[HECnet] Tops-20 Disk Quotas (was Anonymous FAL (Tops-20))

Thomas DeBellis tommytimesharing at gmail.com
Sat Jul 6 18:15:58 PDT 2019


Yes, perhaps I wrote that poorly; my apologies.  Accounts and 
directories are quite clearly separated; you can run Tops-20 without 
_any_ accounts whatsoever.  PANDA does this as does the standard DEC 
distribution.  We (Columbia) didn't because we had to do charge back and 
sold time and you can use the account functionality to do some nifty 
things, like set your scheduler class.

We also had a RSTS/E System, running on a PDP-11/70 (possibly one of the 
finest computers /ever///).  I don't remember what we were using for 
DASD, but it wasn't RM03.  That was an white platter disk that I 
remember remember mounting when we switching between RT-11, RSX and a 
very early version of Unix on a PDP-11/40 in the CS lap at WPI. I think 
maybe Columbia had something larger like an RP04.  Anyway, I remember it 
being separate, whereas the RM03 is in the tower. We sadly unplugged the 
RSTS system when we got our fourth 20.  The only Basic that I ever saw 
that had RSTS muscle was on the DTSS.

Doing sub-dirs on the 20 /is/ beautiful and there are features that I 
appreciate today over everything else I've seen.  The grammar was 
extremely well thought out.  But under the covers, if you had 20 to 30 
thousand users ids to run after and frequent turn over, you had to write 
custom software to do the group management and id creation.  I know, I 
wrote some of it. BUILD /is /dandy, but consider all the confusing 
options you have to do get the access right, viz:

  ABORT DEFAULT-FILE-PROTECTION DIRECTORY-GROUP FILES-ONLY
GENERATIONS KILL       LIST MAXIMUM-SUBDIRECTORIES
  PASSWORD    PERMANENT PROTECTION              PUSH
  SECURESUBDIRECTORY-USER-GROUPTOPS10-PROJECT-PROGRAMMER-NUMBER
USER-OF-GROUP WORKING

See that PUSH command?  That's so you can go recursive when (not if) 
something breaks and come back and try it again.  Groups are far more 
powerful than Unix's laughable excuse, but they are not straightforward 
to implement as clash is not a bug, but rather a feature.  And you can't 
just have a user of a group unless it's allowed in the sub-directory 
user group.  Get any of that wrong and you just created a sub-directory 
that the user can't use and they're ... not happy ...

The quotas are just plain tedious because unless you set the magic bit, 
you have to grab it from the superior and then guess how much (which is 
never right) or ask the user (who has no idea or wants everything).  And 
then you have to explain why SECURE isn't necessary...

And then there are all these other goofy things that they should have 
just ditched and put into in ^ECREATE so your phone doesn't ring.

  ABSOLUTE-INTERNET-SOCKETS ACCOUNT-DEFAULT   ADMINISTRATOR 
ARCHIVE-ONLINE-EXPIRED-FILES
  CHARGE-LIMITED     CONFIDENTIAL      DECNET-ACCESS DISABLE
  ENABLE     ENQ-DEQ           EXPIRATION-OF-PASSWORDEXPIRE
  FROZEN                     INTERNET-ACCESS   INTERNET-WIZARD     IPCF
  MAINTENANCE MUST-RUN-PROGRAM  NUMBEROFFLINE-EXPIRATION-DEFAULT
  ONLINE-EXPIRATION-DEFAULTOPERATOR PRESERVE               
REPEAT-LOGIN-MESSAGES
  SEMI-OPERATOR WHEEL

This is visible list and t it guarantees your phone rings because if 
they try the BUILD and of them, it will break.  As a matter of fact, 
except for a very limited subset (which does not include creating 
sub-directories), it is going to break.  So that's fine if you feel like 
chatting, but it's almost never a short call.

    Why isn't secure /secure/?
         Because our ACJ doesn't need enable the hooks.
    Why?
         Because we don't need them.
    Well, shouldn't */I/* be secure?
         Yes, you should be... I mean, you are.  (he sighs)

And, my favorite:

    What's a WHEEL??
         "Blessed are they who run around in circles" (he begins intoning)
    /??/
         "For they shall be known as Wheels" (he finishes intoning)
    /????/
         It means you have complete unfettered and limited system
    access.  Beyond root or administrator.
    Oh!!  Well I should have that.
         Indeed?  Why?
    Because my: (pick one)

     1. Thesis Advisor
     2. Dean
     3. Manager
     4. Mother
     5. Spiritual Advisor
     6. Boyfriend
     7. Dog

    thinks I should...

         And yet I remain unconvinced. However, don't let that stop them
    from hiring you.

Now, let's compare that whole saga with the effortlessness of mkdir or 
md--boom you're done and no phone call.  Of course you have a point that 
BUILD isn't *that* hard in theory.  However, in practice as compared 
with the former two, was a serious pain in the ass and I think it 
annoying in this day and age.  It was that complicated because it had to 
be because of the huge user populations.

Yes, we had bunches of disks, too; we had at least one RP07, a number of 
RA81's on an HSC50 (clustered) and I believe something on the order of 
20 RP06's (I'd have to look at my copy of the machine room diagram), 8 
tape drives to back everything up and printers and ...  Remember that 
population?  It still wasn't enough.  It's one thing to write a small 
program for an introductory class, but when you really start getting on 
it; writing papers, simulators or compilers.  You just swallow disk 
space and that's before you even talk about anything remotely 
approaching multimedia, which was unthinkable.

Perhaps the following example is illustrative: In order to validate my 
FTP server, I needed some 'decent' sized data sets--things I could look 
at and immediately notice any obvious problems.  So I downloaded some of 
my favorite Sherlock Holmes and Oscar Wilde novels from Project 
Gutenberg along with some other goodies.  All told, over 9,000 pages.

Now, let's suppose you wanted to do a longitudinal textual analysis of 
stylistic changes in Abraham Lincoln's speeches.  It is instructive to 
compare the first and second inaugural addresses using the Gettysburg 
address as a linking document. Well, that's 12 pages right there before 
you've written anything, over 10% of your quota.  We were always 
screaming for more disk.  And CPU.  And memory.

My KLH10 is over 200 times faster than a KL and I have 5 RP07's, with 
one piggy user (me), two medium users (my wife and brother) and some 
assorted guests.  If you compare that with a KL10B with 70 signed on and 
20,000 trying to sign on, you can see why those disk drives simply 
weren't enough.  Nothing but a 3850 would have been and we weren't 
allowed to use that.  We have one holding the 1980 census, the 
equivalent of 4,720 RP06's (on the order of a terabyte).  There was a 
lot of drooling on the floor, but it was dedicated to research.

I wasn't aware that Unix was older than Tops-20.   What basis do you 
have for making this statement?  I had though it younger.  The initial 
Unix release date is November 3, 1971 whereas TENEX came on the air in 
June 15, 1970, more than a year beforehand.  Unfortunately, I don't have 
my Bell System Technical Journals handy (still in boxes), so I don't 
immediately recall the period between Bell pulling the plug on Multics 
and Thompson began playing with that cast off PDP-7. Clearly however, 
BBN was working on TENEX in the late 1960's and sold the page box as a 
commercial product.

> ------------------------------------------------------------------------
> On 7/5/2019 3:40 PM, Johnny Billquist wrote:
>
> Well, accounts and directories are not clearly separated things under 
> TOPS-20, as you yourself noted.
> And disk quotas were annoying to deal with.
>
> Back around the same time, I was using RSTS/E at school, and there you 
> had disk quotas too, and no subdirectories. Also, the default quota 
> was 20 blocks (10 Kbyte). Felt quite acceptable at the time. One RM03 
> for four schools sharing one PDP-11/70.
>
> But creating directories under TOPS-20 was not *that* hard. There was 
> the BUILD command, which sorted out most things rather simply. But I 
> don't know how you'd do it programmatically.
>
> The fact that you could have sub-users on the other hand was one of 
> the most beautiful things of TOPS-20. And it implicitly already gave 
> you groups. At university, each course there was a user, and all 
> students were sub-user to that, belonging thus to the same group. 
> Managed by the teacher, who had the parent account.
>
> As for maximum disk, well... You could have RP07 disks. At half a gig, 
> that was pretty decent. Each of our -2060 had one RP07. And one had 
> one RP06, while the other one had three RP06 drives.
>
> And Unix is older than TOPS-20, and ran on more limited resources, and 
> still handled subdirectories and quotas cleaner. So I don't think it's 
> fair to just blame old age or limited resources. A PDP-10 had vast 
> resources compared to many other things...
>
>   Johnny
>
> On 2019-07-05 20:57, Thomas DeBellis wrote:
>> Oh, it's something beyond annoying, but it's not the accounting 
>> system confounding you; that can be completely disabled (I have it 
>> off on my systems).  The policy is actually built into the Tops-20 
>> file system itself.
>>
>> Directories under Tops-20 are vastly different--both in concept and 
>> implementation--from anything else that I've seen (and I did a lot of 
>> research into file system design at one particular job). Directory 
>> creation is cumbersome, typically requiring expert level intervention 
>> or significant programming.  However, it's whaay better than what 
>> Tops-10 had at the time (nothing), ITS (don't ask), WAITS (nothing) 
>> or MVS (partitioned data sets, a true hack).
>>
>> Create a directory under Unix? mkdir.  Easyn  peasy. Windows? md, 
>> unless you are running quotas.  Also no heavy lift.
>>
>> Tops-20 got more and more complex.  In addition to having to take 
>> quota away from the superior and hand it over to the sub-directory, 
>> unless you are running PANDA modifications, you have to create an 
>> access group and allocate it or the poor user can't see his own 
>> sub-directory.   Group management can be confusing if you are running 
>> super-domestic structures and downright tedious for regular 
>> structures, otherwise.  There was more; Yeesh...   Instead of trying 
>> to check for every possible problem beforehand, it was sometimes 
>> easier to catch errors from the CRDIR%, go recursive and modify the 
>> superior (and on up).
>>
>> You can defeat some of this.  Setting CD%NSQ will cause CRDIR% to no 
>> update the the superior, but you need rights to do it.  I always 
>> thought that there was a better way to do this, perhaps with an IPCF% 
>> based client/server application, coupled with some changes to the 
>> access control job.
>>
>> Why all this hair?  Directories were considered precious resources.  
>> Why would that be?  Consider what happens when you try to fit (or 
>> cram) a user population of over 25,000 students onto the triple 180 
>> MB disk structures of the time (the maximum you could do in 1980's).  
>> You get measly user permanent quotas of 100 pages (250KB), working of 
>> 1,000.  Not much.
>>
>> It's a vastly different world now.  So Tops-20 needs a mkdir, but 
>> that would need to talk to a privileged backend with policy and 
>> directory creation smarts.  I think that would be pretty friendly; 
>> definitely easier than trying to suss out BUILD or ^ECREATE.
>>> ------------------------------------------------------------------------ 
>>>
>>> On 7/4/2019 2:48 PM, Johnny Billquist wrote:
>>>
>>> The one annoying detail of the account system in TOPS-20 is that 
>>> user disk quotas are on a per directory basis. So you have to 
>>> manually move your disk quota around for your subdirectories.
>>>> ------------------------------------------------------------------------ 
>>>>
>>>> On 2019-07-04 04:01, Thomas DeBellis wrote:
>>>>
>>>> Tops-20 is vastly different from Unix (and I believe also VMS) as 
