803 lines
37 KiB
Plaintext
803 lines
37 KiB
Plaintext
From dfox@fc.net Sat Jan 21 06:21:58 1995
|
||
Received: from freeside.fc.net (freeside.fc.net [198.6.198.2]) by bigboote.WPI.EDU (8.6.9/8.6) with ESMTP id GAA16077 for <mikecap@wpi.edu>; Sat, 21 Jan 1995 06:21:53 -0500
|
||
Received: (from dfox@localhost) by freeside.fc.net (8.6.8.1/8.6.6) id FAA01518 for mikecap@wpi.edu; Sat, 21 Jan 1995 05:18:54 -0600
|
||
Date: Sat, 21 Jan 1995 05:18:54 -0600
|
||
From: Malik Al-Rashim <dfox@fc.net>
|
||
Message-Id: <199501211118.FAA01518@freeside.fc.net>
|
||
To: mikecap@wpi.edu
|
||
Subject: JAUC-File10
|
||
Status: O
|
||
|
||
|
||
CALLER ID FAQ
|
||
|
||
By Padgett Peterson (padgett@tccslr.dnet.mmc.com)
|
||
|
||
Frequently Asked Questions About Caller-ID v1.1 Mar. 1994
|
||
|
||
1) What is Caller-ID ?
|
||
|
||
First ask "What is ANI"
|
||
|
||
2) OK, What is ANI ?
|
||
|
||
ANI or Automatic Number Identification is a mechanism by which the
|
||
different telephone companies determine what account is to be charged for
|
||
a call, This information is passed between Telcos and was originally
|
||
for billing purposes and predated both SS7 (Signaling System 7)
|
||
and (C)LASS (Local Area Signaling Services was the original AT&T
|
||
designations, the "C" was added by Bellcore after divesture) services
|
||
which make CNID or Calling Number IDentification as Caller-ID is more
|
||
properly known, possible.
|
||
|
||
Since the Telcos had ANI, the decision was made to make it available
|
||
to authorized parties such as 911 service and law enforcement agencies.
|
||
ANI is also used to let a Telco operator know who is calling.
|
||
|
||
More recently, ANI is used to report to 800 and 900 subscribers,
|
||
who made the calls they have received, in the first case so that
|
||
the 800 subscriber knows who the charge is for, and so that 900
|
||
number subscribers know who to charge.
|
||
|
||
Thus while ANI is similar to CALLER-ID and may provide the same
|
||
information, they are actually two different services and ANI information
|
||
is not necessarily the same as what will appear on a CALLER-ID display.
|
||
|
||
3) Now (maybe) what is Caller-ID ?
|
||
|
||
Caller-ID is a Telco offering that is a byproduct of (C)LASS services.
|
||
In this case, only those numbers reported by participating exchanges are
|
||
returned, exactly which are and which are not is currently (March 1994)
|
||
at the Telco's discretion.
|
||
|
||
The Federal Government has stated that it is their intent that nationwide
|
||
CNID be available by mid-1995. The full text of this decision may be
|
||
found FCC Report No. DC-2571 issued on March 8, 1994.
|
||
|
||
The biggest effect of the ruling is to mandate transport of CPN (customer
|
||
provided number) information between interconnecting networks eliminating
|
||
the effective inter-LATA-only limitation that exists today in most areas.
|
||
|
||
Currently there are two types of Caller-ID. The first (often referred
|
||
to as "basic" service) just returns the calling number or an error
|
||
message and the date/time of the call.
|
||
|
||
The second ("enhanced" Caller-ID) also may return the directory
|
||
information about the calling number. At a minimum, the name of the
|
||
subscriber is returned (the subscriber is not the same as the caller,
|
||
the phone company has no way to determine who is actually on the line).
|
||
|
||
4) How is the Caller-ID information provided ?
|
||
|
||
As a 1200 baud, 7 data bits, 1 stop bit data stream usually transmitted
|
||
following the first and before the second ring signal on the line. Note
|
||
that this is not a standard Bell 212 or CCITT v22 data format so a
|
||
standard modem will probably not be able to receive it. Further, the
|
||
serial information exists as such only from the recipient's switch to
|
||
the callee's location. Between carriers the signal exists as data packets.
|
||
|
||
The signal is provided before the circuit is complete: picking up the
|
||
receiver before the data stream is finished will stop/corrupt the
|
||
transmission.
|
||
|
||
Currently there are two types of information returned: a "short form"
|
||
which contains the date/time (telco and not local) of the call and the
|
||
calling number or error message. The "long form" will also contain the
|
||
name and possibly the address (directory information) of the calling phone.
|
||
|
||
The "short form" stream consists of a set of null values, followed
|
||
by a two byte prefix, followed by the DATE (Month/Day), TIME (24 hour
|
||
format), and number including area code in ASCII, followed by a 2s
|
||
compliment checksum. Most modems/caller id devices will format the data
|
||
but the raw stream looks like this :
|
||
0412303232383134333434303735353537373737xx
|
||
or (prefix)02281334407555777(checksum)
|
||
|
||
A formatted output would look like this:
|
||
Date - Feb 28
|
||
Time - 1:34 pm
|
||
Number - (407)555-7777
|
||
|
||
5) Can a Caller-ID signal be forged/altered ?
|
||
|
||
Since the signal is provided by the local Telco switch and the calling
|
||
party's line is not connected until after the phone is answered, generally
|
||
the signal cannot be altered from the distant end. Manipulation would
|
||
have to take place either at the switch or on the called party's line.
|
||
|
||
However, the foregoing applies only to a properly designed CNID unit.
|
||
For instance the Motorola M145447 chip has a "power down" option that
|
||
wakes the Chip up when the phone rings for just long enough to receive,
|
||
process, and deliver the CNID signal after which it shuts down until the
|
||
next call.
|
||
|
||
Should this option be disabled, the chip will be in a "listen always"
|
||
state and it is theoretically possible to "flood" a line making a
|
||
vulnerable box record successive erroneous numbers.
|
||
|
||
I have received a report of a device called "Presto Chango" that
|
||
can transmit an extra ADSI modem tone after the call has been picked up
|
||
that will cause a susceptible box to display the later information. It
|
||
was also reported to me that CNID boxes marketed by US-West as their
|
||
brand and made by CIDCO have been used to demonstrate the "Presto Chango"
|
||
box.
|
||
|
||
6) What is "ID Blocking" ?
|
||
|
||
Most Telco's providing Caller-ID have been required to also provide the
|
||
ability for a calling party to suppress the Caller-ID signal. Generally
|
||
this is done by pressing star-six-seven before making the call. In most
|
||
cases this will block the next call only however some Telcos have decided
|
||
to implement this in a bewildering array of methods. The best answer is
|
||
to contact the service provider and get an answer in writing.
|
||
|
||
Currently this is supplied as either by-call or by-line blocking. By-Call
|
||
is preferred since the caller must consciously block the transmission
|
||
on each call. By-Line blocking as currently implemented has the
|
||
disadvantage that the caller, without having a second caller-id equipped
|
||
line to use for checking, has no way of knowing if the last star-six-seven
|
||
toggled blocking on or off.
|
||
|
||
Note that blocking is provided by a "privacy" bit that is transmitted
|
||
along with the CNID information and so is still available to the Telco
|
||
switch, just not to the subscriber as a CNID signal. Consequently related
|
||
services such as call trace, call return, & call block may still work.
|
||
|
||
7) What happens if a call is forwarded ?
|
||
|
||
Generally, the number reported is that of the last phone to forward the
|
||
call. Again there are some Telco differences so use the same precaution
|
||
as in (6). If the forwarding is done by customer owned equipment there
|
||
is no way of telling but will probably be the last calling number.
|
||
|
||
Note that as specified, CNID is *supposed* to return the number of the
|
||
originating caller but this is at the mercy of all forwarding devices,
|
||
some of which may not be compliant.
|
||
|
||
8) What happens if I have two phone lines and a black box to do
|
||
the forwarding ?
|
||
|
||
If you have two phone lines or use a PBX with outdialing features, the
|
||
reported number will be that of the last line to dial. Currently there
|
||
is no way to tell a black box from a human holding two handsets together.
|
||
|
||
9) I called somebody from a company phone (555-1234) but their Caller-ID
|
||
device reported 555-1000.
|
||
|
||
Often a company with multiple trunks from the Telco and their own
|
||
switch will report a generic number for all of the trunks.
|
||
|
||
There is a defined protocol for PBXs to pass true CNID information on
|
||
outgoing lines but it will be a long time before all existing COT
|
||
(Customer Owned Telephone) equipment is upgraded to meet this standard
|
||
unless they have a reason to do so.
|
||
|
||
10) I run a BBS. How can I use Caller-ID to authenticate/log callers ?
|
||
|
||
There are two ways. The first utilizes a separate Caller-ID box
|
||
with a serial cable or an internal card. This sends the information
|
||
back to a PC which can then decide whether to answer the phone and what
|
||
device should respond. Some of these are available which can handle
|
||
multiple phone lines per card and multiple cards per PC.
|
||
|
||
The second (and most common) is for the capability to be built in a modem
|
||
or FAX/modem. While limited to a single line per modem, the information
|
||
can be transmitted through the normal COM port to a program that again
|
||
can decide whether or not to answer the phone and how. There is a
|
||
FreeWare Caller-ID ASP script for Procomm Plus v2.x available for FTP
|
||
from the Telecom archive. Most such software packages will also log each
|
||
call as it is received and the action taken.
|
||
|
||
Of course for true wizards, there are chips available (one of the first
|
||
was the Motorola MC145447) that can recognize the CNID signal and
|
||
transform it into a proper RS-232 (serial) signal.
|
||
|
||
11) How is security enhanced by using Caller-ID over a Call-Back
|
||
service or one-time-passwords for dial-up access ?
|
||
|
||
Caller-ID has one great advantage over any other mechanism for telephone
|
||
lines. It allows the customer to decide *before* picking up the receiver,
|
||
whether to answer the call.
|
||
|
||
Consider hackers, crackers, and phreaks. Their goal in life is to forcibly
|
||
penetrate electronic systems without permission (sounds like rape doesn't
|
||
it ?). They employ demon dialers and "finger hacking" to discover
|
||
responsive numbers, often checking every number in a 10,000 number
|
||
exchange.
|
||
|
||
If they get a response such as a modem tone, they have a target and
|
||
will often spend days or weeks trying every possible combination of codes
|
||
to get in. With Caller-ID answer selection, the miscreant will never
|
||
get to the modem tone in the first place, yet for an authorized number,
|
||
the tone will appear on the second ring. Previously the best solution
|
||
for dial-ups was to set the modem to answer on the sixth ring (ats0=6).
|
||
Few hackers will wait that long but it can also irritate customers.
|
||
|
||
12) What error messages will Caller-ID return ?
|
||
|
||
a) "Out of Area" - (Telco) the call came from outside the Telco's
|
||
service area and the Telco either has no available information or
|
||
has chosen not to return what information it has.
|
||
|
||
b) "Blocked" or "Private" - (Telco) the caller either has permanent
|
||
call blocking enabled or has dialed star-six-seven for this call. You do
|
||
not have to answer either.
|
||
|
||
c) "Buffer Full" - (device manufacturer) there are many Caller-ID devices
|
||
on the market and exactly how they have chosen to implement storage is up
|
||
to the manufacturer. This probably means that the divide has a limited
|
||
buffer space and the device is either losing the earliest call records or
|
||
has stopped recording new calls.
|
||
|
||
d) "Data Error" or "Data Error #x" - (device manufacturer) signal was
|
||
received that was substandard in some way or for which the checksum did
|
||
not match the contents.
|
||
|
||
e) "No Data Sent" - (device manufacturer) Signal was received consisting
|
||
entirely of nulls or with missing information but a proper checksum.
|
||
|
||
13) Why are so many people against Caller-ID ?
|
||
|
||
FUD - Fear, Uncertainty, & Doubt or 10,000,000 lemmings can't be wrong.
|
||
There were some justifiable concerns that some people (battered wives,
|
||
undercover policemen) might be endangered or subject to harassment
|
||
(doctors, lawyers, celebrities) by Caller-ID. As mentioned above there
|
||
are several legitimate ways to either block Caller-ID or to have it return
|
||
a different number. It is up to the caller. The advantage is that with
|
||
Caller-ID, for the first time, the called party has the same "right of
|
||
refusal".
|
||
|
||
Expect yet another Telco service (at a slight additional charge) to be
|
||
offered to return an office number for calls made from home. Crisis
|
||
centers could return the number of the local police station.
|
||
|
||
|
||
Compiled by Padgett Peterson. Constructive comments to:
|
||
padgett@tccslr.dnet.mmc.com Brickbats >nul.
|
||
|
||
Thanks for additional material to:
|
||
|
||
David J. Kovan
|
||
Robert Krten
|
||
John Levine
|
||
David G. Lewis
|
||
Karl Voss
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
THE PENTIUM BUG WAR ENDS AS WE KNOW IT
|
||
|
||
By James Baar and Theodore Baar
|
||
|
||
The real long-term significance of the Great Intel Pentium Flaw
|
||
Imbroglio is the imminent demise of the current practice of public
|
||
relations and corporate and government communications as we know them.
|
||
|
||
Ironically caught unaware of the communications world it helped create,
|
||
Intel suffered a public relations near-disaster. Intel's arch competitor,
|
||
IBM, wandered bubba-like into a public relations bog the future depths
|
||
of which are still to be determined.
|
||
|
||
Clearly we soon will see on the boneyard of history such communications
|
||
artifacts as:
|
||
|
||
--The lengthy, well-spun news release or official statement
|
||
explaining what "really" happened or why a product "really" is a
|
||
breakthrough for all mankind.
|
||
|
||
--The news conference where the news is that what the media said
|
||
yesterday or last week is "really" not the news at all.
|
||
|
||
--The necessity to convince rushed and often ill-informed
|
||
journalists and beautiful and much more ill-informed TV anchors that your
|
||
truth is "really" true.
|
||
|
||
The Internet is doing to public relations what CSPAN, CNN Forums
|
||
and talk radio are doing to news coverage: When you are there, the
|
||
messenger is extraneous. And, on the Internet, you are there and you are
|
||
the messenger as well..
|
||
|
||
The Pentium Flaw War was the first major corporate war to be fought
|
||
primarily in cyberspace. The initial, very scattered shots were fired
|
||
more than five months ago on the Internet; major engagements got underway
|
||
in October; and a worldwide battle raged through November and early
|
||
December.
|
||
|
||
Little of this was noted particularly in the general or trade media
|
||
until near the end. And then it was reported as a highly technical
|
||
problem of limited general interest. Only when IBM found it convenient
|
||
to drop the equivalent of a small nuclear weapon did most of the major
|
||
national media take note that something much more than an academic,
|
||
technically obscure brawl was underway.
|
||
|
||
Only then did the WALL STREET JOURNAL shout from it's front page:
|
||
|
||
Chip Shot
|
||
Computer Giants' War
|
||
Over Flaw in Pentium
|
||
Jolts the PC Industry
|
||
|
||
And, on the same day, the NEW YORK TIMES shouted from it's front page:
|
||
|
||
I.B.M. HALTS SALES
|
||
OF IT'S COMPUTERS
|
||
WITH FLAWED CHIP
|
||
|
||
Both stories were inspired belatedly by an IBM announcement that it was
|
||
suspending sales (sort of) of any of it's personal computers that included
|
||
the Intel Pentium chip because the chip had a flaw.
|
||
|
||
Well, ho-hum: Except for the IBM announcement, this was old news along
|
||
the Information Highway. And the IBM announcement was immediately
|
||
discounted by many of the veteran cyberspace combatants of the Pentium
|
||
War as highly suspect: something similar to Parliament coming out against
|
||
slavery in America after Lexington and Concord.
|
||
|
||
Most great military engagements begin quite casually if not accidentally:
|
||
A sniper picks off a poacher stealing a chicken. A nervous platoon leader
|
||
calls in a little artillery fire on a bunker. A lost company stumbles
|
||
on a tank column.
|
||
|
||
Back in June, Intel and some of it's customers already knew about the bug
|
||
that was preventing the new Pentium microprocessors to divide accurately
|
||
out to more than nine or 10 decimal places in some cases. Intel did not
|
||
publish the information. If any messages about the bug appeared here and
|
||
there in various newsgroups on the Internet for the next few months,
|
||
they initially attracted little attention.
|
||
|
||
This was not the kind of consumer problem that causes a lot of excitement
|
||
at your neighborhood 24-hour store. But this bug was of interest -- and
|
||
in some cases importance to parts of the world technical community
|
||
engaged in major mathematical calculations: This is a community that also
|
||
appreciates that such a flaw is not the first nor will be the last in
|
||
the increasing complexity of computer components and software; exalts
|
||
technical openness; recognizes quickly when it is being stonewalled; and
|
||
has a biting specialized sense of outrage and humor.
|
||
|
||
Prof. Thomas Nicely of Lynchburg College reports that when he began
|
||
running into a potential flaw in the Pentium in June he started a three
|
||
month effort to determine whether the problem was the Pentium or something
|
||
else. For example, his own calculations; or possibly known bugs in other
|
||
hardware such as the Borland C Compiler. And in Copenhagen mathematicians
|
||
developed a T-shirt satirizing the Intel chip logo "Intel Inside" as "No
|
||
Intelligence Inside" and published memos saying "We knew about it early
|
||
in June..."
|
||
|
||
Intel managed to downplay and contain word of the bug for the most part
|
||
through the next three months. Any callers were told at first that a fix
|
||
was underway and that the bug affected only very special situations.
|
||
|
||
Then, on Oct. 30, Dr. Nicely posted a message to "whom it may concern"
|
||
on the Internet, reporting his findings and his frustrations with getting
|
||
Intel to pay serious attention to him. In the succeeding weeks, the war
|
||
between Intel and it's users exploded. Each day there were more reports
|
||
about the bug and Intel's truculence.
|
||
|
||
The number of the strings of messages on the Internet increased and grew
|
||
longer as users at universities, laboratories and corporations around the
|
||
world reported the same bug and it's potential variations; discussed
|
||
their research for possibly more bugs; and reported on their
|
||
unsatisfactory and frustrating phone calls to Intel.
|
||
|
||
And here was where the war was really fought.
|
||
|
||
Intel treated each caller as an individual, linear event to be dealt with
|
||
in isolation; turned around or at least mollified. Intel's position was
|
||
that this was a routine bug that was being taken care of and was of no
|
||
major importance to most of it's customers. The Intel position essentially
|
||
remained that there was no need for a general replacement on demand; that
|
||
the problem was relatively minor; that if a user was engaged in the kind
|
||
of heavy mathematics that could be affected by the bug then Intel, if
|
||
it agreed, would replace a Pentium.
|
||
|
||
Meantime, Intel and it's commercial allies continued to promote and sell
|
||
Pentiums. More than four million Pentiums were reported sold.
|
||
|
||
The words "greedy" and "arrogance" became popular on the Internet among
|
||
customers describing Intel's position. The Internet discussion was highly
|
||
technical and profane. It also included useful suggestions for
|
||
broadening the discussion. For example, participants were provided
|
||
with the Fax number of the New York Times. And more and more of the
|
||
callers to Intel shared their mostly frustrating experiences on the
|
||
Internet with a worldwide audience of customers. An angry mob -- slowly
|
||
recognized as a major threat by Intel -- began to assemble in cyberspace
|
||
|
||
Intel CEO Andrew Grove issued a statement on the Internet Nov. 27 seeking
|
||
to quiet the mob. Instead the roar in cyberspace increased. Intel's
|
||
Software Lab Technology Lab Director Richard Wirt on Dec. 8 issued a
|
||
statement on the Internet describing Intel plans to provide a fix for the
|
||
flaw. The roar continued and spread and Intel's weakening protests were
|
||
increasingly drowned out as the users reinforced each other with new data
|
||
and complaints around the clock around the world.
|
||
|
||
It was at this point on Dec.12 that IBM -- a reported minor player in the
|
||
sale of Pentiums, but the developer of a competitive chip, the PowerPC --
|
||
decided to announce both on the Internet and to the major national media
|
||
the halting of it's shipments of Pentium-based IBM PCs.
|
||
|
||
The war was now spread to the major national media where the problem was
|
||
easily confused with various consumer product recalls and the Internet
|
||
where IBM's move was both discounted as self-serving and used
|
||
simultaneously to pummel Intel further.
|
||
|
||
By Dec. 20 Intel had had enough. It agreed to a general recall and
|
||
apologized for not doing so sooner.
|
||
|
||
The public relations lessons are clear.
|
||
|
||
People -- particularly customers -- are no longer isolated waiting to
|
||
learn sooner or later what is happening through the third party media
|
||
screen and, in turn, relying on the third party media to screen and
|
||
sooner or later report their reaction. Even when the third party media
|
||
is accurate this process can take many days.
|
||
|
||
Through the Internet, people -- particularly customers -- can tell a
|
||
corporation or organization exactly what they think and why and share that
|
||
simultaneously and instantaneously with all concerned around the world.
|
||
The Internet returns the world to the agora where everyone hears what was
|
||
said; and everyone hears all comments and reactions; everyone knows who
|
||
is talking and can make credibility judgments.
|
||
|
||
The first Intel error was not to spot the issue stirring on the Internet
|
||
months ago when the commentary was helpful and understanding. At that
|
||
time and for several months later, Internet commentators could have been
|
||
embraced and thanked for their efforts; immediate plans for a work-around
|
||
fix could have been disclosed; and work on a permanent fix could have
|
||
been described: all in cyberspace among sophisticated customers who well
|
||
understand the complex nature of the technology.
|
||
|
||
Intel's second error was not to recognize that because of the Internet it
|
||
no longer could reason at least semi-privately with customers and advance
|
||
rational technical arguments. In pre-cyberspace days, that could be
|
||
effective: the customer is grudgingly mollified until the issue is
|
||
eventually resolved. But in this case, as it's customers shared both
|
||
their problems and experiences with each other in real time, they fed
|
||
each others frustrations; were empowered as a group to demand better
|
||
treatment; and built mutual strength with each day for new battles to
|
||
come.
|
||
|
||
Intel's third error was not to go directly on line with it's customers and
|
||
deal with the issue interactively. Instead, Intel pursued the classic
|
||
static public relations mode of issuing statements and news releases.
|
||
These were turned into blackened ruins by Internet flame messages in a
|
||
matter of hours.
|
||
|
||
Meantime, IBM by it's announcement, uncorked the Law of Unanticipated
|
||
Consequences. The Internet mob really understood the issue; the general
|
||
public for the most part did not. IBM, with motives already under
|
||
suspicion, opened the bottle labeled "Doubt about Technology" to the
|
||
overall potential future detriment of the Information Technology Industry
|
||
in general.
|
||
|
||
As more people around the world join the millions already using the
|
||
Internet for communications, corporations and government will be forced
|
||
if they wish to succeed to function within the new realities of cyberspace:
|
||
information is shared and sifted by thousands of knowledgeable people;
|
||
time is collapsed; facts are quickly checked; loss of credibility can be
|
||
instantaneous; second chances are rare and harder to effect; grandstand
|
||
plays better be perfect; and the playing off of one audience against
|
||
another is far more easily detected.
|
||
|
||
Above all else, a smattering of obscure messages or even a random one or
|
||
two can no longer be automatically disregarded as mere technical mumbling.
|
||
For example, is anyone following up on a recent Internet potential bug
|
||
message regarding AMD DX-80 chips or another regarding "something about a
|
||
conditional loop" in the Pentium?
