Re: [9fans] problems with tracing 9vx on os x (was: Re: ghostscript not finding LucidaSans

2010-06-29 Thread yy
2010/6/28 Pietro Gagliardi :
> First I found a slight building problem on Mac OS X 10.5.8: ethertap.c needs
> to be changed to include  before  and to add a
> defined(__MACOSX__) or similar to the #elf defined(__FreeBSD__) so opentap()
> can be defined.
>
> However once this version was built, I got the following right after seeing
> the memory usage statistic line:


ethertap is part of the modifications I'm doing to 9vx as part of my
gsoc project. Since I don't have any machine running OS X, the darwin
version is far behind the linux one. I compile 9vx in FreeBSD from
time to time, but running it is another history. Eventually I'd like
to do something about this. For the time being, you can fill an issue
at http://bitbucket.org/yiyus/vx32/ or, even better, send me a patch.

By the way, you should be able to deactivate compilation of the tap
(or pcap) ether device with the variable PLAN9TAP (PLAN9PCAP) in
Makefrag.

-- 
- yiyus || JGL . 4l77.com



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Akshat Kumar
On Mon, Jun 28, 2010 at 3:32 PM, ron minnich  wrote:
> not saying it is "good" or "bad", just wanted people to see it
>
>
> https://www.signup4.net/UPLOAD/STRA10A/DARP31E/CRASH%20Proposer%20Day%20v2.pdf

Perhaps I am oversimplifying, but the proposed resolution seems to be:

Abstract MINIX.


Best,
ak



Re: [9fans] offered without comment or judgement

2010-06-29 Thread hiro
> not saying it is "good" or "bad", just wanted people to see it

So is it now "bad" to say what you think?

If you live in a hostile environment, with rules too complex to
understand, it's clever to be also unpredictable.
Computer networks are different. Discrete electronics haven't been
invented to create entropy...



Re: [9fans] offered without comment or judgement

2010-06-29 Thread erik quanstrom
> Computer networks are different. Discrete electronics haven't been
> invented to create entropy...

my air conditioner begs to differ!

- erik



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Gabriel Díaz
hello


I do like their aim, let's see what they end with :), if that's disclosed 
someday. . . :), 
also seems they will end with something too complex to be of general usage

slds.

gabi



- Original Message 
From: ron minnich 
To: Fans of the OS Plan 9 from Bell Labs <9fans@9fans.net>
Sent: Tue, June 29, 2010 12:32:29 AM
Subject: [9fans] offered without comment or judgement

not saying it is "good" or "bad", just wanted people to see it


https://www.signup4.net/UPLOAD/STRA10A/DARP31E/CRASH%20Proposer%20Day%20v2.pdf


ron



[9fans] interesting pci configuration

2010-06-29 Thread erik quanstrom
i hadn't seen bussno > 15 before.  might as well
go for broke:

[...]
2.4.0:  net  02.00.00 14e4/16aa   7 0:f804 33554432 1: 16
64.15.0:brg  06.04.00 1166/0140  11
64.16.0:brg  06.04.00 1166/0142   7
64.17.0:brg  06.04.00 1166/0144  11
64.18.0:brg  06.04.00 1166/0142  11
64.19.0:brg  06.04.00 1166/0144  11
65.0.0: net  02.00.00 8086/10d9  11 0:fdce 131072 1:fdc0 524288 
2:4001 32
65.0.1: net  02.00.00 8086/10d9  11 0:fdbe 131072 1:fdb0 524288 
2:4021 32
72.0.0: net  02.00.00 8086/10d9   7 0:fdee 131072 1:fde0 524288 
2:5001 32
72.0.1: net  02.00.00 8086/10d9  11 0:fdde 131072 1:fdd0 524288 
2:5021 32
79.0.0: brg  06.04.00 1166/0103  96
80.4.0: brg  06.04.00 1166/0104 255
80.8.0: disk 01.04.00 103c/3238  11 0:fdf80004 524288 1: 16 2:6001 
256 3:fdf7 32768

- erik



Re: [9fans] problems with tracing 9vx on os x (was: Re: ghostscript not finding LucidaSans

2010-06-29 Thread Pietro Gagliardi

On Jun 29, 2010, at 4:03 AM, yy wrote:

By the way, you should be able to deactivate compilation of the tap
(or pcap) ether device with the variable PLAN9TAP (PLAN9PCAP) in
Makefrag.


Okay, I did so but I still get the crash as before. Here's a gdb  
backtrace:


#0  0x919366fa in select$DARWIN_EXTSN ()
#1  0xfc75 in microdelay (x=100) at 9vx/time.c:389
#2  0xdb9c in dt_panic (fmt=0xbd5cc "user fault: signo=%d addr=%p  
[useraddr=%p] read=%d eip=%p esp=%p") at 9vx/stub.c:536
#3  0xa886 in sigsegv (signo=10, info=0x5e1fc0, v=0x5e1d20) at 9vx/ 
main.c:844
#4  0x00013b5c in wrapper (siginfo=0x5e1fc0, mcontext=0x5e1d60,  
handler=0xa769 ) at 9vx/osx/signal.c:85

#5  0x000b6e09 in xscan (p=0x63f3a0) at libvx32/emu.c:247
#6  0x000b9bda in xlate (vxp=0x63f3a0) at libvx32/emu.c:1695
#7  0x000b9e7e in vxproc_run (vxp=0x63f3a0) at libvx32/emu.c:1841
#8  0x0001373f in touser (initsp=0xfa4) at 9vx/vx32.c:251
#9  0xa762 in init0 () at 9vx/main.c:742

I'm not sure what this information would give you, but...