>>>> to how it manages user ids and accounts.  Parts of the 
>>>> authentication paradigm are very tightly woven into the the file 
>>>> system.  Briefly,
>>>>
>>>>   * A user id is a login-able directory (I.E., one that doesn't have
>>>>     apassword and is not set FILES-ONLY).  In addition to basic OS
>>>>     restrictions which prevent you from viewing file system meta-data
>>>>     unless you have appropriate authorization, an access control job
>>>>     (ACJ) is layered on top of this which can even restrict
>>>>     privileged users.
>>>>   * Accounts are either validated out of a binary accounting file in
>>>>     monitor space (which is compiled from ASCII source) or via the
>>>>     ACJ.     Accounts can have multiple users or systems processes
>>>>     (such as spoolers) creating billing records. Users can switch
>>>>     between accounts on a per-job, per-fork and intra-program basis
>>>>     (a program can decide to bill certain portions of its activity to
>>>>     different accounts).
>>>>   * The obvious benefit is that there is no password file to attack
>>>>     or steal and you can't even tell that there is an accounting
>>>>     file; probing passwords is monitored and a certain amount of
>>>>     intervention is done.  It is /extremely/ fast. No /etc/passwd to
>>>>     grovel.
>>>>
>>>> However, a deleterious side-effect is that once an id is created, 
>>>> it can be used for _anything_, including online interactive login.
>>>>
>>>> On a PANDA monitor, is possible to specify a user id as FTP-ONLY, 
>>>> but neither the supplied 5 series ACJ nor the EXEC do anything with 
>>>> it.  Historically, the Tops-20 FTP server implemented ANONYMOUS 
>>>> usage by parsing for the login user atom ANONYMOUS and then 
>>>> swallowing anything for the password (what was typically supplied 
>>>> was an email addresses). This was then hardwired into a local id.
>>>>
>>>> Artifacts of this still exist in certain browers.  Guess who 
>>>> supplies IEUSER@ as the email address password for ANONYOUS usage?
>>>>
>>>> I recall that this is the approach that we had to use with Tops-20 
>>>> FAL.  The Extended  Mode FTP server that I wrote is configurable 
>>>> via a file to specify the underlying id and password.  More 
>>>> productization would probably including having the ACJ enforce 
>>>> FTP-ONLY on LOGIN% or CRJOB% and having the EXEC parse for and 
>>>> display FTP-ONLY.  Probably about two weeks' part time work as I 
>>>> recall.  Might have to consider Batch policy.
>>>>
>>>> One approach here could be to lift the ANONYMOUS code out of EFTPSR 
>>>> and drop it into FAL and then do the changes to the ACJ and EXEC. 
>>>> I'm just surprised none of the HECnet Tops-10 or Tops-20 nerds have 
>>>> done it (there is some commonality in some of the sources).
>>>>
>>>> Since Tops-20 has a BLISS compiler which implements BLISS COMMON 
>>>> (my first training at DEC as an employee was to write code that 
>>>> would cross compile under VMS, RSX, Tops-10 and Tops-20).  I think 
>>>> it might be useful to review some of the VMS DECnet source, if any 
>>>> of that is available.  It might be possible to lift some 
>>>> functionality, which could be fun.
>>>>
>>>> Does the VMS hobbiest license get you source code?
>>>>> ------------------------------------------------------------------------ 
>>>>>
>>>>> On 7/3/2019 7:21 PM, Johnny Billquist wrote:
>>>>>
>>>>> VMS, as someone else mentioned, have a default account for FAL.
>>>>>
>>>>> RSX does not have that.  However, you can use proxy access in RSX 
>>>>> to achieve something similar.  Enable incoming and outgoing proxy, 
>>>>> and define a default account that incoming requests should be 
>>>>> using that way.
>>>>>
>>>>> If TOPS-20 can do this I don't know.  But it's a suggestion for 
>>>>> something else/more to check.
>>>>>
>>>>>   Johnny
>>>>>> ------------------------------------------------------------------------ 
>>>>>>
>>>>>> On 2019-07-03 14:15, Thomas DeBellis wrote:
>>>>>>
>>>>>> I have some software that I'd like to post, but don't recall how 
>>>>>> to configure FAL to allow for an anonymous connection; to 
>>>>>> download from a restricted directory.
>>>>>>
>>>>>> I know how to do it for the FTP server (seeing as I wrote it), 
>>>>>> but ... different code base.
>>>>>>
>>>>>> I can only vaguely remember what we did for CCnet at Columbia 
>>>>>> University in the 1980's, but I think it was kind of a hack.
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sonic.net/pipermail/hecnet-list/attachments/20190706/76bb5419/attachment-0001.html>


More information about the Hecnet-list mailing list