• Upcoming time boundary events

    From Simon Clubley@21:1/5 to All on Mon May 19 17:18:24 2025
    I realised that today is exactly 28 years since the 10,000 day
    issue in VMS. I am starting to feel old. :-(

    On a more serious note, I wonder what upcoming time boundaries
    we are about to hit.

    The obvious one is 2038, but I also wonder how many had 2030 as
    their Y2K pivot point.

    Any others you know of (both VMS and non-VMS) ?

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Simon Clubley on Mon May 19 15:19:57 2025
    On 5/19/2025 1:18 PM, Simon Clubley wrote:
    I realised that today is exactly 28 years since the 10,000 day
    issue in VMS. I am starting to feel old. :-(

    On a more serious note, I wonder what upcoming time boundaries
    we are about to hit.

    The obvious one is 2038, but I also wonder how many had 2030 as
    their Y2K pivot point.

    Any others you know of (both VMS and non-VMS) ?

    30 years before 32 bit signed seconds since 1970 => 18-Jan-2008
    10 years before 32 bit signed seconds since 1970 => 18-Jan-2028
    32 bit signed seconds since 1970 => 18-Jan-2038
    split 2 digits year to support 1950-2049 (*) => 01-Jan-2050
    30 years before 32 bit unsigned seconds since 1970 => 07-Feb-2076
    10 years before 32 bit unsigned seconds since 1970 => 07-Feb-2096
    32 bit unsigned seconds since 1970 => 07-Feb-2106
    everything is going to have issues at Y10K
    all common 64 bit times should first break after Y10K (**)

    *) Common in many databases, but it is usually configurable,
    so it can be changed to like 1970-2069 when needed.

    **) But in order: Windows file time, VMS time, milliseconds
    since 1970, seconds since 1970.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris Townley@21:1/5 to All on Mon May 19 21:48:10 2025
    On 19/05/2025 20:19, Arne Vajhøj wrote:
    On 5/19/2025 1:18 PM, Simon Clubley wrote:
    I realised that today is exactly 28 years since the 10,000 day
    issue in VMS. I am starting to feel old. :-(

    On a more serious note, I wonder what upcoming time boundaries
    we are about to hit.

    The obvious one is 2038, but I also wonder how many had 2030 as
    their Y2K pivot point.

    Any others you know of (both VMS and non-VMS) ?

    30 years before 32 bit signed seconds since 1970 => 18-Jan-2008
    10 years before 32 bit signed seconds since 1970 => 18-Jan-2028
    32 bit signed seconds since 1970 => 18-Jan-2038
    split 2 digits year to support 1950-2049 (*) => 01-Jan-2050
    30 years before 32 bit unsigned seconds since 1970 => 07-Feb-2076
    10 years before 32 bit unsigned seconds since 1970 => 07-Feb-2096
    32 bit unsigned seconds since 1970 => 07-Feb-2106
    everything is going to have issues at Y10K
    all common 64 bit times should first break after Y10K (**)

    *) Common in many databases, but it is usually configurable,
       so it can be changed to like 1970-2069 when needed.

    **) But in order: Windows file time, VMS time, milliseconds
        since 1970, seconds since 1970.

    Arne

    Just looked at our old suite. The majority of dates were stored as
    Julian, so we just adjusted all (and historical ones) by 25000, so it
    will work into 2028.

    We also set the century break at 80, so that is good for a while!

    I even have the archived conversion routines from are release program,
    so I could rejig them for 2028 ;)

    --
    Chris

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris Townley@21:1/5 to Chris Townley on Mon May 19 21:50:40 2025
    On 19/05/2025 21:48, Chris Townley wrote:
    On 19/05/2025 20:19, Arne Vajhøj wrote:
    On 5/19/2025 1:18 PM, Simon Clubley wrote:
    I realised that today is exactly 28 years since the 10,000 day
    issue in VMS. I am starting to feel old. :-(

    On a more serious note, I wonder what upcoming time boundaries
    we are about to hit.

    The obvious one is 2038, but I also wonder how many had 2030 as
    their Y2K pivot point.

    Any others you know of (both VMS and non-VMS) ?

    30 years before 32 bit signed seconds since 1970 => 18-Jan-2008
    10 years before 32 bit signed seconds since 1970 => 18-Jan-2028
    32 bit signed seconds since 1970 => 18-Jan-2038
    split 2 digits year to support 1950-2049 (*) => 01-Jan-2050
    30 years before 32 bit unsigned seconds since 1970 => 07-Feb-2076
    10 years before 32 bit unsigned seconds since 1970 => 07-Feb-2096
    32 bit unsigned seconds since 1970 => 07-Feb-2106
    everything is going to have issues at Y10K
    all common 64 bit times should first break after Y10K (**)

    *) Common in many databases, but it is usually configurable,
        so it can be changed to like 1970-2069 when needed.

    **) But in order: Windows file time, VMS time, milliseconds
         since 1970, seconds since 1970.

    Arne

    Just looked at our old suite. The majority of dates were stored as
    Julian, so we just adjusted all (and historical ones) by 25000, so it
    will work into 2028.

    We also set the century break at 80, so that is good for a while!

    I even have the archived conversion routines from are release program,
    so I could rejig them for 2028 ;)


    I also remember discovering my final Y2K bug - in 2013!

    --
    Chris

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Tue May 20 00:26:31 2025
    On Mon, 19 May 2025 15:19:57 -0400, Arne Vajhøj wrote:

    everything is going to have issues at Y10K
    all common 64 bit times should first break after Y10K (**)

    What’s an obvious choice of a more important event for a time reference
    than the Big Bang? Better than any random historical (or worse, still, fictional) event that only has meaning for just some parts of our species.

    The time in multiples of the Planck interval (≅ 5.39e-44 seconds) since
    the Big Bang can be represented as an integer in about 202 bits. So it
    seems natural to round that size up to 256 bits, which gives us a range
    that can cover quite a lot of time into the future.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephen Hoffman@21:1/5 to Simon Clubley on Thu May 22 22:31:14 2025
    On 2025-05-19 17:18:24 +0000, Simon Clubley said:

    I realised that today is exactly 28 years since the 10,000 day issue in
    VMS. I am starting to feel old. :-(

    On a more serious note, I wonder what upcoming time boundaries we are
    about to hit.

    The obvious one is 2038, but I also wonder how many had 2030 as their
    Y2K pivot point.

    Any others you know of (both VMS and non-VMS) ?

    Simon.


    Probably-partial list of bad dates for OpenVMS:

    17-Nov-1858 00:00 UTC, OpenVMS base date
    1-Jan-1970 00:00:00.00 UTC, epoch
    19-May-1997, the LIBRTL 10K Day limit that derailed DECwindows
    1-Jan-2000 Local, Y2K, various bugs and limits found and fixed in OpenVMS
    2003 Local (details of this one escape me)
    31-Dec-2028, HPE root certificate expires, leading to PCSI and
    VMSINSTAL errors at install
    7-Feb-2036 06:28:16 UTC NTP overflow
    19-Jan-2038 03:14:07 UTC, signed 32-bit time_t overflow
    20-Nov-2038 23:59:37UTC third GPS rollover.
    2057 Local, OpenVMS pivot date (and DEC Centennial)
    7-Feb-2106 06:28:15 UTC unsigned 32-bit time_t overflow
    1-Jan-10000 00:00:00.00 Local, four digit year overflows
    31-Jul-31086 02:48:05.47 UTC, end of the OpenVMS epoch


    DEC ended the Y2K evaluation range prior to 2038, though at least 2038
    bug was identified and resolved within OpenVMS.

    VSI has their own signing certificate, and that'll be another bad date
    to add to this list.

    Server consoles have their own limits and oddities around dates.

    More:
    https://www.theiet.org/media/1631/dates.pdf https://en.wikipedia.org/wiki/Time_formatting_and_storage_bugs


    --
    Pure Personal Opinion | HoffmanLabs LLC

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to Stephen Hoffman on Fri May 23 18:11:38 2025
    On 2025-05-22, Stephen Hoffman <seaohveh@hoffmanlabs.invalid> wrote:
    On 2025-05-19 17:18:24 +0000, Simon Clubley said:

    I realised that today is exactly 28 years since the 10,000 day issue in
    VMS. I am starting to feel old. :-(

    On a more serious note, I wonder what upcoming time boundaries we are
    about to hit.

    The obvious one is 2038, but I also wonder how many had 2030 as their
    Y2K pivot point.

    Any others you know of (both VMS and non-VMS) ?

    Simon.


    Probably-partial list of bad dates for OpenVMS:

    17-Nov-1858 00:00 UTC, OpenVMS base date
    1-Jan-1970 00:00:00.00 UTC, epoch
    19-May-1997, the LIBRTL 10K Day limit that derailed DECwindows
    1-Jan-2000 Local, Y2K, various bugs and limits found and fixed in OpenVMS 2003 Local (details of this one escape me)

    I don't remember that one. Does anyone have any details ?

    31-Dec-2028, HPE root certificate expires, leading to PCSI and
    VMSINSTAL errors at install

    Can the certificates be ignored using a suitable qualifier ?

    7-Feb-2036 06:28:16 UTC NTP overflow

    Didn't know about that one either.

    The details are vague since it's been several years since I looked at
    DECnet Phase IV, but there's a signed integer delta date field somewhere
    in DECnet Phase IV (from a base date offset) that overflowed, at least
    if you followed the spec, in 2021 (IIRC). I do remember that VMS treated
    it as an unsigned integer, hence VMS wasn't affected.

    I _think_ it was in EVL, but I can't be sure now.

    BTW, I still think unsigned integers should be the default and you
    should have to ask for a signed integer if you actually need one.

    19-Jan-2038 03:14:07 UTC, signed 32-bit time_t overflow
    20-Nov-2038 23:59:37UTC third GPS rollover.
    2057 Local, OpenVMS pivot date (and DEC Centennial)
    7-Feb-2106 06:28:15 UTC unsigned 32-bit time_t overflow
    1-Jan-10000 00:00:00.00 Local, four digit year overflows
    31-Jul-31086 02:48:05.47 UTC, end of the OpenVMS epoch


    DEC ended the Y2K evaluation range prior to 2038, though at least 2038
    bug was identified and resolved within OpenVMS.

    VSI has their own signing certificate, and that'll be another bad date
    to add to this list.


    Does anyone know the expiry date for this one ?

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Robert A. Brooks@21:1/5 to Simon Clubley on Fri May 23 14:52:45 2025
    On 5/23/2025 14:11, Simon Clubley wrote:

    The details are vague since it's been several years since I looked at
    DECnet Phase IV, but there's a signed integer delta date field somewhere
    in DECnet Phase IV (from a base date offset) that overflowed, at least
    if you followed the spec, in 2021 (IIRC). I do remember that VMS treated
    it as an unsigned integer, hence VMS wasn't affected.

    I _think_ it was in EVL, but I can't be sure now.

    I fixed that one; it'll be good until my 100th birthday.

    --
    -- Rob

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to Robert A. Brooks on Tue May 27 12:15:36 2025
    On 2025-05-23, Robert A. Brooks <FIRST.LAST@vmssoftware.com> wrote:
    On 5/23/2025 14:11, Simon Clubley wrote:

    The details are vague since it's been several years since I looked at
    DECnet Phase IV, but there's a signed integer delta date field somewhere
    in DECnet Phase IV (from a base date offset) that overflowed, at least
    if you followed the spec, in 2021 (IIRC). I do remember that VMS treated
    it as an unsigned integer, hence VMS wasn't affected.

    I _think_ it was in EVL, but I can't be sure now.

    I fixed that one; it'll be good until my 100th birthday.


    $ set response/mode=good_natured

    I wonder if people will have stopped using DECnet Phase IV by then ? :-)

    These old protocols have a habit of staying around a lot longer than
    expected. For example, I suspect somewhere people are still using UUCP, 2780/3780, xmodem, DDCMP, original SNA (not SNA over TCP/IP), etc, ...

    I wonder how old you have to be to recognise any of the above these days ? :-)

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to clubley@remove_me.eisner.decus.org- on Wed May 28 12:34:26 2025
    In article <1014ad8$2jurh$1@dont-email.me>,
    Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
    On 2025-05-23, Robert A. Brooks <FIRST.LAST@vmssoftware.com> wrote:
    On 5/23/2025 14:11, Simon Clubley wrote:

    The details are vague since it's been several years since I looked at
    DECnet Phase IV, but there's a signed integer delta date field somewhere >>> in DECnet Phase IV (from a base date offset) that overflowed, at least
    if you followed the spec, in 2021 (IIRC). I do remember that VMS treated >>> it as an unsigned integer, hence VMS wasn't affected.

    I _think_ it was in EVL, but I can't be sure now.

    I fixed that one; it'll be good until my 100th birthday.


    $ set response/mode=good_natured

    I wonder if people will have stopped using DECnet Phase IV by then ? :-)

    These old protocols have a habit of staying around a lot longer than >expected. For example, I suspect somewhere people are still using UUCP, >2780/3780, xmodem, DDCMP, original SNA (not SNA over TCP/IP), etc, ...

    I wonder how old you have to be to recognise any of the above these days ? :-)

    XMODEM is suprisingly common in embedded work, where one often
    needs to transfer something (firmware, a kernel, etc) via a UART
    or similar to some target device. I implemented a standalone
    "debugger" and boot loader for bringup and development on our
    server boards a few weeks ago, and I implemented both XMODEM and
    ZMODEM.

    The thing boots up and runs a REPL, where users can issue
    commands to inspect the state of the system but also manipulate
    it in various ways. Most users use ZMODEM, sending a compressed
    RAM disk image (UFS format) or cpio archive, and the tool
    receives the image, inflates it, "mounts" the filesystem, and
    reads and loads the kernel image out of it, and boots it.

    https://github.com/oxidecomputer/bldb/

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to bill on Thu May 29 18:23:01 2025
    On 2025-05-28, bill <bill.gunshannon@gmail.com> wrote:
    On 5/27/2025 8:15 AM, Simon Clubley wrote:

    These old protocols have a habit of staying around a lot longer than
    expected. For example, I suspect somewhere people are still using UUCP,
    2780/3780, xmodem, DDCMP, original SNA (not SNA over TCP/IP), etc, ...

