Re: [9fans] ftpd on 9front

2025-03-28 Thread ori
Quoth Garry :
> OK, so I am running ftpd on 9front, but on connecting I get:
> 
> Connected to 192.168.1.108.
> 220 Plan 9 FTP server ready.
> 200 UTF8 always on
> User (192.168.1.108:(none)): glenda
> 331 Need password
> Password:
> 
> 534 Command requires tls
> Login failed.
> 
> Any ideas of how to get this work? I am indifferent to whether I either get 
> TLS working or disable it, but I suppose getting TLS working is at least a 
> learning experience.
> 
> Any help much appreciated.
> 
> Garry

To set up TLS, you can easily generate a self-signed cert; the manpage rsa(8)
has examples for httpd, it should be more or less the same for ftp. Note that
the private key needs to end up in a factotum that runs in the same namespace
as the daemon.

If you want a cert with a complete cert chain, you can also use auth/acmed
to generate a cert with letsencrypt; see man 8 acmed for details and examples.

There are no options to allow accepting your password in plain text, and I
would rather not add them.  that said, it looks to be a one line patch to
disable all checking for that (see below, do *not* recommend).

--- a/sys/src/cmd/ip/ftpd.c
+++ b/sys/src/cmd/ip/ftpd.c
@@ -1089,7 +1089,7 @@
if(cistrcmp(cmd, t->name) == 0) {
if(t->needlogin && !ftpd.user.loggedin) {
reply(ftpd.out, "530 Command requires 
login");
-   } else if(t->needtls && !ftpd.conn.tlson) {
+   } else if(0 && t->needtls && !ftpd.conn.tlson) {
reply(ftpd.out, "534 Command requires 
tls");
} else {
if(t->fn != passcmd)


--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Td09db527ec1fde98-M72362e1da3f5d6fa01429103
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] 9Front on Intel N100?

2025-03-28 Thread Aidan K. Wiggins via 9fans
Funny enough, I finally got another ethernet daughtboard for my
laptop, and this is apparently the chip (combo?) it has. I've found it
hasn't worked for me yet. I will look into it in the coming days!

Aidan

Quoth tlaro...@kergis.com:
> On Fri, Mar 28, 2025 at 07:24:28PM +1100, Oliver Lowe wrote:
> > Thanks for the tip!
> > 
> > > I got a fanless mini PC with N100, Plan 9 installed no problem and
> > > recognised the network right away. 
> > 
> > What model NIC? I'm typing this from a N100 mini PC (running OpenBSD).
> > dmesg(8) reports the 2 network interfaces as:
> > 
> > "Realtek 8168" rev 0x15: RTL8168H/8111H (0x5400)
> > 
> > which I'm hoping should be supported based on my very non-expert
> > reading of /sys/src/9/pc/ether8169.c
> 
> It is or will be supported since it is probably (from 0x5400) Macfg_68
> or Macfg_69:
> 
> { 0x5400, Macfg_68, Jmb9k, Fdesc2 | Fphywk | F8168gplus | Fmagicpkt2, 
> 0x8F00 },
> { 0x5400, Macfg_69, Jmb9k, Fdesc2 | Fphywk | F8168gplus | Fmagicpkt2, 
> 0x8F00 },
> 
> You can already verify the PCI vendor Id and the device Id. Should be
> one of these:
> 
> enum {  /* PCI vendors of */
> VRtl = 0x10EC,  /* Realtek */
> VNcb = 0x10FF,  /* NCube */
> VDlk = 0x1186,  /* D-LINK */
> VAlt = 0x1259,  /* Allied Telesis Inc */
> VUsr = 0x16EC,  /* USRobotics */
> VLnk = 0x1737,  /* Linksys */
> 
> };
> 
> And for the device:
> 
> { VRtl, 0x8136, Rtl810x, Fpcie },
> { VRtl, 0x8161, Rtl8168, Fpcie },   /* RTL8168 add-on */
> { VRtl, 0x8162, Rtl8168, 0 },   /* RTL8168KB */
> { VRtl, 0x8168, Rtl8168, Fpcie },   /* RTL8168B */
> { VNcb, 0x8168, Rtl8168, 0 },
> 
> --
> Thierry Laronde 
>  http://www.kergis.com/
> http://kertex.kergis.com/
> Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T25f54f1e44602c84-Mc42bcd76f32e7787773925e7
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] 9Front on Intel N100?

