I think these observations are basically correct; you can only go so far
with software based security until you really have to start thinking
about hardening the physical environment.
Columbia was perhaps kind of an odd case in that a rather large number
of people could come waltzing through the machine room and some didn't
really understand, "Don't Touch". We systems programmers REALLY didn't
feel comfortable with this.
But the security question really was, once you are in normal operation,
just how 'normal' should the console be? Tops-10's console was pretty
normal except for the INITIA automatic nice things. Tops-20's is closer
as you normally can't get to the auto-magic. My recollection is that on
at least at least some IBM mainframes, you couldn't use the console for
a foreground session. I think this was the case for OS/360 (which we
ran on our 91) and maybe for MVS. I can't remember about VM.
What part of the KA10 console are you talking about, actually? I
thought a few switches did work even with run on. My 1971 version of
SYSREF (from the Orange Book, pages 138 to 143) states that some
switches, such as READ IN, START, EXAMINE NEXT and DEPOSIT NEXT don't
work if run is on. However, EXAMINE THIS and DEPOSIT do work with run
on, which is what I remember.
I can't remember where I put the later version of SYSREF that has KI
operations. What do you remember?
The switch register (obviously) works and WPI used it for a fun
application. We have less than 37 operations personnel assigned to our
KA, and each operator had their own bit. When they came in to work,
they pressed the switch for their 'bit'. You could run a program which
would read the switch register and tell you how many operators were on
duty and who they were.
------------------------------------------------------------------------
On 3/7/22 4:26 PM, Peter Lothberg wrote:
I think we are "over board", if you are standing next to the machine all bets
are off.
Om the KI10, the front panel works while the CPU is running, not like KA10 where you have
to halt the CPU.
On the KI you can examine/deposit anywhere, use physical addresses or go through the
"MMU". You can put an instruction on the switches and press XCT and the CPU will
execute that as next instruction in current context.
Yes, there is a "front panel lock" toggle switch, but no key-lock.....
(Or walk to the back of the CPU and turn power off...)
(or shut down the air conditioner)
Even Inter CPU's have a "front end" that can be accessed if you have access
to the motherboard....
-P
> ------------------------------------------------------------------------
> On 3/72022 3:56 PM, Thomas DeBellis wrote
> Under Tops-10, the situation might be considered to be worse (but I believe that term
to be unfair). That is, the operating system has no control over what might be examined
or deposited from the front panel.
> There, the CTY is even more special: it doesn't need a password for/any/ login.
You can do an _I [1,2]_ and you are now an operator (I.E.,
> root). However, for many years, I thought this was just neat...
>
> What about other DEC multi-user operating systems? Do you have 'magic'
consoles?