    I wonder how old you have to be to recognise any of the above these days ? :-)


    There is still a UUCP network. It runs over the internet rather than
    the phone system but it runs the UUCP protocol.


    Motivated by that comment, I just had a quick look and discovered
    that, 40 years on, FidoNet is still in use...

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From David Wade@21:1/5 to Simon Clubley on Thu May 29 19:36:22 2025
    On 29/05/2025 19:23, Simon Clubley wrote:
    On 2025-05-28, bill <bill.gunshannon@gmail.com> wrote:
    On 5/27/2025 8:15 AM, Simon Clubley wrote:

    These old protocols have a habit of staying around a lot longer than
    expected. For example, I suspect somewhere people are still using UUCP,
    2780/3780, xmodem, DDCMP, original SNA (not SNA over TCP/IP), etc, ...


    SNA is an architecture. SNA over IP is still SNA. In fact 3270 over
    BiSync can be part of an SNA Network. Would you include SNA over X.25?


    I wonder how old you have to be to recognise any of the above these days ? :-)



    Not that old. I am 70 and so I was programming before SNA was announced,
    but I guess many over 40 worked with SNA over HDLC, Token Ring an
    Bus+Tag channels.


    There is still a UUCP network. It runs over the internet rather than
    the phone system but it runs the UUCP protocol.


    I keep meaning to look at that...


    Motivated by that comment, I just had a quick look and discovered
    that, 40 years on, FidoNet is still in use...

    Simon.


    Dave

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From jayjwa@21:1/5 to bill on Thu May 29 16:24:39 2025
    bill <bill.gunshannon@gmail.com> writes:

    There is still a UUCP network. It runs over the internet rather than
    the phone system but it runs the UUCP protocol.
    Or emulated serial lines.

    https://www.digiater.nl/openvms/decus/vax92a/uucp/

    ❰jayjwa❙~❱✔≻ rlogin kirin

    $ mail

    MAIL> send
    To: uucp%"atr2!jayjwa"
    Subj: UUCP
    Enter your message below. Press CTRL/Z when complete, or CTRL/C to quit:
    Can you believe that people are still using UUCP?
    Exit

    MAIL> exit
    $ logout
    rlogin: Connection to kirin closed normally.26:35.15
    ❰jayjwa❙~❱✔≻ mailx
    mailx version v14.9.25. Type `?' for help
    /var/spool/mail/jayjwa: 2 messages 1 new
    O 1 Mail System Intern 2025-05-29 11:12 13/536 DON'T DELETE THIS MESSAGE -- FOLDER INTERNAL DATA
    ▸N 2 jayjwa@kirin.lan 2025-05-29 11:26 21/891 UUCP
    ? 2
    [-- Message 2 -- 21 lines, 891 bytes --]:
    Date: Thu, 29 May 25 15:26:30 EDT
    Message-Id: <00BAB43684479760.00000237@kirin.lan>
    From: jayjwa@kirin.lan
    Subject: UUCP
    To: jayjwa@atr2.lan

    Can you believe that people are still using UUCP?

    ?

    --
    PGP Key ID: 781C A3E2 C6ED 70A6 B356 7AF5 B510 542E D460 5CAE
    "The Internet should always be the Wild West!"

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dennis Boone@21:1/5 to All on Fri May 30 04:28:05 2025
    The only one I know of that did not survive was BITNET. And if
    I could get hold of sources for BITNET systems of various flavors
    I wold love to see it revived as well.

    BITNET was an NJE network. For IBM mainframes, the software was
    pretty much built in -- spooling files or sending short interactive
    messages ala VM/370. For VAXen, things like Jnet were used; I don't
    remember if that's in captivity or not. For unix, HUJI built an NJE
    package. The funet folks revised it. Thebug and I made it work on
    (then) current linux, and had it talking to my VM-on-herc for a while.
    If it's of interest, I can make it accessible.

    De

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Fri May 30 09:46:27 2025
    bill explained :
    On 5/29/2025 4:24 PM, jayjwa wrote:
    bill <bill.gunshannon@gmail.com> writes:

    There is still a UUCP network. It runs over the internet rather than
    the phone system but it runs the UUCP protocol.
    Or emulated serial lines.

    https://www.digiater.nl/openvms/decus/vax92a/uucp/

    ❰jayjwa❙~❱✔≻ rlogin kirin

    $ mail

    MAIL> send
    To: uucp%"atr2!jayjwa"
    Subj: UUCP
    Enter your message below. Press CTRL/Z when complete, or CTRL/C to quit:
    Can you believe that people are still using UUCP?
    Exit

    MAIL> exit
    $ logout
    rlogin: Connection to kirin closed normally.26:35.15
    ❰jayjwa❙~❱✔≻ mailx
    mailx version v14.9.25. Type `?' for help
    /var/spool/mail/jayjwa: 2 messages 1 new
    O 1 Mail System Intern 2025-05-29 11:12 13/536 DON'T DELETE THIS
    MESSAGE -- FOLDER INTERNAL DATA
    ▸N 2 jayjwa@kirin.lan 2025-05-29 11:26 21/891 UUCP
    ? 2
    [-- Message 2 -- 21 lines, 891 bytes --]:
    Date: Thu, 29 May 25 15:26:30 EDT
    Message-Id: <00BAB43684479760.00000237@kirin.lan>
    From: jayjwa@kirin.lan
    Subject: UUCP
    To: jayjwa@atr2.lan

    Can you believe that people are still using UUCP?

    ?



    Can you believe people are still using DECNET? :-)

    bill

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to bill.gunshannon@gmail.com on Fri May 30 11:57:18 2025
    In article <m9sccbFnrcsU3@mid.individual.net>,
    bill <bill.gunshannon@gmail.com> wrote:
    On 5/29/2025 2:23 PM, Simon Clubley wrote:
    On 2025-05-28, bill <bill.gunshannon@gmail.com> wrote:
    On 5/27/2025 8:15 AM, Simon Clubley wrote:

    These old protocols have a habit of staying around a lot longer than
    expected. For example, I suspect somewhere people are still using UUCP, >>>> 2780/3780, xmodem, DDCMP, original SNA (not SNA over TCP/IP), etc, ... >>>>
    I wonder how old you have to be to recognise any of the above these days ? :-)


    There is still a UUCP network. It runs over the internet rather than
    the phone system but it runs the UUCP protocol.

    Motivated by that comment, I just had a quick look and discovered
    that, 40 years on, FidoNet is still in use...

    I know of a number of old BBSes that still run on the INTERNET
    today running on things like Tandy Color Computers. There is
    still a lot of interest in old "Legacy" stuff. :-)

    The only one I know of that did not survive was BITNET. And if
    I could get hold of sources for BITNET systems of various flavors
    I wold love to see it revived as well.

    There is a hobbyist BITNET network out there, but I don't know
    much about it, other than that it exists (or existed at some
    point?). I believe it was run by the same folks that do HECnet?

    Johnny may know more.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to Marc Van Dyck on Fri May 30 12:34:21 2025
    On 2025-05-30, Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:

    Can you believe people are still using DECNET? :-)

    bill

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?


    For the first one, what about sshfs ?

    For the second one, how important is this these days, given that you
    can open a socket directly within a program and then do normal reads
    and writes to it ?

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to David Wade on Fri May 30 12:18:19 2025
    On 2025-05-29, David Wade <g4ugm@dave.invalid> wrote:
    On 5/27/2025 8:15 AM, Simon Clubley wrote:

    These old protocols have a habit of staying around a lot longer than
    expected. For example, I suspect somewhere people are still using UUCP, >>>> 2780/3780, xmodem, DDCMP, original SNA (not SNA over TCP/IP), etc, ... >>>>

    SNA is an architecture. SNA over IP is still SNA. In fact 3270 over
    BiSync can be part of an SNA Network. Would you include SNA over X.25?


    I look at SNA in the same way as I look at DECnet. At one time, DECnet
    ran over its own transport and lower-level protocols. As a result of
    a changing world, it was then adapted to run over a protocol (IP) which
    is not a part of SNA/DECnet.

    For me, the split point between original and current SNA/DECnet occurred
    when the previously fully native implementation was adapted to run over IP.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Simon Clubley on Fri May 30 09:23:58 2025
    On 5/30/2025 8:18 AM, Simon Clubley wrote:
    On 2025-05-29, David Wade <g4ugm@dave.invalid> wrote:
    On 5/27/2025 8:15 AM, Simon Clubley wrote:
    These old protocols have a habit of staying around a lot longer than >>>>> expected. For example, I suspect somewhere people are still using UUCP, >>>>> 2780/3780, xmodem, DDCMP, original SNA (not SNA over TCP/IP), etc, ...

    SNA is an architecture. SNA over IP is still SNA. In fact 3270 over
    BiSync can be part of an SNA Network. Would you include SNA over X.25?


    I look at SNA in the same way as I look at DECnet. At one time, DECnet
    ran over its own transport and lower-level protocols. As a result of
    a changing world, it was then adapted to run over a protocol (IP) which
    is not a part of SNA/DECnet.

    Isn't DNA the equivalent of SNA?

    For me, the split point between original and current SNA/DECnet occurred when the previously fully native implementation was adapted to run
    over IP.

    Isn't it more accurate to say that support for IP was added as a
    possibility in parallel with still supporting the other protocols?

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dave Froble@21:1/5 to Simon Clubley on Fri May 30 09:17:38 2025
    On 5/29/2025 2:23 PM, Simon Clubley wrote:
    On 2025-05-28, bill <bill.gunshannon@gmail.com> wrote:
    On 5/27/2025 8:15 AM, Simon Clubley wrote:

    These old protocols have a habit of staying around a lot longer than
    expected. For example, I suspect somewhere people are still using UUCP,
    2780/3780, xmodem, DDCMP, original SNA (not SNA over TCP/IP), etc, ...

    I wonder how old you have to be to recognise any of the above these days ? :-)


    There is still a UUCP network. It runs over the internet rather than
    the phone system but it runs the UUCP protocol.


    Motivated by that comment, I just had a quick look and discovered
    that, 40 years on, FidoNet is still in use...

    Simon.


    If it ain't broke, don't fix it ...

    If it works, then work it ...

    --
    David Froble Tel: 724-529-0450
    Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
    DFE Ultralights, Inc.
    170 Grimplin Road
    Vanderbilt, PA 15486

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Marc Van Dyck on Fri May 30 09:29:32 2025
    On 5/30/2025 3:46 AM, Marc Van Dyck wrote:
    bill explained :
    Can you believe people are still using DECNET?  :-)

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    Usage/API compatible? No.

    High level functionality? Yes.
    Among other options: FAL->FTP and task to task->INETD.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Simon Clubley on Fri May 30 09:31:34 2025
    On 5/30/2025 8:34 AM, Simon Clubley wrote:
    On 2025-05-30, Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    Can you believe people are still using DECNET? :-)

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    For the first one, what about sshfs ?

    Does is run on VMS?

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Fri May 30 22:38:05 2025
    On Fri, 30 May 2025 09:23:58 -0400, Arne Vajhøj wrote:

    Isn't DNA the equivalent of SNA?

    DECnet was always a proper peer-to-peer network. SNA, for about the first decade or so of its official existence, was not. It was only in the
    mid-1980s that IBM discovered what everybody else knew -- that
    “networking” wasn’t about having a bunch of remote subordinates being controlled by a central mainframe.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to Marc Van Dyck on Fri May 30 22:41:32 2025
    On Fri, 30 May 2025 09:46:27 +0200, Marc Van Dyck wrote:

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    The irony of it, that the DEC concept requires creating a separate server process for every client connection, while the standard *nix sockets API
    lets a single server process handle multiple connections (or fork off
    separate processes to spread the load, as it chooses).

    I say “irony” because, of course, creation of all these extra processes willy-nilly is expensive on VMS (and on its Windows NT successor), while
    it is much cheaper on *nix systems.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Simon Clubley on Fri May 30 21:51:48 2025
    On 5/27/2025 8:15 AM, Simon Clubley wrote:
    On 2025-05-23, Robert A. Brooks <FIRST.LAST@vmssoftware.com> wrote:
    On 5/23/2025 14:11, Simon Clubley wrote:
    The details are vague since it's been several years since I looked at
    DECnet Phase IV, but there's a signed integer delta date field somewhere >>> in DECnet Phase IV (from a base date offset) that overflowed, at least
    if you followed the spec, in 2021 (IIRC). I do remember that VMS treated >>> it as an unsigned integer, hence VMS wasn't affected.

    I _think_ it was in EVL, but I can't be sure now.

    I fixed that one; it'll be good until my 100th birthday.


    $ set response/mode=good_natured

    I wonder if people will have stopped using DECnet Phase IV by then ? :-)

    My impression is that:
    * people are now preferring IV over V, because people only
    need IV functionality and IV is simpler
    * people does not use DECnet that much today, but often enough
    that they still prefer to have it installed
    * usage is almost entirely:
    - $ SET HOST
    - RMS file specs
    - task-to-task (for those running OSU HTTPD or something else
    requiring it)

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Sat May 31 12:08:42 2025
    Arne Vajhj wrote on 30/05/2025 :
    On 5/30/2025 3:46 AM, Marc Van Dyck wrote:
    bill explained :
    Can you believe people are still using DECNET? :-)

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    Usage/API compatible? No.

    High level functionality? Yes.
    Among other options: FAL->FTP

    How about opening a file remotely without having to copy it over first
    ?

    and task to task->INETD.

    Can be done from shell/scripting, without programming ?

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Sat May 31 12:23:46 2025
    Arne Vajhj laid this down on his screen :
    On 5/27/2025 8:15 AM, Simon Clubley wrote:
    On 2025-05-23, Robert A. Brooks <FIRST.LAST@vmssoftware.com> wrote:
    On 5/23/2025 14:11, Simon Clubley wrote:
    The details are vague since it's been several years since I looked at
    DECnet Phase IV, but there's a signed integer delta date field somewhere >>>> in DECnet Phase IV (from a base date offset) that overflowed, at least >>>> if you followed the spec, in 2021 (IIRC). I do remember that VMS treated >>>> it as an unsigned integer, hence VMS wasn't affected.

    I _think_ it was in EVL, but I can't be sure now.
    I fixed that one; it'll be good until my 100th birthday.


    $ set response/mode=good_natured

    I wonder if people will have stopped using DECnet Phase IV by then ? :-)

    My impression is that:
    * people are now preferring IV over V, because people only
    need IV functionality and IV is simpler
    * people does not use DECnet that much today, but often enough
    that they still prefer to have it installed
    * usage is almost entirely:
    - $ SET HOST
    - RMS file specs
    - task-to-task (for those running OSU HTTPD or something else
    requiring it)

    Arne

    From what I can see from this side of the pond, everyone uses DECnet
    phase V exclusively with TCP/IP transport, so that any network gear can
    be used, without having the network people involved.

    Other advantage is that most OPenVMS installations today are used in environments that must be certified, and external audit people usually
    know nothing about DECnet. They are mostly just interested in which IP
    ports are opened. Since for DECnet you just need a few, it's easily
    justified. They couldn't be possibly bothered about what DECnet object
    is enabled. They will complain about rlogin or telnet, but see nothing
    wrong with set host. FTP ? God forbid. But FAL ? just fine... You can't
    imagine how easy it was for me to get OpenVMS systems pass audits with
    flying colors, while my open systems colleagues suffered...

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Marc Van Dyck on Sat May 31 09:33:05 2025
    On 5/31/2025 6:23 AM, Marc Van Dyck wrote:
    Arne Vajhøj laid this down on his screen :
    On 5/27/2025 8:15 AM, Simon Clubley wrote:
    I wonder if people will have stopped using DECnet Phase IV by then ? :-)

    My impression is that:
    * people are now preferring IV over V, because people only
       need IV functionality and IV is simpler
    * people does not use DECnet that much today, but often enough
       that they still prefer to have it installed
    * usage is almost entirely:
       - $ SET HOST
       - RMS file specs
       - task-to-task (for those running OSU HTTPD or something else
         requiring it)

    From what I can see from this side of the pond, everyone uses DECnet
    phase V exclusively with TCP/IP transport, so that any network gear can
    be used, without having the network people involved.

    OK. Maybe I am wrong. That would explain why VSI is putting V in the
    CLP kit.

    The over TCP/IP argument certainly makes sense if the there is a
    need for wider communication between VMS systems.

    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    But again I could be wrong. I have not been doing non-hobbyist
    system management for a couple of decades.

    Other advantage is that most OPenVMS installations today are used in environments that must be certified, and external audit people usually
    know nothing about DECnet. They are mostly just interested in which IP
    ports are opened. Since for DECnet you just need a few, it's easily justified. They couldn't be possibly bothered about what DECnet object
    is enabled. They will complain about rlogin or telnet, but see nothing
    wrong with set host. FTP ? God forbid. But FAL ? just fine... You can't imagine how easy it was for me to get OpenVMS systems pass audits with
    flying colors, while my open systems colleagues suffered...

    :-)

    When I was involved in audits of VMS systems then the auditors did have
    VMS checklists and checked stuff like DECnet default access.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Marc Van Dyck on Sat May 31 13:47:35 2025
    On 5/31/2025 6:08 AM, Marc Van Dyck wrote:
    Arne Vajhøj wrote on 30/05/2025 :
    On 5/30/2025 3:46 AM, Marc Van Dyck wrote:
    bill explained :
    Can you believe people are still using DECNET?  :-)

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    Usage/API compatible? No.

    High level functionality? Yes.
    Among other options: FAL->FTP

    How about opening a file remotely without having to copy it over first ?

    The DECnet integration in RMS is unique.

    But from a practical perspective then either copy the file or put the
    file on a shared disk.

    and task to task->INETD.

    Can be done from shell/scripting, without programming ?

    DCL does not speak TCP/IP. And probably never will.

    But then script it in Python or Groovy or Perl or something
    else that does speak TCP/IP.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Chris Townley on Sat May 31 15:47:58 2025
    On 5/31/2025 3:34 PM, Chris Townley wrote:
    On 31/05/2025 18:47, Arne Vajhøj wrote:
    Can be done from shell/scripting, without programming ?

    DCL does not speak TCP/IP. And probably never will.

    But then script it in Python or Groovy or Perl or something
    else that does speak TCP/IP.

    What about COPY/FTP or the SSH commands?

    I am not sure I understand.

    The context was:

    #### and
    #### transparent task to task communication ?

    ### and task to task->INETD.

    So I assume that we are talking about how to rewrite
    something like:

    $ open/read f 0::"task=something"
    $ read f line
    $ close f
    $ exit

    to talk to an INETD service instead.

    Which I don't know how to do in DCL but is supereasy in Python/Groovy/Perl/whatever.

    And I don't see how COPY/FTP or SSH will help.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris Townley@21:1/5 to All on Sat May 31 20:34:29 2025
    On 31/05/2025 18:47, Arne Vajhøj wrote:

    Can be done from shell/scripting, without programming ?

    DCL does not speak TCP/IP. And probably never will.

    But then script it in Python or Groovy or Perl or something
    else that does speak TCP/IP.

    Arne


    What about COPY/FTP or the SSH commands?

    --
    Chris

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to Marc Van Dyck on Sat May 31 21:53:49 2025
    On Sat, 31 May 2025 12:23:46 +0200, Marc Van Dyck wrote:

    ... external audit people ... are mostly just interested in which IP
    ports are opened.

    In other words, they haven’t got a clue.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to All on Sun Jun 1 19:27:48 2025
    On 5/31/2025 3:47 PM, Arne Vajhøj wrote:
    The context was:

    ####                                                 and
    #### transparent task to task communication ?

    ### and task to task->INETD.

    So I assume that we are talking about how to rewrite
    something like:

    $ open/read f 0::"task=something"
    $ read f line
    $ close f
    $ exit

    Or to provide a complete example:

    $ typ add.com
    $ open/read/write f sys$net
    $ read f num1
    $ num1 = f$integer(num1)
    $ read f num2
    $ num2 = f$integer(num2)
    $ numres = num1 + num2
    $ numres = f$string(numres)
    $ write f numres
    $ close f
    $ exit
    $ typ tst.com
    $ open/read/write f 0"myusername mypassword"::"task=add.com"
    $ write f "123"
    $ write f "456"
    $ read f res
    $ close f
    $ write sys$output res
    $ exit
    $ @tst
    579

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dave Froble@21:1/5 to Lawrence D'Oliveiro on Sun Jun 1 21:39:11 2025
    On 5/31/2025 5:53 PM, Lawrence D'Oliveiro wrote:
    On Sat, 31 May 2025 12:23:46 +0200, Marc Van Dyck wrote:

    ... external audit people ... are mostly just interested in which IP
    ports are opened.

    In other words, they haven’t got a clue.


    Sure they do ...

    They know that:

    All computers run WEENDOZE ...

    The only networking is TCP/IP ...

    :-)

    --
    David Froble Tel: 724-529-0450
    Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
    DFE Ultralights, Inc.
    170 Grimplin Road
    Vanderbilt, PA 15486

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Lawrence D'Oliveiro on Sun Jun 1 21:49:59 2025
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    On Fri, 30 May 2025 09:46:27 +0200, Marc Van Dyck wrote:
    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    The irony of it, that the DEC concept requires creating a separate server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Mon Jun 2 01:17:21 2025
    On Sun, 1 Jun 2025 19:27:48 -0400, Arne Vajhøj wrote:

    $ typ tst.com
    $ open/read/write f 0"myusername mypassword"::"task=add.com"
    $ write f "123"
    $ write f "456"
    $ read f res
    $ close f
    $ write sys$output res
    $ exit

    I tried doing a bash equivalent to this, involving opening a remote
    connection and holding it open while feeding it numbers one at a time. But
    I couldn’t get that to work. Something about the syntax for dynamic redirections (and closing of dynamically-assigned FDs) that I don’t understand. Or that isn’t implemented properly.

    But this does work:

    ldo@theon:~> echo 123 + 456 | ssh hypatia bc
    579

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to All on Sun Jun 1 21:54:54 2025
    On 6/1/2025 9:49 PM, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    On Fri, 30 May 2025 09:46:27 +0200, Marc Van Dyck wrote:
    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    The irony of it, that the DEC concept requires creating a separate server
    process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Modified version of add server:

    $ type add2.com
    $ open/read/write f sys$net
    $ read f num1
    $ num1 = f$integer(num1)
    $ read f num2
    $ num2 = f$integer(num2)
    $ numres = num1 + num2
    $ numres = f$string(numres)
    $ write f numres
    $ pid = f$getjpi(0, "PID")
    $ write f pid
    $ close f
    $ exit
    $ type tst2.com
    $ open/read/write f 0"myusername mypassword"::"task=add2.com"
    $ write f "123"
    $ write f "456"
    $ read f res
    $ read f pid
    $ close f
    $ write sys$output "''res says ''pid'"
    $ exit
    $ @tst2
    579 says 00000425
    $ @tst2
    579 says 00000425
    $ @tst2
    579 says 00000425

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Mon Jun 2 03:44:26 2025
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:

    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:

    The irony of it, that the DEC concept requires creating a separate
    server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being
    shut down.

    What about multiple concurrent connections? You can’t avoid creating extra processes in that situation.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Mon Jun 2 10:34:32 2025
    Arne Vajhj has brought this to us :

    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Mon Jun 2 10:48:16 2025
    Marc Van Dyck formulated on Monday :
    Arne Vajhj has brought this to us :

    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    And even if no disaster tolerance is required, security teams often
    mandates to have production, test, and development systems on separate
    network segments, with heavy firewalling in between. Good luck to
    implement that with DECnet native routing.

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Mon Jun 2 10:59:15 2025
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:

    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:

    The irony of it, that the DEC concept requires creating a separate
    server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being shut down.

    What about multiple concurrent connections? You can’t avoid creating extra processes in that situation.

    Yes there is a time out. Mechanism is built in NET$SERVER.COM if I
    remember well. I think you can even customize the time out with a
    logical name. It can have some side effects, some of which I did not
    like. Therefore I used to terminate all my network mode procedures with
    a STOP/ID=0 instead of LOGOUT, just to make sure processes would not be re-used. Process creation used to be expensive on OpenVMS but with
    today's hardware it's hardly an issue anymore.

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From JKB@21:1/5 to All on Mon Jun 2 10:40:08 2025
    Problem solved with :
    - DEC-VAXVMS-TCPIP_ECO-V0503-184-4.PCSI
    - VAXDWMOTMUP01_073.A

    Regards,

    JB
    --
    Si votre demande me parvient en code 29, je vous titiouillerai volontiers
    une réponse.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to marc.gr.vandyck@invalid.skynet.be on Mon Jun 2 11:24:07 2025
    In article <mn.12937e96a0bc3b12.104627@invalid.skynet.be>,
    Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:

    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:

    The irony of it, that the DEC concept requires creating a separate
    server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being >> shut down.

    What about multiple concurrent connections? You can’t avoid creating extra >> processes in that situation.

    Responding generally, not specifically to Marc, but since I've
    plonked the troll, I don't see his responses (I highly suggest
    others do the same).

    But this assertion in particular is silly and deserves a
    rebuttal for the benefit of others.

    I suppose the troll has never heard of event-driven programming,
    or asynchronous IO, or, for that matter, threads. Any of these
    allow multiple connections to be served by a single process.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to davef@tsoft-inc.com on Mon Jun 2 11:24:57 2025
    In article <101ivc8$2o6lf$1@dont-email.me>,
    Dave Froble <davef@tsoft-inc.com> wrote:
    On 5/31/2025 5:53 PM, Lawrence D'Oliveiro wrote:
    On Sat, 31 May 2025 12:23:46 +0200, Marc Van Dyck wrote:

    ... external audit people ... are mostly just interested in which IP
    ports are opened.

    In other words, they haven’t got a clue.

    Sure they do ...

    They know that:

    All computers run WEENDOZE ...

    The only networking is TCP/IP ...

    :-)

    Please don't feed the troll.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to arne@vajhoej.dk on Mon Jun 2 12:37:10 2025
    On 2025-05-30, Arne Vajhj <arne@vajhoej.dk> wrote:
    On 5/30/2025 8:18 AM, Simon Clubley wrote:
    On 2025-05-29, David Wade <g4ugm@dave.invalid> wrote:
    On 5/27/2025 8:15 AM, Simon Clubley wrote:
    These old protocols have a habit of staying around a lot longer than >>>>>> expected. For example, I suspect somewhere people are still using UUCP, >>>>>> 2780/3780, xmodem, DDCMP, original SNA (not SNA over TCP/IP), etc, ... >>>
    SNA is an architecture. SNA over IP is still SNA. In fact 3270 over
    BiSync can be part of an SNA Network. Would you include SNA over X.25?


    I look at SNA in the same way as I look at DECnet. At one time, DECnet
    ran over its own transport and lower-level protocols. As a result of
    a changing world, it was then adapted to run over a protocol (IP) which
    is not a part of SNA/DECnet.

    Isn't DNA the equivalent of SNA?

    For me, the split point between original and current SNA/DECnet occurred when the previously fully native implementation was adapted to run
    over IP.

    Isn't it more accurate to say that support for IP was added as a
    possibility in parallel with still supporting the other protocols?


    It's much more than that. What matters here is that this is the point
    there was a distinct culture change with both DECnet and SNA.

    Up to this point the general feeling among many people (inside both
    IBM/DEC and customers alike) was that their own protocols were superior
    to "that IP stack stuff" and that you didn't need IP.

    The need to enable your own vendor-specific network stack to run over
    the IP stack was the point at which you had to change that attitude
    forever and that those vendor-specific protocols now needed to work
    with an industry-standard protocol that the vendor did not control.

    In case anyone here has forgotten this, I draw your attention to the
    early days of UCX and how DEC was dragged into the TCP/IP world against
    its will. With what other vendor would an ongoing market exist for
    a third-party TCP/IP stack that you had to pay for ?

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to arne@vajhoej.dk on Mon Jun 2 12:41:32 2025
    On 2025-05-30, Arne Vajhj <arne@vajhoej.dk> wrote:
    On 5/30/2025 8:34 AM, Simon Clubley wrote:
    On 2025-05-30, Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    Can you believe people are still using DECNET? :-)

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    For the first one, what about sshfs ?

    Does is run on VMS?


    I don't know. But it's an excellent example of something that should
    if it currently doesn't.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Dan Cross on Mon Jun 2 08:32:47 2025
    On 6/2/2025 7:24 AM, Dan Cross wrote:
    In article <mn.12937e96a0bc3b12.104627@invalid.skynet.be>,
    Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    The irony of it, that the DEC concept requires creating a separate
    server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being >>> shut down.

    What about multiple concurrent connections? You can’t avoid creating extra
    processes in that situation.

    Responding generally, not specifically to Marc, but since I've
    plonked the troll, I don't see his responses (I highly suggest
    others do the same).

    But this assertion in particular is silly and deserves a
    rebuttal for the benefit of others.

    I suppose the troll has never heard of event-driven programming,
    or asynchronous IO, or, for that matter, threads. Any of these
    allow multiple connections to be served by a single process.

    For TCP/IP yes.

    For DECnet task to task??

    I don't see a way to do that. But please enlighten us.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Marc Van Dyck on Mon Jun 2 08:43:07 2025
    On 6/2/2025 4:48 AM, Marc Van Dyck wrote:
    Marc Van Dyck formulated on Monday :
    Arne Vajhøj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    And even if no disaster tolerance is required, security teams often
    mandates to have production, test, and development systems on separate network segments, with heavy firewalling in between. Good luck to
    implement that with DECnet native routing.

    That is a common setup. But I don't see DECnet file copy
    dev->test>prod as being a good idea in that setup.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to Marc Van Dyck on Mon Jun 2 12:46:45 2025
    On 2025-05-31, Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    Arne Vajhj wrote on 30/05/2025 :
    On 5/30/2025 3:46 AM, Marc Van Dyck wrote:
    bill explained :
    Can you believe people are still using DECNET? :-)

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    Usage/API compatible? No.

    High level functionality? Yes.
    Among other options: FAL->FTP

    How about opening a file remotely without having to copy it over first
    ?

    and task to task->INETD.

    Can be done from shell/scripting, without programming ?


    Bash can do it, at least on Unix. You can directly open a connection to
    a TCP or UDP socket from within your script and treat it as just another
    file descriptor to read from/write to.

    I don't know if bash on VMS can do this. For details see:

    https://www.gnu.org/software/bash/manual/html_node/Redirections.html

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Marc Van Dyck on Mon Jun 2 08:37:54 2025
    On 6/2/2025 4:34 AM, Marc Van Dyck wrote:
    Arne Vajhøj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    True.

    But at the risk of sounding like a broken record, that is also
    something I got the impression is getting rarer.

    But I don't know.

    How many multi-site VMS clusters do you know?

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to All on Mon Jun 2 08:47:39 2025
    On 6/2/2025 8:37 AM, Arne Vajhøj wrote:
    On 6/2/2025 4:34 AM, Marc Van Dyck wrote:
    Arne Vajhøj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    True.

    But at the risk of sounding like a broken record, that is also
    something I got the impression is getting rarer.

    But I don't know.

    How many multi-site VMS clusters do you know?

    But I do see an opportunity for VSI to change that.

    Work with a cloud provider to offer a VMS cluster bundle:
    * 3 VM's in 3 different AZ's
    * 3 VMS + VMSCluster license
    * a cool setup script
    * not highway robbery price for VMScluster license

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Simon Clubley on Mon Jun 2 08:48:58 2025
    On 6/2/2025 8:37 AM, Simon Clubley wrote:
    In case anyone here has forgotten this, I draw your attention to the
    early days of UCX and how DEC was dragged into the TCP/IP world against
    its will. With what other vendor would an ongoing market exist for
    a third-party TCP/IP stack that you had to pay for ?

    Nobody that has used UCX 1.x will ever forget it.

    :-(

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to arne@vajhoej.dk on Mon Jun 2 12:58:40 2025
    On 2025-05-31, Arne Vajhj <arne@vajhoej.dk> wrote:
    On 5/31/2025 6:23 AM, Marc Van Dyck wrote:

    Other advantage is that most OPenVMS installations today are used in
    environments that must be certified, and external audit people usually
    know nothing about DECnet. They are mostly just interested in which IP
    ports are opened. Since for DECnet you just need a few, it's easily
    justified. They couldn't be possibly bothered about what DECnet object
    is enabled. They will complain about rlogin or telnet, but see nothing
    wrong with set host. FTP ? God forbid. But FAL ? just fine... You can't
    imagine how easy it was for me to get OpenVMS systems pass audits with
    flying colors, while my open systems colleagues suffered...

    :-)


    That's not something which is funny Arne.

    The auditors should know enough to be able to properly audit these
    systems especially in the high-critical environment I get the impression
    that Marc works in.

    When I was involved in audits of VMS systems then the auditors did have
    VMS checklists and checked stuff like DECnet default access.


    And for as long as an organisation has such systems, then the auditors
    should know how to audit them. If they don't, then they are not doing the
    job they were paid to do (and which they may even have legal liability
    for not doing it properly).

    An attacker doesn't care if their entry point is currently fashionable
    or not. They only care that they have an entry point they can exploit.

    That doesn't just apply to VMS BTW as it applies to every single device, system, or protocol that an organisation has in use. If there is something
    that can be compromised, then the organisation's auditors should know how
    to evaluate it.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Simon Clubley on Mon Jun 2 09:13:58 2025
    On 6/2/2025 8:58 AM, Simon Clubley wrote:
    On 2025-05-31, Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 5/31/2025 6:23 AM, Marc Van Dyck wrote:
    Other advantage is that most OPenVMS installations today are used in
    environments that must be certified, and external audit people usually
    know nothing about DECnet. They are mostly just interested in which IP
    ports are opened. Since for DECnet you just need a few, it's easily
    justified. They couldn't be possibly bothered about what DECnet object
    is enabled. They will complain about rlogin or telnet, but see nothing
    wrong with set host. FTP ? God forbid. But FAL ? just fine... You can't
    imagine how easy it was for me to get OpenVMS systems pass audits with
    flying colors, while my open systems colleagues suffered...

    :-)

    That's not something which is funny Arne.

    I got an age where I prefer to smile instead of cry.

    The auditors should know enough to be able to properly audit these
    systems especially in the high-critical environment I get the impression
    that Marc works in.

    When I was involved in audits of VMS systems then the auditors did have
    VMS checklists and checked stuff like DECnet default access.


    And for as long as an organisation has such systems, then the auditors
    should know how to audit them. If they don't, then they are not doing the
    job they were paid to do (and which they may even have legal liability
    for not doing it properly).

    If an audit company accept payment to audit some VMS systems, then
    they should obviously be able to audit VMS systems.

    If you bring your car to the mechanic and ask them to check the brakes,
    then you expect that they know how to check the brakes.

    That said then the bar set by such audits are usually pretty low. Some
    people that don't know the system come in and spend a few
    hours checking some stuff using a check list. Even with a reasonable
    good uptodate check list and some bright auditors it is still
    rather superficial.

    Passing such an audit should indicate that the security is
    not catastrophic bad. But if you need good security, then
    you need engineers and time.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris Townley@21:1/5 to Simon Clubley on Mon Jun 2 14:17:16 2025
    On 02/06/2025 13:58, Simon Clubley wrote:
    On 2025-05-31, Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 5/31/2025 6:23 AM, Marc Van Dyck wrote:

    Other advantage is that most OPenVMS installations today are used in
    environments that must be certified, and external audit people usually
    know nothing about DECnet. They are mostly just interested in which IP
    ports are opened. Since for DECnet you just need a few, it's easily
    justified. They couldn't be possibly bothered about what DECnet object
    is enabled. They will complain about rlogin or telnet, but see nothing
    wrong with set host. FTP ? God forbid. But FAL ? just fine... You can't
    imagine how easy it was for me to get OpenVMS systems pass audits with
    flying colors, while my open systems colleagues suffered...

    :-)


    That's not something which is funny Arne.

    The auditors should know enough to be able to properly audit these
    systems especially in the high-critical environment I get the impression
    that Marc works in.

    When I was involved in audits of VMS systems then the auditors did have
    VMS checklists and checked stuff like DECnet default access.


    And for as long as an organisation has such systems, then the auditors
    should know how to audit them. If they don't, then they are not doing the
    job they were paid to do (and which they may even have legal liability
    for not doing it properly).

    An attacker doesn't care if their entry point is currently fashionable
    or not. They only care that they have an entry point they can exploit.

    That doesn't just apply to VMS BTW as it applies to every single device, system, or protocol that an organisation has in use. If there is something that can be compromised, then the organisation's auditors should know how
    to evaluate it.

    Simon.


    I wouldn't disagree, but the demonstrable experiences I have seen belie
    that. When I first got involved with external IT audits, they were all
    over our VMS systems - they had automated tools that they didn't
    understand. After a coupe of tears we changed external auditors, and the
    new lot just ignored VMS, but jumped on our AS/400 - which ran a single, internal task.
    Rarely did I see anything worthwhile come from them, except where I
    tipped them off to something I knew about but was not allowed to fix/
    That changes after their report.

    --
    Chris

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Lawrence D'Oliveiro on Mon Jun 2 09:25:22 2025
    On 6/1/2025 11:44 PM, Lawrence D'Oliveiro wrote:
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    The irony of it, that the DEC concept requires creating a separate
    server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being shut down.

    Yes.

    What about multiple concurrent connections? You can’t avoid creating extra processes in that situation.

    True.

    But they will all be kept around and reused. OSU HTTPD use it for
    CGI scripts - it works.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to arne@vajhoej.dk on Mon Jun 2 17:16:02 2025
    In article <101k5lf$39d9f$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 7:24 AM, Dan Cross wrote:
    In article <mn.12937e96a0bc3b12.104627@invalid.skynet.be>,
    Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    The irony of it, that the DEC concept requires creating a separate >>>>>> server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being >>>> shut down.

    What about multiple concurrent connections? You can’t avoid creating extra
    processes in that situation.

    Responding generally, not specifically to Marc, but since I've
    plonked the troll, I don't see his responses (I highly suggest
    others do the same).

    But this assertion in particular is silly and deserves a
    rebuttal for the benefit of others.

    I suppose the troll has never heard of event-driven programming,
    or asynchronous IO, or, for that matter, threads. Any of these
    allow multiple connections to be served by a single process.

    For TCP/IP yes.

    For DECnet task to task??

    Yes.

    I don't see a way to do that.

    Yes, but you're also the guy who didn't see a way to pass an
    active TCP connection between processes under VMS, and who tried
    to use the 4.4BSD API when I posted example code of how it's
    done on Unix as an example.

    But please enlighten us.

    Mailboxes and QIO?

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Dan Cross on Mon Jun 2 14:07:41 2025
    On 6/2/2025 1:16 PM, Dan Cross wrote:
    In article <101k5lf$39d9f$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 7:24 AM, Dan Cross wrote:
    In article <mn.12937e96a0bc3b12.104627@invalid.skynet.be>,
    Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    The irony of it, that the DEC concept requires creating a separate >>>>>>> server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being
    shut down.

    What about multiple concurrent connections? You can’t avoid creating extra
    processes in that situation.

    Responding generally, not specifically to Marc, but since I've
    plonked the troll, I don't see his responses (I highly suggest
    others do the same).

    But this assertion in particular is silly and deserves a
    rebuttal for the benefit of others.

    I suppose the troll has never heard of event-driven programming,
    or asynchronous IO, or, for that matter, threads. Any of these
    allow multiple connections to be served by a single process.

    For TCP/IP yes.

    For DECnet task to task??

    Yes.

    I don't see a way to do that.

    Yes, but you're also the guy who didn't see a way to pass an
    active TCP connection between processes under VMS, and who tried
    to use the 4.4BSD API when I posted example code of how it's
    done on Unix as an example.

    But please enlighten us.

    Mailboxes and QIO?

    ????

    Let us look at how it works.

    1) client activate task=foobar.exe
    2) DECnet note that all existing processes are in use
    and start a new process running foobar.exe

    foobar.exe can do a lot of QIO on mailboxes, but that
    it not gonna change that DECnet started a new process.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to All on Mon Jun 2 14:31:38 2025
    On 6/2/2025 2:07 PM, Arne Vajhøj wrote:
    On 6/2/2025 1:16 PM, Dan Cross wrote:
    In article <101k5lf$39d9f$1@dont-email.me>,
    Arne Vajhøj  <arne@vajhoej.dk> wrote:
    On 6/2/2025 7:24 AM, Dan Cross wrote:
    In article <mn.12937e96a0bc3b12.104627@invalid.skynet.be>,
    Marc Van Dyck  <marc.gr.vandyck@invalid.skynet.be> wrote:
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    The irony of it, that the DEC concept requires creating a separate >>>>>>>> server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time
    before being
    shut down.

    What about multiple concurrent connections? You can’t avoid
    creating extra
    processes in that situation.

    Responding generally, not specifically to Marc, but since I've
    plonked the troll, I don't see his responses (I highly suggest
    others do the same).

    But this assertion in particular is silly and deserves a
    rebuttal for the benefit of others.

    I suppose the troll has never heard of event-driven programming,
    or asynchronous IO, or, for that matter, threads.  Any of these
    allow multiple connections to be served by a single process.

    For TCP/IP yes.

    For DECnet task to task??

    Yes.

    I don't see a way to do that.

    Yes, but you're also the guy who didn't see a way to pass an
    active TCP connection between processes under VMS, and who tried
    to use the 4.4BSD API when I posted example code of how it's
    done on Unix as an example.

    But please enlighten us.

    Mailboxes and QIO?

    ????

    Let us look at how it works.

    1) client activate task=foobar.exe
    2) DECnet note that all existing processes are in use
       and start a new process running foobar.exe

    foobar.exe can do a lot of QIO on mailboxes, but that
    it not gonna change that DECnet started a new process.

    All the above was transparent DECnet task to task.

    Are you talking non-transparent DECnet task to task
    to a known network object?

