| Ticket Hash: | 573449e6df17dc89b9b666d24c404a8200e1eb9c | ||
| Title: | Option to switch from screen(1) to telnet(1) based console | ||
| Status: | Closed | Type: | Feature Request |
| Severity: | Minor | Priority: | Low |
| Subsystem: | simulator | Resolution: | Rejected |
| Last Modified: |
2017-01-08 04:24:17 9.18 years ago |
Created: |
2016-12-26 21:44:28 9.21 years ago |
| Version Found In: | |||
| User Comments: | ||||
tangent added on 2016-12-26 21:44:28:
A simpler option for remotely using one's PiDP-8/I than SSH'ing in and connecting to the screen(1) session would be if you could just telnet to it. This avoids the need for Windows users to go find an SSH client, and avoids the need to deal with passwords, SSH keys, etc. on all platforms. SIMH does largely support this via a combination of SET CONSOLE TELNET and SET REMOTE TELNET. The first command redirects the normal stdout terminal interface to telnet on a TCP port of your choice, and the latter allows access to most SIMH commands via telnet on a different port. This isn't perfect, so it needs to be optional:
tangent added on 2016-12-26 23:36:04:
Doing this would allow a bad actor on the [W]LAN to exfiltrate files from the local system readable by the user running the modified SIMH by using its paper tape and other media attachment features. It is even possible that they could write to local files by attaching a file as, say, a raw RK05 disk pack and then modifying the file via PDP-8 code. Keep in mind that if this is the default mode, it will affect people on their desktop development systems, laptops, etc., not just Raspberry Pis running our software. This feature could only be done once we have a way of doing proper user isolation, so that the user running the simulator is only allowed to read and modify things in $prefix/share/media. This could get really complicated, and all to save people from having to figure out SSH. tangent added on 2017-01-08 04:24:17:
It would be too easy to use this feature to exfiltrate data from the Pi via the media mounting feature. You could probably even use it to falsely mount a Pi-side file as a raw RK05 disk and then modify the Pi via the simulator this way. Doing this would open a massive security hole. | ||||