I think these observations are basically correct; you can only go so far with software based security until you really have to start thinking about hardening the physical environment.
Columbia was perhaps kind of an odd case in that a rather large
number of people could come waltzing through the machine room and
some didn't really understand, "Don't Touch". We systems
programmers REALLY didn't feel comfortable with this.
But the security question really was, once you are in normal
operation, just how 'normal' should the console be? Tops-10's
console was pretty normal except for the INITIA
automatic nice things. Tops-20's is closer as you normally can't
get to the auto-magic. My recollection is that on at least at
least some IBM mainframes, you couldn't use the console for a
foreground session. I think this was the case for OS/360 (which
we ran on our 91) and maybe for MVS. I can't remember about VM.
What part of the KA10 console are you talking about, actually? I thought a few switches did work even with run on. My 1971 version of SYSREF (from the Orange Book, pages 138 to 143) states that some switches, such as READ IN, START, EXAMINE NEXT and DEPOSIT NEXT don't work if run is on. However, EXAMINE THIS and DEPOSIT do work with run on, which is what I remember.
I can't remember where I put the later version of SYSREF that has
KI operations. What do you remember?
The switch register (obviously) works and WPI used it for a fun
application. We have less than 37 operations personnel assigned
to our KA, and each operator had their own bit. When they came in
to work, they pressed the switch for their 'bit'. You could run a
program which would read the switch register and tell you how many
operators were on duty and who they were.
On 3/7/22 4:26 PM, Peter Lothberg wrote:I think we are "over board", if you are standing next to the machine all bets are off. Om the KI10, the front panel works while the CPU is running, not like KA10 where you have to halt the CPU. On the KI you can examine/deposit anywhere, use physical addresses or go through the "MMU". You can put an instruction on the switches and press XCT and the CPU will execute that as next instruction in current context. Yes, there is a "front panel lock" toggle switch, but no key-lock..... (Or walk to the back of the CPU and turn power off...) (or shut down the air conditioner) Even Inter CPU's have a "front end" that can be accessed if you have access to the motherboard.... -POn 3/72022 3:56 PM, Thomas DeBellis wroteUnder Tops-10, the situation might be considered to be worse (but I believe that term to be unfair). That is, the operating system has no control over what might be examined or deposited from the front panel.There, the CTY is even more special: it doesn't need a password for/any/ login. You can do an _I [1,2]_ and you are now an operator (I.E., root). However, for many years, I thought this was just neat... What about other DEC multi-user operating systems? Do you have 'magic' consoles?