    That is different but may be able to do it.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to arne@vajhoej.dk on Mon Jun 2 20:23:37 2025
    In article <683de86d$0$684$14726298@news.sunsite.dk>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 1:16 PM, Dan Cross wrote:
    In article <101k5lf$39d9f$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 7:24 AM, Dan Cross wrote:
    In article <mn.12937e96a0bc3b12.104627@invalid.skynet.be>,
    Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    The irony of it, that the DEC concept requires creating a separate >>>>>>>> server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being
    shut down.

    What about multiple concurrent connections? You can’t avoid creating extra
    processes in that situation.

    Responding generally, not specifically to Marc, but since I've
    plonked the troll, I don't see his responses (I highly suggest
    others do the same).

    But this assertion in particular is silly and deserves a
    rebuttal for the benefit of others.

    I suppose the troll has never heard of event-driven programming,
    or asynchronous IO, or, for that matter, threads. Any of these
    allow multiple connections to be served by a single process.

    For TCP/IP yes.

    For DECnet task to task??

    Yes.

    I don't see a way to do that.

    Yes, but you're also the guy who didn't see a way to pass an
    active TCP connection between processes under VMS, and who tried
    to use the 4.4BSD API when I posted example code of how it's
    done on Unix as an example.

    But please enlighten us.

    Mailboxes and QIO?

    ????

    Let us look at how it works.

    1) client activate task=foobar.exe
    2) DECnet note that all existing processes are in use
    and start a new process running foobar.exe

    foobar.exe can do a lot of QIO on mailboxes, but that
    it not gonna change that DECnet started a new process.

    Two cases: transparent task-to-task, and non-transparent.
    You just said "DECnet task to task".

    Earlier in the thread, Marc mentioned transparent task-to-task,
    but you didn't say that. Non-transparent task-to-task
    communications over DECnet do not require a new process; they
    can make use of all of the techniques I mentioned earlier.

    To nothing prevents a transparent client from communicating with
    a non-transparent server, as far as I can tell, though I could
    be wrong.

    Even then, I'm not entirely convinced one can't play clever
    games with logicals for tasks that refer to multiple devnames to
    handle multiple clients simultaneously in the context of
    transparent task-to-task communications. If you'll recall from
    when you were dismissing the idea that VMS had anything similar
    to Unix/Linux's passing file descriptors between tasks, similar
    techniques could be employed to solve that problem.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Dan Cross on Mon Jun 2 16:48:23 2025
    On 6/2/2025 4:23 PM, Dan Cross wrote:
    In article <683de86d$0$684$14726298@news.sunsite.dk>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 1:16 PM, Dan Cross wrote:
    In article <101k5lf$39d9f$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 7:24 AM, Dan Cross wrote:
    In article <mn.12937e96a0bc3b12.104627@invalid.skynet.be>,
    Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    The irony of it, that the DEC concept requires creating a separate >>>>>>>>> server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being
    shut down.

    What about multiple concurrent connections? You can’t avoid creating extra
    processes in that situation.

    Responding generally, not specifically to Marc, but since I've
    plonked the troll, I don't see his responses (I highly suggest
    others do the same).

    But this assertion in particular is silly and deserves a
    rebuttal for the benefit of others.

    I suppose the troll has never heard of event-driven programming,
    or asynchronous IO, or, for that matter, threads. Any of these
    allow multiple connections to be served by a single process.

    For TCP/IP yes.

    For DECnet task to task??

    Yes.

    I don't see a way to do that.

    Yes, but you're also the guy who didn't see a way to pass an
    active TCP connection between processes under VMS, and who tried
    to use the 4.4BSD API when I posted example code of how it's
    done on Unix as an example.

    But please enlighten us.

    Mailboxes and QIO?

    ????

    Let us look at how it works.

    1) client activate task=foobar.exe
    2) DECnet note that all existing processes are in use
    and start a new process running foobar.exe

    foobar.exe can do a lot of QIO on mailboxes, but that
    it not gonna change that DECnet started a new process.

    Two cases: transparent task-to-task, and non-transparent.
    You just said "DECnet task to task".

    Earlier in the thread, Marc mentioned transparent task-to-task,
    but you didn't say that. Non-transparent task-to-task
    communications over DECnet do not require a new process; they
    can make use of all of the techniques I mentioned earlier.

    I did not say transparent but the code I posted and Lawrence
    commented on was transparent task to task.

    Which means that Lawrences comment was actually correct.

    And you calling it silly was wrong.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to arne@vajhoej.dk on Mon Jun 2 21:01:57 2025
    In article <101l2mn$3grj7$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 4:23 PM, Dan Cross wrote:
    In article <683de86d$0$684$14726298@news.sunsite.dk>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 1:16 PM, Dan Cross wrote:
    In article <101k5lf$39d9f$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 7:24 AM, Dan Cross wrote:
    In article <mn.12937e96a0bc3b12.104627@invalid.skynet.be>,
    Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    The irony of it, that the DEC concept requires creating a separate >>>>>>>>>> server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being
    shut down.

    What about multiple concurrent connections? You can’t avoid creating extra
    processes in that situation.

    Responding generally, not specifically to Marc, but since I've
    plonked the troll, I don't see his responses (I highly suggest
    others do the same).

    But this assertion in particular is silly and deserves a
    rebuttal for the benefit of others.

    I suppose the troll has never heard of event-driven programming,
    or asynchronous IO, or, for that matter, threads. Any of these
    allow multiple connections to be served by a single process.

    For TCP/IP yes.

    For DECnet task to task??

    Yes.

    I don't see a way to do that.

    Yes, but you're also the guy who didn't see a way to pass an
    active TCP connection between processes under VMS, and who tried
    to use the 4.4BSD API when I posted example code of how it's
    done on Unix as an example.

    But please enlighten us.

    Mailboxes and QIO?

    ????

    Let us look at how it works.

    1) client activate task=foobar.exe
    2) DECnet note that all existing processes are in use
    and start a new process running foobar.exe

    foobar.exe can do a lot of QIO on mailboxes, but that
    it not gonna change that DECnet started a new process.

    Two cases: transparent task-to-task, and non-transparent.
    You just said "DECnet task to task".

    Earlier in the thread, Marc mentioned transparent task-to-task,
    but you didn't say that. Non-transparent task-to-task
    communications over DECnet do not require a new process; they
    can make use of all of the techniques I mentioned earlier.

    I did not say transparent but the code I posted and Lawrence
    commented on was transparent task to task.

    Which means that Lawrences comment was actually correct.

    I've had Lawrence plonked for a while now. I strongly recommend
    that you do the same. He is a troll, and does not engage in
    good faith.

    And you calling it silly was wrong.

    I noticed you didn't quote the rest of my reply.

    Like I said, I'm not convinced that one cannot write an
    application that uses multiple devnames and then define logical
    symbols so that it can interact with multiple clients using
    transparent task-to-task communications. And as I mentioned, I
    don't see any structural reason that a transparent client cannot
    communicate with a non-transparent server.

    So yes, I think his comment was silly and wrong.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Dan Cross on Mon Jun 2 18:57:43 2025
    On 6/2/2025 5:01 PM, Dan Cross wrote:
    In article <101l2mn$3grj7$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 4:23 PM, Dan Cross wrote:
    In article <683de86d$0$684$14726298@news.sunsite.dk>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 1:16 PM, Dan Cross wrote:
    In article <101k5lf$39d9f$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 7:24 AM, Dan Cross wrote:
    In article <mn.12937e96a0bc3b12.104627@invalid.skynet.be>,
    Marc Van Dyck <marc.gr.vandyck@invalid.skynet.be> wrote:
    on 02/06/2025, Lawrence D'Oliveiro supposed :
    On Sun, 1 Jun 2025 21:49:59 -0400, Arne Vajhøj wrote:
    On 5/30/2025 6:41 PM, Lawrence D'Oliveiro wrote:
    The irony of it, that the DEC concept requires creating a separate >>>>>>>>>>> server process for every client connection,

    It doesn't.

    Processes are re-used for task to task servers.

    Hmm. Presumably the process is kept around for a limited time before being
    shut down.

    What about multiple concurrent connections? You can’t avoid creating extra
    processes in that situation.

    Responding generally, not specifically to Marc, but since I've
    plonked the troll, I don't see his responses (I highly suggest
    others do the same).

    But this assertion in particular is silly and deserves a
    rebuttal for the benefit of others.

    I suppose the troll has never heard of event-driven programming, >>>>>>> or asynchronous IO, or, for that matter, threads. Any of these
    allow multiple connections to be served by a single process.

    For TCP/IP yes.

    For DECnet task to task??

    Yes.

    I don't see a way to do that.

    Yes, but you're also the guy who didn't see a way to pass an
    active TCP connection between processes under VMS, and who tried
    to use the 4.4BSD API when I posted example code of how it's
    done on Unix as an example.

    But please enlighten us.

    Mailboxes and QIO?

    ????

    Let us look at how it works.

    1) client activate task=foobar.exe
    2) DECnet note that all existing processes are in use
    and start a new process running foobar.exe

    foobar.exe can do a lot of QIO on mailboxes, but that
    it not gonna change that DECnet started a new process.

    Two cases: transparent task-to-task, and non-transparent.
    You just said "DECnet task to task".

    Earlier in the thread, Marc mentioned transparent task-to-task,
    but you didn't say that. Non-transparent task-to-task
    communications over DECnet do not require a new process; they
    can make use of all of the techniques I mentioned earlier.

    I did not say transparent but the code I posted and Lawrence
    commented on was transparent task to task.

    Which means that Lawrences comment was actually correct.

    I've had Lawrence plonked for a while now. I strongly recommend
    that you do the same. He is a troll, and does not engage in
    good faith.

    In this thread he first claimed that my tttt example created a new
    process every time. When he was told that was wrong then he
    acknowledge that. And the he noted that it would create multiple
    processes is run concurrently. Which is correct.

    That is good behavior.

    There are other participants here that could learn
    from that!

    And you calling it silly was wrong.

    I noticed you didn't quote the rest of my reply.

    Like I said, I'm not convinced that one cannot write an
    application that uses multiple devnames and then define logical
    symbols so that it can interact with multiple clients using
    transparent task-to-task communications.

    So you called him silly because you think that he could be wrong
    even though you don't have any specifics?

    Interesting personality you have!

    And as I mentioned, I
    don't see any structural reason that a transparent client cannot
    communicate with a non-transparent server.

    I am not even sure what that means.

    But I am pretty sure that my code example that Lawrence was commenting
    on does not do it. That was totally classic transparent all the way.

    So that argument is totally irrelevant.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to arne@vajhoej.dk on Tue Jun 3 00:01:31 2025
    In article <101la97$3iet6$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    On 6/2/2025 5:01 PM, Dan Cross wrote:
    In article <101l2mn$3grj7$1@dont-email.me>,
    Arne Vajhøj <arne@vajhoej.dk> wrote:
    [snip]
    Which means that Lawrences comment was actually correct.

    I've had Lawrence plonked for a while now. I strongly recommend
    that you do the same. He is a troll, and does not engage in
    good faith.

    In this thread he first claimed that my tttt example created a new
    process every time. When he was told that was wrong then he
    acknowledge that. And the he noted that it would create multiple
    processes is run concurrently. Which is correct.

    That is good behavior.

    Sure. In contrast to literally years of poor behavior in this
    and other newsgroups.

    There are other participants here that could learn
    from that!

    Indeed.

    And you calling it silly was wrong.

    I noticed you didn't quote the rest of my reply.

    Like I said, I'm not convinced that one cannot write an
    application that uses multiple devnames and then define logical
    symbols so that it can interact with multiple clients using
    transparent task-to-task communications.

    So you called him silly because you think that he could be wrong
    even though you don't have any specifics?

    Interesting personality you have!

    Stop trying to move the goalposts. I said what I said; if you
    are having a hard time interpeting it, ask for clarification,
    but do not put words in my mouth.

    And as I mentioned, I
    don't see any structural reason that a transparent client cannot
    communicate with a non-transparent server.

    I am not even sure what that means.

    I'm not surprised.

    But I am pretty sure that my code example that Lawrence was commenting
    on does not do it. That was totally classic transparent all the way.

    So that argument is totally irrelevant.

    Not at all. The statement was that one _can't_ do it. I said
    that's a silly statement, and gave reasoning. If you disagree
    with that reasoning, then say that.

    But my experience with you, specifically, is that you tend to
    argue about things that you really do not know about
    (hypervisors, passing around open file channels, etc), and do so
    endlessly, despite evidence showing your interpretation is wrong
    in context. You've even quoted me back to myself to try and
    argue something you didn't understand. Usually when you've been
    definitively shown to be wrong, you simply stop posting rather
    than admit error.

    In fact, you're basically doing that right now.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Tue Jun 3 00:30:41 2025
    On Mon, 2 Jun 2025 08:48:58 -0400, Arne Vajhøj wrote:

    With what other vendor would an ongoing market exist for a
    third-party TCP/IP stack that you had to pay for ?

    Nobody that has used UCX 1.x will ever forget it.

    *Cough* Trumpet Winsock *Cough*

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Tue Jun 3 00:36:00 2025
    On Mon, 2 Jun 2025 09:25:22 -0400, Arne Vajhøj wrote:

    On 6/1/2025 11:44 PM, Lawrence D'Oliveiro wrote:

    What about multiple concurrent connections? You can’t avoid creating
    extra processes in that situation.

    True.

    But they will all be kept around and reused. OSU HTTPD use it for CGI
    scripts - it works.

    But there’s a resource-usage cost associated with keeping processes in existence, isn’t there. As opposed to letting the server process control
    for itself how it will divide up multiple concurrent connections among a
    set of service processes/threads.

    (I know, CGI doesn’t give you that control anyway. This is why Web
    developers don’t like to use CGI nowadays.)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Tue Jun 3 10:28:04 2025
    on 02/06/2025, Arne Vajhj supposed :
    On 6/2/2025 4:48 AM, Marc Van Dyck wrote:
    Marc Van Dyck formulated on Monday :
    Arne Vajhj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    And even if no disaster tolerance is required, security teams often
    mandates to have production, test, and development systems on separate
    network segments, with heavy firewalling in between. Good luck to
    implement that with DECnet native routing.

    That is a common setup. But I don't see DECnet file copy
    dev->test>prod as being a good idea in that setup.

    Arne

    That's what we used to release new versions of applications from test
    to production. Using DECnet, FAL, and proxies... I also envisaged to
    get a DFS setup in place, but got retired before I could achieve that.

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Tue Jun 3 10:25:11 2025
    Arne Vajhj expressed precisely :
    On 6/2/2025 4:34 AM, Marc Van Dyck wrote:
    Arne Vajhj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    True.

    But at the risk of sounding like a broken record, that is also
    something I got the impression is getting rarer.

    But I don't know.

    How many multi-site VMS clusters do you know?

    Arne

    At least the one that I was in charge of before I retired last year.
    Two sites, 3 main applications, 3 production clusters, 3 other ones
    on a distant site for disaster tolerance, 3 test systems, one for
    development, two clusters for system management, and two for system testing/crash & burn activities. FC storage with asynchronous long
    distance replication. Backups on shared robots. Lots of fun...

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Marc Van Dyck on Tue Jun 3 10:18:53 2025
    On 6/3/2025 4:25 AM, Marc Van Dyck wrote:
    Arne Vajhøj expressed precisely :
    On 6/2/2025 4:34 AM, Marc Van Dyck wrote:
    Arne Vajhøj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    True.

    But at the risk of sounding like a broken record, that is also
    something I got the impression is getting rarer.

    But I don't know.

    How many multi-site VMS clusters do you know?

    At least the one that I was in charge of before I retired last year.
    Two sites, 3 main applications, 3 production clusters, 3 other ones
    on a distant site for disaster tolerance, 3 test systems, one for development, two clusters for system management, and two for system testing/crash & burn activities. FC storage with asynchronous long
    distance replication. Backups on shared robots. Lots of fun...

    Dan just posted a question on the VSI forum about a 6 node cluster.
    So clusters do exist.

    I just see very few questions related to clusters. But maybe system
    managers running clusters are generally more competent than average.

    And very few need clusters for load volume leaving mostly HA reason.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Marc Van Dyck on Tue Jun 3 11:37:23 2025
    On 6/3/2025 4:28 AM, Marc Van Dyck wrote:
    on 02/06/2025, Arne Vajhøj supposed :
    On 6/2/2025 4:48 AM, Marc Van Dyck wrote:
    Marc Van Dyck formulated on Monday :
    Arne Vajhøj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    And even if no disaster tolerance is required, security teams often
    mandates to have production, test, and development systems on separate
    network segments, with heavy firewalling in between. Good luck to
    implement that with DECnet native routing.

    That is a common setup. But I don't see DECnet file copy
    dev->test>prod as being a good idea in that setup.

    That's what we used to release new versions of applications from test
    to production. Using DECnet, FAL, and proxies... I also envisaged to
    get a DFS setup in place, but got retired before I could achieve that.

    I would have expected at least prod to be:

    --(SFTP put install kit)-->SFTP server<--(SFTP get install kit)--prod

    I have seen DECnet copy too, but 20+ years ago.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Lawrence D'Oliveiro on Tue Jun 3 11:44:53 2025
    On 6/2/2025 8:36 PM, Lawrence D'Oliveiro wrote:
    On Mon, 2 Jun 2025 09:25:22 -0400, Arne Vajhøj wrote:
    On 6/1/2025 11:44 PM, Lawrence D'Oliveiro wrote:

    What about multiple concurrent connections? You can’t avoid creating
    extra processes in that situation.

    True.

    But they will all be kept around and reused. OSU HTTPD use it for CGI
    scripts - it works.

    But there’s a resource-usage cost associated with keeping processes in existence, isn’t there. As opposed to letting the server process control for itself how it will divide up multiple concurrent connections among a
    set of service processes/threads.

    It is a tradeoff between memory usage by having processes standby
    and CPU usage of having to start new processes.

    (I know, CGI doesn’t give you that control anyway. This is why Web developers don’t like to use CGI nowadays.)

    I would say that the main reason for CGI being obsolete is poor
    performance. Process creation, image activation and IPC adds crazy
    overhead.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Wed Jun 4 10:27:46 2025
    Arne Vajhj used his keyboard to write :
    On 6/3/2025 4:25 AM, Marc Van Dyck wrote:
    Arne Vajhj expressed precisely :
    On 6/2/2025 4:34 AM, Marc Van Dyck wrote:
    Arne Vajhj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    True.

    But at the risk of sounding like a broken record, that is also
    something I got the impression is getting rarer.

    But I don't know.

    How many multi-site VMS clusters do you know?

    At least the one that I was in charge of before I retired last year.
    Two sites, 3 main applications, 3 production clusters, 3 other ones
    on a distant site for disaster tolerance, 3 test systems, one for
    development, two clusters for system management, and two for system
    testing/crash & burn activities. FC storage with asynchronous long
    distance replication. Backups on shared robots. Lots of fun...

    Dan just posted a question on the VSI forum about a 6 node cluster.
    So clusters do exist.

    I just see very few questions related to clusters. But maybe system
    managers running clusters are generally more competent than average.

    And very few need clusters for load volume leaving mostly HA reason.

    Arne

    Indeed. Clusters used the be a way to add compute power by horizontal
    scaling, because vertical scaling was either impossible or
    unaffordable.
    Today compute power is cheap, so clustering is mostly a high
    availability tool. With the consequence that large number of nodes have
    largely disappeared ; most clusters are now two or three (if you don't
    want a quorum disk) nodes only. I still remember the development
    cluster
    I ran 25 years ago, a large LAVC with some 50 satellites that used to
    take half a day to reboot...

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Wed Jun 4 10:19:27 2025
    Arne Vajhj wrote on 03/06/2025 :
    On 6/3/2025 4:28 AM, Marc Van Dyck wrote:
    on 02/06/2025, Arne Vajhj supposed :
    On 6/2/2025 4:48 AM, Marc Van Dyck wrote:
    Marc Van Dyck formulated on Monday :
    Arne Vajhj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    And even if no disaster tolerance is required, security teams often
    mandates to have production, test, and development systems on separate >>>> network segments, with heavy firewalling in between. Good luck to
    implement that with DECnet native routing.

    That is a common setup. But I don't see DECnet file copy
    dev->test>prod as being a good idea in that setup.

    That's what we used to release new versions of applications from test
    to production. Using DECnet, FAL, and proxies... I also envisaged to
    get a DFS setup in place, but got retired before I could achieve that.

    I would have expected at least prod to be:

    --(SFTP put install kit)-->SFTP server<--(SFTP get install kit)--prod

    I have seen DECnet copy too, but 20+ years ago.

    Arne

    Nah, we found easier than that. Copy between nodes only allowed for
    specific accounts, and those accounts are audited by System Detective.
    That's an absolutely superb product.

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Daniel@21:1/5 to Marc Van Dyck on Wed Jun 4 20:52:06 2025
    On 4/6/2025 17:57, Marc Van Dyck wrote:
    Arne Vajhøj used his keyboard to write :
    On 6/3/2025 4:25 AM, Marc Van Dyck wrote:
    Arne Vajhøj expressed precisely :
    On 6/2/2025 4:34 AM, Marc Van Dyck wrote:
    Arne Vajhøj has brought this to us :
    But again my impression is that often the VMS systems are in same
    server room and no routing required.

    Several OpenVMS systems today are used in disaster-tolerant
    configurations. That implies at least two different locations.

    True.

    But at the risk of sounding like a broken record, that is also
    something I got the impression is getting rarer.

    But I don't know.

    How many multi-site VMS clusters do you know?

    At least the one that I was in charge of before I retired last year.
    Two sites, 3 main applications, 3 production clusters, 3 other ones
    on a distant site for disaster tolerance, 3 test systems, one for
    development, two clusters for system management, and two for system
    testing/crash & burn activities. FC storage with asynchronous long
    distance replication. Backups on shared robots. Lots of fun...

    Dan just posted a question on the VSI forum about a 6 node cluster.
    So clusters do exist.

    I just see very few questions related to clusters. But maybe system
    managers running clusters are generally more competent than average.

    And very few need clusters for load volume leaving mostly HA reason.

    Arne

    Indeed. Clusters used the be a way to add compute power by horizontal scaling, because vertical scaling was either impossible or unaffordable. Today compute power is cheap, so clustering is mostly a high
    availability tool. With the consequence that large number of nodes have largely disappeared ; most clusters are now two or three (if you don't
    want a quorum disk) nodes only. I still remember the development cluster
    I ran 25 years ago, a large LAVC with some 50 satellites that used to
    take half a day to reboot...

    Amen. Not multi-site, except in the sense of two physically separated
    data centres at extreme ends of same building. In the very early '90s
    we had a ~60 node largely LAVC cluster bolstered by half-a-dozen or so
    CI systems providing the major science/engineering compute grunt. IIRC
    took a couple of hours to reboot (the satellites). Gone by the mid-
    '00s. When I left in the mid-10's a legacy 2 node cluster providing
    reference software. So probably a 15 year useful life. Not too bad in
    the schemes of things.

    --
    Anyone, who using social-media, forms an opinion regarding anything
    other than the relative cuteness of this or that puppy-dog, needs
    seriously to examine their critical thinking.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to Marc Van Dyck on Wed Jun 4 22:49:56 2025
    On Wed, 04 Jun 2025 10:19:27 +0200, Marc Van Dyck wrote:

    Copy between nodes only allowed for specific accounts, and those
    accounts are audited by System Detective. That's an absolutely
    superb product.

    Basic security should be built into the core OS installation, not added as
    an afterthought -- and an extra-cost one at that.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Thu Jun 5 10:44:51 2025
    Lawrence D'Oliveiro laid this down on his screen :
    On Wed, 04 Jun 2025 10:19:27 +0200, Marc Van Dyck wrote:

    Copy between nodes only allowed for specific accounts, and those
    accounts are audited by System Detective. That's an absolutely
    superb product.

    Basic security should be built into the core OS installation, not added as
    an afterthought -- and an extra-cost one at that.

    There are already many security features available in OpenVMS. More
    than
    what many people need. There must be a trade-off. Building more stuff
    into the OS means that more customers pay for features they don't need.
    System Detective is a third party layered product offering features
    that I never needed before working in the finance industry. Like, for
    example, recording all the activity of specific user's interactive
    sessions, which is what we do for all privileged accounts.

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dave Froble@21:1/5 to Lawrence D'Oliveiro on Thu Jun 5 08:33:16 2025
    On 6/4/2025 6:49 PM, Lawrence D'Oliveiro wrote:
    On Wed, 04 Jun 2025 10:19:27 +0200, Marc Van Dyck wrote:

    Copy between nodes only allowed for specific accounts, and those
    accounts are audited by System Detective. That's an absolutely
    superb product.

    Basic security should be built into the core OS installation, not added as
    an afterthought -- and an extra-cost one at that.


    And I'm guessing that all that should also be free?

    With that attitude, you and I and many others would be broke, homeless, and such ..

    --
    David Froble Tel: 724-529-0450
    Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
    DFE Ultralights, Inc.
    170 Grimplin Road
    Vanderbilt, PA 15486

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Marc Van Dyck on Thu Jun 5 09:10:45 2025
    On 6/5/2025 4:44 AM, Marc Van Dyck wrote:
    Lawrence D'Oliveiro laid this down on his screen :
    On Wed, 04 Jun 2025 10:19:27 +0200, Marc Van Dyck wrote:
    Copy between nodes only allowed for specific accounts, and those
    accounts are audited by System Detective. That's an absolutely
    superb product.

    Basic security should be built into the core OS installation, not
    added as an afterthought -- and an extra-cost one at that.

    There are already many security features available in OpenVMS. More than
    what many people need. There must be a trade-off. Building more stuff
    into the OS means that more customers pay for features they don't need. System Detective is a third party layered product offering features
    that I never needed before working in the finance industry. Like, for example, recording all the activity of specific user's interactive
    sessions, which is what we do for all privileged accounts.

    https://pointsecure.com/products/system-detective/

    sounds pretty advanced.

    Way more than the basic:

    $ SET HOST xxx /LOG=whatever.log

    Can it be configured to not log (or x out) certain
    sensitive information that should not be logged?

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris Townley@21:1/5 to bill on Thu Jun 5 14:30:52 2025
    On 05/06/2025 14:24, bill wrote:
    On 6/5/2025 8:33 AM, Dave Froble wrote:
    On 6/4/2025 6:49 PM, Lawrence D'Oliveiro wrote:
    On Wed, 04 Jun 2025 10:19:27 +0200, Marc Van Dyck wrote:

    Copy between nodes only allowed for specific accounts, and those
    accounts are audited by System Detective. That's an absolutely
    superb product.

    Basic security should be built into the core OS installation, not
    added as
    an afterthought -- and an extra-cost one at that.


    And I'm guessing that all that should also be free?

    With that attitude, you and I and many others would be broke,
    homeless, and such ..


    Richard Stallman rears his ugly head yet again!!!  Of course, it seems
    to always be users who never develop anything who believe all the stuff
    that gets developed should be free.

    bill


    TANSTAFL ?

    --
    Chris

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to bill on Thu Jun 5 10:01:17 2025
    On 6/5/2025 9:24 AM, bill wrote:
    On 6/5/2025 8:33 AM, Dave Froble wrote:
    On 6/4/2025 6:49 PM, Lawrence D'Oliveiro wrote:
    On Wed, 04 Jun 2025 10:19:27 +0200, Marc Van Dyck wrote:
    Copy between nodes only allowed for specific accounts, and those
    accounts are audited by System Detective. That's an absolutely
    superb product.

    Basic security should be built into the core OS installation, not
    added as
    an afterthought -- and an extra-cost one at that.

    And I'm guessing that all that should also be free?

    With that attitude, you and I and many others would be broke,
    homeless, and such ..

    Richard Stallman rears his ugly head yet again!!!  Of course, it seems
    to always be users who never develop anything who believe all the stuff
    that gets developed should be free.

    If your focus is the people actually producing software, then
    you should not blame Stallman.

    GPL/AGPL is less business friendly than Apache/MIT/BSD on
    the software consumer side.

    But GPL/AGPL is more business friendly than Apache/MIT/BSD on
    the software producer side.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to Marc Van Dyck on Thu Jun 5 23:58:02 2025
    On Thu, 05 Jun 2025 10:44:51 +0200, Marc Van Dyck wrote:

    Lawrence D'Oliveiro laid this down on his screen :

    Basic security should be built into the core OS installation, not added
    as an afterthought -- and an extra-cost one at that.

    There are already many security features available in OpenVMS. More than
    what many people need. There must be a trade-off. Building more stuff
    into the OS means that more customers pay for features they don't need.

    Look at what comes standard in the Linux kernel: cgroups, namespaces, containers, virtualization, SELinux, AppArmor, the whole pluggable LSM mechanism, seccomp, netfilter, EBPF ... and that’s just off the top of my head.

    That should be just the baseline for the kind of security that comes in
    the box.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Thu Jun 5 23:51:49 2025
    On Thu, 5 Jun 2025 10:01:17 -0400, Arne Vajhøj wrote:

    GPL/AGPL is less business friendly than Apache/MIT/BSD on the software consumer side.

    But GPL/AGPL is more business friendly than Apache/MIT/BSD on the
    software producer side.

    Funny you should say that. Leaving aside the AGPL for a moment, I have
    heard lots of people say that copyleft licences are not somehow “business- friendly”. What they are is “competition-friendly”: they ensure that market participants compete on a level playing field.

    Remember that, in Free Software, there is not this hard-and-fast
    distinction between those who “produce” it and those who “consume” it. Sheer numbers of passive users do not, on their own, make much difference
    to the success of a Free Software project. What matters is the liveliness
    of the community that contributes back to the project.

    And this is where copyleft comes in. Businesses are notorious for wanting
    to take without giving back. Consider the difference between the BSD and
    Linux worlds: one remains anaemic and relegated to the fringe, weighed
    down by freeloaders who keep sucking the lifeblood from the community,
    while the other continues to thrive and grow, even as it has come to
    dominate the entire computing landscape.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marc Van Dyck@21:1/5 to All on Fri Jun 6 09:57:22 2025
    Arne Vajhj has brought this to us :

    https://pointsecure.com/products/system-detective/

    sounds pretty advanced.

    Way more than the basic:

    $ SET HOST xxx /LOG=whatever.log

    Can it be configured to not log (or x out) certain
    sensitive information that should not be logged?

    Arne

    To be honest, I don't remember. It's the kind of products that works
    in "fire and forget" mode, you configure it to do what you want, and
    then don't touch it for years. I have done that more than 10 years ago.

    --
    Marc Van Dyck

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Waldek Hebisch@21:1/5 to Dave Froble on Sun Jun 8 14:30:24 2025
    Dave Froble <davef@tsoft-inc.com> wrote:
    On 6/4/2025 6:49 PM, Lawrence D'Oliveiro wrote:
    On Wed, 04 Jun 2025 10:19:27 +0200, Marc Van Dyck wrote:

    Copy between nodes only allowed for specific accounts, and those
    accounts are audited by System Detective. That's an absolutely
    superb product.

    Basic security should be built into the core OS installation, not added as >> an afterthought -- and an extra-cost one at that.


    And I'm guessing that all that should also be free?

    With that attitude, you and I and many others would be broke, homeless, and such ..

    Well, there is no law saying that programmers have special rights
    to get money. As with other profesions they get paid because they
    to things useful to others.

    More to the point: security is now basic OS function. Trying to
    add it in external products is likely to fail, that is produce
    something less secure. Even if external product is good,
    presence of unsecured systems leads to loss for everybody.
    Also, it does not make sense when a lot of programmers
    re-invent (and code again) the same thing.

    In other word, having solid foundation allows more interesting
    (and more useful) add on products. It is important that
    functionality that _you_ use is included (without extra charge)
    in base system, otherwise that may limit adaption of _your_
    product (even if people are happy to pay extra for dependencies
    (not all are), dependencies are extra trouble which must be
    resolved before your product can work).

    So, for good earnings select your market. Do not go into
    delivering comodities unless you are happy with comodity pricing
    (which for software may be 0).

    --
    Waldek Hebisch

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to Waldek Hebisch on Sun Jun 8 21:46:01 2025
    On Sun, 8 Jun 2025 14:30:24 -0000 (UTC), Waldek Hebisch wrote:

    More to the point: security is now basic OS function. Trying to add it
    in external products is likely to fail, that is produce something less secure.

    Also, Bruce Schneier has made the point that “security does not compose”. That is, you can have two components that may be perfectly secure on their
    own, combine them together somehow, even in some simple way, and end up
    with a combination that has security holes in it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From chrisq@21:1/5 to Lawrence D'Oliveiro on Sun Jun 8 23:39:23 2025
    On 5/30/25 23:41, Lawrence D'Oliveiro wrote:
    On Fri, 30 May 2025 09:46:27 +0200, Marc Van Dyck wrote:

    Well, is anyone else proposing a suitable replacement for FAL and
    transparent task to task communication ?

    The irony of it, that the DEC concept requires creating a separate server process for every client connection, while the standard *nix sockets API
    lets a single server process handle multiple connections (or fork off separate processes to spread the load, as it chooses).

    I say “irony” because, of course, creation of all these extra processes willy-nilly is expensive on VMS (and on its Windows NT successor), while
    it is much cheaper on *nix systems.

    That's complicated in unix by the fact of multiple 'known' port
    numbers for eg: ssh, telnet, nfs.etc. inetd looks at the port number
    then spawns off the relevant process, depending on the port number.
    Simple, neat and elegant, one of the good ideas from unix 4.3, back
    in the 1980's. rBeing rplaced by xinetd, for better security.


    Chris

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to chrisq on Mon Jun 9 00:25:13 2025
    On Sun, 8 Jun 2025 23:39:23 +0100, chrisq wrote:

    That's complicated in unix by the fact of multiple 'known' port
    numbers for eg: ssh, telnet, nfs.etc. inetd looks at the port number
    then spawns off the relevant process, depending on the port number.
    Simple, neat and elegant, one of the good ideas from unix 4.3, back
    in the 1980's. rBeing rplaced by xinetd, for better security.

    systemd generalizes this with its socket-based service activation
    concept: a single unit definition can specify any number of each of
    IPv4 and IPv6 ports, Unix-family socket names, and also named pipes,
    to listen on. Oh, and other things like VSOCK and Netlink endpoints as
    well. Also POSIX message queues, USB function endpoints, and some
    other lesser-known features.

    <https://www.freedesktop.org/software/systemd/man/latest/systemd.socket.html>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to Lawrence D'Oliveiro on Mon Jun 9 12:35:13 2025
    On 2025-06-05, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
    On Thu, 05 Jun 2025 10:44:51 +0200, Marc Van Dyck wrote:

    Lawrence D'Oliveiro laid this down on his screen :

    Basic security should be built into the core OS installation, not added
    as an afterthought -- and an extra-cost one at that.

    There are already many security features available in OpenVMS. More than
    what many people need. There must be a trade-off. Building more stuff
    into the OS means that more customers pay for features they don't need.

    Look at what comes standard in the Linux kernel: cgroups, namespaces, containers, virtualization, SELinux, AppArmor, the whole pluggable LSM mechanism, seccomp, netfilter, EBPF ... and that?s just off the top of my head.


    It also has ASLR, KASLR, shells that don't have access to privileges
    outside of the privileges the user has, and encrypted filesystems.
    It also has secure password hashing algorithms and a central source
    of entropy, both of which have only recently been added to x86-64 VMS
    (but not added to the other VMS architectures).

    On a non-security level, it also has support for filesystems in user
    space, and pluggable kernel mode filesystems (which can be unloaded
    again without needing a reboot).

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to clubley@remove_me.eisner.decus.org- on Mon Jun 9 15:49:01 2025
    In article <1026ke1$hh9a$1@dont-email.me>,
    Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
    On 2025-06-05, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
    On Thu, 05 Jun 2025 10:44:51 +0200, Marc Van Dyck wrote:

    Lawrence D'Oliveiro laid this down on his screen :

    Basic security should be built into the core OS installation, not added >>>> as an afterthought -- and an extra-cost one at that.

    There are already many security features available in OpenVMS. More than >>> what many people need. There must be a trade-off. Building more stuff
    into the OS means that more customers pay for features they don't need.

    Look at what comes standard in the Linux kernel: cgroups, namespaces,
    containers, virtualization, SELinux, AppArmor, the whole pluggable LSM
    mechanism, seccomp, netfilter, EBPF ... and that?s just off the top of my
    head.


    It also has ASLR, KASLR, shells that don't have access to privileges
    outside of the privileges the user has, and encrypted filesystems.
    It also has secure password hashing algorithms and a central source
    of entropy, both of which have only recently been added to x86-64 VMS
    (but not added to the other VMS architectures).

    On a non-security level, it also has support for filesystems in user
    space, and pluggable kernel mode filesystems (which can be unloaded
    again without needing a reboot).

    It's also huge, includes code of widely varying levels of
    quality, and much of what is, at best, described as "dubious"
    provenance, the vast majority of which is written in a type-
    and memory-unsafe language. Not that OpenVMS is better in many
    of these ways.

    Frankly, it's amazing that Linux works as well as it does, and
    has as few security vulnerabilities as it does. But it does not
    have what any reasonable person would call a coherent security
    architecture.

    What is, perhaps, true is that, because Linux is so widely
    deployed and available, a lot of people understand (at least at
    a gross level) _how_ to configure it to a reasonable level of
    security for a given task. The same is not necessarily true of
    other systems.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From chrisq@21:1/5 to Lawrence D'Oliveiro on Mon Jun 9 17:34:31 2025
    On 6/9/25 01:25, Lawrence D'Oliveiro wrote:
    On Sun, 8 Jun 2025 23:39:23 +0100, chrisq wrote:

    That's complicated in unix by the fact of multiple 'known' port
    numbers for eg: ssh, telnet, nfs.etc. inetd looks at the port number
    then spawns off the relevant process, depending on the port number.
    Simple, neat and elegant, one of the good ideas from unix 4.3, back
    in the 1980's. rBeing rplaced by xinetd, for better security.

    systemd generalizes this with its socket-based service activation
    concept: a single unit definition can specify any number of each of
    IPv4 and IPv6 ports, Unix-family socket names, and also named pipes,
    to listen on. Oh, and other things like VSOCK and Netlink endpoints as
    well. Also POSIX message queues, USB function endpoints, and some
    other lesser-known features.

    <https://www.freedesktop.org/software/systemd/man/latest/systemd.socket.html>

    That's interesting, but wonder if they really needed the overarching complpexity of systemd to enable that. More productive and less
    disruptive to build on what is already there, but ymmv.

    Chris

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to chrisq on Mon Jun 9 22:51:44 2025
    On Mon, 9 Jun 2025 17:34:31 +0100, chrisq wrote:

    That's interesting, but wonder if they really needed the overarching complpexity of systemd to enable that. More productive and less
    disruptive to build on what is already there, but ymmv.

    I wonder how you see “complexity” in a unified approach to things, as opposed to the old different-mechanism-for-each-connection-type legacy thinking.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From chrisq@21:1/5 to Lawrence D'Oliveiro on Tue Jun 10 19:36:35 2025
    On 6/9/25 23:51, Lawrence D'Oliveiro wrote:
    On Mon, 9 Jun 2025 17:34:31 +0100, chrisq wrote:

    That's interesting, but wonder if they really needed the overarching
    complpexity of systemd to enable that. More productive and less
    disruptive to build on what is already there, but ymmv.

    I wonder how you see “complexity” in a unified approach to things, as opposed to the old different-mechanism-for-each-connection-type legacy thinking.

    Good engineering is about minimising complexity as far as is practical,
    which reduces design and ongoing maintenance, management and staff
    reeducation costs. Fewer possible bugs, as well.

    Better mousetraps everywhere, but most of them add nothing to the
    sum of usefulness.

    Chris

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to chrisq on Tue Jun 10 15:20:04 2025
    On 6/10/2025 2:36 PM, chrisq wrote:
    On 6/9/25 23:51, Lawrence D'Oliveiro wrote:
    On Mon, 9 Jun 2025 17:34:31 +0100, chrisq wrote:
    That's interesting, but wonder if they really needed the overarching
    complpexity of systemd to enable that. More productive and less
    disruptive to build on what is already there, but ymmv.

    I wonder how you see “complexity” in a unified approach to things, as
    opposed to the old different-mechanism-for-each-connection-type legacy
    thinking.

    Good engineering is about minimising complexity as far as is practical,
    which reduces design and ongoing maintenance, management and staff reeducation costs. Fewer possible bugs, as well.

    "Perfection is achieved, not when there is nothing more to add, but when
    there is nothing left to take away"

    I think it is good engineering.

    But it does not reflect the world of software development today. It is
    common to have code bases grow 5-10% per year (which means doubling
    every 10 years) for relative mature applications and 15-30% per
    year (which means doubling every 3 years) for applications in
    quickly evolving domains.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From chrisq@21:1/5 to All on Tue Jun 10 23:33:52 2025
    On 6/10/25 20:20, Arne Vajhøj wrote:
    On 6/10/2025 2:36 PM, chrisq wrote:
    On 6/9/25 23:51, Lawrence D'Oliveiro wrote:
    On Mon, 9 Jun 2025 17:34:31 +0100, chrisq wrote:
    That's interesting, but wonder if they really needed the overarching
    complpexity of systemd to enable that. More productive and less
    disruptive to build on what is already there, but ymmv.

    I wonder how you see “complexity” in a unified approach to things, as >>> opposed to the old different-mechanism-for-each-connection-type legacy
    thinking.

    Good engineering is about minimising complexity as far as is practical,
    which reduces design and ongoing maintenance, management and staff
    reeducation costs. Fewer possible bugs, as well.

    "Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away"

    I think it is good engineering.

    But it does not reflect the world of software development today. It is
    common to have code bases grow 5-10% per year (which means doubling
    every 10 years) for relative mature applications and 15-30% per
    year (which means doubling every 3 years) for applications in
    quickly evolving domains.

    Arne

    Absolutely, though present Linux does seem to have forgotten that
    guiding principle.

    Have some old DEC DMCC industrial pcs and sorting though the pile,
    found two Alpha processor examples. 21164 cpu, single board
    processor, with a passive pci backplane. Thought it might be
    fun to resurrect one or both as an exercise, as still have a
    Suse Linux Alpha 7.1 distro kit with all cds, which had never
    been used here. Around 2000/2001 era. Both had some early
    prototype bios, so probably pre prod hardware and firmware,
    though good help screens from a serial console. Can be either
    floppy or network boot to update the bios, so setup a mop server
    on the lab server, FreeBSD, booted via a network card almost
    instantly, choose srm, and updated the bios. Found a few
    other bits and pieces and now have Suse Linux up and running,
    though still have to configure X for a desktop login. Have to
    define the graphics card and monitor etc, before it will play,
    so not so plug and play, as later versions.

    Had forgotten just how professional and fully sorted, Suse Linux
    was at the time. In particular, the seamless install process.

    Chris





    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to chrisq on Tue Jun 10 23:51:54 2025
    On Tue, 10 Jun 2025 23:33:52 +0100, chrisq wrote:

    Had forgotten just how professional and fully sorted, Suse Linux was at
    the time. In particular, the seamless install process.

    OK for those who don’t know how to look beneath the surface, I guess.

    I administered Suse boxes for a client for a few years (and ran it
    myself), until we both switched to Debian. Suse was famous for its “YaST” install/configuration system. Yes, it did make things easy-point-and-click
    in many ways. But the cost was that its system of pluggable modules got
    their sticky little fingers into every corner of your Linux system.

    Luckily, YaST was indeed modular. I soon found the module that kept
    rewriting the Postfix config, and disabled it, so that we could run a more tailored setup for the main mail server.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to chrisq on Tue Jun 10 23:46:55 2025
    On Tue, 10 Jun 2025 19:36:35 +0100, chrisq wrote:

    On 6/9/25 23:51, Lawrence D'Oliveiro wrote:

    On Mon, 9 Jun 2025 17:34:31 +0100, chrisq wrote:

    That's interesting, but wonder if they really needed the overarching
    complpexity of systemd to enable that. More productive and less
    disruptive to build on what is already there, but ymmv.

    I wonder how you see “complexity” in a unified approach to things, as
    opposed to the old different-mechanism-for-each-connection-type legacy
    thinking.

    Good engineering is about minimising complexity as far as is practical,
    which reduces design and ongoing maintenance, management and staff reeducation costs. Fewer possible bugs, as well.

    Better mousetraps everywhere, but most of them add nothing to the sum of usefulness.

    Which is all very well, but still doesn’t answer the question of how you
    see “complexity” in a commonality of approach.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Clubley@21:1/5 to Lawrence D'Oliveiro on Thu Jun 12 12:21:07 2025
    On 2025-06-10, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
    On Tue, 10 Jun 2025 23:33:52 +0100, chrisq wrote:

    But the cost was that its system of pluggable modules got
    their sticky little fingers into every corner of your Linux system.


    How is that any different from systemd ?

    Systemd is even worse because so much software now requires systemd
    integration that it's increasingly difficult to run that software on non-systemd Unix.

    Oh, and for those of you who think Wayland is a full replacement for
    X11, KiCad disagrees with you:

    From: https://www.kicad.org/blog/2025/06/KiCad-and-Wayland-Support/

    |KiCad does run on Wayland systems, but with significant limitations and known |issues that substantially degrade the user experience. While you can design |PCBs using KiCad on Wayland, you will encounter numerous problems that we |cannot fix at the application level.

    Simon.

    --
    Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
    Walking destinations on a map are further away than they appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Cross@21:1/5 to clubley@remove_me.eisner.decus.org- on Thu Jun 12 14:13:23 2025
    In article <102egnj$2lrk4$1@dont-email.me>,
    Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote:
    On 2025-06-10, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
    On Tue, 10 Jun 2025 23:33:52 +0100, chrisq wrote:

    But the cost was that its system of pluggable modules got
    their sticky little fingers into every corner of your Linux system.

    How is that any different from systemd ?

    Systemd is even worse because so much software now requires systemd >integration that it's increasingly difficult to run that software on >non-systemd Unix.

    Oh, and for those of you who think Wayland is a full replacement for
    X11, KiCad disagrees with you:

    From: https://www.kicad.org/blog/2025/06/KiCad-and-Wayland-Support/

    |KiCad does run on Wayland systems, but with significant limitations and known >|issues that substantially degrade the user experience. While you can design >|PCBs using KiCad on Wayland, you will encounter numerous problems that we >|cannot fix at the application level.

    Yup. There's a reason that many folks have given up on trying
    to use Linux for professional-level work requiring a graphical
    environment. My tools of choice at the time, after the SunOS
    and DEC Windows era, was FreeBSD and Plan 9. But it's just not
    as cohesive as my Mac. And when your job involves relying on
    tools like KiCad, it's just a bette way to go.

    - Dan C.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephen Hoffman@21:1/5 to All on Sat Jun 14 13:00:29 2025
    On 2025-06-01 23:27:48 +0000, Arne Vajhj said:

    On 5/31/2025 3:47 PM, Arne Vajhj wrote:
    The context was:

    #### and
    #### transparent task to task communication ?

    ### and task to task->INETD.

    So I assume that we are talking about how to rewrite
    something like:

    $ open/read f 0::"task=something"
    $ read f line
    $ close f
    $ exit

    Or to provide a complete example:

    $ typ add.com
    $ open/read/write f sys$net
    $ read f num1
    $ num1 = f$integer(num1)
    $ read f num2
    $ num2 = f$integer(num2)
    $ numres = num1 + num2
    $ numres = f$string(numres)
    $ write f numres
    $ close f
    $ exit
    $ typ tst.com
    $ open/read/write f 0"myusername mypassword"::"task=add.com"
    $ write f "123"
    $ write f "456"
    $ read f res
    $ close f
    $ write sys$output res
    $ exit
    $ @tst
    579

    Arne

    From the OpenVMS Freeware...

    $! XQTYPE.COM
    $!
    $ Set NoOn
    $ Set NoVerif
    $ vers = "0000|XQTYPE"
    $ Goto 'F$Mode()'
    $!
    $! 1989 Digital Equipment Corporation
    $! Written: S Hoffman, 21-Jan-1989
    $!
    $! Uses DCL DECnet task-to-task to check the device type of the XQA0:
    $! controller on the remote system. Can return <unknown>, <none>,
    $! <DELQA> or <DEQNA>. Requires VMS V5.0 or better as the procedure
    $! uses block-structured IF DCL syntax.
    $!
    $! Calling:
    $! @XQTYPE node
    $!
    $! Procedure must be named XQTYPE.COM and must reside in the default
    $! login directory on both the local and the remote nodes. Note that
    $! the remote login may occur either in the directory specified by a
    $! proxy, if one exists, or in the DECNET directory. If you're not
    $! sure the default directory can be found by entering the command
    $! "DIRECTORY node::". Requires access to the DECNET TASK object on
    $! the remote end; either by the default DECNET username/password or
    $! via a proxy.
    $!
    $INTERACTIVE:
    $DO_P1:
    $ p1 = F$Edit(p1,"COLLAPSE,UPCASE") - "::"
    $ If F$Leng(p1) .eq. 0
    $ Then
    $ msg = "Error reading input"
    $ Read/Prompt="Node? "/Error=DONE Sys$Command p1
    $ Goto DO_P1
    $ EndIf
    $!
    $ msg = "Error creating network connection"
    $ Open/Read/Write/Error=DONE net 'p1'::"task=XQTYPE"
    $ Read net remvers
    $ Write net vers
    $ Read net XQType
    $ Close net
    $ Write Sys$Output "XQA0: Device type on node ''p1':: is ''XQType'"
    $ msg = ""
    $ Goto DONE
    $
    $NETWORK:
    $! remove the colons to work around a FT bug in DECwindows
    $ Show Process/All
    $ msg = "Error receiving network connection"
    $ Open/Read/Write/Error=DONE net Sys$Net
    $ Write net vers
    $ Read net remvers
    $ If F$GetDVI("XQA0:","EXISTS")
    $ Then
    $ DEVType = F$GetDVI("XQA0:","DEVTYPE")
    $ XQType = "<unknown>"
    $ If DEVType .eq. 33 Then XQType = "DELQA"
    $ If DEVType .eq. 22 Then XQType = "DEQNA"
    $ Else
    $ XQType = "<none>"
    $ EndIf
    $ Write net XQType
    $ Close net
    $
    $BATCH:
    $OTHER:
    $ msg = "Unsupported F$MODE()"
    $
    $DONE:
    $ If F$Len(msg) .ne. 0 Then Write Sys$Output msg
    $ Stop
    $ Exit


    --
    Pure Personal Opinion | HoffmanLabs LLC

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Lawrence D'Oliveiro on Sat Jun 14 17:07:36 2025
    On 6/5/2025 7:51 PM, Lawrence D'Oliveiro wrote:
    On Thu, 5 Jun 2025 10:01:17 -0400, Arne Vajhøj wrote:
    GPL/AGPL is less business friendly than Apache/MIT/BSD on the software
    consumer side.

    But GPL/AGPL is more business friendly than Apache/MIT/BSD on the
    software producer side.

    Funny you should say that. Leaving aside the AGPL for a moment, I have
    heard lots of people say that copyleft licences are not somehow “business- friendly”. What they are is “competition-friendly”: they ensure that market participants compete on a level playing field.

    Remember that, in Free Software, there is not this hard-and-fast
    distinction between those who “produce” it and those who “consume” it.
    Sheer numbers of passive users do not, on their own, make much difference
    to the success of a Free Software project. What matters is the liveliness
    of the community that contributes back to the project.

    And this is where copyleft comes in. Businesses are notorious for wanting
    to take without giving back. Consider the difference between the BSD and Linux worlds: one remains anaemic and relegated to the fringe, weighed
    down by freeloaders who keep sucking the lifeblood from the community,
    while the other continues to thrive and grow, even as it has come to
    dominate the entire computing landscape.

    Linux and FreeBSD/OpenBSD/NetBSD projects are really not that different.

    They are not driven by a profit motive.

    They have chosen different licenses, but each seems happy with their
    choice and do not seem to wish to change license.

    Linux is obviously much more widely used than FreeBSD/OpenBSD/NetBSD,
    but I very much doubt that the FreeBSD/OpenBSD/NetBSD people
    envy Linux - I believe they have different goals.

    There are open source projects that started with a permissive
    license and where the people and the company behind felt that
    they were being treated unfairly (usually when the small
    company's cloud service could not compete with Amazon/Microsoft/Google
    offering the same service using the company's software) so they
    decided to change license.

    Some of the more well known examples:

    Elastic : ElasticSerarch, Apache->SSPL->SSPL/AGPL
    Redis : Redis, BSD->RSAL/SSPL->RSAL/SSPL/AGPL
    HashiCorp : TerraForm, MPL->BSL
    Cockroach Labs : CockroachDB, Apache->BSL
    Lightbend : Akka, Apache->BSL

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to Stephen Hoffman on Sat Jun 14 23:44:01 2025
    On Sat, 14 Jun 2025 13:00:29 -0400, Stephen Hoffman wrote:

    From the OpenVMS Freeware...

    See, that kind of thing is getting to the level of complexity where I
    would say a Python script would be easier to manage.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Sat Jun 14 23:51:03 2025
    On Sat, 14 Jun 2025 17:07:36 -0400, Arne Vajhøj wrote:

    Linux and FreeBSD/OpenBSD/NetBSD projects are really not that different.

    They are not driven by a profit motive.

    There are certainly groups in both camps that are driven by a profit
    motive. You’ve heard this a thousand times before already: “Free software”
    means “free as in freedom”, not “free as in beer”.

    Linux is obviously much more widely used than FreeBSD/OpenBSD/NetBSD,
    but I very much doubt that the FreeBSD/OpenBSD/NetBSD people envy Linux
    - I believe they have different goals.

    Yes, there is some Linux-envy. For example, while systemd itself is Linux- only, some in the BSD camp have been working on a systemd-looklike called “InitWare”. Also they see the need to move off X11 at some point and onto Wayland. Linux containers are also another area which the BSDs cannot
    quite match functionally. And there’s the network stack etc etc.

    There are open source projects that started with a permissive license
    and where the people and the company behind felt that they were being
    treated unfairly (usually when the small company's cloud service could
    not compete with Amazon/Microsoft/Google offering the same service using
    the company's software) so they decided to change license.

    Yes, we know. And we also hear complaints from some in the BSD camp about
    their code being taken and included into GPL’d software, when they
    explicitly adopt a licence that permits that.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Arne_Vajh=C3=B8j?=@21:1/5 to Lawrence D'Oliveiro on Sat Jun 14 20:53:59 2025
    On 6/14/2025 7:44 PM, Lawrence D'Oliveiro wrote:
    On Sat, 14 Jun 2025 13:00:29 -0400, Stephen Hoffman wrote:
    From the OpenVMS Freeware...

    See, that kind of thing is getting to the level of complexity where I
    would say a Python script would be easier to manage.

    Post a Python script doing the same.

    My guess would be same complexity and more lines. Probably also
    a bit nicer structured, but then Hoff could also have written
    that DCL nicer structured, if that had been a goal.

    Arne

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Lawrence D'Oliveiro@21:1/5 to All on Sun Jun 15 01:55:51 2025
    On Sat, 14 Jun 2025 20:53:59 -0400, Arne Vajhøj wrote:

    On 6/14/2025 7:44 PM, Lawrence D'Oliveiro wrote:

    See, that kind of thing is getting to the level of complexity where I
    would say a Python script would be easier to manage.

    Post a Python script doing the same.

    For a start, the remote command that would be roughly equivalent (if I understood it right) for TCP/IP would be so much simpler, and would not
    require the installation of a custom script:

    ssh «remote-host» ip -j link show

    Actually, then the local end could still be done as a simple Bash script, relying on the “jq” tool to extract the relevant information from the returned JSON blob.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)