Re: [9fans] offered without comment or judgement

2010-06-29 Thread hiro
To me it seems that their aim is complexity.

On 6/29/10, Gabriel Díaz  wrote:
> hello
>
>
> I do like their aim, let's see what they end with :), if that's disclosed
> someday. . . :),
> also seems they will end with something too complex to be of general usage
>
> slds.
>
> gabi
>
>
>
> - Original Message 
> From: ron minnich 
> To: Fans of the OS Plan 9 from Bell Labs <9fans@9fans.net>
> Sent: Tue, June 29, 2010 12:32:29 AM
> Subject: [9fans] offered without comment or judgement
>
> not saying it is "good" or "bad", just wanted people to see it
>
>
> https://www.signup4.net/UPLOAD/STRA10A/DARP31E/CRASH%20Proposer%20Day%20v2.pdf
>
>
> ron
>
>



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Wes Kussmaul

Stanley Lieber wrote:
Anywhere legitimate identification is used, legitimate identification 
can be purchased.


There are imperfect but very good ways to protect against that 
vulnerability. They vary with the needs (and budgets) of relying parties.


--
Learn about The Authenticity Economy at 


http://video.google.com/videoplay?docid=-1419344994607129684&hl=en#




Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Rob Pike
On Mon, Jun 28, 2010 at 3:03 PM, Eric Van Hensbergen  wrote:
> On Sat, Jun 26, 2010 at 4:26 AM,   wrote:
>>> but I can dig
>>> them up, clean them up, and share them,
>>
>> My particular concern is to encourage convergence towards a single
>> source distribution rather than divergence as seems to have been the
>> case so far with Plan 9 native, Inferno, p9p and now Go. What I have
>> chosen to do, ill-advised as it may be, is to set up a mercurial
>> repository to re-distribute hacked Go sources that mostly contain
>> harmless changes that make it possible to compile the Go sources and
>> specifically the development toolchain with the Plan 9 toolchain.  I'm
>> presently trying to bring the work I did last year into this
>> repository and at the same time keep track of the Go release.
>>
>
> I've had a composite repo of previous attempts (well, Sape's previous
> attempt) at doing this (for some time) at:
> http://code.google.com/p/go-plan9/
>
> I'm happy to add anyone to the committer/admin list, although my
> preference is to keep the main branch in sync with go and have folks
> attempts at conversion in sub-branches.  You are of course welcome to
> maintain your own repo with your own effort, I just figured if
> everyone had a common place to see what approaches people were using
> we might get there faster
>
>       -eric

Is the porting process active?

-rob



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Devon H. O'Dell
2010/6/29 Wes Kussmaul :
> Stanley Lieber wrote:
>>
>> Anywhere legitimate identification is used, legitimate identification can
>> be purchased.
>
> There are imperfect but very good ways to protect against that
> vulnerability. They vary with the needs (and budgets) of relying parties.

I'm pretty sure you can't solve the problem. At the end of the day, it
boils down to client-side security and what a person is willing to
defend with their life. It's perfectly feasible to assume that
identity information in a PKI world can be coerced and stolen as
easily as physical identity information such as drivers licenses and
social security cards. The security always breaks down at the personal
level, and most private individuals aren't willing to die to protect
this information.

But you can do at least as good as these forms of ID. PKI requires
knowledge of some sort of passkey. (I just worry about identification
for people who are not smart enough to pick a good key. Which,
unfortunately, is also most people.

--dho



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Devon H. O'Dell
2010/6/29 Rob Pike :
> On Mon, Jun 28, 2010 at 3:03 PM, Eric Van Hensbergen  wrote:
>> On Sat, Jun 26, 2010 at 4:26 AM,   wrote:
 but I can dig
 them up, clean them up, and share them,
>>>
>>> My particular concern is to encourage convergence towards a single
>>> source distribution rather than divergence as seems to have been the
>>> case so far with Plan 9 native, Inferno, p9p and now Go. What I have
>>> chosen to do, ill-advised as it may be, is to set up a mercurial
>>> repository to re-distribute hacked Go sources that mostly contain
>>> harmless changes that make it possible to compile the Go sources and
>>> specifically the development toolchain with the Plan 9 toolchain.  I'm
>>> presently trying to bring the work I did last year into this
>>> repository and at the same time keep track of the Go release.
>>>
>>
>> I've had a composite repo of previous attempts (well, Sape's previous
>> attempt) at doing this (for some time) at:
>> http://code.google.com/p/go-plan9/
>>
>> I'm happy to add anyone to the committer/admin list, although my
>> preference is to keep the main branch in sync with go and have folks
>> attempts at conversion in sub-branches.  You are of course welcome to
>> maintain your own repo with your own effort, I just figured if
>> everyone had a common place to see what approaches people were using
>> we might get there faster
>>
>>       -eric
>
> Is the porting process active?

I haven't had time, but have made promises. I'll start tonight.

--dho

> -rob
>
>



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Francisco J Ballesteros
Which things are yet to be done to get the port done?



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Francisco J Ballesteros
FTS, I'm interesting in getting Go here because I'm going to write
the i.e. window system (successor of o/live, o/mero, ...) also in go, to run
at least the viewer native on unix systems. The C version is still cooking.

On Tue, Jun 29, 2010 at 7:36 PM, Francisco J Ballesteros  wrote:
> Which things are yet to be done to get the port done?
>



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Jack Johnson
On Tue, Jun 29, 2010 at 9:48 AM, Francisco J Ballesteros  wrote:
> FTS, I'm interesting in getting Go here because I'm going to write
> the i.e. window system (successor of o/live, o/mero, ...) also in go, to run
> at least the viewer native on unix systems. The C version is still cooking.

Is there an overview/paper/etc. for i.e?



[9fans] i.e. (was go toolchain)

2010-06-29 Thread Francisco J Ballesteros
no yet.
I'll post here when there's something to see.

Sorry to polute the go thread with this, hence the new subject.

On Tue, Jun 29, 2010 at 8:02 PM, Jack Johnson  wrote:
> On Tue, Jun 29, 2010 at 9:48 AM, Francisco J Ballesteros  
> wrote:
>> FTS, I'm interesting in getting Go here because I'm going to write
>> the i.e. window system (successor of o/live, o/mero, ...) also in go, to run
>> at least the viewer native on unix systems. The C version is still cooking.
>
> Is there an overview/paper/etc. for i.e?
>
>



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Eric Van Hensbergen
>
> Is the porting process active?
>

It seems to be an opportunistic concurrent activity (which is why I
tried to create a central repo so we'd get some benefit from the
sparse multiple activities).  Most people were just waiting for Andrey
:)

There is some stuff that Forysth/Jmk have been looking at to allow for
the segment registers, but Russ had suggested workaround at USENIX
that I don't think anyone has had time to try yet.

So here's what my take on what needs to be done:

a) Simple logistics (makefile/script transformations, Sape's branch
has some of this, what the right way to do this in order to be
integrated back into the mainline go tree is an open question)
b) support or workaround for the segment register stuff
c) runtime support

People seem to be mostly getting hung up on (a), (b) is probably the
trickiest bit, and I think (c) is just a matter of sitting down and
getting it done.

I wonder if one way of avoiding (a) is just to rig to cross-compile
from Linux/MacOSX to Plan 9 and get (b) and (c) done first then work
back to (a), just because it seems like it would be more satisfying.

-eric



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Francisco J Ballesteros
Anyone (Russ?) can repeat here aprox. what the workaround for b was, for
those like me that didn't attend usenix?

On Tue, Jun 29, 2010 at 8:10 PM, Eric Van Hensbergen  wrote:
>>
>> Is the porting process active?
>>
>
> It seems to be an opportunistic concurrent activity (which is why I
> tried to create a central repo so we'd get some benefit from the
> sparse multiple activities).  Most people were just waiting for Andrey
> :)
>
> There is some stuff that Forysth/Jmk have been looking at to allow for
> the segment registers, but Russ had suggested workaround at USENIX
> that I don't think anyone has had time to try yet.
>
> So here's what my take on what needs to be done:
>
> a) Simple logistics (makefile/script transformations, Sape's branch
> has some of this, what the right way to do this in order to be
> integrated back into the mainline go tree is an open question)
> b) support or workaround for the segment register stuff
> c) runtime support
>
> People seem to be mostly getting hung up on (a), (b) is probably the
> trickiest bit, and I think (c) is just a matter of sitting down and
> getting it done.
>
> I wonder if one way of avoiding (a) is just to rig to cross-compile
> from Linux/MacOSX to Plan 9 and get (b) and (c) done first then work
> back to (a), just because it seems like it would be more satisfying.
>
>    -eric
>
>



Re: [9fans] i.e. (was go toolchain)

2010-06-29 Thread Francisco J Ballesteros
Now that I remember, we recently added some demos for
o/live & octopus to the http://lsub.org/ls/demos.html
page and we didn't post here to let 9fans know.

On Tue, Jun 29, 2010 at 8:04 PM, Francisco J Ballesteros  wrote:
> no yet.
> I'll post here when there's something to see.
>
> Sorry to polute the go thread with this, hence the new subject.
>
> On Tue, Jun 29, 2010 at 8:02 PM, Jack Johnson  wrote:
>> On Tue, Jun 29, 2010 at 9:48 AM, Francisco J Ballesteros  
>> wrote:
>>> FTS, I'm interesting in getting Go here because I'm going to write
>>> the i.e. window system (successor of o/live, o/mero, ...) also in go, to run
>>> at least the viewer native on unix systems. The C version is still cooking.
>>
>> Is there an overview/paper/etc. for i.e?
>>
>>
>



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread erik quanstrom
> a) Simple logistics (makefile/script transformations, Sape's branch
> has some of this, what the right way to do this in order to be
> integrated back into the mainline go tree is an open question)
[...]
> 
> I wonder if one way of avoiding (a) is just to rig to cross-compile
> from Linux/MacOSX to Plan 9 and get (b) and (c) done first then work
> back to (a), just because it seems like it would be more satisfying.

i found that (a) wasn't hard.  i got everything compiled
rather quickly, but something came up before i could get
going on the runtime.

- erik



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Steve Simon
> But you can do at least as good as these forms of ID. PKI requires
> knowledge of some sort of passkey. (I just worry about identification
> for people who are not smart enough to pick a good key. Which,
> unfortunately, is also most people.

My understanding is a passkey just needs sufficent entropy in order to be 
strong.

This can be a few characters drawn from a larger characterset - your password 
must
be no more than 16 chars and must contain upper and lower case numbers and 
punctuation.

Alternatively it could be a long string made up of a restricted character set - 
your
pass phrase can consist of any text characters but must not contain long 
repitations
and be of at least 200 characters long (say).

Thus a passphrase may be a quote from your favorite movie, a lyric or the like. 
This
can then be hashed into a higher entropy string (is this statement true?) used 
for
authentication.

I don't understand why modern security systems have an upper limit on 
passphrase length.

(waits for people who know better to tell him he is dumb).

-Steve



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Devon H. O'Dell
2010/6/29 Steve Simon :
>> But you can do at least as good as these forms of ID. PKI requires
>> knowledge of some sort of passkey. (I just worry about identification
>> for people who are not smart enough to pick a good key. Which,
>> unfortunately, is also most people.
>
> My understanding is a passkey just needs sufficent entropy in order to be 
> strong.

Sure. But you can still brute-force a 4-character passkey in a
reasonably short time.

> This can be a few characters drawn from a larger characterset - your password 
> must
> be no more than 16 chars and must contain upper and lower case numbers and 
> punctuation.
>
> Alternatively it could be a long string made up of a restricted character set 
> - your
> pass phrase can consist of any text characters but must not contain long 
> repitations
> and be of at least 200 characters long (say).

This works, but tends to be easy to get out of people or figure out
about people if you know a bit about them.

> Thus a passphrase may be a quote from your favorite movie, a lyric or the 
> like. This
> can then be hashed into a higher entropy string (is this statement true?) 
> used for
> authentication.
>
> I don't understand why modern security systems have an upper limit on 
> passphrase length.

Because people can't remember passwords, and companies don't like
employing full-time password changers.

--dho

> (waits for people who know better to tell him he is dumb).
>
> -Steve
>
>



Re: [9fans] offered without comment or judgement

2010-06-29 Thread erik quanstrom
> > I don't understand why modern security systems have an upper limit on 
> > passphrase length.
> 
> Because people can't remember passwords, and companies don't like
> employing full-time password changers.

i don't understand this comment.  the length of a password
is only vaguely related to memorability.  long english phrases
are easy to remember.  unfortunately, they are also easy to
harvest automaticly, so "four score and seven years ago" might
be a bad password.

- erik



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Devon H. O'Dell
2010/6/29 erik quanstrom :
>> > I don't understand why modern security systems have an upper limit on 
>> > passphrase length.
>>
>> Because people can't remember passwords, and companies don't like
>> employing full-time password changers.
>
> i don't understand this comment.  the length of a password
> is only vaguely related to memorability.  long english phrases
> are easy to remember.  unfortunately, they are also easy to
> harvest automaticly, so "four score and seven years ago" might
> be a bad password.

The problem is two-fold:

a) Lay-people are told by all their "computer guru" friends to choose
a password that is difficult to guess. Add numbers, capital letters,
punctuation. Most people don't think in this sort of context, and it
is difficult to remember.

b) People don't regard the idea as particularly important. I know many
people who routinely forget 6-8 character passwords.

The length of the phrase is actually in fact tied explicitly to
memory. The longer a string of characters, the more difficult it is to
remember. That's just fact. You have to practice to recite a
monologue; most people can't just read it once and commit it to
memory. In a similar fashion, most people must either write down a
password (which is dumb) or recite it for a fairly lengthy period of
time to remember it. Noting that places having an upper bound on
password length usually also have other password policies (like "must
contain at least one of each: capital letter, lowercase letter, and
number"). This either means things like initials and important dates
(birthdays, anniversaries, etc) or random gibberish. People are told
not to use something that can be socially engineered, so random
gibberish it is. And people at large just don't get it. It's easily
forgettable.

When talking about symmetric cryptography, "four score and seven years
ago" would probably be a great key. There is no convenient rainbow
table upon which to do a hash lookup. It's sufficiently expensive to
brute-force. The only thing that would give you any sort of advantage
is knowing it was an english phrase and trying all of them.
Misspellings, punctuation, capitalization, and the like can all throw
this off. So picking something directly out of song lyrics, quotes, or
a book of idioms is likely to be useless. Adding in a single period,
comma, or some creative capitalization is fantastic.

But we all know about passwords here.

--dho

> - erik
>
>



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Wes Kussmaul

Devon H. O'Dell wrote:

2010/6/29 Wes Kussmaul :
  

Stanley Lieber wrote:


Anywhere legitimate identification is used, legitimate identification can
be purchased.
  

There are imperfect but very good ways to protect against that
vulnerability. They vary with the needs (and budgets) of relying parties.



I'm pretty sure you can't solve the problem. At the end of the day, it
boils down to client-side security and what a person is willing to
defend with their life. It's perfectly feasible to assume that
identity information in a PKI world can be coerced and stolen as
easily as physical identity information such as drivers licenses and
social security cards. The security always breaks down at the personal
level, and most private individuals aren't willing to die to protect
this information.

But you can do at least as good as these forms of ID. PKI requires
knowledge of some sort of passkey. (I just worry about identification
for people who are not smart enough to pick a good key. Which,
unfortunately, is also most people


It's true, people give up their ATM card PINs at gunpoint. Guns are a 
problem, especially where people tend to still use currency. Online, not 
so much.


Possession is still the most effective factor. As our site points out,

After spending millions of dollars on network security, corporations 
still have major security problems.


Meanwhile, your ATM card allows your bank to dispense cash with 
confidence from a machine on a city sidewalk.


The technology used by your ATM card is more ancient than the floppy 
disk. So why are bank ATM networks generally secure, while corporate 
information networks, in spite of continuous investment in the latest 
security technology, are barely able to keep ahead of intruders?


The difference is not about technology. The difference is about 
assumptions and architecture.


Your bank's ATM network starts with the premise that knowing who you are 
is the foundation of security.


If a trusted co-worker asked you to share your ATM card and associated 
PIN, what would you say? Of course, they would never ask in the first place.


If that co-worker asked you for your network password, what would you 
say? In many companies, collaborative work gets done by sharing access 
credentials, in spite of rules against it.



--
Learn about The Authenticity Economy at 


http://video.google.com/videoplay?docid=-1419344994607129684&hl=en#



Re: [9fans] offered without comment or judgement

2010-06-29 Thread erik quanstrom
> The length of the phrase is actually in fact tied explicitly to
> memory. The longer a string of characters, the more difficult it is to
> remember. That's just fact

repeating this doesn't make it true, but it does make
the phrase easier to remember.  so i think your argument
is its own defeat.  the gettysburg address is fairly easy for
me to remember.  but i don't think i'd have such an easy
time on a randomly-choosen 285-word phrase.

clearly something this long is not necessary.  i'm sure you
have made-up phrases with non-words you tell our dog.
that should be easy to remember, not on the internet, and
have the added bonus that you get to smile while typing your
password.

> When talking about symmetric cryptography, "four score and seven years
> ago" would probably be a great key. There is no convenient rainbow
> table upon which to do a hash lookup. It's sufficiently expensive to
> brute-force.

i'm not convinced of this.  here's why.  i was reading yesterday
about a research-project that built a machine that could try 1 billion
rsa keys/sec.  now consider such a machine in the possession of bad
guys.  for them it would make sense to harvest nearly every phrase
you can find on the internet and try it.  the hard part would be
crawling the net.

- erik



Re: [9fans] i.e. (was go toolchain)

2010-06-29 Thread David Leimbach
On Tue, Jun 29, 2010 at 11:26 AM, Francisco J Ballesteros wrote:

> Now that I remember, we recently added some demos for
> o/live & octopus to the http://lsub.org/ls/demos.html
> page and we didn't post here to let 9fans know.
>

Thanks, this is very cool. I'm considering setting up a PC at my office, and
a PC at home, and then terminals on each to the other, but I'm not sure if
that's necessary or if the two PCs would suffice.

Also should this be working on Snow Leopard?  I'm having some difficulty but
not sure where I'm making mistakes.

Dave



>
> On Tue, Jun 29, 2010 at 8:04 PM, Francisco J Ballesteros 
> wrote:
> > no yet.
> > I'll post here when there's something to see.
> >
> > Sorry to polute the go thread with this, hence the new subject.
> >
> > On Tue, Jun 29, 2010 at 8:02 PM, Jack Johnson 
> wrote:
> >> On Tue, Jun 29, 2010 at 9:48 AM, Francisco J Ballesteros 
> wrote:
> >>> FTS, I'm interesting in getting Go here because I'm going to write
> >>> the i.e. window system (successor of o/live, o/mero, ...) also in go,
> to run
> >>> at least the viewer native on unix systems. The C version is still
> cooking.
> >>
> >> Is there an overview/paper/etc. for i.e?
> >>
> >>
> >
>
>


Re: [9fans] i.e. (was go toolchain)

2010-06-29 Thread Francisco J Ballesteros
If you have problems we can try to help you off list.

On Tue, Jun 29, 2010 at 9:30 PM, David Leimbach  wrote:
>
>
> On Tue, Jun 29, 2010 at 11:26 AM, Francisco J Ballesteros 
> wrote:
>>
>> Now that I remember, we recently added some demos for
>> o/live & octopus to the http://lsub.org/ls/demos.html
>> page and we didn't post here to let 9fans know.
>
> Thanks, this is very cool. I'm considering setting up a PC at my office, and
> a PC at home, and then terminals on each to the other, but I'm not sure if
> that's necessary or if the two PCs would suffice.
> Also should this be working on Snow Leopard?  I'm having some difficulty but
> not sure where I'm making mistakes.
> Dave
>
>>
>> On Tue, Jun 29, 2010 at 8:04 PM, Francisco J Ballesteros 
>> wrote:
>> > no yet.
>> > I'll post here when there's something to see.
>> >
>> > Sorry to polute the go thread with this, hence the new subject.
>> >
>> > On Tue, Jun 29, 2010 at 8:02 PM, Jack Johnson 
>> > wrote:
>> >> On Tue, Jun 29, 2010 at 9:48 AM, Francisco J Ballesteros
>> >>  wrote:
>> >>> FTS, I'm interesting in getting Go here because I'm going to write
>> >>> the i.e. window system (successor of o/live, o/mero, ...) also in go,
>> >>> to run
>> >>> at least the viewer native on unix systems. The C version is still
>> >>> cooking.
>> >>
>> >> Is there an overview/paper/etc. for i.e?
>> >>
>> >>
>> >
>>
>
>



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Devon H. O'Dell
2010/6/29 erik quanstrom :
>> The length of the phrase is actually in fact tied explicitly to
>> memory. The longer a string of characters, the more difficult it is to
>> remember. That's just fact
>
> repeating this doesn't make it true, but it does make
> the phrase easier to remember.  so i think your argument
> is its own defeat.  the gettysburg address is fairly easy for
> me to remember.  but i don't think i'd have such an easy
> time on a randomly-choosen 285-word phrase.
>
> clearly something this long is not necessary.  i'm sure you
> have made-up phrases with non-words you tell our dog.
> that should be easy to remember, not on the internet, and
> have the added bonus that you get to smile while typing your
> password.

You're taking this slightly out of context. I said that this is
coupled with the fact that peers encourage the use of randomness in a
password, and companies enforce password policies that corroborate
this need. I'm not suggesting there's a set length at which point
people have difficulty remembering something, but there is certainly a
correlation: you certainly aren't going to argue the chances of
remembering "fsd&e" are much greater than remembering
"amsdagk3881((@!3ll1..dags8" are you? Similarly, you wouldn't argue
that at some point you spent time learning the Gettysburg Address --
it's not simply something you read once and recalled. (If so, this is
impressive, and you shouldn't argue this as "normal".) Length of the
phrase is certainly tied to the ability to commit it to memory. Yes,
I'm repeating this using empirical evidence as I'm slightly too lazy
to go look up any of the several articles I've read about how we
memorize things and how "brain storage" actually works. There are ways
to bypass this to some degree: adding music or tune, creating rhyme,
setting to iambic pentameter (or any "rhythmization" for that matter).

As computing systems continue to get stronger, the necessity of longer
passphrases will increase -- or slower secure algorithms will need to
be developed. (Or possibly more fitting algorithms, given the
possibility of quantum computing, which may intrinsically provide
solutions to some implementation issues following PKI).

>> When talking about symmetric cryptography, "four score and seven years
>> ago" would probably be a great key. There is no convenient rainbow
>> table upon which to do a hash lookup. It's sufficiently expensive to
>> brute-force.
>
> i'm not convinced of this.  here's why.  i was reading yesterday
> about a research-project that built a machine that could try 1 billion
> rsa keys/sec.  now consider such a machine in the possession of bad
> guys.  for them it would make sense to harvest nearly every phrase
> you can find on the internet and try it.  the hard part would be
> crawling the net.

I certainly have several nonsensical words / names for my cats. None
of them contain numbers or punctuation or anything associated with a
strong passphrase. The longest of these is probably about 12
characters. And a system that can try a billion RSA keys per second is
going to quickly exhaust the relatively short combination of these,
even brute forcing. And you're right -- as I also alluded above, the
continued computing and mathematical advancements made by society at
large will continue to obsolete any statements about what a "good pass
phrase" is.

Right now, it's length and perceived randomness.

People have enough difficulty remembering short passwords. Or creating
"good" passwords in the first place. Upper bounds along with enforcing
permutations are placed to reduce peoples' likelihood of forgetting
them while still providing some level of security. It's not the best
approach, but until people start treating passwords like an ATM card
with a PIN, it's not going to matter much anyway. (Ignoring that PINs
for most cards are only have 9990 or fewer permutations.)

--dho

> - erik
>
>



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Wes Kussmaul

Devon H. O'Dell wrote:

2010/6/29 erik quanstrom :
  

I don't understand why modern security systems have an upper limit on 
passphrase length.


Because people can't remember passwords, and companies don't like
employing full-time password changers.
  

i don't understand this comment.  the length of a password
is only vaguely related to memorability.  long english phrases
are easy to remember.  unfortunately, they are also easy to
harvest automaticly, so "four score and seven years ago" might
be a bad password.



The problem is two-fold:

a) Lay-people are told by all their "computer guru" friends to choose
a password that is difficult to guess. Add numbers, capital letters,
punctuation. Most people don't think in this sort of context, and it
is difficult to remember.

b) People don't regard the idea as particularly important. I know many
people who routinely forget 6-8 character passwords.
  


Many banks still use 4 digit PINs on their ATM cards, without problem. 
Possession is a very important factor.


The token that will prevail of course is the phone - even though it 
denies relying parties the billboard value of a card.


Now, will developers be smart enough to isolate the private key from the 
phone's porous OS? The jury is out on that.


wk

--
Learn about The Authenticity Economy at 


http://video.google.com/videoplay?docid=-1419344994607129684&hl=en#



Re: [9fans] offered without comment or judgement

2010-06-29 Thread ron minnich
On Tue, Jun 29, 2010 at 2:14 AM, hiro <23h...@googlemail.com> wrote:
>> not saying it is "good" or "bad", just wanted people to see it
>
> So is it now "bad" to say what you think?

Nope, I just have my own opinions on this but don't want to corrupt anyone :-)

ron



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Eric Van Hensbergen
I was sleep-deprived much of the week, so my memory is most likely not
exact (so hopefully Russ will provide a clarification), but I believe
he said something along the lines of pointing to the top of the stack
as a workaround.  I haven't had a chance to look at it yet, so that's
about as much of a hint as I can give at the moment.

 -eric

On Tue, Jun 29, 2010 at 1:12 PM, Francisco J Ballesteros  wrote:
> Anyone (Russ?) can repeat here aprox. what the workaround for b was, for
> those like me that didn't attend usenix?
>
> On Tue, Jun 29, 2010 at 8:10 PM, Eric Van Hensbergen  wrote:
>>>
>>> Is the porting process active?
>>>
>>
>> It seems to be an opportunistic concurrent activity (which is why I
>> tried to create a central repo so we'd get some benefit from the
>> sparse multiple activities).  Most people were just waiting for Andrey
>> :)
>>
>> There is some stuff that Forysth/Jmk have been looking at to allow for
>> the segment registers, but Russ had suggested workaround at USENIX
>> that I don't think anyone has had time to try yet.
>>
>> So here's what my take on what needs to be done:
>>
>> a) Simple logistics (makefile/script transformations, Sape's branch
>> has some of this, what the right way to do this in order to be
>> integrated back into the mainline go tree is an open question)
>> b) support or workaround for the segment register stuff
>> c) runtime support
>>
>> People seem to be mostly getting hung up on (a), (b) is probably the
>> trickiest bit, and I think (c) is just a matter of sitting down and
>> getting it done.
>>
>> I wonder if one way of avoiding (a) is just to rig to cross-compile
>> from Linux/MacOSX to Plan 9 and get (b) and (c) done first then work
>> back to (a), just because it seems like it would be more satisfying.
>>
>>    -eric
>>
>>
>
>



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Eric Van Hensbergen
erik's attempt is now in the go-plan9 repo under its own branch for
those that wish to take a look.
Hopefully I merged it properly.

-eric


On Tue, Jun 29, 2010 at 1:32 PM, erik quanstrom
 wrote:
>> a) Simple logistics (makefile/script transformations, Sape's branch
>> has some of this, what the right way to do this in order to be
>> integrated back into the mainline go tree is an open question)
> [...]
>>
>> I wonder if one way of avoiding (a) is just to rig to cross-compile
>> from Linux/MacOSX to Plan 9 and get (b) and (c) done first then work
>> back to (a), just because it seems like it would be more satisfying.
>
> i found that (a) wasn't hard.  i got everything compiled
> rather quickly, but something came up before i could get
> going on the runtime.
>
> - erik
>
>



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread erik quanstrom
On Tue Jun 29 16:46:40 EDT 2010, eri...@gmail.com wrote:
> erik's attempt is now in the go-plan9 repo under its own branch for
> those that wish to take a look.
> Hopefully I merged it properly.

it compiles and links, but obviously doesn't run
since there really is no runtime.

- erik



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread ron minnich
Can someone remind me of the problem? Is it simply the need to be able
to set %gs?

Could a write to /dev/arch of something like
gs 0xwhatever
which sets %gs for that process solve the problem?

Or is it bigger than that?

ron



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Devon H. O'Dell
2010/6/29 erik quanstrom :
> On Tue Jun 29 16:46:40 EDT 2010, eri...@gmail.com wrote:
>> erik's attempt is now in the go-plan9 repo under its own branch for
>> those that wish to take a look.
>> Hopefully I merged it properly.
>
> it compiles and links, but obviously doesn't run
> since there really is no runtime.

Or syscall implementation or net / fd / etc implementation.
pkg/runtime should be easy. I'll do it tonight.

--dho

> - erik
>
>



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread ron minnich
On Tue, Jun 29, 2010 at 2:15 PM, Devon H. O'Dell  wrote:

> Or syscall implementation or net / fd / etc implementation.
> pkg/runtime should be easy. I'll do it tonight.

It would be nice to avoid a system call if possible :-)

ron



Re: [9fans] offered without comment or judgement

2010-06-29 Thread Steve Simon
> Many banks still use 4 digit PINs on their ATM cards, without problem. 
> Possession is a very important factor.

well, posscession and the fact that you only get three attempts to enter
the PIN (in the UK at least), so brute force attacks are a non-starter,
so limited kyspace is much less of a problem.

-Steve



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Steve Simon
On Tue Jun 29 22:04:19 BST 2010, rminn...@gmail.com wrote:
> Can someone remind me of the problem? Is it simply the need to be able
> to set %gs?
> 
> Could a write to /dev/arch of something like
> gs 0xwhatever
> which sets %gs for that process solve the problem?
> 
> Or is it bigger than that?
> 
> ron

Ok, my turn with the bad memory.

Isn't this exactly what cinap's patch did to allow
recent debian releases to run under linuxemu?

-Steve



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Charles Forsyth
>Or is it bigger than that?

the go toolchain is replete with go-specific things,
and produces incompatible .8 files (and perhaps for other architectures),
because of the way certain changes were made.

as russ suggested, it's probably easiest just to have a /bin/go
and put go/8c, go/8l etc in that, as they exist. that would obviously work.

he also suggested changing plan9's go/8l to rewrite references to offsets off 
GS as references
to (say) offsets into the privstack data. you'd need to consider whether
that would cover all cases correctly, although at the time i thought it would.



[9fans] megamouse?

2010-06-29 Thread David Leimbach
http://warmouse.com/pr062810.html

Looks complicated.


Re: [9fans] megamouse?

2010-06-29 Thread Devon H. O'Dell
See also http://cyborggaming.com/ for complicated mice :)

2010/6/29 David Leimbach :
> http://warmouse.com/pr062810.html
> Looks complicated.
>
>



Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread cinap_lenrek
the segment registers are just indices to the kernels descriptor tables.
setting the segment registers can be done with assembly instructions from 
userspace. but what you need is being able to modify the descriptors in
a save way from userspace!

i needed this for linuxemu to implement set_thread_area syscalls
under plan9 so i made the modifications to the kernel:

/n/sources/contrib/cinap_lenrek/segdescpatch

it adds the files ldt and gdt to devarch.

heres a linuxemu process where glibc has setup a special descriptor
and loaded %gs to point to it under plan9:

cat /dev/gdt
000b data WPUBG3 1819c080 f
000c data -0  0
000d data -0  0

PC  0x00020439 pread+0x7  /sys/src/libc/9syscall/pread.s:5
SP  0xdeffcd70 ECODE 0xf010080c EFLAG 0x0286
CS  0x0023 DS0x001b SS  0x001b
GS  0x005b FS0x ES  0x001b
TRAP0x0040 system call
AX  0x0032 BX   0x00032b4c CX   0x0001 DX   0x
DI  0x080e7468 SI   0x BP   0xdeffcf2c

format of is simple text:

