misty.com> <ug9dsd$2l4dl$1@dont-email.me> <ug9k9v$7id$1@reader2.panix.com> <fac73ab2-29cf-4751-8fd7-bed3c80f6988n@googlegroups.com>
Injection-Date: Fri, 13 Oct 2023 12:36:02 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="9b39b6d83a643fee6311203be98a14ce";
logging-data="3347157"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1881/A2Bi91vgCeb0wyrWv4CRGx4PUxNPo="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:7WWLV1Ypk9wUCPPclK6Skq40o2s=
 by: Simon Clubley - Fri, 13 Oct 2023 12:36 UTC

On 2023-10-12, Jake Hamby (Solid State Jake) <jake.hamby@gmail.com> wrote:
> On Thursday, October 12, 2023 at 1:18:11?PM UTC-7, Dan Cross wrote:
>>
>> I see a lot of work being done with virtualization that amounts
>> to essentially an extra ring; even RISC-V has 3 modes. Perhaps
>> that is actually what is desired, though; a different ring of
>> protection, but one that actually means something.
>
> I know AArch64 has an extra "secure" ring above the hypervisor ring:
>
> EL0 = apps
> EL1 = guest OS
> EL2 = hypervisor
> EL3 = secure monitor/firmware
>
> I also know that POWER9 added a very similar feature called "ultravisor" mode.
>
> https://docs.kernel.org/powerpc/ultravisor.html
>

However these do nothing to help with isolation of functionality _within_
an OS instance, only with isolation _between_ OS instances.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: The main stream memory of DEC.

<ugbhfv$oae$1@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30528&group=comp.os.vms#30528

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Fri, 13 Oct 2023 13:42:23 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <ugbhfv$oae$1@reader2.panix.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <ug9i6c$2lvsn$2@dont-email.me> <ug9kfq$7id$2@reader2.panix.com> <7b196588-cd3b-4ee3-812c-27227c7df15dn@googlegroups.com>
Injection-Date: Fri, 13 Oct 2023 13:42:23 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="24910"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Fri, 13 Oct 2023 13:42 UTC

In article <7b196588-cd3b-4ee3-812c-27227c7df15dn@googlegroups.com>,
gah4 <gah4@u.washington.edu> wrote:
>On Thursday, October 12, 2023 at 1:21:17 PM UTC-7, Dan Cross wrote:
>
>(snip)
>
>> x86_64 still has 4 rings; two of them just aren't meaningfully
>> useful. Come to think of it, that was mostly true of x86, as
>> well.
>
>I remember that OS/2 used ring 2 to allow some programs the
>ability to do I/O directly to I/O devices. I don't remember now
>how much control over which I/O devices it had.

Yeah. OS/2 2.x was about the only consumer of the ring
mechanism that I'm aware of. By the time the 386 came out with
paging, it was basically useless (pages have a U/S bit, not a
pair and segmentation was falling out of favor).

- Dan C.

Re: The main stream memory of DEC.

<ugbi5d$of1$1@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30529&group=comp.os.vms#30529

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Fri, 13 Oct 2023 13:53:49 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <ugbi5d$of1$1@reader2.panix.com>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <ug9k9v$7id$1@reader2.panix.com> <fac73ab2-29cf-4751-8fd7-bed3c80f6988n@googlegroups.com> <ugbdjh$364ml$2@dont-email.me>
Injection-Date: Fri, 13 Oct 2023 13:53:49 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="25057"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Fri, 13 Oct 2023 13:53 UTC

In article <ugbdjh$364ml$2@dont-email.me>,
Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
>On 2023-10-12, Jake Hamby (Solid State Jake) <jake.hamby@gmail.com> wrote:
>> On Thursday, October 12, 2023 at 1:18:11?PM UTC-7, Dan Cross wrote:
>>>
>>> I see a lot of work being done with virtualization that amounts
>>> to essentially an extra ring; even RISC-V has 3 modes. Perhaps
>>> that is actually what is desired, though; a different ring of
>>> protection, but one that actually means something.
>>
>> I know AArch64 has an extra "secure" ring above the hypervisor ring:
>>
>> EL0 = apps
>> EL1 = guest OS
>> EL2 = hypervisor
>> EL3 = secure monitor/firmware
>>
>> I also know that POWER9 added a very similar feature called "ultravisor" mode.
>>
>> https://docs.kernel.org/powerpc/ultravisor.html
>
>However these do nothing to help with isolation of functionality _within_
>an OS instance, only with isolation _between_ OS instances.

Not quite true; there's been interesting research in running
things like device drivers in very lightweight VMs within the
overall context of a traditional kernel to provide a security
boundary based on microkernel-like principles. E.g.,
https://www.usenix.org/conference/atc19/presentation/narayanan

On a research project a few years ago, I proposed that we run
the ACPICA AML interpreter in a lightweight VM to isolate it
from the rest of the kernel; a colleague took the idea and
made it run in userspace which was functionally equivalent.
Basically, an ACPI event translated to a change to a file
descriptor, and a thread in a process was blocked on reading
from that FD: thus, we reflected the event into userspace for
handling; we ran the flow, and wrote the results back into the
kernel.

The ring architecture for isolating components of a vertically
layered OS (instead of horizontally disjoint, as in a ukernel)
get reinvented over and over again.

- Dan C.

Re: The main stream memory of DEC.

<ugc3ep$3bm8p$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=30532&group=comp.os.vms#30532

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: The main stream memory of DEC.
Date: Fri, 13 Oct 2023 18:48:57 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 16
Message-ID: <ugc3ep$3bm8p$2@dont-email.me>
References: <371cf2e8-9ca1-4571-964e-e70642a75943n@googlegroups.com> <ug9k9v$7id$1@reader2.panix.com> <fac73ab2-29cf-4751-8fd7-bed3c80f6988n@googlegroups.com> <ugbdjh$364ml$2@dont-email.me> <ugbi5d$of1$1@reader2.panix.com>
Injection-Date: Fri, 13 Oct 2023 18:48:57 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="9b39b6d83a643fee6311203be98a14ce";
logging-data="3528985"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/VzBXV985qk8fVfWy1wZpfa1WFCd8ofC8="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:uH/CY+NbsNe3yIDG2kawFJHxPso=
 by: Simon Clubley - Fri, 13 Oct 2023 18:48 UTC

On 2023-10-13, Dan Cross <cross@spitfire.i.gajendra.net> wrote:
>
> Not quite true; there's been interesting research in running
> things like device drivers in very lightweight VMs within the
> overall context of a traditional kernel to provide a security
> boundary based on microkernel-like principles. E.g.,
> https://www.usenix.org/conference/atc19/presentation/narayanan
>

Thank you. I was not aware of that work.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Pages:12
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor