home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CLASSIC_COMPUTER      Classic Computers      1,530 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,188 of 1,530   
   Jeff Thiele to Mike Powell   
   Re: recent projects   
   13 Aug 22 11:00:00   
   
   TID: Mystic BBS 1.12 A46   
   MSGID: 1:387/26 8e1bb436   
   REPLY: 1208.clascomp@1:2320/105 275ce5bc   
   TZUTC: -0500   
   On 13 Aug 2022, Mike Powell said the following...   
    MP> As the SBC it was all running on is public facing, I didn't want the   
    MP> version of linux running under it all to get too long in the tooth.    
    MP> Once I upgraded it, I could never get it all working again.   
      
   This is the main reason I prefer FPGAs to emulation on an SBC for   
   public-facing projects such as BBSs, although this has really got me   
   thinking about security on FPGA-based hardware.   
      
   Right now, I have a Raspberry Pi running Mystic BBS software. If a caller   
   were able to break that software, they could possibly gain access to the   
   underlying OS, which is plenty powerful enough to go exploring my home   
   network, even without root privileges. It's not public-facing, for that   
   reason.   
      
   A BBS running on an emulated system, itself running on a Raspberry Pi, is   
   perhaps slightly more complicated, but not all that different. If someone   
   were able to break the BBS software, they might be able to gain access to the   
   emulated system (more on that below). Breaking that, they'd be able to access   
   the underlying modern OS.   
      
   A BBS running on DEC OS/8, running on an FPGA implementation of a PDP-8 would   
   be a different story, I thought before writing this, because there's nowhere   
   to go after breaking the PDP-8 FPGA implementation; beyond that is only   
   hardware.   
      
   So a malicious caller would, at best, have a PDP-8 system with a WiFi modem   
   at their disposal. Could that be used to wreak havoc on the local network?   
   Yes, given someone with enough PDP-8 knowledge, I now believe it could. It   
   wouldn't be easy, but it would be possible.   
      
   Hmm.   
      
   Jeff.   
      
   --- Mystic BBS v1.12 A46 2020/08/26 (Raspberry Pi/32)   
    * Origin: Cold War Computing BBS (1:387/26)   
   SEEN-BY: 1/123 15/0 18/200 19/38 50 90/1 105/81 106/201 633 987 120/340   
   SEEN-BY: 123/131 124/5014 5016 129/305 331 130/330 153/7715 154/10   
   SEEN-BY: 218/700 227/114 229/111 112 113 206 317 400 424 426 428 452   
   SEEN-BY: 229/470 664 700 266/512 280/464 282/1038 292/854 317/3 320/219   
   SEEN-BY: 322/757 342/200 387/25 26 396/45 460/58 633/280 712/848   
   PATH: 387/26 396/45 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca