Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

"But what we need to know is, do people want nasally-insertable computers?"


computers / comp.sys.transputer / Annotated CSA Mandelzoom loader worm

SubjectAuthor
o Annotated CSA Mandelzoom loader wormTom Stepleton

1
Annotated CSA Mandelzoom loader worm

<9f456f8b-55c3-437f-9e9b-c359668a4423n@googlegroups.com>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=244&group=comp.sys.transputer#244

  copy link   Newsgroups: comp.sys.transputer
X-Received: by 2002:a05:620a:c9b:b0:6cb:cde2:27b5 with SMTP id q27-20020a05620a0c9b00b006cbcde227b5mr4226502qki.293.1664496017940;
Thu, 29 Sep 2022 17:00:17 -0700 (PDT)
X-Received: by 2002:ac8:5a51:0:b0:35c:fa98:1101 with SMTP id
o17-20020ac85a51000000b0035cfa981101mr4641005qta.604.1664496017730; Thu, 29
Sep 2022 17:00:17 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.sys.transputer
Date: Thu, 29 Sep 2022 17:00:17 -0700 (PDT)
Injection-Info: google-groups.googlegroups.com; posting-host=82.39.238.122; posting-account=l3olFwkAAAB7_YlbF47jpoRgdTkZ-iGF
NNTP-Posting-Host: 82.39.238.122
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <9f456f8b-55c3-437f-9e9b-c359668a4423n@googlegroups.com>
Subject: Annotated CSA Mandelzoom loader worm
From: stepleton@gmail.com (Tom Stepleton)
Injection-Date: Fri, 30 Sep 2022 00:00:17 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 1961
 by: Tom Stepleton - Fri, 30 Sep 2022 00:00 UTC

I've carried out a close reading of the "worm" in the CSA Mandelzoom source code: this is the code that distributes itself across a Transputer network and then loads and executes programs distributed to it by a host computer. The worm itself is not specific to Mandelzoom --- you could use it to load other programs if you wanted to.

The network initialisation and worm code are in three files, executed in this order:
SRESET.TAL -- reset the Transputer network
FLBOOT.TAL -- main worm and bootstrap loader
FLLOAD.TAL -- full loader for larger programs

I've annotated these source files with a play-by-play of what the worm is doing. The annotated files are found at the gist link below, regrettably in the opposite order to what's listed above:

https://gist.github.com/stepleton/e0181ecd11ade19124a2956da614caab

I hope this might be of interest to the rare enthusiast out there,
--Tom

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor