RE: VAX + Spectre

2019-10-03 Thread Dave Wade via cctalk
> -Original Message- > From: cctalk On Behalf Of Paul Koning via > cctalk > Sent: 03 October 2019 16:28 > To: Stefan Skoglund > Cc: General Discussion: On-Topic and Off-Topic Posts > Subject: Re: VAX + Spectre > > > > > On Oct 3, 2019, a

Re: VAX + Spectre

2019-10-03 Thread Paul Koning via cctalk
> On Oct 3, 2019, at 10:55 AM, Stefan Skoglund wrote: > > tor 2019-10-03 klockan 09:45 -0400 skrev Paul Koning via cctalk: >>> On Oct 3, 2019, at 8:25 AM, Maciej W. Rozycki >>> wrote: >>> >>> On Thu, 3 Oct 2019, Maciej W. Rozycki wrote: >>> > You need an extremely high resolution timer

Re: VAX + Spectre

2019-10-03 Thread Stefan Skoglund via cctalk
tor 2019-10-03 klockan 09:45 -0400 skrev Paul Koning via cctalk: > > On Oct 3, 2019, at 8:25 AM, Maciej W. Rozycki > > wrote: > > > > On Thu, 3 Oct 2019, Maciej W. Rozycki wrote: > > > > > > You need an extremely high resolution timer to detect slight > > > > differences in > > > > execution

Re: VAX + Spectre

2019-10-03 Thread Paul Koning via cctalk
> On Oct 3, 2019, at 8:25 AM, Maciej W. Rozycki wrote: > > On Thu, 3 Oct 2019, Maciej W. Rozycki wrote: > >>> You need an extremely high resolution timer to detect slight differences in >>> execution time of speculatively-executed threads. The VAX 11/780 certainly >>> did >>> not do

Re: Fwd: VAX + Spectre

2019-10-03 Thread Maciej W. Rozycki via cctalk
On Thu, 3 Oct 2019, Maciej W. Rozycki wrote: > > You need an extremely high resolution timer to detect slight differences in > > execution time of speculatively-executed threads. The VAX 11/780 certainly > > did > > not do speculative execution, and my guess is that all VAXen did not, > >

Re: Fwd: VAX + Spectre

2019-10-02 Thread Maciej W. Rozycki via cctalk
On Tue, 17 Sep 2019, Jon Elson via cctalk wrote: > > "Spectre" is one of two notorious bugs of modern CPUs involving speculative > > execution. I rather doubt that VAX is affected by this but I suspect others > > here have a lot more knowledge. > > > > > You need an extremely high resolution

Re: [Simh] Fwd: VAX + Spectre

2019-09-22 Thread Fred Cisin via cctalk
On Sun, 22 Sep 2019, Nemo via cctalk wrote: We had a secure (but not tempest) room built for us by an authorised contractor and they forgot to install A/C. It was unusable until a portable A/C was placed in it with complicated baffles letting the hot air out. Nobody except a college

Re: [Simh] Fwd: VAX + Spectre

2019-09-22 Thread Nemo via cctalk
On 18/09/2019, Guy Sotomayor Jr via cctalk wrote: > [...] > Yea, I had to make a trip to a “secure facility” once and there were entire > “tempest” rooms with conditioned power and no external communications > equipment. We had a secure (but not tempest) room built for us by an authorised

Re: [Simh] Fwd: VAX + Spectre

2019-09-18 Thread Guy Sotomayor Jr via cctalk
> On Sep 18, 2019, at 9:59 AM, Chris Elmquist wrote: > > On Wednesday (09/18/2019 at 09:19AM -0700), Guy Sotomayor Jr via cctalk wrote: >> >> >>> On Sep 18, 2019, at 12:42 AM, Liam Proven via cctalk >>> wrote: >>> >>> On Wed, 18 Sep 2019 at 02:19, Paul Koning via cctalk >>> wrote: >

Re: [Simh] Fwd: VAX + Spectre

2019-09-18 Thread Chris Elmquist via cctalk
On Wednesday (09/18/2019 at 09:19AM -0700), Guy Sotomayor Jr via cctalk wrote: > > > > On Sep 18, 2019, at 12:42 AM, Liam Proven via cctalk > > wrote: > > > > On Wed, 18 Sep 2019 at 02:19, Paul Koning via cctalk > > wrote: > >>> ... > >> Speaking of timing, that reminds me of two amazing

Re: [Simh] Fwd: VAX + Spectre

2019-09-18 Thread Guy Sotomayor Jr via cctalk
> On Sep 18, 2019, at 12:42 AM, Liam Proven via cctalk > wrote: > > On Wed, 18 Sep 2019 at 02:19, Paul Koning via cctalk > wrote: >>> ... >> Speaking of timing, that reminds me of two amazing security holes written up >> in the past few years. Nothing to do with the Spectre etc. issue. >>

Re: [Simh] Fwd: VAX + Spectre

2019-09-18 Thread Liam Proven via cctalk
On Wed, 18 Sep 2019 at 02:19, Paul Koning via cctalk wrote: > > ... > Speaking of timing, that reminds me of two amazing security holes written up > in the past few years. Nothing to do with the Spectre etc. issue. > > One is the recovery of speech from an encrypted VoIP channel such as Skype,

Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread ben via cctalk
Windows _is_ Bells and Whistles, plus a couple of gongs. No ... The GONGS is the chinese knock off.

Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread ben via cctalk
On 9/17/2019 1:08 PM, Fred Cisin via cctalk wrote: On Tue, 17 Sep 2019, Paul Koning via cctalk wrote: I could easily imagine a computer science exam question "Describe in one paragraph the specific design error that enabled the Meltdown attack". I used to have some related questions in my

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Paul Koning via cctalk
> On Sep 17, 2019, at 6:51 PM, dwight via cctalk wrote: > > ... > This latest one is bad for a touch typer or those that always enter the > password in the same way. It looks for the timing of when you hit keys and > then makes guesses on what keys would typically take that length of time

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread dwight via cctalk
Discussion: On-Topic and Off-Topic Posts ; SIMH Subject: Re: [Simh] Fwd: VAX + Spectre I can simplify the question a bit. I have to be careful as I work for Intel and I've been involved with a small bit of it on our end and some of the lawyers are a bit touchy about the whole situation. So I

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Clem Cole via cctalk
of modern CPUs involving > speculative execution. I rather doubt that VAX is affected by this but I > suspect others here have a lot more knowledge. > > > > paul > > > >> Begin forwarded message: > >> > >> From: co...@sdf.org > >> Subject

Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Liam Proven via cctalk
On Tue, 17 Sep 2019 at 21:09, Fred Cisin via cctalk wrote: > One student (who later became my best friend and buddy) > skipped the technical details and said, "The primary design error for > MacOS and Windoze (sic) is that they placed a lower priority on security, > than on being able to

Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread allison via cctalk
On 9/17/19 3:08 PM, Fred Cisin via cctalk wrote: > On Tue, 17 Sep 2019, Paul Koning via cctalk wrote: >> I could easily imagine a computer science exam question "Describe in >> one paragraph the specific design error that enabled the Meltdown >> attack". > > I used to have some related questions

Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Fred Cisin via cctalk
On Tue, 17 Sep 2019, Paul Koning via cctalk wrote: I could easily imagine a computer science exam question "Describe in one paragraph the specific design error that enabled the Meltdown attack". I used to have some related questions in my microcomputer operating systems class. One student

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Paul Koning via cctalk
> On Sep 17, 2019, at 2:35 PM, allison via cctalk wrote: > >>> ... > > I see this as a question of the number of angels that can dance on the > point of a pin. But could GCC compile code that has system access to > do nasties is a more complex question. Then again how does it get > system

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread allison via cctalk
Tue, Sep 17, 2019 at 9:55 AM Paul Koning >> wrote: >>> "Spectre" is one of two notorious bugs of modern CPUs involving >> speculative execution. I rather doubt that VAX is affected by this but I >> suspect others here have a lot more knowledge. >>> >

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Warner Losh via cctalk
actice. > > ᐧ > > > > On Tue, Sep 17, 2019 at 9:55 AM Paul Koning > wrote: > > "Spectre" is one of two notorious bugs of modern CPUs involving > speculative execution. I rather doubt that VAX is affected by this but I > suspect others here have a lot more

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Paul Koning via cctalk
e have a lot more knowledge. > > paul > >> Begin forwarded message: >> >> From: co...@sdf.org >> Subject: VAX + Spectre >> Date: September 17, 2019 at 5:32:42 AM EDT >> To: port-...@netbsd.org >> >> So, this is a bug report: >> https:/

Re: [Simh] Fwd: VAX + Spectre

2019-09-17 Thread Clem Cole via cctalk
rwarded message: > > *From: *co...@sdf.org > *Subject: **VAX + Spectre* > *Date: *September 17, 2019 at 5:32:42 AM EDT > *To: *port-...@netbsd.org > > So, this is a bug report: > https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86811 > > GCC would like to know if VAX needs S

Re: Fwd: VAX + Spectre

2019-09-17 Thread Jon Elson via cctalk
On 09/17/2019 08:55 AM, Paul Koning via cctalk wrote: "Spectre" is one of two notorious bugs of modern CPUs involving speculative execution. I rather doubt that VAX is affected by this but I suspect others here have a lot more knowledge. You need an extremely high resolution timer to detect

Re: Fwd: VAX + Spectre

2019-09-17 Thread Cameron Kaiser via cctalk
> "Spectre" is one of two notorious bugs of modern CPUs involving speculative > execution. I rather doubt that VAX is affected by this but I suspect others > here have a lot more knowledge. However, even speculative execution isn't enough to make Spectre possible or feasible. For example, the

Re: [Simh] VAX + Spectre

2019-09-17 Thread Zane Healy via cctalk
rather doubt that VAX is affected by this but I suspect others > here have a lot more knowledge. > > paul > >> Begin forwarded message: >> >> From: co...@sdf.org <mailto:co...@sdf.org> >> Subject: VAX + Spectre >> Date: September 17, 2019 at

Fwd: VAX + Spectre

2019-09-17 Thread Paul Koning via cctalk
"Spectre" is one of two notorious bugs of modern CPUs involving speculative execution. I rather doubt that VAX is affected by this but I suspect others here have a lot more knowledge. paul > Begin forwarded message: > > From: co...@sdf.org > Subject: VAX + Spe