https://www.engadget.com/2019/01/08/national-inventors-hall-of-fame-class-o…
The National Inventors Hall of Fame (NIHF) joined Engadget on stage
today at CES to announce its 2019 class of inductees. [ including ] ...
Dennis Ritchie (Posthumous) and Ken Thompson: UNIX Operating System
-------------------------------------------------------------------
Thompson and Ritchie's creation of the UNIX operating system and the C
programming language were pivotal developments in the progress of computer
science. Today, 50 years after its beginnings, UNIX and UNIX-like systems
continue to run machinery from supercomputers to smartphones. The UNIX
operating system remains the basis of much of the world's computing
infrastructure, and C language -- written to simplify the development
of UNIX -- is one of the most widely used languages today.
Cheers, Warren
Hi All.
Back in October I started a discussion about QED sources. A number of
people were kind enough to send me tarballs and zip files as well as
pointers to other archives.
I have finally cobbled it all together and made it available on GitHub:
https://github.com/arnoldrobbins/qed-archive
I have tried to acknowledge everyone who contributed.
Thanks again to all who did send me stuff and email me.
Enjoy,
Arnold
Off topic, but looking for help and wisdom.
If you visit https://www.scotnet.co.uk/iain/ <https://www.scotnet.co.uk/iain/>saratov you will see some photos of work that I have started on the front panel of a Capatob2.
I plan to get the switches and lights running on a blinkenbone board with a PDP8 emulation behind it. (I already have an PDP11/70 front-panel running on the same infrastructure)
I have been struggling for over a year to get much info about this saratov computer (circuit diagrams etc). So I have started the reverse engineering on the panel.
Does anybody know anything about this computer? online or offline it would be much appreciated.
Iain
Hi all, back from a few days holiday. Just a reminder that the TUHS list
is for things related to Unix. I don't mind a bit of topic drift, but if
the topic goes completely away from Unix then the conversation should
migrate to the COFF (Computer Old Farts Forum) list, coff(a)tuhs.org.
I'll mark the "Isaacson" thread as closed on TUHS, but feel free to
continue it over on COFF.
Thanks, Warren
Been wanting to wade into this for a few days but needed to think about how.
I think that we're all aware that RMS has atrocious personal habits. But I
don't think that this mailing list is the place to discuss them unless it's
somehow in the context of UNIX.
Many seem to excuse RMS's revisionist view of the history of technology on
the grounds that RMS claims that his memory isn't very good. I think that
if he knows that he doesn't remember things then he should refrain from
talking about them as if he does.
As others have said, I don't conflate coding prowess with the ability to
design. I've had many an argument with John Gilmore (one of the people
who doesn't mind footing the cleaning and repair bill after allowing RMS
to stay at his place) where he begins with "When I wrote GNU tar..." I've
always responded by saying that writing tar is no big deal; the specification
was the hard part.
One place where I completely disagree with RMS that I think is in context
for this list is his claim that Linux should be called GNU/Linux. I've
written tons of software in my life, and I don't preface the name of each
one with the parts list.
Even if one believed that such an attribution scheme made sense, I would
claim that it should be called internet/Linux. I would argue that Linux
would not have happened without the internet making it possible for folks
around the world to participate. And I think that there's a good chance
that the tools would have been created anyway.
Of course, I acknowledge that the GNU tools have been ported to Linux.
Big deal. I haven't seen RMS arguing for GNU/Windows now that Microsoft
has seen the light.
Like many of you, Linux is not where I first started using GNU tools; I
started using them on my Sun machines after Sun started charging extra
for the compiler and included a licensing system that was broken and often
interfered with getting work done.
Jon
I think the RMS stuff should go away. It's not because I love the guy,
I don't. It's because we have people like Ken and Rob and other heavy
hitters and my hunch is they have little patience for this sort of thing
(they might correct me if I'm wrong).
I'd love to call out RMS on his BS but this isn't the place. This is
the place for people who actually did real work on Unix to share those
stories. Or so I think, it's up to Warren, not me.
I was given a copy of Walter Isaacson's "The Innovators: How a Group of
Hackers, Geniuses, and Geeks Created the Digital Revolution". It devotes
ten pages to Stallman and Gnu, Torvalds and Linux, even Tannebaum and
Minix, but never mentions Thompson and Ritchie. Unix is identified only
as a product from Bell Labs from which the others learned something--he
doesn't say what. I have heard also that Isaacson's "Idea Factory"
(about Bell Labs) barely mentions Unix. Is Isaacson blind, biased,
or merely brainwashed?
In the case of Steve Jobs, Isaacson tells not just that the Alto system
from Xerox inspired him, but also who its star creators were: Lampson,
Thacker and Kay. But then he stomps on them: "Once again, the greatest
innovation would come not from the people who created the breakthroughs,
but from the people who applied them usefully." While he very describes
innovation as a continuum from invention through engineering to marketing,
he seems to be more impressed by the later stages.
Or maybe he just likes to tell stories, and didn't pick up all the
good ones about Ken. Isaacson describes spacewar, arguably the first
stage of computer-game innovation, at great length. At the same time,
all he has to say about early-stage operating systems is a single
sentence that credits John McCarthy with leading a time-sharing effort
at MIT. (In my recollection, McCarthy proseletized; Corbato led.) He
tells how ARPANET, which he says was mainly developed by BB&N, connected
time-shared computers, but breathes not a word about Berkeley's work,
without which ARPANET would have been an open circuit.
"Innovators" won general critical praise. A couple of reviews predicted
it would become the standard of the field. However, an evidently
knowledgeable review in IEEE Annals of the History of Computing faulted
it for peddling familiar potted legends without really digging for
deeper insight. Regarding Thompson and Ritchie, it looks more like
overt suppression.
Doug
> On Jan 5, 2019,Paul Winalski <paul.winalski(a)gmail.com> wrote:
>
> ... After Lampson
> left Xerox PARC he set up a similar outfit at Digital'--the Western
> Research Lab (WRL).
Actually, WRL was started by Forest Baskett, formerly of Stanford University. Butler Lampson joined DEC's Systems Research Center (SRC) shortly after it was formed by former PARC manager Bob Taylor.
> ... I was working in the software tools
> engineering group at the time, and we would have loved to take WRL's
> work and to incorporate it in our products. But we couldn't. Why?
> Because they wrote everything in Modula 3, and we were using BLISS.
SRC used Modula-3, and before that a similar language called Modula-2+. Originally, WRL used Modula-2, and then I think switched to C. Perhaps DEC’s engineering groups should also have switched from Bliss to C.
> Yes, PARC invented the modern windows-based GUI, but, as with so many
> PARC innovations, Xerox did nothing with it. Based on how the PARC
> alumni at WRL behaved at DEC,I would argue that this was the fault of
> PARC as much as of Xerox management.
Xerox built its Star office automation system based on PARC technology and with lots of support from PARC. Star was of course not a big success. PARC also invented laser printers, and Xerox made quite a bit of money from them.
Paul McJones (former Xerox SDD and DEC SRC member — I have been on both sides of the fence)
>>I have heard also that Isaacson's "Idea Factory" (about Bell Labs)
> Did you mean the work of this title by Jon Gertner?
Indeed. If should fact-check myself if I'm going to challenge
some one else's choice of facts.
Thanks for the catch,
Doug
>> From: Doug McIlroy
>> I have heard also that Isaacson's "Idea Factory" (about Bell Labs)
> Did you mean the work of this title by Jon Gertner? (I have yet to pull
> down my copy to see what it says about Unix
I looked, and it too says next to nothing about Unix (which it describes as a
"programming language" - pg. 346). Oh well.
This is really a pretty serious omission, given that the vast majority of
mobile devices now run Android, which is a Unix derivative (Linux). So just
about everyone has a Unix-derived thing in their pocket.
Noel
Long ago when we were running ACSnet
(https://en.wikipedia.org/wiki/MHSnet) we lacked graphical
workstations so we never saw the Bell Labs face mail
(https://en.wikipedia.org/wiki/Vismon) mechanism in action. I think
colleagues who later had Sun workstations might have briefly had
X-face in operation.
I see on Luca Cardelli's homepage that there was an icon for ACSnet
email, of course it is Kangaroo...
http://lucacardelli.name/indexArtifacts.html
scroll down Original 48x48 bitmaps for "face mail" at Bell Labs.
From: Doug McIlroy
> I have heard also that Isaacson's "Idea Factory" (about Bell Labs)
I was unable to find a book of this title by Isaacson? Did you mean the work
of this title by Jon Gertner? (I have yet to pull down my copy to see what it
says about Unix - it's in another room, and I'm lazy... :-)
> (In my recollection, McCarthy proseletized; Corbato led.)
I think that's an accurate 1-sentence summary.
> breathes not a word about Berkeley's work, without which ARPANET would
> have been an open circuit.
Can you elaborate on this point a bit - I'm not sure what it is you're
referring to?
> A couple of reviews predicted it would become the standard of the
> field.
Among people who spell 'Internet' with a lower-case 'i', perhaps it will
(sadly).
Noel
From: jkh(a)violet.Berkeley.EDU (Jordan K. Hubbard)
Subject: My Broadcast
Date: 2 April 1987 at 21:45:46 CEST
To: hackers_guild(a)ucbvax.Berkeley.EDU, tcp-ip(a)sri-nic.arpa
By now, many of you have heard of (or seen) the broadcast message I sent to
the net two days ago. I have since received 743 messages and have
replied to every one (either with a form letter, or more personally
when questions were asked). The intention behind this effort was to
show that I wasn't interested in doing what I did maliciously or in
hiding out afterwards and avoiding the repercussions. One of the
people who received my message was Dennis Perry, the Inspector General
of the ARPAnet (in the Pentagon), and he wasn't exactly pleased.
(I hear his Interleaf windows got scribbled on)
So now everyone is asking: "Who is this Jordan Hubbard, and why is he on my
screen??"
I will attempt to explain.
I head a small group here at Berkeley called the "Distributed Unix Group".
What that essentially means is that I come up with Unix distribution software
for workstations on campus. Part of this job entails seeing where some of
the novice administrators we're creating will hang themselves, and hopefully
prevent them from doing so. Yesterday, I finally got around to looking
at the "broadcast" group in /etc/netgroup which was set to "(,,)". It
was obvious that this was set up for rwall to use, so I read the documentation
on "netgroup" and "rwall". A section of the netgroup man page said:
...
Any of three fields can be empty, in which case it signifies
a wild card. Thus
universal (,,)
defines a group to which everyone belongs. Field names that ...
...
Now "everyone" here is pretty ambiguous. Reading a bit further down, one
sees discussion on yellow-pages domains and might be led to believe that
"everyone" was everyone in your domain. I know that rwall uses point-to-point
RPC connections, so I didn't feel that this was what they meant, just that
it seemed to be the implication.
Reading the rwall man page turned up nothing about "broadcasts". It doesn't
even specify the communications method used. One might infer that rwall
did indeed use actual broadcast packets.
Failing to find anything that might suggest that rwall would do anything
nasty beyond the bounds of the current domain (or at least up to the IMP),
I tried it. I knew that rwall takes awhile to do its stuff, so I left
it running and went back to my office. I assumed that anyone who got my
message would let me know.. Boy, was I right about that!
After the first few mail messages arrived from Purdue and Utexas, I begin
to understand what was really going on and killed the rwall. I mean, how
often do you expect to run something on your machine and have people
from Wisconsin start getting the results of it on their screens?
All of this has raised some interesting points and problems.
1. Rwall will walk through your entire hosts file and blare at anyone
and everyone if you use the (,,) wildcard group. Whether this is a bug
or a feature, I don't know.
2. Since rwall is an RPC service, and RPC doesn't seem to give a damn
who you are as long as you're root (which is trivial to be, on a work-
station), I have to wonder what other RPC services are open holes. We've
managed to do some interesting, unauthorized, things with the YP service
here at Berkeley, I wonder what the implications of this are.
3. Having a group called "broadcast" in your netgroup file (which is how
it comes from sun) is just begging for some novice admin (or operator
with root) to use it in the mistaken belief that he/she is getting to
all the users. I am really surprised (as are many others) that this has
taken this long to happen.
4. Killing rwall is not going to solve the problem. Any fool can write
rwall, and just about any fool can get root priviledge on a Sun workstation.
It seems that the place to fix the problem is on the receiving ends. The
only other alternative would be to tighten up all the IMP gateways to
forward packets only from "trusted" hosts. I don't like that at all,
from a standpoint of reduced convenience and productivity. Also, since
many places are adding hosts at a phenominal rate (ourselves especially),
it would be hard to keep such a database up to date. Many perfectly well-
behaved people would suffer for the potential sins of a few.
I certainly don't intend to do this again, but I'm very curious as to
what will happen as a result. A lot of people got wall'd, and I would think
that they would be annoyed that their machine would let someone from the
opposite side of the continent do such a thing!
Jordan Hubbard
jkh(a)violet.berkeley.edu
(ucbvax!jkh)
Computer Facilities & Communications.
U.C. Berkeley
On 4 Jan 2019, at 21:46, Clem Cole <clemc(a)ccc.com> wrote:
>From where did that wonderful clip come? It's clearly a sequence from something else. I've never seen it before.
>Thanks,
>Clem
They were from my email archives of Hackers_Guild and the umd cs department staff mailing list. Does anybody else have any h_g archives sitting around?
Here’s some more funny stuff about the NSA! Gotta love how Brian Reid and Rick Adams weigh in. ;)
-Don
From: yee(a)dali.berkeley.edu (Peter E. Yee)
Subject: For those who missed 997@lll-crg, here it is
Date: 19 November 1985 at 15:58:08 CET
To: hackers_guild(a)ucbvax.berkeley.edu
Relay-Version: version B 2.10.3 4.3bsd-beta 6/6/85; site lll-crg.ARpA
Posting-Version: version B 2.10.3 4.3bsd-beta 6/6/85; site lll-crg.ARpA
Path: lll-crg!bandy
From: bandy(a)lll-crg.ARpA (Andrew Scott Beals)
Newsgroups: net.net-people
Subject: oh YES the NSA is on the net!
Message-ID: <997(a)lll-crg.ARpA>
Date: 19 Nov 85 07:11:36 GMT
Date-Received: 19 Nov 85 07:11:36 GMT
References: <324(a)ucdavis.UUCP> <2253(a)umcp-cs.UUCP>
Reply-To: bandy(a)lll-crg.UUCP (Andrew Scott Beals)
Distribution: net
Organization: Computation Research Group, Lawrence Livermore Labs
Lines: 94
Summary: (let's say) unintentional dis-information corrected
In article <2253(a)umcp-cs.UUCP> tlr(a)umcp-cs.UUCP (Terry L. Ridder) writes:
I can almost guarantee that the National Security Agency is
not on USENET or ARPANET. I can further almost guarantee that
very few employees of NSA are even aware that USENET exist.
Signed
Terry L. Ridder
UUCP: seismo!(mimsy.umd.edu|neurad)!bilbo!wiretap!(root|tlr)
^^^^^^^
PHONE: 301-490-2248 (home) 301-859-6642 (work)
Right.
There used to be a host called "TYCHO" (nickname "NSA") at host
zero on imp fifty-seven. (26.0.0.57) (information taken from the old
NIC (Network Information Center for Internet) host tables)
Now there is a machine called "DOCKMASTER" on that same imp port
(TYCHO was an old PDP-11 running version 6 unix (which rumors had
flown for quite some time that someone actually proved was secure)).
Here is what the NIC has to say about DOCKMASTER:
The National Computer Security Center (DOCKMASTER)
820 Elkridge Landing Road
Room A1127, Building FANX-II
Linthicum, MD 21090
NetAddress: 26.0.0.57
Nicknames: NCSC-MULTICS
Host Administrator and Liaison:
Aliff, Stephen W. (SWA1) Aliff.DODCSC@MIT-MULTICS
(301) 850-5888
Multics, if I remember correctly, was just given some level of
certification by the government that it was secure. Interesting, no?
Unfortunately, I'm not nearly as much of a Packrat as some might like
to think so I don't have a Maryland phone book (I do have my silly
putty though), so I can't tell you where this exchange is located
(nor where Terry's work number is located). However, looking up
Linthicum MD (I was born and raised just north of DC) shows that
it's just north of BWI (airport). There is a NASA center right near
there and next to that is an un-marked (of course) NSA center.
All of this points that imp 57 is still NSA's imp.
NIC has this to say about host 1 on imp 57:
National Security Agency (COINS-GATEWAY)
COINS Network Control Center
Fort George G. Meade, MD 20755
NetAddress: 26.1.0.57
Nicknames: COINS
Host Administrator and Liaison:
Smith, Ronald L. (RLS6) COINS@USC-ISI
(301) 688-6375
The NIC generally likes to give a machine the name "-GATEWAY" when
that machine is a gateway into another part of the internet. (the
machine type of COINS is a Plurbus, which is a multiprocessor
gateway machine manufactured by BBN (the folks who do the ARPANET
and MILNET hardware).
In any case, it seems that Mr Ridder is un-(or mis-?)informed.
Side note: at the last (Portland) USENIX, I happened across a
gentlemen (very cleancut) whose badge listed him as working for the
"Department of Defense, Fort Meade Maryland". I said "Oh, you're one
of those NSA guys!" To which he replied "How did you know?!"...
"Everyone else in DOD says /which/ part of DOD they work for..."
andrew scott beals
lawrence livermore national laboratory/university of california
Pooh-bah for LLL-CRG.ARPA
(415) 423-1948 (work) (533-1948 (FTS))
ps. In case anyone is wondering and before you go giving my name to
people that I don't want to talk to (like the Kind Folks at the NSA
(but I'm sure they've heard of me or will before I finish up with my
current round of paperwork with the DOE/OPM/FBI)), I obtained all of
this information through public channels.
--
There once was a thing called a V-2,
To pilot which you did not need to--
You just pushed a button,
And it would leave nuttin'
But stiffs and big holes and debris, too.
andy beals - bandy(a)lll-crg.arpa - {seismo,ihnp4!sun,dual}!lll-crg!bandy
From: jordan(a)ucbarpa.berkeley.edu (Jordan Hayes)
Subject: Re: ``dockmaster''
Date: 19 November 1985 at 16:27:34 CET
To: hackers_guild(a)ucbvax.berkeley.edu
for those so inclined, they should look at what is on port 2 of that
imp ... hmmm ... sorta like putting the CIA on port 4 of imp 78 ...
/jordan
From: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Subject: Re: ``dockmaster''
Date: 19 November 1985 at 18:27:27 CET
To: hackers_guild(a)ucbvax.berkeley.edu, jordan(a)ucbarpa.berkeley.edu
Maryland lets NSA people use mimsy. The NSA is interested in the
supercomputer designs that they're working on there... (which is
why they have an imp connection)
In any case, I just got a long note from Mr Ridder. I'll forward
it to you when I'm done reading my mail...
andy
From: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Subject: message from Mr. Ridder
Date: 19 November 1985 at 18:31:44 CET
To: hackers_guild(a)lll-crg.ARPA
From tlr(a)mimsy.umd.edu Tue Nov 19 06:13:44 1985
Date: Tue, 19 Nov 85 09:12:54 EST
From: Terry L. Ridder <tlr(a)mimsy.umd.edu>
Subject: Your posting
Mr. Andrew Scott Beals
I am writing to inform you of at least two facts:
The computer named "wiretap" belongs to my children,
age 9, age 7, age 2. Jennifer, the 7 year old, named
the computer. Sarah, the 9 year old, named the other
computer "bilbo".
Bilbo and wiretap are both private machines. The are
owned by my family and I. They are in no way shape or
form associated with the NSA.
Concerning your posting, I am concerned that you have
no regard for the safety of federal employees. Your
posting is marked for distribution "net", if you would
look at the two previous posting they are marked for
distribution 'usa'. Therefore, you probably have just
told most of the world the location of what you believe
to be an NSA facility. This probably has made the location
a target for any of a number of terrorist groups. What if
you are wrong? You have place in danger the lifes of
innocent people. Just because you may think you know something
does not mean that you tell most of the world.
I would hope that in the future that you would take the
time to think about all the ramifications before making
a posting, similiar in nature to the one in question.
I would hope that you will send out a cancel message on
your posting, before it gets to far.
I sincerely hope that you restrict your speculations about
my family's association with any federal agency. I hope
also that you are mature enough to post an apology for
inferring that my computers were associated with the NSA.
I do not want to think of what the implications are from
that speculation on your part. You may have damaged my
family's reputation and my own reputation.
Please be a little more responsible in the future.
Engage brain before fingers.
Signed
Terry L. Ridder
for the Terry L. Ridder family
---------------------
From: fair(a)ucbarpa.berkeley.edu (Erik E. Fair)
Subject: Re: message from Mr. Ridder
Date: 19 November 1985 at 18:42:34 CET
To: bandy(a)lll-crg.ARPA
Cc: Hackers_Guild(a)ucbvax.berkeley.edu
I wonder if this bozoid has ever read `The Puzzle Palace'?
It identifies several `secret' NSA installations, including
one out in the wilds of Sonoma, just over the border from
Marin County, along the road from Tomales to Petaluma. All
from public sources and Freedom Of Information Act suits.
Erik E. Fair ucbvax!fair fair(a)ucbarpa.berkeley.edu
P.S. Be sure to waive hello in your Email to the folks at the
Maryland Procurement Office...
From: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Subject: Re: message from Mr. Ridder
Date: 19 November 1985 at 19:11:36 CET
To: fair(a)ucbarpa.berkeley.edu
Cc: Hackers_Guild(a)ucbvax.berkeley.edu
[mimsy.umd.edu]
Login name: tlr In real life: Terry L. Ridder
Office: Laurel MD 20707 Office phone: 859-6642
Home phone: 490-2248 Arpanet Sponsor
Directory: /u/tlr Shell: /bin/csh
Last login Tue Nov 19 09:17 on tty04
Project: To find a new job, raise three children, and have time for the wife.
Plan: To move overseas.
----------------------
Well, this is what it has to say about him. Arpanet sponsor, eh?
andy
From: fair(a)ucbarpa.berkeley.edu (Erik E. Fair)
Subject: Re: message from Mr. Ridder
Date: 19 November 1985 at 19:48:41 CET
To: bandy(a)lll-crg.ARPA
Cc: Hackers_Guild(a)ucbvax.berkeley.edu
Ask Chris Torek what an `Arpanet Sponsor' is...
Erik
From: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Subject: more follies, dt if uninterested
Date: 20 November 1985 at 02:10:30 CET
To: hackers_guild(a)lll-crg.ARPA
Seems that the gentleman doesn't read his fucking news before going
off at the handle. I sent him an "Excuse me, but if you look at
article ..." note.
LLL General consul? Snicker snicker. Maybe Postmaster or root or
usenet will get a nice note from him telling me what a Bad Boy I've
been... :-)
andy
-----------------------
Date: Tue, 19 Nov 85 18:46:28 EST
From: Terry L. Ridder <tlr(a)mimsy.umd.edu>
Subject: apology is inorder
Mr. Andrew Scott Beals
I again ask that you act in a mature manner and post an
apology concerning your inferring that my private computers
are associated with the NSA.
If you choose not to, would you be kind enough to inform me
what the phone number is for LLL general consul is?
Signed
Terry L. Ridder
From: jordan(a)ucbarpa.berkeley.edu (Jordan Hayes)
Subject: Re: ridder me this ...
Date: 20 November 1985 at 02:59:22 CET
To: hackers_guild(a)ucbvax.berkeley.edu
Methinks either the man is an idiot or he's not really a force to
be reckoned with. If his main mail machine is mimsy, that means he's
on the same imp ... since NSA people have accounts at umd, maybe he's
FROM the NSA ... hmmm ...
/jordan
From: Milo S. Medin (NASA ARC Code ED) <medin(a)orion.ARPA>
Subject: Re: message from Mr. Ridder
Date: 20 November 1985 at 03:03:55 CET
To: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Cc: fair(a)ucbarpa.berkeley.edu, Hackers_Guild(a)ucbvax.berkeley.edu
LLL general counsel? uh oh..... That means lawyers....
Milo
From: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Subject: ridder me this
Date: 20 November 1985 at 03:14:56 CET
To: hackers_guild(a)lll-crg.ARPA
One of my sources tells me that Mr Ridder is indeed an NSA person. Chris
Torek told me that an "Arpanet Sponsor" in their terminology means that
he's one of the people who helped them get on the network.
andy
From: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Subject: Re: Ridder me this (qualification)
Date: 20 November 1985 at 03:31:22 CET
To: bandy(a)ll-crg.ARPA, deboor%buddy(a)ucbvax.berkeley.edu
Cc: hackers_guild(a)ucbvax.berkeley.edu
Oh, I already sent him an apology. Here it is:
Relay-Version: version B 2.10.3 4.3bsd-beta 6/6/85; site lll-crg.ARpA
Posting-Version: version B 2.10.3 4.3bsd-beta 6/6/85; site lll-crg.ARpA
Path: lll-crg!bandy
From: bandy(a)lll-crg.ARpA (Andrew Scott Beals)
Newsgroups: net.net-people
Subject: Apology to Terry Ridder
Message-ID: <998(a)lll-crg.ARpA>
Date: 19 Nov 85 17:37:12 GMT
Date-Received: 19 Nov 85 17:37:12 GMT
References: <324(a)ucdavis.UUCP> <2253(a)umcp-cs.UUCP> <997(a)lll-crg.ARpA>
Reply-To: bandy(a)lll-crg.UUCP (Andrew Scott Beals)
Distribution: net
Organization: Computation Research Group, Lawrence Livermore Labs
Lines: 15
I would like to take this opportunity to formally extend my
apologies to Terry L. Ridder (tlr(a)mimsy.umd.edu) and his family for
insinuating that their home machines (bilbo and wiretap) and any
association with any Federal agency (the NSA in this case).
andrew scott beals
uc/llnl
--
There once was a thing called a V-2,
To pilot which you did not need to--
You just pushed a button,
And it would leave nuttin'
But stiffs and big holes and debris, too.
andy beals - bandy(a)lll-crg.arpa - {seismo,ihnp4!sun,dual}!lll-crg!bandy
---------------------
What was interesting was that the file was ~news/net/net-people/666 ...
Tee hee hee.
andy
From: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Subject: calling LLL {lawyers,diplomats}
Date: 20 November 1985 at 03:38:35 CET
To: hackers_guild(a)lll-crg.ARPA
Of course, they'll tell him that "Anything that our employees say
is their own opinion unless they are a member of the LLNL Public
Information group and are speaking in an official capacity."
"Pin-heads. Pin-heads. Roly-poly pin-heads. Pin-heads. Pin-heads.
Watch them lose. Yow!"
andy
From: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Subject: teehee
Date: 20 November 1985 at 17:18:25 CET
To: hackers_guild(a)ucbvax.berkeley.edu
From reid@glacier Wed Nov 20 06:59:01 1985
Date: Wed, 20 Nov 85 06:57:35 pst
From: Brian Reid <reid@glacier>
Subject: Re: Apology to Terry Ridder
Newsgroups: net.net-people
Organization: Stanford University, Computer Systems Lab
Terry Ridder is one of the biggest assholes on earth, and I can't fathom
anybody owing him an apology about anything. Oh well.
--
Brian Reid decwrl!glacier!reid
Stanford reid(a)SU-Glacier.ARPA
From: Andrew Scott Beals <bandy(a)lll-crg.ARPA>
Subject: philngai on tlr
Date: 21 November 1985 at 07:21:35 CET
To: hackers_guild(a)lll-crg.ARPA
From amdcad!phil Wed Nov 20 20:41:58 1985
Date: Wed, 20 Nov 85 20:08:04 pst
From: amdcad!phil (Phil Ngai)
Subject: Re: message from Mr. Ridder
what kind of asshole names a computer wiretap and then complains when
others make seemingly reasonable assumptions about it?
who should engage their brain, that's what i want to know.
--
Raise snails for fun and profit! Race them for amusement! Then eat the losers!
Phil Ngai +1 408 749-5720
UUCP: {ucbvax,decwrl,ihnp4,allegra}!amdcad!phil
ARPA: amdcad!phil(a)decwrl.dec.com
From: cuuxb!jab(a)lll-crg.ARPA
Subject: Re: message from Mr. Ridder
Date: 24 November 1985 at 02:25:13 CET
To: lll-crg!sdcsvax.arpa!hutch(a)lll-crg.ARPA
Cc: lll-crg!hackers_guild(a)ucbvax.berkeley.edu
The Ridder guy is a jerk. I would wonder why the ARPANET knows about his
private machines, anyhow: sounds like a misuse of government funding.
Jeff Bowles
Lisle, IL
From: Donnalyn Frey <donnalyn(a)seismo.css.gov>
Subject: Re: private machines on internet
Date: 24 November 1985 at 06:08:34 CET
To: cuuxb!jab(a)lll-crg.ARPA, deboor%buddy(a)ucbvax.berkeley.edu
Cc: hackers_guild(a)ucbvax.berkeley.edu
Ridders machines are NOT on the arpanet. They have uucp links to
Uof Maryland. Ridder himself has an account on mimsy.umd.edu.
Ridders two machines were named by his children. ONe had
just finished reading teh Hobbit (hence bilbo, despite the
2 other known bilbos [not to be confused with certain dildos being discussed])
and the other had finished some spy book, hence wiretap.
He is quite pompous and seems to think the world revolves around
him. We asked him to rename "bilbo" to not conflict. He replied that
the other machines should change because he had already named his
machine.
By the way, we're talking about toys here (maybe somthing as expensive
as an IBM-PC) not the "real" machines you might be led to believe.
He is best ignored.
---rick
(I originally posted this to hacker news, but I’ll repost it here too.)
At the University of Maryland, our network access was through the NSA's "secret" MILNET IMP 57 at Fort Mead. It was pretty obvious that UMD got their network access via NSA, because mimsy.umd.edu had a similar "*.57" IP address as dockmaster, tycho and coins.
https://emaillab.jp/dns/hosts/
HOST : 26.0.0.57 : TYCHO : PDP-11/70 : UNIX : TCP/TELNET,TCP/SMTP,TCP/FTP :
HOST : 26.0.0.57 : DOCKMASTER.NCSC.MIL,DOCKMASTER.DCA.MIL, DOCKMASTER.ARPA : HONEYWELL-DPS-8/70 : MULTICS : TCP/TELNET,TCP/FTP,TCP/SMTP,TCP/ECHO,TCP/DISCARD,ICMP :
HOST : 26.1.0.57 : COINS-GATEWAY,COINS : PLURIBUS : PLI ::
HOST : 26.2.0.57, 128.8.0.8 : MARYLAND,MIMSY,UMD-CSD,UMD8,UMCP-CS : VAX-11/780 : UNIX : TCP/TELNET,TCP/FTP,TCP/SMTP,UDP,TCP/ECHO,TCP/FINGER,ICMP :
https://multicians.org/site-dockmaster.html
Whenever the network went down (which was often), we had to call up a machine room at Fort Mead and ask them to please press the reset button on the box labeled "IMP 57". Sometimes the helpful person who answered the phone had no idea which box I meant, so I had describe to him which box to reset over the phone. ("Nope, that didn't work. Try the other one!" ;) They were even generous enough to issue us (CS department systems staff and undergrad students) our own MILNET TACACS card.
On mimsy, you could get a list of NSA employees by typing "grep contact /etc/passwd", because each of their courtesy accounts had "network contact" in the gecos field.
Before they rolled out TACACS cards, anyone could dial up an IMP and log in without a password, and connect to any host they wanted to, without even having to murder anyone like on TV:
https://www.youtube.com/watch?v=hVth6T3gMa0
I found this handy how-to tutorial guide for "Talking to the Milnet NOC" and resetting the LH/DH, which was useful for guiding the NSA employee on the other end of the phone through fixing their end of the problem. What it doesn't mention is that the key box with the chase key was extremely easy to pick with a paperclip.
Who would answer the Milnet NOC's 24-hour phone was hit or miss: Some were more helpful and knowledgeable than others, others were quite uptight.
Once I told the guy who answered, "Hi, this is the University of Maryland. Our connection to the NSA IMP seems to be down." He barked back: "You can't say that on the telephone! Are you calling on a blue phone?" (I can't remember the exact color, except that it wasn't red: that I would have remembered). I said, "You can't say NSA??! This is a green phone, but there's a black phone in the other room that I could call you back on, but then I couldn't see the hardware." And he said "No, I mean a voice secure line!" I replied, "You do know that this is a university, don't you? We only have black and green phones.”
Date: Thu, 11 Sep 86 13:53:45 EDT
From: Steve D. Miller <steve(a)brillig.umd.edu>
To: staff(a)mimsy.umd.edu
Subject: Talking to the Milnet NOC
This message is intended to be a brief tutorial/compendium of
information you probably want to know if you need to see about
getting the LH/DH thingy (and us) talking to the world.
First, you need the following numbers:
(1) Our IMP number (57),
(2) Mimsy's milnet host address (26.2.0.57),
(3) The circuit number for our link to the NSA
(DSEP07500-057)
(4) The NOC number itself (692-5726).
