Wednesday, June 29, 2011

getting yer old school on with tru64 via es40 emulation

Emulators are fun! Especially when I get to go back to my early days of computing. Back in the day I used to run a 400cpu alpha cluster over at the Sanger. It was all Tru64, all the time. We started out with 4.0f and ended when alpha ended at 5.1b - fun times indeed. Here's a little picture of the tru64 DS10 pie box cluster as it was being built at that time in a machine room in the EBI.



Terrifying times if I were to be totally honest - tru64 is a wicked mistress. Anyone who has ever seen "AdvFS Domain Panic" will understand the true meaning of the word "Panic!".

Anyway, life moves on, we get older (sometimes even wiser), the alpha died out, as did tru64, but there are those epic folks out there that keep the dream alive. I'd been fiddling with ES40/45 emulators for a while over at http://www.es40.org/ and they kinda sorta work.

I was looking for full boat nostalgia to get a 5.1 install from scratch via an old ISO and found it over at EmuVM.com. Seems to be one of the best es40 emulators out there for short or no money. There is the Stromasys stuff that is also pretty cool and also the FreeAXP stuff, but I wanted me an ES40 for no $ ;-)!

Took a while to get all the moving parts together for example we needed a version of putty for linux with gtk2:

http://ubuntuforums.org/archive/index.php/t-908417.html

mkdir ~/putty
cd ~/putty
svn co svn://svn.tartarus.org/sgt/putty
./mkfiles.pl # you need to run this to generate the Makefile.gtk used below
cd putty/unix
sudo make -f Makefile.gtk

you need to have the no echo thing set as you can see below this is the alpha emulator doing it's ev6 21264 thing via console, with networking and everything, remember to boot it via sudo, or the pcap networking driver will fail bringing up the LAT and segfault the emulator!


Pretty cool eh? You can even go gang busters and fire up the old ghetto xdmcp from your linux box, to hell with security - these were the days of telnet and plain text! Mind you remembering securettys also caused me heartburn - these were different days of "securing" things, check out the root login via telnet ;-):

jcuff@shuttle:~$ telnet 192.168.1.67
Trying 192.168.1.67...
Connected to 192.168.1.67.
Escape character is '^]'.


Compaq Tru64 UNIX V5.1 (Rev. 732) (test) (pts/0)

login: root
Password:

Last login: Tue Jul 26 01:56:37 EDT 2011 from 192.168.1.7:2
Compaq Tru64 UNIX V5.1 (Rev. 732); Fri Jul 22 14:59:57 EDT 2011

The installation software has successfully installed your system.

There are logfiles that contain a record of your installation.  These are:

        /var/adm/smlogs/install.cdf     - configuration description file
        /var/adm/smlogs/install.log     - general log file
        /var/adm/smlogs/install.FS.log  - file system creation logs
        /var/adm/smlogs/setld.log       - log for the setld(8) utility
        /var/adm/smlogs/fverify.log     - verification log file


You have mail.
# cat /etc/securettys
# Secure tty data base model file.
#
# *****************************************************************
# *                                                               *
# *    Copyright Compaq Computer Corporation, 2000                *
# *                                                               *
# *   The software contained on this media  is  proprietary  to   *
# *   and  embodies  the  confidential  technology  of  Compaq    *
# *   Computer Corporation.  Possession, use,  duplication  or    *
# *   dissemination of the software and media is authorized only  *
# *   pursuant to a valid written license from Compaq Computer    *
# *   Corporation.                                                *
# *                                                               *
# *   RESTRICTED RIGHTS LEGEND   Use, duplication, or disclosure  *
# *   by the U.S. Government is subject to restrictions  as  set  *
# *   forth in Subparagraph (c)(1)(ii)  of  DFARS  252.227-7013,  *
# *   or  in  FAR 52.227-19, as applicable.                       *
# *                                                               *
# *****************************************************************
#
# HISTORY
# 
# @(#)$RCSfile: securettys,v $ $Revision: 1.1.5.4 $ (DEC) $Date: 1993/08/31 11:40:23 $ 
# 
#
# (c) Copyright 1990, 1991, 1992, 1993 OPEN SOFTWARE FOUNDATION, INC. 
# ALL RIGHTS RESERVED 
# 
# OSF/1 1.2
#  
#  /etc/securettys
# 
#  Note: Each entry in this file represents a device (secure device) 
#  from which root login is permitted.  For, pseudo ttys (ptys) a 
#  single keyword entry "ptys" means all ptys are to be treated as being
#  secure.  Note that the entry is "ptys" and not prefixed by /dev
#  as is customary for the other physical devices.  The absence of
#  this key word implies that root login will not be permitted from 
#  all ptys.  X displays are indicated with the display name.
# 
#  
/dev/console
local:0
:0
192.168.1.7:2
ptys

well once you remember all that, you can then get back to your XDMCP fun:

Xnest :2 -query 192.168.1.67

Ahhh it takes me back... CDE in full boat 8bit technicolor!


Oh happy days!



[any opinions here are all mine, and have absolutely nothing to do with my employer]
(c) 2011 James Cuff