2025-03-28 Thread tlaronde
On Fri, Mar 28, 2025 at 07:24:28PM +1100, Oliver Lowe wrote:
> Thanks for the tip!
> 
> > I got a fanless mini PC with N100, Plan 9 installed no problem and
> > recognised the network right away. 
> 
> What model NIC? I'm typing this from a N100 mini PC (running OpenBSD).
> dmesg(8) reports the 2 network interfaces as:
> 
> "Realtek 8168" rev 0x15: RTL8168H/8111H (0x5400)
> 
> which I'm hoping should be supported based on my very non-expert
> reading of /sys/src/9/pc/ether8169.c

It is or will be supported since it is probably (from 0x5400) Macfg_68
or Macfg_69:

{ 0x5400, Macfg_68, Jmb9k, Fdesc2 | Fphywk | F8168gplus | 
Fmagicpkt2, 0x8F00 },
{ 0x5400, Macfg_69, Jmb9k, Fdesc2 | Fphywk | F8168gplus | 
Fmagicpkt2, 0x8F00 },

You can already verify the PCI vendor Id and the device Id. Should be
one of these:

enum {  /* PCI vendors of */
VRtl = 0x10EC,  /* Realtek */
VNcb = 0x10FF,  /* NCube */
VDlk = 0x1186,  /* D-LINK */
VAlt = 0x1259,  /* Allied Telesis Inc */
VUsr = 0x16EC,  /* USRobotics */
VLnk = 0x1737,  /* Linksys */

};

And for the device:

{ VRtl, 0x8136, Rtl810x, Fpcie },
{ VRtl, 0x8161, Rtl8168, Fpcie },   /* RTL8168 add-on */
{ VRtl, 0x8162, Rtl8168, 0 },   /* RTL8168KB */
{ VRtl, 0x8168, Rtl8168, Fpcie },   /* RTL8168B */
{ VNcb, 0x8168, Rtl8168, 0 },

-- 
Thierry Laronde 
 http://www.kergis.com/
http://kertex.kergis.com/
Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T25f54f1e44602c84-M222eb6809c3bb3aba9660828
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] Acme event file and keyboard

2025-03-28 Thread Robert Kroeger
You said "acme's event files on windows". To be absolutely precise: you
mean this kind of window (from p9p and Edwood) (the 29 in this context)?

; 9p ls acme/29
addr
body
ctl
data
editout
errors
event
rdsel
tag
wrsel
xdata

So: what's the exact command line with args that you're running? Because
the error that you're seeing suggests that winwriteevent is sending a
malformed message to acme. Do you get any complaint content in Acme's
'+Errors' window? p9p Acme and Edwood both log some issues that show up in
their file system implementation to +Errors.

At least as how I understand the code, p9p Acme supports only the
interception of (some) mouse events. The event flow in (e.g. Edwood)
definitely does not include code to route key events to specific windows.
This is perhaps a worthwhile API addition.

Rob.



On Wed, Mar 26, 2025 at 11:37 AM Matthieu Rakotojaona via 9fans <
9fans@9fans.net> wrote:

> Has anyone managed to do anything productive with acme's event files on
> windows and the keyboard ? All I can find is mouse-related scripts.
> 
> I'm trying to do keybindings the easy way, by tapping into that event
> file, but I have some issues:
> 
> - When text is added the tag isn't updated with Undo and Put
> 
> - Thinking it's because acme didn't receive the event, I send it with
> winwriteevent from $PLAN9/lib/acme.rc but get "9p: write error: bad
> event syntax". No error when using 9fans.net/go/acme, but still no
> update on the tag
> 
> Am I doing something wrong ?
> 


-- 
Robert Kroeger
rjkro...@liqui.org

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T08b139f442c68dca-Mc4bbcc6bf08001a870632574
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] An interesting article on the challenges chip designers face against secure startup

2025-03-28 Thread tlaronde
On Fri, Mar 28, 2025 at 07:04:05AM -0700, ron minnich wrote:
> search for: keysight rp2350 hardware attacks
> 
> (I'm done including links :-)
> 
> Short form: it's getting easier by the day to put together glitching
> hardware, for under $1000, and uncover those keys!

[From the PR departement] This demonstrates once more:
- That security relies first on simplicity (despite the
conclusion, there is a mention about software too, i.e. compilers:
"Due to an unlucky arrangement of instructions emitted by the
compiler, injecting a fault which skips one out of two very specific
instructions confuses the chip into rebooting to the hazardous boot
type".);
- That security has a cost and to maintain efficiency,
strong security has to be done only once, and that it would
be more secure for a task, verified, to execute once on a dedicated
core than having to verify it at each running slot of time, having
verified too that it had not been altered while sleeping and that the
context on the core or the caches have not been "polluted" by a
concurrent task.

On the obvious side---it will probably not be a scoop to a lot of
people---, I discovered, while working on the driver for the
RTL 8125 and al. NICs, that there are instructions to allow
to turn off the blinking led showing that there are network exchanges...

All in all, trusting something that one doesn't build entirely (from
hardware to software)---it may exhibit then errors but from involuntary
faults---is, at best, naivety.
-- 
Thierry Laronde 
 http://www.kergis.com/
http://kertex.kergis.com/
Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbd230a8f010208d8-M484bb3312349d42903435fed
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] Acme event file and keyboard

2025-03-28 Thread m via 9fans
Sorry I wasn't really clear, I'm talking about, in your example, 
`acme/29/event`. acme(4) explains I can also receive keyboard events and I do, 
I can get the characters I enter, but sending them back in has the behaviour I 
explained. I'm using `wineventloop` from acme.rc, and my event function is 
trivial:

```
fn event {
    winwritevent $*
}

newwindow
wineventloop
```

As I said I don't have errors when using the go API, only with the acme.rc one. 
I don't have anything special in +Errors

-- 
Matthieu
--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T08b139f442c68dca-M336f69c7e238c2194c8283b1
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


[9fans] Host security using TPMs

2025-03-28 Thread Lyndon Nerenberg (VE7TFX/VE6BBM)
Aleksandar Kuktin writes:

> I'd like to point out the problem with TPM is that, since the "trust"
> chain originates with the manufacturer, or more accurately with
> whomever controls the manufacturer, you'll never be in complete control
> of the device. "Trusted computing" in this scenario means "can THEY
> trust YOUR computer to serve THEM and work against YOU"? If you can't
> change the key (all of them), or if you don't have the private key
> (all of them), you simply don't have control over the boot process

[...]

There's no such thing as perfect security.  Each of us individually
decides what level of security is sufficient for our needs.  For
the purposes of running my Plan 9 network at home, if I could do
host authentication using TPM, that would be sufficiently secure
for my needs, and a *hell* of a lot more secure than the current
scheme.

--lyndon

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T4aedea377a3d63c1-Mdb1e33d6715468d3f1891a45
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] An interesting article on the challenges chip designers face against secure startup

2025-03-28 Thread tlaronde
On Fri, Mar 28, 2025 at 09:20:44AM -0700, ron minnich wrote:
> The relevance to plan 9: we have this thing we've used for about 30y now,
> known to many of us as sdE0/nvram.
> 
> IIUC, on the pre-x86  hardware, it really was a bit of NVRAM, the idea
> being you had some bit of NVRAM on your system, hard to get to, which was a
> good place to stash a key.
> 
> X86 has always had the battery-backed CMOS memory, and it's always been too
> small to hold anything useful, certainly not big enough for NVRAM, so I
> always assumed that is why we ended up with sdE0/nvram. [Although, note, on
>  the LANL supercomputers, we did use a few bytes of CMOS to remember a
> node's location on the source-routed Myrinet: not totally useless :-)]
> 
> Creating a 512B partition on persistent storage to hold a secret key is, I
> guess, what you do when you are on systems without a decent place to put
> it. It never struck me as safe.
> 
> I figure that at some point somebody is going to come in and show us a
> better way to do it. Should that happen, it's good to be aware of just how
> real the threats are. So I thought it would be nice to know, and possibly
> interesting as well.

My point, that was not clear I admit, is that I think that more than
90% of the threats come from the manufacturers and the vendors of the
devices or the software, so that focusing on reducing the 10% left to
0.0001% or less is forgetting that this leaves the 90% intact.

In the same order of ideas, I believe that present cryptography is 
indeed hard to break digitally but I'm convinced that it can be
broken analogically---so that everybody uses digital cryptography that
_almost_ nobody can break, but that one or two entities can and that
they would be embarrassed if different not digital means were used.