Second, you need to know something about the hardware. There
are three pieces of hardware that make up our side of the link:
the LH/DH itself, the ECU, and the modem. The LH/DH and the
ECU are the things in the vax lab by brillig; the ECU is the
thing on top (with the switches), and the LH/DH is the thing
on the bottom. The normal state is to have the four red LEDs
on the ECU on and the Host Master Ready, HRY, Imp Master Ready,
and IRY lights on at the LH/DH. If these lights are not on,
something is wrong. If mimsy is down, then we'll only have some
of the lights on, but that should fix itself when mimsy comes up.
Some interesting buttons or switches on the ECU are:
reset - resets something or another
stop - stops something or another
start - restarts something or another
local loopback -- two switches and two leds; you may need
to throw one or the other of these if the NOC asks
you to. These loopback switches should be distinguished
from those on the modem itself.
remote loopback -- like local loopback, but does something else.
The modem is in the phone room beside the terminal room (rm.
4322, if memory serves). It can be opened with the chase key from
the key box...but if someone official and outside of staff asks
you that, you probably shouldn't admit to it. It has a switch on
it, too; it seems that switch normally rests in the middle, and
there's a "LL" setting to the left which I assume puts the modem in
local loopback mode.
Now that you have some idea of where things are, call the NOC.
Identify yourself as from the University of Maryland, and say that
we're not talking to the outside world. They will probably ask for
our Milnet address or the number of the IMP we're connected to,
and will then poke about and see what's happening. They will ask
you to do various things; ask if you're not sure what they mean,
but the background info above should help in puzzling it out.
Hopefully, this will make it easier to find people to fix
our net problems in the future; it's still hard to do 'cause
we have so little info (no hardware manual, for example),
but this should give us a fighting chance.
-Steve
There were rumored to be "explosive bolts" on the ARPA/MILNET gateways (whether they were metaphorical or not, I don't know).
Here's something interesting that Milo Medin wrote about dual homed sites like NSA and NASA, that were on both the ARPANET and MILNET:
To: fair(a)ucbarpa.berkeley.edu (Erik E. Fair)
Cc: Hackers_Guild(a)ucbvax.berkeley.edu, ucdavis!ccohesh(a)ucbvax.berkeley.edu
Subject: Re: a question of definition
Date: Thu, 29 Jan 87 15:33:35 PST
From: Milo S. Medin (NASA ARC Code ED) <medin(a)orion.arpa>
Right, the core has many gateways on it now, maybe 20-30. All the LSI's will
be stubbed off the core however, and only buttergates will be left after
the mailbridges and EGP peers are all converted. Actually, I think DARPA is
paying for it all...
Ames is *not* getting a mailbridge. You are right of course, that we could
use 2 gateways, not just 1 (actually, there will be a prime and backup anyways),
and then push routing info appropriately. But that's anything but simple.
Firstly, the hosts have to know which gateway to send a packet to a given
network, and thus have to pick between the 2. That's a bad idea.
It also means that I have to pass all EGP learned info around on the
local cable, and if I do that, then I can't have routing info from
the local cable pass out via EGP. At least not without violating
the current EGP spec. Think about it. It'd be really simple to
create a loop that way. Thus, in order to maximize the use of both
PSN's, you really need one gateway wired to both PSN's, and just
have it advertise a default route inside. Or use a reasonble IGP,
of which RIP (aka /etc/routed stuff) is not. I'm hoping to get
an RFC out of BBN at this IETF meeting which may go a long way in
reducing the use of RIP as an IGP.
BTW, NSA is an example of a site on both MILNET and ARPANET but without
a mailbridge...
There is no restriction that a network can only be on ARPANET or MILNET.
That goes against the Internet model of doing things. Our local
NASA gatewayed nets will be advertised on both sides. The restriction
on BARRNet is that the constituent elements of BARRNet do not all
have access to MILNET. NSF has an understanding with DARPA and
DCA that NSFnet'd sites can use ARPANET. That does not extend to
the MILNET. Thus, Davis can use UCB's or Stanford's, our even NASA's
ARPANET gateways, with the approval of the site of course, but
not MILNET, even though NASA has MILNET coverage. Thus we are required
to restrict BARRNet routing through our MILNET PSN. If we were willing
to sponsor UCB's MILNET access, for some requirement which NASA
had to implement, then we would turn that on. But BARRNet itself will
but cutoff to MILNET (and probably ARPANET too) at Ames, but not
cut off to other NASA centers or sites that NASA connects. There is
no technical reason that prevents this, in fact, we have to take
special measures to prevent it. But those are the rules. Anyways,
mailbridge performance should improve after the conversion, so
UCB should be in better shape. And you'll certainly be able to
talk to us via BARRNnet... I have noticed recently that MILNET<->
ARPANET performance has been particularly poor... Sigh.
The DCA folks feel that in case of an emergency they may be
forced to use an unsecure network to pass certain info around. The
DDN brochure mentions SIOP related data for example. Who knows,
if the balloon goes up, the launch order might pass through Evans
Hall on its way out to SAC... :-)
Milo
I dug up an "explosive bolts" reference -- fortunately that brilliant plan didn't get far.
(Milo Medin knows this stuff first hand: https://innovation.defense.gov/Media/Biographies/Bio-Display/Article/139585… )
To: fair(a)ucbarpa.berkeley.edu (Erik E. Fair)
Cc: ucdavis!ccohesh(a)ucbvax.berkeley.edu, Hackers_Guild(a)ucbvax.berkeley.edu
Subject: Re: a question of definition
Date: Thu, 29 Jan 87 12:29:36 PST
From: Milo S. Medin (NASA ARC Code ED) <medin(a)orion.arpa>
Actually its:
SCINET -- Secret Compartmented Information Net (if you don't know what
compartmented means, you don't need to ask)
DODIIS -- DoD Intelligence Information Net
The other stuff I think is right, at least without me looking things
up. I probably shouldn't have brought this subject of the secure part
of the DDN up. People like being low key about such things...
Erik, all the BBN gateways on MILNET and ARPANET currently comprise
the core, not just mailbridges. Some are used as site gateways, others
as EGP neighbors, etc... And just because you are dual homed doesn't mean
you get a mailbridge. And the IETF doesn't deal with low level stuff
like that; DCA does all that. In fact, the reason we are getting an
ARPANET PSN is because when DCA came out to do a site survey, they
liked our site so much they asked if they could put one here! It's
amazing how many sites have tried to get ARPANET PSN's the right
way and have had to wait much longer than us... BTW, since we are
dual homed (probably a gateway with 2 1822 interfaces in it), we
are taking steps to be sure that people on ARPANET or MILNET can't
use our gateway to bypass the mailbridges. The code will be hacked
to drop all packets that aren't going to a locally reachable network.
BARRNet, even though its locally reachable, will be excluded
from this however, since the current procedural limitations call for
not allowing any BARRNet traffic to flow out of BARRNet to MILNET
and the reverse. NASA traffic of course can traffic through BARRNet,
and even use ARPANET that way (though that's not a big deal when
we get our own ARPANET PSN). That's because only NASA is authorized
to directly connect to MILNET, not UCB or Stanford, etc...
DCA must have the ability to partition the ARPANET and MILNET in
case of an "emergency", and having non-DCA controlled paths between
the nets prevents that. There was talk some time ago about putting
explosive bolts in the mailbridges that would be triggered by
destruct packets... That idea didn't get far though...
The DDN only includes MILNET,ARPANET,SCINET,etc... Not the attached
networks. If it did, you'd need to file a TSR to add a PC to your
local cable. A TSR is a monstrous piece of paperwork that needs to
be done anytime anything is changed on the DDN... Rick knows all
about them don't you Rick?
The whole network game is filled with acronyms! I gave up trying
to write documents with full explainations in terms long ago...
I have yet to see a short and concise (and correct) way of describing
DDN X.25 Standard Service for example... That's probably one of the
harder things about getting into networking these days. We won't
even talk about Etherbunnies and Martians and other Millspeak...
Milo '1822' Medin
The issue of a.out magic numbers came up. The a.out header was 16 bytes. The first two bytes was 0407 in the original code. This was followed by 16 bit quantities for text, data, and bss sizes. Then the size of the symbol tables. I'm pretty sure the rest of the fields were blank in V6. Later a start address (previously always assumed to be zero) was added.
The number 407 was a neat kludge. It was a (relative) branch instruction on the PDP-11. 0400 was the base op code. 7 referred to jumping ahead 7 words which skipped you over the a.out header (the PC had already been incremented for the branch instruction itself). This allowed you to make a boot block without having to strip off the header. Boot blocks were just one 512 byte block loaded from block zero of the disk into low memory.
Later executables used 410 for a write protected text segment and 411 for split-I/D executables. Later versions added more codes (413 was used in BSD to indicate aligned pages followed etc... Even later systems coded the hardware type into the magic number to distinguish between different architectures.
Note that the fact that 410 and 411 were also PDP-11 branch instructions wasn't ever really used for anything.
According to my notes, the ARPAnet was converted from NCP to TCP on this
day in 1983; except for a temporary dispensation for a few hosts, NCP
support was switched off.
And as every Unix geek knows, today in 1970 is Unix's time epoch.
Trivia: I found a web site that thinks that that's my birthday! Not even
close; try October 1952 instead...
-- Dave
Warner Losh:
But wasn't it tsort that did the heavy lifting to get things in order?
ar c foo.a `tsort *.o`
Ranlib just made it fast by adding an index..
====
There's a little more than that to ranlib.
Without ranlib, ld made a single pass through each library,
loading the modules that resolved unresolved symbols. If
a module itself had unresolved symbols (as many do) and
some of those symbols were defined in a module ld had
already passed, you were out of luck, unless you explicitly
told ld to run a second pass, e.g. cc x.o y.o -la -la.
Hence the importance of explicit ordering when building
the library archive, and the usefulness of tsort.
Ranlib makes a list of all the .o file in this archive and
the global symbols defined or used by each module, and
places the list first in the archive. If ld is (as it
was) changed to recognize the index, it can then make a
list of all the object files needed from this archive, even
if needed only by some file it will load from the same
archive, then collect all required modules in a single pass.
Ld could all along have just made two passes through the
library, one to assemble the same list ranlib did in advance,
a second to load the files. (Or perhaps a first pass to
load what it knows it needs and assemble the list, and a
second only if necessary.) Presumably it didn't both to
make ld simpler and because disk I/O was much slower back
then (especially on a heavily-loaded time-sharing system,
something far less common today). I suspect it would work
fine just to do it that way today.
Nowadays ranlib is no longer a separate program: ar
recognizes object files and maintains an index if any are
present. I never especially liked that; ar is in
principle a general tool so why should it have a special
case for one type of file? But in practice I don't know
anyone who uses ar for anything except libraries any more
(everyone uses tar for the general case, since it does a
better job). Were I to wave flags over the matter I'd
rather push to ditch ar entirely save for compatibility
with the past, move to using tar rather than ar for object
libraries, and let ld do two passes when necessary rather
than requiring that libraries be specially prepared. As
I say, I think modern systems are fast enough that that
would work fine.
Norman Wilson
Toronto ON
Happy New Year to you all. It's also the year we will celebrate the
50th anniversary of the Unix timesharing system. Just FYI, I hope to
be in Los Angeles the week before the 2019 Usenix ATC, to go to the
CHM. Then to Seattle before the ATC to visit the LCM+L, then the ATC.
Hope to see some of you along the way.
I'm feeling the need to get a few other people to help out curate and
maintain the Unix Archive. Not that it changes very often, but it might
help to have some fresh eyes (and opinions) look at it and add/improve it.
So if there is any interest from a few of the long-time TUHS members,
please e-mail me. I run Nextcloud on the server, so if you can run a
client at your end and have about 4G spare disk space (or less if
you are only interested in a specific section), that would be great.
I'll be away for about 7 days but I'll try to read/respond to e-mails.
Cheers, Warren
I found this project online recently. For those who love K&R and the 64 bit world.
https://github.com/gnuless/ncc
It outputs to a custom a.out format so it's not immediately usable.
It's a dual clause BSD license too!
Dear Unix Enthusiasts,
We are seriously considering upgrading our PDP 11/40 clone (SIMH), to a PDP 11/45 (preferably another SIMH) for our Unix v6 installation. Our CEO was traveling and met a techie in first class (seriously, first class?) who told him that we needed one. I thought I had better ask some folks who have gone before about it before we jumped on the bandwagon. By way of background, Our install is pretty small with a few rk’s and 256K of ram along with a few standard peripherals, and some stuff our oldtimers refuse to part with (papertape, card punch, etc). It has fairly low utilization - a developer logs in and writes code every few days and the oldtimers hunt the wumpus and play this weird Brit game about cows. It could be considered a casual development and test environment and an occasional gaming console.
Here is what I would like to know that I think y’all might be particularly equipped to answer:
1. Are there any v6 specific concerns about upgrading?
2. Why should we consider taking the leap to the 11/45? Everything seems to work fine now.
3. If we jump in and do the upgrade, how can we immediately recognize what has changed in the environment? I.e what are some things that we can now do that we couldn’t do before?
4. If we just insert our current diskpacks into the new system, will it just boot and work? Or what do we need to before/after booting to prepare/respond to the new system?
5. Is 256K enough memory or what configuration do y’all recommend?
6. Is there anything else we need to know about?
Regards,
Will
Sent from my iPhone
> From: Larry McVoy
> And cron is really 3246 bytes? And 2054 for init? Don't those seem too
> small? Linux's cron is 44472 and that's with shared libs
No, 3246 is the same as mine, and my init (which has a few changes from stock) is
2064.
I'm not surprised the later one is 44KB - that's in part due to the denseness
of PDP-11 binary (and the word-size is only 16 bits), but more broadly, I
expect that it goes to my complaint about later Unixes - they've lost, IMO,
the single most important thing about the PDP-11 Unixes, which is their
bang/buck ratio.
Noel
We lost Rear Admiral "Amazing" Grace Hopper on this day in 1992; amongst
other things she gave us COBOL and ADA, and was allegedly responsible for
the term "debugging" when she removed a moth from a relay on the Harvard
Mk I.
-- Dave
> From: Will Senn
> We are seriously considering upgrading our PDP 11/40 clone (SIMH), to a
> PDP 11/45 (preferably another SIMH)
Heh! When I saw the subject line, I thought you wanted to upgrade a
_physical_ -11/40 to an -11/45. ('Step 1. Sell the -11/40. Step 2. Buy
an -11/45.' :-)
> for our Unix v6 installation.
Why on earth would an organization have such a thing? :-)
> Our CEO was traveling and met a techie in first class (seriously,
> first class?) who told him that we needed one.
Heh. If said techie knows about the two, he's probably pretty senior (i.e.
eligible for Social Security :-), and thus elegible for first class... :-)
> It has fairly low utilization - a developer logs in and writes code
> every few days
Who the *&%^&*(%& is still writing code under V6?!
And how do you all get the bits in and out? (I run mine under Ersatz-11,
which has this nice device which allows it to read files off the host file
system; transfering stuff back and forth is a snap, I do all my editing with
Epsilon on my Windoze box, 'cause I'm too lazy to bring up the V6 Emacs I
have.)
> 1. Are there any v6 specific concerns about upgrading?
Not that I know of.
> 2. Why should we consider taking the leap to the 11/45? Everything
> seems to work fine now.
You're asking _us_?
Some larger applications will only run on an split-I-D machine, is about the
only reason I can think of.
Oh, also, the floating point instructions on the /45 are the only kind
understood by V6; the C compiler doesn't emit the ones the /40 provides. Any
floating point code run on the /40, the instructions are simulated by a
trap handler (by way of the OS, which has to handle it and reflect it to
the user process). I.e. very slow.
> 3. If we jump in and do the upgrade, how can we immediately recognize
> what has changed in the environment? I.e what are some things that we
> can now do that we couldn't do before?
See above.
> 4. If we just insert our current diskpacks into the new system, will it
> just boot and work? Or what do we need to before/after booting to
> prepare/respond to the new system?
Any V6 disk pack can be read/mounted on any V6 machine. Any binaries (the OS,
or user commands) for the -11/40 will run on the -/45. (Which is why the V6
dist includes binaries for /40 versions of the OS only.)
To make use of the /45, you need a different copy of the OS binary, built from
a slightly different set of modules. (Replace m40.s with m45.s; and you will
need to re-asssemble l.s, prepending it with data.s.) Both variants can live
on the same pack, under different filenames; select the right one at boot
time.
> 5. Is 256K enough memory or what configuration do y'all recommend?
256KB is all you can have. Neither SIMH nor Ersatz-11 support the Able
ENABLE:
http://gunkies.org/wiki/Able_ENABLE
which is what you need to have more than 256KB on a UNIBUS -11.
> From: Clem Cole
> You'll probably want to configure a kernel for the 45 class machine.
> Look at the differences in the *.s files in the kernel.
More importantly, look at the 'run' file in /usr/sys, which has commented
out lines to build the OS image for /45-/70 class machines.
> But either way you should configure the system to use the largest drive
> v6 has.
This is actually of limited utility, since a V6 file system is restricted to
65K blocks _max_. So a disk with 350K blocks (like an RP06), you'll have to
split it into like 5 partitions to use it all.
> From: Will Senn
> Do you know of some commonly used at the time v6 programs that needed
> that much space?
Heh. Spun up my v6, and did "file * | grep separate" in /bin and /usr/bin,
and then recalled that V6 was distributed in a form suitable for a /40. So,
null set.
Did the same thing on /bin from the MIT V6+ system, and got:
a68: separate I&D executable not stripped
a86: separate I&D executable not stripped
bteco: separate I&D executable not stripped
c86: separate I&D executable not stripped
e: separate I&D executable not stripped
emacs: separate I&D executable not stripped
lisp: separate I&D executable not stripped
mail: separate I&D executable not stripped
ndd: separate I&D executable not stripped
s: separate I&D executable not stripped
send: separate I&D executable not stripped
teco: separate I&D executable not stripped
No idea what the difference is between 'teco' and 'bteco', what 's/send' do,
etc.
> Is there any material difference between doing it at install time vs
> having run on 11/40 for a while and moving the disk over to the 11/45
> later?
No; like I said, you can have two different OS binaries on the disk, and
select which one you boot.
> On a related note, how difficult is it to copy the system from rk to
> hp? I know I can rebuild, but I'm sure there's a quicker/easier method...
Build a system with both, and then copy the files? I'd use 'tar' (I have a V6
tar, but it uses a modified OS with the smdate() call added back in) to do the
moving (which would retain the last-write dates); 'tp' or 'stp' would also
work.
The hack _I_ used on simulated systems was to expand the file that held the
'disk pack', mount it as a different kind of pack (RL or RP), and then go in
and hand-patch the disk size in the root block with 'db', then 'icheck -s' to
re-build the free list. Note: this won't give you more inodes, so you may run
out, but the usual inode allocation is pretty generous.
Noel
PS: Speaking of the last write dates, I have versions of mv/mvall, cp/cpall,
ln, chmod etc which retain them (using smdate()). If there's an actual
community of people using V6, I should upload all the stuff I have. Although
it might be good to establish some central location for exchange of V6 code.
However, I don't and won't (don't even ask) use GitHub or any similar modern
thing.
The setting up document hints at how to build world so to speak in v6.
However, when I log in as bin (most files are owned by bin) and:
chdir /usr/source
sh run
I get a number of failed items along these lines:
cp a.out /etc/cron
Can't create new file.
cp a.out /etc/init
Can't create new file.
A little digging around points to the problem - some files are owned by
daemon, others by root:
-rwsrwsr-- 1 daemon 3246 Oct 10 12:54 cron
-rwxrwxr-- 1 root 2054 May 13 23:50 init
My question is this, is the system recompiled en-masse using the run
script in /usr/source or not? It certainly appears to be the method, as
it contains a bunch of chdir somedir; time sh run lines including the
/usr/sys/run file... If it's not, what was the method?
I gather I can force it by logging in as root and running those sections
of the run script pertaining to files owned by root, and the same for
daemon, but that seems inefficient and begs the question why didn't they
have run scripts for root and daemon that were separate from the ones
for bin.
Thanks,
Will
--
GPG Fingerprint: 68F4 B3BD 1730 555A 4462 7D45 3EAA 5B6D A982 BAAF