Re: [Simh] Fwd: VAX + Spectre

2019-09-22 Thread Fred Cisin via cctalk
On Sun, 22 Sep 2019, Nemo via cctalk wrote: We had a secure (but not tempest) room built for us by an authorised contractor and they forgot to install A/C. It was unusable until a portable A/C was placed in it with complicated baffles letting the hot air out. Nobody except a college administra

Re: [Simh] Fwd: VAX + Spectre

2019-09-22 Thread Nemo via cctalk
On 18/09/2019, Guy Sotomayor Jr via cctalk wrote: > [...] > Yea, I had to make a trip to a “secure facility” once and there were entire > “tempest” rooms with conditioned power and no external communications > equipment. We had a secure (but not tempest) room built for us by an authorised contrac

Re: [Simh] Fwd: VAX + Spectre

2019-09-18 Thread Guy Sotomayor Jr via cctalk
> On Sep 18, 2019, at 9:59 AM, Chris Elmquist wrote: > > On Wednesday (09/18/2019 at 09:19AM -0700), Guy Sotomayor Jr via cctalk wrote: >> >> >>> On Sep 18, 2019, at 12:42 AM, Liam Proven via cctalk >>> wrote: >>> >>> On Wed, 18 Sep 2019 at 02:19, Paul Koning via cctalk >>> wrote: >

Re: [Simh] Fwd: VAX + Spectre

2019-09-18 Thread Chris Elmquist via cctalk
On Wednesday (09/18/2019 at 09:19AM -0700), Guy Sotomayor Jr via cctalk wrote: > > > > On Sep 18, 2019, at 12:42 AM, Liam Proven via cctalk > > wrote: > > > > On Wed, 18 Sep 2019 at 02:19, Paul Koning via cctalk > > wrote: > >>> ... > >> Speaking of timing, that reminds me of two amazing secu

Re: [Simh] Fwd: VAX + Spectre

2019-09-18 Thread Guy Sotomayor Jr via cctalk
> On Sep 18, 2019, at 12:42 AM, Liam Proven via cctalk > wrote: > > On Wed, 18 Sep 2019 at 02:19, Paul Koning via cctalk > wrote: >>> ... >> Speaking of timing, that reminds me of two amazing security holes written up >> in the past few years. Nothing to do with the Spectre etc. issue. >>

Re: [Simh] Fwd: VAX + Spectre

2019-09-18 Thread Liam Proven via cctalk
On Wed, 18 Sep 2019 at 02:19, Paul Koning via cctalk wrote: > > ... > Speaking of timing, that reminds me of two amazing security holes written up > in the past few years. Nothing to do with the Spectre etc. issue. > > One is the recovery of speech from an encrypted VoIP channel such as Skype,

Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread ben via cctalk
Windows _is_ Bells and Whistles, plus a couple of gongs. No ... The GONGS is the chinese knock off.

Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread ben via cctalk
On 9/17/2019 1:08 PM, Fred Cisin via cctalk wrote: On Tue, 17 Sep 2019, Paul Koning via cctalk wrote: I could easily imagine a computer science exam question "Describe in one paragraph the specific design error that enabled the Meltdown attack". I used to have some related questions in my mic

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Paul Koning via cctalk
> On Sep 17, 2019, at 6:51 PM, dwight via cctalk wrote: > > ... > This latest one is bad for a touch typer or those that always enter the > password in the same way. It looks for the timing of when you hit keys and > then makes guesses on what keys would typically take that length of time to

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread dwight via cctalk
ng Cc: General Discussion: On-Topic and Off-Topic Posts ; SIMH Subject: Re: [Simh] Fwd: VAX + Spectre I can simplify the question a bit. I have to be careful as I work for Intel and I've been involved with a small bit of it on our end and some of the lawyers are a bit touchy about the who

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Clem Cole via cctalk
I can simplify the question a bit. I have to be careful as I work for Intel and I've been involved with a small bit of it on our end and some of the lawyers are a bit touchy about the whole situation. So I need to add - these opinions are my own not necessarily my employers. Basically, if you h

Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Liam Proven via cctalk
On Tue, 17 Sep 2019 at 21:09, Fred Cisin via cctalk wrote: > One student (who later became my best friend and buddy) > skipped the technical details and said, "The primary design error for > MacOS and Windoze (sic) is that they placed a lower priority on security, > than on being able to transpar

Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread allison via cctalk
On 9/17/19 3:08 PM, Fred Cisin via cctalk wrote: > On Tue, 17 Sep 2019, Paul Koning via cctalk wrote: >> I could easily imagine a computer science exam question "Describe in >> one paragraph the specific design error that enabled the Meltdown >> attack". > > I used to have some related questions i

Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Fred Cisin via cctalk
On Tue, 17 Sep 2019, Paul Koning via cctalk wrote: I could easily imagine a computer science exam question "Describe in one paragraph the specific design error that enabled the Meltdown attack". I used to have some related questions in my microcomputer operating systems class. One student (wh

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Paul Koning via cctalk
> On Sep 17, 2019, at 2:35 PM, allison via cctalk wrote: > >>> ... > > I see this as a question of the number of angels that can dance on the > point of a pin. But could GCC compile code that has system access to > do nasties is a more complex question. Then again how does it get > system

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread allison via cctalk
On 9/17/19 1:49 PM, Warner Losh via cctalk wrote: > On Tue, Sep 17, 2019, 6:40 PM Paul Koning via cctalk > wrote: > >> Yes, I understand that a number of ISAs are vulnerable. The original >> paper by Kocher clearly mentions both x86 and ARM. >> >> The reason I forwwarded the question is that I'm

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Warner Losh via cctalk
On Tue, Sep 17, 2019, 6:40 PM Paul Koning via cctalk wrote: > Yes, I understand that a number of ISAs are vulnerable. The original > paper by Kocher clearly mentions both x86 and ARM. > > The reason I forwwarded the question is that I'm not aware enough of all > the VAX variants to answer whethe

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Paul Koning via cctalk
Yes, I understand that a number of ISAs are vulnerable. The original paper by Kocher clearly mentions both x86 and ARM. The reason I forwwarded the question is that I'm not aware enough of all the VAX variants to answer whether there are any VAXen with speculative execution. If no, then we're

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Clem Cole via cctalk
Paul - be careful. All CPU's post the IBM AGS that used branch prediction are suspect. Russ Robelen (who was the 360/50 lead, worked on 360/90 and lead AGS) has the speculative executing patent. I tweaked him when it all came out and said - look at what you did. What Russ and team are great i