/*
 * format:
 * idx[4] type[8] flags[8] dpl[1] base[8] limit[5]\n
 */

idx is the descriptor index (the one you load into a segment registers by the 
selector)
type is code or data
dpl is the priority level (usualy just 3 for userspace)
base and limit describe the location of the segment (limit is in pages if G 
flag is set)

/*
 * flags:
 * P = present
 * A = accessed (for code/data)
 * E = expand down (for data)
 * W = writable (for data)
 * R = readable (for code)
 * C = conforming (for code)
 * G = limit granularity in pages (for code/data)
 * D = 32 bit operand size (for code)
 * B = 32 bit stack pointer (for data)
 * Y = busy (for tss and tss16)
 * U = available for use by system software
 */

gdt and ldt are both per process.  the only difference between gdt and
ldt is that gdt has a small fixed number of descriptors in the gdt
that you can modify.  the ldt refers to the local descriptor table
wich can have up to 2^13 user descriptors.

--
cinap
--- Begin Message ---
Can someone remind me of the problem? Is it simply the need to be able
to set %gs?

Could a write to /dev/arch of something like
gs 0xwhatever
which sets %gs for that process solve the problem?

Or is it bigger than that?

ron--- End Message ---


Re: [9fans] megamouse?

2010-06-29 Thread Ethan Grammatikidis


On 29 Jun 2010, at 11:17 pm, Devon H. O'Dell wrote:


See also http://cyborggaming.com/ for complicated mice :)

2010/6/29 David Leimbach :

http://warmouse.com/pr062810.html
Looks complicated.


Cyborg Gaming's R.A.T. I think I could do something with, but the  
warmouse? Get that think away from me! lol


--
For purposes of orientation, if you find yourself in a steamy  
Devonian landscape and notice that a dragon is about to devour a  
beautiful girl nearby, you have undoubtedly stumbled into a lost  
world. Your problem is to save the girl and then live happily ever  
after with her. But if, on the other hand, you find yourself in  
Piccadily Circus, London, and notice that a beautiful girl is leading  
a dragon on a plastic lead down Regent Street, to no one's amazement  
but your own, then you are in a parallel world and your problems are  
entirely different.







Re: [9fans] Go/Inferno toolchain (Was: comment and newline in

2010-06-29 Thread Russ Cox
what i said to people at usenix was approximately
the following.

i think that porting go to plan 9 - the time to get
something working that runs all the go programs -
is not more than a week of concerted effort.
i also think that it just hasn't been high enough
priority for anyone (myself included) to put that
amount of effort in.

the go runtime sets up the segment registers,
with the operating system's help, so that gs
points at per-kernel-thread storage.
the linker generates references through gs
for the pseudo-addressing mode 0(gs), 4(gs), etc.
on plan 9 there is already per-kernel-thread
storage: it is called the stack.  the workaround
would be for the linker to know the top of stack
address and rewrite 0(gs) and 4(gs) to fixed
memory addresses just below the top of the stack.
it would be just as efficient as the 0(gs), 4(gs)
stuff and not require any kernel changes.

the build uses make, yes, and in some places
there are even include files that include other
include files (gasp!), but writing equivalent mkfiles
should take not very much time.  we're not doing
anything magical, and the particular style in the
makefiles should be familiar.

there's obviously a lot of divergence between
the plan 9 tool chain and the go tool chain.
the object files have different format, and so on.
to get off the ground i would suggest treating
the go copies of the tools as separate programs
and libraries from the originals.  for example,
you might install the go libmach as /386/lib/go/libmach.a
and the compiler tool chain as /386/bin/go/8a,
/386/bin/go/8c, /386/bin/go/8g, /386/bin/go/8l.
the .8 files created by those tools would not
be compatible with the standard ones, and the
standard nm wouldn't understand the final 8.out,
but the final 8.out would run.  you'd have to
disable the runtime copy of the symbol table
(the "nacl" target in 8l already does).
anyway, keep everything separate and get it
working.  once you have a working system then
you could worry about reconciling the two worlds
to whatever extent is appropriate.

i think people get too hung up on trying to make
the port back perfect.  just make it work.
then make it better.

russ



Re: [9fans] megamouse?

2010-06-29 Thread John Floren
On Tue, Jun 29, 2010 at 6:10 PM, David Leimbach  wrote:
> http://warmouse.com/pr062810.html
> Looks complicated.
>
>

Hey, there's a way to end the mouse/keyboard switching argument once
and for all! With 18 buttons, you can just make the mouse a chording
keyboard as well and never move your hand from the mouse.

John
-- 
"With MPI, familiarity breeds contempt. Contempt and nausea. Contempt,
nausea, and fear. Contempt, nausea, fear, and .." -- Ron Minnich



Re: [9fans] megamouse?

2010-06-29 Thread Pietro Gagliardi

On Jun 29, 2010, at 7:11 PM, John Floren wrote:

Hey, there's a way to end the mouse/keyboard switching argument once
and for all! With 18 buttons, you can just make the mouse a chording
keyboard as well and never move your hand from the mouse.


Amputees around the world jump for joy.

Also as a side note, this was originally known as the OpenOffice.org  
Mouse. Hey! Let's make an acme/Wily Mouse; it'd totally sell!