--- Log opened Mon Oct 24 00:00:11 2016 | ||
shorne | olofk: I have access to some not all. Would it be possible to grant me to all? I am trying to do some doc cleanups i.e. finish todo's on openrisc.io and add some readmes to repo like openrisc/doc etc | 04:50 |
---|---|---|
shorne | Hello, anyone have any problem with me adding a moving banner to the wiki? i.e. | 05:54 |
shorne | http://opencores.org/or1k/OR1K:Community_portal | 05:54 |
ZipCPU|Laptop | Yeah ... I tend to ad-block anything that moves. Such things are just too annoying. | 06:48 |
ZipCPU|Laptop | (shorne) | 06:48 |
-!- Netsplit *.net <-> *.split quits: stekern, SMDwrk, olofk, rhythmx | 08:45 | |
-!- Netsplit over, joins: SMDwrk | 08:52 | |
Silent | Hello :) | 16:22 |
Silent | I have just discovered OpenRisc, and I have to say that it looks very interesting | 16:23 |
kc5tja | Greetings. Just FYI, due to time-zone issues, you might not get a response to your comments here for many hours, so please be patient. :) I happened to be at keyboard to see your text. | 16:40 |
Silent | It's ok, I can live with that | 16:41 |
Silent | Also sometimes I am on very late or very early so that is ok | 16:41 |
kc5tja | Just wanted to chime in, as I've seen folks ask for help, then leave 15 minutes later expecting a real-time response. :) | 16:41 |
Silent | Thanks for the heads-up | 16:42 |
Silent | I am currnetly watching lectures to get familiar with OpenRISC | 16:42 |
Silent | Is desktop or workstation usage also a target, or only space exploration? ;) | 16:42 |
kc5tja | I'm actually more familiar with RISC-V than with OpenRISC, but from what little I know about it, I don't think anyone ever had a real "target" application for it. | 16:47 |
kc5tja | It was just a project that the creators had hoped to spread to different areas beyond embedded. | 16:48 |
Silent | What brings me here is the quest to secure hardware | 16:50 |
Silent | It may seem like it is a battle lost already, but if we can use FPGAs this may change | 16:51 |
Silent | Maybe as thecnology advances FPGAs and similar technologies become powerful enough to support a full desktop CPU implementation | 16:52 |
Silent | Or at least other applications, such as security gateways or IoT devices | 16:54 |
ZipCPU | Silent: If you are interested in secure hardware, you're starting to knock on the right doors. | 17:38 |
ZipCPU | As with kc5tja, I'm not an OpenRISC guy myself. I'm more of a ZipCPU guy, but I tend to hang around this bunch. | 17:40 |
Silent | So are you saying I am in the right place? | 17:41 |
ZipCPU | Going back to your question of desktop or workstation, I think the specification was generic enough to support a workstation, but that the entire spec has never been implemented. | 17:41 |
ZipCPU | Silent: Well, I was going to say you are in the right place, but to do that might mean that there were no other applicable places. | 17:41 |
ZipCPU | This is certainly an applicable place to be, and those here will have all the tools you need to do your research. | 17:42 |
Silent | That it very good to hear | 17:42 |
ZipCPU | You might also wish to hang around the #riscv forum. There's been some security papers discussed there, from researchers using the RISC-V platform. | 17:42 |
ZipCPU | One interesting one was a researcher who encrypted not only the memory data bus, but also the memory address bus in such a way that the memory never needed the key, if you know what I mean. | 17:43 |
ZipCPU | I would also encourage you to find a copy of the wishbone spec. I've fallen in love with the B4 version, but I may be the only one using B4 rather than B3. | 17:44 |
ZipCPU | The neat thing about that is, when you take a CPU plus a bus, you can do ... just about whatever security research is on your mind. | 17:44 |
Silent | I will certainly look into that | 17:45 |
Silent | Open source hardware is a very interesting concept, I am very interested so far | 17:46 |
ZipCPU | I have personally thought about doing something with security but ... haven't decided what would be worthwhile to try (yet). | 17:46 |
ZipCPU | Or ... who would be worthwhile to impress with it. | 17:46 |
ZipCPU | Or ... how to handle the key exchange(s). | 17:46 |
ZipCPU | I mean, I built an SD card controller some time ago, and just recently an ethernet controller. It shouldn't be too difficult to couple both of these controllers with some nice strong hw encryption, but ... then what? | 17:48 |
Silent | Publish, be merry | 17:49 |
* ZipCPU laughs heartily | 17:49 | |
Silent | Seems to me like the community of people interested in such things is very small | 17:50 |
ZipCPU | I remember going to a course, years ago, into how to build disk drives. The speaker said, basically, if you can't make something work then publish it. | 17:50 |
Silent | But it's a start | 17:50 |
ZipCPU | Another thought I had was to create a truly multi-level secure O/S. | 17:52 |
ZipCPU | Remember how all that research died back in the 80's? | 17:52 |
kc5tja | ZipCPU: I'm using B4, but I'm not using all of its features. I'm staying compatible with B3. (re: who's using what version of Wishbone) | 17:53 |
ZipCPU | kc5tja: I'm using B4, but only in the pipeline mode. I'm loving the performance, but I was surprised to discover at ORCONF that no one else is. | 17:53 |
ZipCPU | Seems like there's a fear of patent issues with it. | 17:54 |
ZipCPU | Cool! Julius just posted to the ORCONF attendees that all of the presentations have been posted online. | 17:55 |
ZipCPU | THANKS JULIUS!! | 17:55 |
kc5tja | "multi-level secure O/S"? Not sure what you mean here. Most OS/systems programming R&D I'm familiar with that era aims to reduce as much as possible both the number of supported levels and trusted footprint of the kernel. | 17:56 |
kc5tja | (e.g., small kernel, no more than a user and supervisor mode, possibly with kernel in completely separate address space as any other user-mode program) | 17:57 |
ZipCPU | So "multi-level secure O/S" goes back to a DOD effort to create a system that could handle secure information at multiple classification levels. | 17:57 |
ZipCPU | Users at higher classification levels were not allowed to "leak" information to lower levels and so forth. | 17:57 |
ZipCPU | Even today, the issue of crossing classification domains (network at one level to a second network at another) is a ... very difficult problem. | 17:58 |
ZipCPU | Few computers/systems are able to do such. | 17:58 |
kc5tja | I would think an object-capability security system would be ideal here. | 17:58 |
kc5tja | It seems general enough to address this need. | 17:59 |
ZipCPU | It may well be. A *lot* has been learned since those initial efforts back in the 80's failed. | 17:59 |
ZipCPU | For example, no one likes the Bell-Lapadula model of being able to write up and read down, but nothing more. | 18:00 |
ZipCPU | It failed pretty hard in practice. | 18:00 |
ZipCPU | Google the "Trusted Computer System Evaluation Criteria" for a fascinating read. | 18:02 |
ZipCPU | Steven Lipner wrote a very fascinating history of what happened with it, titled "The Birth and Death of the Orange Book." | 18:07 |
-!- Netsplit *.net <-> *.split quits: imphil, nurelin, heroux, LoneTech | 19:43 | |
-!- Netsplit over, joins: LoneTech | 19:44 | |
-!- Netsplit over, joins: imphil, nurelin, heroux | 19:44 | |
--- Log closed Tue Oct 25 00:00:12 2016 |
Generated by irclog2html.py 2.15.2 by Marius Gedminas - find it at mg.pov.lt!