As long as somebody has physical access to the device (I guess this
was the case for tampering with voltage)...

One has to know exactly who has access. As long as the physical
access is under control (for both the human beings and the material
they bring with them), is there really a problem? The problem seems
more the hype around a "100% trustworthy device" for RPI.


> 
> 
> On Fri, Mar 28, 2025 at 8:06?AM  wrote:
> 
> > On Fri, Mar 28, 2025 at 07:04:05AM -0700, ron minnich wrote:
> > > search for: keysight rp2350 hardware attacks
> > >
> > > (I'm done including links :-)
> > >
> > > Short form: it's getting easier by the day to put together glitching
> > > hardware, for under $1000, and uncover those keys!
> > 
> > [From the PR departement] This demonstrates once more:
> > - That security relies first on simplicity (despite the
> > conclusion, there is a mention about software too, i.e. compilers:
> > "Due to an unlucky arrangement of instructions emitted by the
> > compiler, injecting a fault which skips one out of two very specific
> > instructions confuses the chip into rebooting to the hazardous boot
> > type".);
> > - That security has a cost and to maintain efficiency,
> > strong security has to be done only once, and that it would
> > be more secure for a task, verified, to execute once on a dedicated
> > core than having to verify it at each running slot of time, having
> > verified too that it had not been altered while sleeping and that the
> > context on the core or the caches have not been "polluted" by a
> > concurrent task.
> > 
> > On the obvious side---it will probably not be a scoop to a lot of
> > people---, I discovered, while working on the driver for the
> > RTL 8125 and al. NICs, that there are instructions to allow
> > to turn off the blinking led showing that there are network exchanges...
> > 
> > All in all, trusting something that one doesn't build entirely (from
> > hardware to software)---it may exhibit then errors but from involuntary
> > faults---is, at best, naivety.
> > --
> > Thierry Laronde 
> >  http://www.kergis.com/
> > http://kertex.kergis.com/
> > Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C

-- 
Thierry Laronde 
 http://www.kergis.com/
http://kertex.kergis.com/
Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbd230a8f010208d8-Mc15ac56eb1ee48d971b9e158
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


[9fans] ftpd on 9front

2025-03-28 Thread Garry
OK, so I am running ftpd on 9front, but on connecting I get:

Connected to 192.168.1.108.
220 Plan 9 FTP server ready.
200 UTF8 always on
User (192.168.1.108:(none)): glenda
331 Need password
Password:

534 Command requires tls
Login failed.

Any ideas of how to get this work? I am indifferent to whether I either get TLS 
working or disable it, but I suppose getting TLS working is at least a learning 
experience.

Any help much appreciated.

Garry
--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Td09db527ec1fde98-M416e6cc6e776d58a76102b9c
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] 9Front on Intel N100?

2025-03-28 Thread Garry
It's using the rtl8169 driver, but I'm not sure how to get the exact chipset 
model, and Googling and Copiloting isn't helping. If you know the command to 
run in 9front to get the info you need, let me know I'll run it.
--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T25f54f1e44602c84-M437b494db7f0f9b7b2d69037
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] 9Front on Intel N100?

2025-03-28 Thread Oliver Lowe
Thanks for the tip!

> I got a fanless mini PC with N100, Plan 9 installed no problem and
> recognised the network right away. 

What model NIC? I'm typing this from a N100 mini PC (running OpenBSD).
dmesg(8) reports the 2 network interfaces as:

"Realtek 8168" rev 0x15: RTL8168H/8111H (0x5400)

which I'm hoping should be supported based on my very non-expert
reading of /sys/src/9/pc/ether8169.c

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T25f54f1e44602c84-Me815b43805fa5e71bc6e2fb0
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] An interesting article on the challenges chip designers face against secure startup

2025-03-28 Thread Frank D. Engel, Jr.
Most current asymmetric cryptography (public key) is vulnerable to 
various forms of attacks from quantum computers of a threshold size, not 
yet achieved but potentially feasible to see happen in the 
not-too-distant future.


Symmetric ciphers (ex. AES, twofish) are generally more resistant.

As to knowing who as physical access, that goes out the window if your 
laptop or cell phone gets stolen.  Secure boot / encryption is more 
about protecting devices to the greatest extent possible when you lose 
physical control over them.



On 3/28/25 14:06, tlaro...@kergis.com wrote:

On Fri, Mar 28, 2025 at 09:20:44AM -0700, ron minnich wrote:

The relevance to plan 9: we have this thing we've used for about 30y now,
known to many of us as sdE0/nvram.

IIUC, on the pre-x86  hardware, it really was a bit of NVRAM, the idea
being you had some bit of NVRAM on your system, hard to get to, which was a
good place to stash a key.

X86 has always had the battery-backed CMOS memory, and it's always been too
small to hold anything useful, certainly not big enough for NVRAM, so I
always assumed that is why we ended up with sdE0/nvram. [Although, note, on
  the LANL supercomputers, we did use a few bytes of CMOS to remember a
node's location on the source-routed Myrinet: not totally useless :-)]

Creating a 512B partition on persistent storage to hold a secret key is, I
guess, what you do when you are on systems without a decent place to put
it. It never struck me as safe.

I figure that at some point somebody is going to come in and show us a
better way to do it. Should that happen, it's good to be aware of just how
real the threats are. So I thought it would be nice to know, and possibly
interesting as well.

My point, that was not clear I admit, is that I think that more than
90% of the threats come from the manufacturers and the vendors of the
devices or the software, so that focusing on reducing the 10% left to
0.0001% or less is forgetting that this leaves the 90% intact.

In the same order of ideas, I believe that present cryptography is
indeed hard to break digitally but I'm convinced that it can be
broken analogically---so that everybody uses digital cryptography that
_almost_ nobody can break, but that one or two entities can and that
they would be embarrassed if different not digital means were used.

As long as somebody has physical access to the device (I guess this
was the case for tampering with voltage)...

One has to know exactly who has access. As long as the physical
access is under control (for both the human beings and the material
they bring with them), is there really a problem? The problem seems
more the hype around a "100% trustworthy device" for RPI.




On Fri, Mar 28, 2025 at 8:06?AM  wrote:


On Fri, Mar 28, 2025 at 07:04:05AM -0700, ron minnich wrote:

search for: keysight rp2350 hardware attacks

(I'm done including links :-)

Short form: it's getting easier by the day to put together glitching
hardware, for under $1000, and uncover those keys!

[From the PR departement] This demonstrates once more:
 - That security relies first on simplicity (despite the
conclusion, there is a mention about software too, i.e. compilers:
"Due to an unlucky arrangement of instructions emitted by the
compiler, injecting a fault which skips one out of two very specific
instructions confuses the chip into rebooting to the hazardous boot
type".);
 - That security has a cost and to maintain efficiency,
 strong security has to be done only once, and that it would
be more secure for a task, verified, to execute once on a dedicated
core than having to verify it at each running slot of time, having
verified too that it had not been altered while sleeping and that the
context on the core or the caches have not been "polluted" by a
concurrent task.

On the obvious side---it will probably not be a scoop to a lot of
people---, I discovered, while working on the driver for the
RTL 8125 and al. NICs, that there are instructions to allow
to turn off the blinking led showing that there are network exchanges...

All in all, trusting something that one doesn't build entirely (from
hardware to software)---it may exhibit then errors but from involuntary
faults---is, at best, naivety.
--
Thierry Laronde 
  http://www.kergis.com/
 http://kertex.kergis.com/
Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C


--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbd230a8f010208d8-M8c4b99bd55d8720b5e5e56b1
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


[9fans] Nix/9legacy: added NSEC syscall

2025-03-28 Thread tlaronde
In order to be as compatible as possible with current userland, and to
facilitate diff'ing, I have added the NSEC syscall to Nix and put the Nix added
syscalls after so that there are only additions when comparing.

Todget() has been updated from the 9k version as well and, since the
signature has changed, adaptation have been made to the calls in the
Nix code but without adopting brutally new versions of touched sources
since there may be added code specific to Nix.

I have thus seen that monotonic time has been implemented in 9k (and
is thus available with Nix too) with the new version of port/tod.c:todget()

It compiles. If something is broken, you know who to blame, but have
also a hint about where to look for :-^
-- 
Thierry Laronde 
 http://www.kergis.com/
http://kertex.kergis.com/
Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbb689d7c28ef21eb-M2a9b449d23862af934114f20
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] An interesting article on the challenges chip designers face against secure startup

2025-03-28 Thread Aleksandar Kuktin
>On Fri, 28 Mar 2025 12:26:37 -0700
>"Lyndon Nerenberg (VE7TFX/VE6BBM)"  wrote:
>
> ron minnich writes:
> 
> > I figure that at some point somebody is going to come in and show
> > us a better way to do it. Should that happen, it's good to be aware
> > of just how real the threats are. So I thought it would be nice to
> > know, and possibly interesting as well.
> 
> Perhaps it's time to integrate TPM?  That's been in the back of
> my mind for a long time, but I have never had suitable hardware
> to trying monkeying around with it.  (That might change soon.)
> 
> --lyndon

Hi all! A long-time lurker here.

I'd like to point out the problem with TPM is that, since the "trust"
chain originates with the manufacturer, or more accurately with
whomever controls the manufacturer, you'll never be in complete control
of the device. "Trusted computing" in this scenario means "can THEY
trust YOUR computer to serve THEM and work against YOU"? If you can't
change the key (all of them), or if you don't have the private key
(all of them), you simply don't have control over the boot process, and
if you don't have control over the boot process, you simply have no
control over the machine whatsoever. The machine can and will turn
against you when it's true masters order it to.

Then there's the entire thing about "war against general
computing". Etc. This all is generally discussed under the heading
"technofeudalism".

-- 
Svi moji e-mailovi su kriptografski potpisani. Proverite ih.
All of my e-mails are cryptographically signed. Verify them.
--
You don't need an AI for a robot uprising.
Humans will do just fine.
--


signature.asc
Description: PGP signature

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbd230a8f010208d8-Mf2d73ed41ad414db5c2616ad
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] An interesting article on the challenges chip designers face against secure startup

2025-03-28 Thread ron minnich
The relevance to plan 9: we have this thing we've used for about 30y now,
known to many of us as sdE0/nvram.

IIUC, on the pre-x86  hardware, it really was a bit of NVRAM, the idea
being you had some bit of NVRAM on your system, hard to get to, which was a
good place to stash a key.

X86 has always had the battery-backed CMOS memory, and it's always been too
small to hold anything useful, certainly not big enough for NVRAM, so I
always assumed that is why we ended up with sdE0/nvram. [Although, note, on
 the LANL supercomputers, we did use a few bytes of CMOS to remember a
node's location on the source-routed Myrinet: not totally useless :-)]

Creating a 512B partition on persistent storage to hold a secret key is, I
guess, what you do when you are on systems without a decent place to put
it. It never struck me as safe.

I figure that at some point somebody is going to come in and show us a
better way to do it. Should that happen, it's good to be aware of just how
real the threats are. So I thought it would be nice to know, and possibly
interesting as well.


On Fri, Mar 28, 2025 at 8:06 AM  wrote:

> On Fri, Mar 28, 2025 at 07:04:05AM -0700, ron minnich wrote:
> > search for: keysight rp2350 hardware attacks
> >
> > (I'm done including links :-)
> >
> > Short form: it's getting easier by the day to put together glitching
> > hardware, for under $1000, and uncover those keys!
> 
> [From the PR departement] This demonstrates once more:
> - That security relies first on simplicity (despite the
> conclusion, there is a mention about software too, i.e. compilers:
> "Due to an unlucky arrangement of instructions emitted by the
> compiler, injecting a fault which skips one out of two very specific
> instructions confuses the chip into rebooting to the hazardous boot
> type".);
> - That security has a cost and to maintain efficiency,
> strong security has to be done only once, and that it would
> be more secure for a task, verified, to execute once on a dedicated
> core than having to verify it at each running slot of time, having
> verified too that it had not been altered while sleeping and that the
> context on the core or the caches have not been "polluted" by a
> concurrent task.
> 
> On the obvious side---it will probably not be a scoop to a lot of
> people---, I discovered, while working on the driver for the
> RTL 8125 and al. NICs, that there are instructions to allow
> to turn off the blinking led showing that there are network exchanges...
> 
> All in all, trusting something that one doesn't build entirely (from
> hardware to software)---it may exhibit then errors but from involuntary
> faults---is, at best, naivety.
> --
> Thierry Laronde 
>  http://www.kergis.com/
> http://kertex.kergis.com/
> Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbd230a8f010208d8-M023cc872fbda4674c9b7178f
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] NIX this morning

2025-03-28 Thread Brian L. Stuart
On Thu, Mar 27, 2025 at 07:47:02AM -0700, ron minnich wrote:
> Off to my day job :-)

Ron,
I've heard rumors (perhaps apocryphal) that there exists
a state of being where there is no "day job" and you can
spend all your time on things that are more intellectually
satisfying than any suit could ever appreciate.  I think
they call it "retirement."  Of course, that may be as mythical
as "vacation."  But I've got a basement full of unstarted
and half-finished projects that are calling out for me
find a path to this nirvana.

BLS


--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T10229a3f9069de91-M025e341cd6009ff6e343eee1
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


[9fans] An interesting article on the challenges chip designers face against secure startup

2025-03-28 Thread ron minnich
search for: keysight rp2350 hardware attacks

(I'm done including links :-)

Short form: it's getting easier by the day to put together glitching
hardware, for under $1000, and uncover those keys!

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbd230a8f010208d8-M2cd0d36e0a6b03ca1c3b15a8
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription


Re: [9fans] An interesting article on the challenges chip designers face against secure startup

2025-03-28 Thread Skip Tavakkolian
Isn't that what the TPM is supposed to provide in a verifiable way?

Arm's TrustZone presumably provides layered-isolation to keys and
signatures that can be verified all the way to the manufacturer.   I'm
guessing they might be the basis for TPM hardware implementation.

On Fri, Mar 28, 2025 at 9:56 AM ron minnich  wrote:
>
> The relevance to plan 9: we have this thing we've used for about 30y now, 
> known to many of us as sdE0/nvram.
>
> IIUC, on the pre-x86  hardware, it really was a bit of NVRAM, the idea being 
> you had some bit of NVRAM on your system, hard to get to, which was a good 
> place to stash a key.
>
> X86 has always had the battery-backed CMOS memory, and it's always been too 
> small to hold anything useful, certainly not big enough for NVRAM, so I 
> always assumed that is why we ended up with sdE0/nvram. [Although, note, on  
> the LANL supercomputers, we did use a few bytes of CMOS to remember a node's 
> location on the source-routed Myrinet: not totally useless :-)]
>
> Creating a 512B partition on persistent storage to hold a secret key is, I 
> guess, what you do when you are on systems without a decent place to put it. 
> It never struck me as safe.
>
> I figure that at some point somebody is going to come in and show us a better 
> way to do it. Should that happen, it's good to be aware of just how real the 
> threats are. So I thought it would be nice to know, and possibly interesting 
> as well.
>
>
> On Fri, Mar 28, 2025 at 8:06 AM  wrote:
>>
>> On Fri, Mar 28, 2025 at 07:04:05AM -0700, ron minnich wrote:
>> > search for: keysight rp2350 hardware attacks
>> >
>> > (I'm done including links :-)
>> >
>> > Short form: it's getting easier by the day to put together glitching
>> > hardware, for under $1000, and uncover those keys!
>> 
>> [From the PR departement] This demonstrates once more:
>> - That security relies first on simplicity (despite the
>> conclusion, there is a mention about software too, i.e. compilers:
>> "Due to an unlucky arrangement of instructions emitted by the
>> compiler, injecting a fault which skips one out of two very specific
>> instructions confuses the chip into rebooting to the hazardous boot
>> type".);
>> - That security has a cost and to maintain efficiency,
>> strong security has to be done only once, and that it would
>> be more secure for a task, verified, to execute once on a dedicated
>> core than having to verify it at each running slot of time, having
>> verified too that it had not been altered while sleeping and that the
>> context on the core or the caches have not been "polluted" by a
>> concurrent task.
>> 
>> On the obvious side---it will probably not be a scoop to a lot of
>> people---, I discovered, while working on the driver for the
>> RTL 8125 and al. NICs, that there are instructions to allow
>> to turn off the blinking led showing that there are network exchanges...
>> 
>> All in all, trusting something that one doesn't build entirely (from
>> hardware to software)---it may exhibit then errors but from involuntary
>> faults---is, at best, naivety.
>> --
>> Thierry Laronde 
>>  http://www.kergis.com/
>> http://kertex.kergis.com/
>> Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C
>
> 9fans / 9fans / see discussions + participants + delivery options Permalink

--
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbd230a8f010208d8-Mfcf4c51e9b2d7efd1db76cf8
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription