From nobody Wed Dec 27 15:59:37 2023 X-Original-To: freebsd-arm@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4T0btr03qnz55sFk for ; Wed, 27 Dec 2023 15:59:48 +0000 (UTC) (envelope-from fbsd@www.zefox.net) Received: from www.zefox.net (www.zefox.net [50.1.20.27]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "www.zefox.com", Issuer "www.zefox.com" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4T0btq2vfcz3NlK for ; Wed, 27 Dec 2023 15:59:47 +0000 (UTC) (envelope-from fbsd@www.zefox.net) Authentication-Results: mx1.freebsd.org; none Received: from www.zefox.net (localhost [127.0.0.1]) by www.zefox.net (8.17.1/8.15.2) with ESMTPS id 3BRFxcps033962 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Wed, 27 Dec 2023 07:59:39 -0800 (PST) (envelope-from fbsd@www.zefox.net) Received: (from fbsd@localhost) by www.zefox.net (8.17.1/8.15.2/Submit) id 3BRFxbYd033961; Wed, 27 Dec 2023 07:59:37 -0800 (PST) (envelope-from fbsd) Date: Wed, 27 Dec 2023 07:59:37 -0800 From: bob prohaska To: John F Carr Cc: Mark Millard , "ticso@cicely.de" , Marcin Cieslak , "freebsd-arm@freebsd.org" Subject: Re: USB-serial adapter suggestions needed Message-ID: References: <16864054-4os0-pq3p-7qp0-7299666908os@fncre.vasb> <55q37289-ss30-nq9o-7r31-086n999p394s@fncre.vasb> <23100FB9-BB4A-48FF-A715-84EF7F6F59A6@mit.edu> List-Id: Porting FreeBSD to ARM processors List-Archive: https://lists.freebsd.org/archives/freebsd-arm List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-arm@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <23100FB9-BB4A-48FF-A715-84EF7F6F59A6@mit.edu> X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:7065, ipnet:50.1.16.0/20, country:US] X-Spamd-Bar: ---- X-Rspamd-Queue-Id: 4T0btq2vfcz3NlK On Wed, Dec 27, 2023 at 01:48:33PM +0000, John F Carr wrote: > > > > On Dec 27, 2023, at 03:30, Mark Millard wrote: > > > > 0000: 6C 6F 67 69 6E 3A 20 C3 AF C2 BF C2 BD C3 AF C2 login: ......... > > 0010: BF C2 BD C3 AF C2 BF C2 BD C3 AF C2 BF C2 BD C3 ................ > > 0020: AF C2 BF C2 BD C3 AF C2 BF C2 BD C3 AF C2 BF C2 ................ > > 0030: BD C3 AF C2 BF C2 BD 0A 50 61 73 73 77 6F 72 64 ........Password > > 0040: 3A : > > > > The byte pairs that start with C3 's and C2's look far from > > random to me --also they do not look like glitches. > > Those byte pairs are valid UTF-8. > > C3 AF = 000 1110 1111 = EF > C2 BF = 000 1011 1111 = BF > C2 BD = 000 1011 1101 = BD > > What EF BF BD means, I can't say. As Unicode it is "??????". > Maybe UTF-8 encoded 8 bit line noise. A simple-minded Web search for EF BF BD finds quite a few links, one being https://www.aon.com/cyber-solutions/aon_cyber_labs/when-efbfbd-and-friends-come-knocking-observations-of-byte-array-to-string-conversions/ I don't understand most of it, but it seems to imply EF BF BD are artifacts from some encryption process. What they might be doing on a private wire between two serial ports is a mystery, at least to me. SSH invokes encryption, far as I know tip and cu do not. Maybe something to do with ssh or sshd? Thanks for writing! bob prohaska