|
||
|
||
One final cyberspace reality of note: instant corrosive humor is abundant
|
||
and effective. (If they really are laughing about you, you can't be taken
|
||
seriously anymore.) This was ably demonstrated by the Internet author
|
||
who wrote for the delectation of Intel customers and potential customers
|
||
everywhere a Star Trek parody. He called it: "BBUUGGS IINN
|
||
SSPPAACCEE!!".
|
||
|
||
(This article is from a forthcoming issue of Knowledge Tools News, an
|
||
electronic newsletter of Omegacom, Inc. James Baar (jimbar@omegacom.com)
|
||
is president/managing consultant. Theodore Baar (tedbar@omegacom.com.)
|
||
is vice president/chief technologist.)
|
||
|
||
-----------
|
||
Copyright (c) 1994 Omegacom, Inc., all rights reserved. This article may
|
||
be posted to any USENET newsgroup, on-line service, or BBS as long as it
|
||
is posted in it's entirety and includes this copyright statement. All
|
||
other rights reserved. This article may not be included in commercial
|
||
collections or compilations without express permission from Omegacom,
|
||
Inc. jimbar@omegacom.com. For all other uses you must seek permission
|
||
of Omegacom, Inc. jimbar@omegacom.com
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
NON-DISCLOSURE AGREEMENT OF DR. NICELY
|
||
|
||
The following message was posted to the Internet by Dr. Thomas Nicely,
|
||
discover of the Pentium Floating Point Unit Flaw. The first part deals
|
||
with a question regarding Dr. Nicely's signing of a non-disclosure
|
||
agreement with Intel.
|
||
|
||
TO: Whomever It May Concern
|
||
FROM: Dr. Thomas R. Nicely, Lynchburg College, Lynchburg, Virginia
|
||
(nicely@acavax.lynchburg.edu)
|
||
RE: Pentium Bug and Intel NDA
|
||
DATE: 94.11.25.1400 EST
|
||
|
||
This is in reply to Paul Rubin's (phr@netcom.com) inquiry of 23 November.
|
||
|
||
* I signed a temporary nondisclosure agreement with Intel on 10 November.
|
||
|
||
* There was no coercion or threat of any kind, by either party.
|
||
|
||
* The NDA was signed in the course of discussions to determine
|
||
whether or not an agreement (such as a consultancy) could be reached
|
||
which would prove beneficial in the long term to myself, to the Intel
|
||
Corporation, and to my employer, Lynchburg College.
|
||
|
||
* From 10 November until 22 November, I deflected all inquiries regarding
|
||
the Pentium FPU to Intel's representatives. This was a consequence of
|
||
my own mistaken interpretation of the NDA; I was treating it in the
|
||
manner of a security clearance; I once held a clearance for secret
|
||
restricted data in X-division (nuclear weapon design and analysis)
|
||
at Los Alamos National Laboratory, and that clearance treated most
|
||
information concerned as "born secret," even if the information was
|
||
acquired prior to the clearance and/or independently. In the same
|
||
spirit, I removed from the College's VAX anonymous FTP directory
|
||
copies of the codes used to analyze the Pentium chip for the bug.
|
||
|
||
* After receiving some complaints in this regard, Intel (on its own
|
||
initiative) informed me on 22 November that I was free to discuss
|
||
publicly the discovery and nature of the Pentium FPU bug, since this was
|
||
my own work, accomplished prior to signing the NDA and without
|
||
assistance from Intel; and that the primary purpose of the NDA was to
|
||
insure confidentiality of information exchanged in the course of any
|
||
consulting I might do for Intel in the future.
|
||
|
||
* To this date, Intel has been most cooperative in alleviating difficulties
|
||
caused for my own research (computational number theory; distribution of
|
||
twin primes and other constellations, and the sums of their reciprocals)
|
||
by the presence of the bug. They have shipped replacement chips for the
|
||
CPUs in the machines I am using, and I have verified that the new chips
|
||
are free of the bug (zero errors in > 1e15 simulated random divisions).
|
||
|
||
* I cannot speak for Intel regarding its policies on CPU replacement for
|
||
Pentium systems having the bug; that is a management decision which
|
||
obviously must take into account the constraints of supply, inventory,
|
||
logistics, expense, and public relations. To date, I believe Intel has
|
||
handled the affair in essentially the manner that could usually be
|
||
expected of most businesses operating in a highly competitive, low-margin
|
||
capitalistic economy. Any Pentium owner who feels the need for a
|
||
replacement CPU should contact Intel Customer Service and Tech
|
||
Support at 800-628-8686, or Intel representative John Thompson at
|
||
408-765-1279.
|
||
|
||
* I probably have a somewhat different perspective on the bug than most
|
||
users. It is my opinion that the current generation of microprocessors
|
||
(and possibly all of them since, say, the 8080) has become so complex
|
||
that it is no longer possible to completely debug them, or even to
|
||
determine every bug that exists in one. Thus, the discovery of this
|
||
particular bug should not be any great surprise. There have been many
|
||
well-publicized bugs in the past (e.g., the 32-bit multiply bug in the
|
||
early 80386s, the arctangent bug in the early 80486s, the stack-handling
|
||
bug in the early 8088s, and the Motorola 68K revision F bug).
|
||
Furthermore, in view of this, all mission-critical computations should
|
||
be performed multiple times, in settings as independent as possible---
|
||
preferably with different CPUs, operating systems, and software
|
||
algorithms. Where different platforms are not available, the same
|
||
computation should be performed using algorithms as independent as
|
||
possible; this was in fact how I pinpointed the Pentium bug---the
|
||
sums of the reciprocals of the twin primes were being done in both
|
||
long double floating point (64 significant bits) and in extended
|
||
precision using arrays of integers (26 decimal digits at that time,
|
||
53 decimal digits currently). Dual calculations were also being run
|
||
on 486 and Pentium systems.
|
||
|
||
* Note that the bug can be temporarily circumvented by locking out
|
||
the FPU. For most DOS applications, this can be done by means of the
|
||
DOS commands SET 87=NO (for executables created by Borland compilers)
|
||
and SET NO87=NO87 (for executables created by Microsoft compilers).
|
||
Of course, this is at best a performance-killing band-aid; some
|
||
applications require an FPU, while Windows and most DOS extenders
|
||
ignore these environmental variables. In theory, it should be
|
||
possible to write a fairly short (100 lines?) utility code which
|
||
enters protected mode (ring 0), sets up a valid global descriptor table
|
||
(and perhaps a valid interrupt descriptor table), resets the emulation
|
||
bit in the machine status word of control register 0, and then re-enters
|
||
real mode. Running such a code at boot time should lock out the FPU
|
||
even for Windows and DOS extended applications; a similar code could
|
||
reactivate the FPU at will. Unfortunately, I haven't had the time to
|
||
write the code yet!
|
||
|
||
* To date, my analysis indicates that the bug will appear in about 1 in
|
||
31 billion random divisions and 1 in 1.26 billion random reciprocals.
|
||
These figures are similar to the rate of 1 in 9.5 billion attributed to
|
||
Intel. In my own application (distribution of twin primes and the sum
|
||
of their reciprocals) no error appeared for values < 824e9. Most users
|
||
will find these values reassuring; those of us doing computational
|
||
number theory, chaos theory, or analysis of ill-conditioned matrices
|
||
may still want a new, bug-free CPU.
|
||
|
||
* To date, the worst-case error of which I am aware is an example
|
||
apparently posted by Tim Coe of Vitesse Semiconductors on 14 November,
|
||
indicating that the quotient 4195835.0/3145727.0 is returned correctly
|
||
to only 14 significant bits (5 significant decimal digits). I have not
|
||
yet had a chance to verify this example.
|
||
|
||
* Copies of some of the codes I have used to analyze the bug (updated to
|
||
reflect later developments) will be restored to the anonymous FTP
|
||
directory [anonymous.nicely.pentbug] of Lynchburg College's VAX server
|
||
(machine ID acavax.lynchburg.edu) as soon as I get time to update and
|
||
post them.
|
||
|
||
* Feel free to transmit this communication as you wish.
|
||
|
||
Sincerely,
|
||
|
||
Dr. Thomas R. Nicely
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
THE COMPUTER NEVERMORE (The Raven)
|
||
|
||
By Unknown
|
||
|
||
Once upon a midnight dreary, fingers cramped and vision bleary,
|
||
System manuals piled high and wasted paper on the floor
|
||
Longing for the warmth of bedsheets,
|
||
Still I sat there, doing spreadsheets;
|
||
Having reached the bottom line,
|
||
I took a floppy from the drawer.
|
||
Typing with a steady hand, then invoked the SAVE command
|
||
But I got a reprimand: it read 'Abort, Retry, Ignore.'
|
||
|
||
Was this some occult illusion? Some maniacal intrusion?
|
||
These were choices Solomon himself had never faced before.
|
||
Carefully, I weighed my options.
|
||
These three seemed to be the top ones.
|
||
Clearly I must now adopt one:
|
||
Choose 'Abort, Retry, Ignore.'
|
||
|
||
With my fingers pale and trembling,
|
||
Slowly toward the keyboard bending,
|
||
Longing for a happy ending, hoping all would be restored,
|
||
Praying for some guarantee
|
||
Finally I pressed a key--
|
||
But on the screen what did I see?
|
||
Again: 'Abort, Retry, Ignore.'
|
||
|
||
I tried to catch the chips off-guard--
|
||
I pressed again, but twice as hard.
|
||
Luck was just not in the cards.
|
||
I saw what I had seen before.
|
||
Now I typed in desperation
|
||
Trying random combinations
|
||
Still there came the incantation:
|
||
Choose: 'Abort, Retry, Ignore.'
|
||
|
||
There I sat, distraught exhausted, by my own machine accosted
|
||
Getting up I turned away and paced across the office floor.
|
||
And then I saw an awful sight:
|
||
A bold and blinding flash of light--
|
||
A lightning bolt had cut the night and shook me to my very core.
|
||
I saw the screen collapse and die
|
||
'Oh no--my data base,' I cried
|
||
I thought I heard a voice reply,
|
||
'You'll see your data Nevermore!'
|
||
|
||
To this day I do not know
|
||
The place to which lost data goes
|
||
I bet it goes to heaven where the angels have it stored
|
||
But as for productivity, well
|
||
I fear that IT goes straight to hell
|
||
And that Us the tale I have to tell
|
||
Your choice: 'Abort, Retry, Ignore.'
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
TWAS THE NIGHT BEFORE STAR TREK...
|
||
|
||
'Twas the night before Christmas, when all through the ship
|
||
Not a circuit was buzzing, not one microchip;
|
||
The phasers were hung in the armory securely,
|
||
In hope that no alien would get up that early.
|
||
|
||
The crewmen were nestled all snug in their bunks
|
||
(Except for the few who were partying drunks);
|
||
And Picard in his nightshirt, and Bev in her lace,
|
||
Had just settled down for a neat face to face...
|
||
|
||
When out in the hall there arose such a racket,
|
||
That we leapt from our beds, pulling on pant and jacket.
|
||
Away to the lifts we all shot like a gun,
|
||
Leapt into the cars and yelled loudly "Deck One!"
|
||
|
||
The bridge red-alert lights, which flashed through the din,
|
||
Gave a lustre of Hades to objects within.
|
||
When, what on the viewscreen, our eyes should behold,
|
||
But a weird kind of sleigh, and some guy who looked old.
|
||
|
||
But the glint in his eyes was so strange and askew,
|
||
That we knew in a moment it had to be Q.
|
||
His sleigh grew much larger as closer he came.
|
||
Then he zapped on the bridge and addressed us by name:
|
||
|
||
"It's Riker, It's Data, It's Worf and Jean-Luc!
|
||
It's Geordi, And Wesley, the genetic fluke!
|
||
To the top of the bridge, to the top of the hall!
|
||
Now float away! Float away! Float away all!"
|
||
|
||
As leaves in the autumn are whisked off the street,
|
||
So the floor of the bridge came away from our feet,
|
||
And up to the ceiling, our bodies they flew,
|
||
As the captain called out, "What the Hell is this, Q?!"
|
||
|
||
The prankster just laughed and expanded his grin,
|
||
And, snapping his fingers, he vanished again.
|
||
As we took in our plight, and were looking around,
|
||
The spell was removed, and we crashed to the ground.
|
||
|
||
Then Q, dressed in fur from his head to his toe,
|
||
Appeared once again, to continue the show.
|
||
"That's enough!" cried the captain, "You'll stop this at once!"
|
||
And Riker said, "Worf, take aim at this dunce!"
|
||
|
||
"I'm deeply offended, Jean-Luc" replied Q,
|
||
"I just wanted to celebrate Christmas with you."
|
||
As we scoffed at his words, he produced a large sack.
|
||
He dumped out the contents and took a step back.
|
||
|
||
"I've brought gifts," he said, "just to show I'm sincere.
|
||
There's something delightful for everyone here."
|
||
He sat on the floor, and dug into his pile,
|
||
And handed out gifts with his most charming smile:
|
||
|
||
"For Counselor Troi, there's no need to explain.
|
||
Here's Tylenol-Beta for all of your pain.
|
||
For Worf I've some mints, as his breath's not too great,
|
||
And for Geordi LaForge, an inflatable date."
|
||
|
||
For Wesley, some hormones, and Clearasil-plus;
|
||
For Data, a joke book, For Riker a truss.
|
||
For Beverly Crusher, there's sleek lingerie,
|
||
And for Jean-Luc, the thrill of just seeing her that way."
|
||
|
||
And he sprang to his feet with that grin on his face
|
||
And, clapping his hands, disappeared into space.
|
||
But we heard him exclaim as he dwindled from sight,
|
||
"Merry Christmas to all, and to all a good flight!"
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
SANTA SOURCE CODE
|
||
|
||
By Unknown
|
||
|
||
#bash
|
||
|
||
better !pout !cry
|
||
better watchout
|
||
lpr why
|
||
santa claus <north pole >town
|
||
|
||
cat /etc/passwd >list
|
||
ncheck list
|
||
ncheck list
|
||
cat list | grep naughty >nogiftlist
|
||
cat list | grep nice >giftlist
|
||
santa claus <north pole >town
|
||
|
||
who | grep sleeping
|
||
who | grep awake
|
||
who | egrep 'bag|good'
|
||
for (goodnes sake) {
|
||
be good
|
||
}
|
||
|
||
better !pout !cry
|
||
better watchout
|
||
lpr why
|
||
santa claus <north pole >town
|
||
|
||
|
||
[original source unknown]
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|