etherboot-developers Mailing List for Etherboot (Page 205)
Brought to you by:
marty_connor,
stefanhajnoczi
You can subscribe to this list here.
| 2000 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
(2) |
Aug
(10) |
Sep
(3) |
Oct
(10) |
Nov
(47) |
Dec
(20) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2001 |
Jan
(41) |
Feb
(107) |
Mar
(76) |
Apr
(103) |
May
(66) |
Jun
(72) |
Jul
(27) |
Aug
(31) |
Sep
(33) |
Oct
(18) |
Nov
(33) |
Dec
(67) |
| 2002 |
Jan
(25) |
Feb
(62) |
Mar
(79) |
Apr
(74) |
May
(67) |
Jun
(104) |
Jul
(155) |
Aug
(234) |
Sep
(87) |
Oct
(93) |
Nov
(54) |
Dec
(114) |
| 2003 |
Jan
(146) |
Feb
(104) |
Mar
(117) |
Apr
(189) |
May
(96) |
Jun
(40) |
Jul
(133) |
Aug
(136) |
Sep
(113) |
Oct
(142) |
Nov
(99) |
Dec
(185) |
| 2004 |
Jan
(233) |
Feb
(151) |
Mar
(109) |
Apr
(96) |
May
(200) |
Jun
(175) |
Jul
(162) |
Aug
(118) |
Sep
(107) |
Oct
(77) |
Nov
(121) |
Dec
(114) |
| 2005 |
Jan
(201) |
Feb
(271) |
Mar
(113) |
Apr
(119) |
May
(69) |
Jun
(46) |
Jul
(21) |
Aug
(37) |
Sep
(13) |
Oct
(4) |
Nov
(19) |
Dec
(46) |
| 2006 |
Jan
(10) |
Feb
(18) |
Mar
(85) |
Apr
(2) |
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
|
Dec
|
| 2007 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(10) |
Jul
(20) |
Aug
(9) |
Sep
(11) |
Oct
(4) |
Nov
(1) |
Dec
(40) |
| 2008 |
Jan
(19) |
Feb
(8) |
Mar
(37) |
Apr
(28) |
May
(38) |
Jun
(63) |
Jul
(31) |
Aug
(22) |
Sep
(37) |
Oct
(38) |
Nov
(49) |
Dec
(24) |
| 2009 |
Jan
(48) |
Feb
(51) |
Mar
(80) |
Apr
(55) |
May
(34) |
Jun
(57) |
Jul
(20) |
Aug
(83) |
Sep
(17) |
Oct
(81) |
Nov
(53) |
Dec
(40) |
| 2010 |
Jan
(55) |
Feb
(28) |
Mar
(36) |
Apr
(7) |
May
|
Jun
|
Jul
(7) |
Aug
|
Sep
|
Oct
(1) |
Nov
(3) |
Dec
|
| 2011 |
Jan
(1) |
Feb
|
Mar
(3) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(6) |
Oct
|
Nov
(10) |
Dec
|
| 2012 |
Jan
|
Feb
|
Mar
|
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2013 |
Jan
|
Feb
|
Mar
(1) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
|
From: <ke...@us...> - 2003-04-01 02:56:46
|
>I would place the in: >core/isapnp.c >include/isapnp.h > >And if there is something that is demonstrably x86 specific >the code can code in arch/i386/core. But isapnp primarily depends >on the isa bus and inb/outb none of which are x86 specific. And >inb/outb already have arch dependent implementations. Then again, the Linux equivalents live in drivers/pnp. There is also a directory drivers/pci. Not sure what the logic is there. |
|
From: <ebi...@ln...> - 2003-04-01 02:44:36
|
"Timothy Legge" <tl...@ro...> writes: > Sorry for the html format, here is the text >=20 > Hi=20 > =A0 > I am going to update the 3c515 driver in 5.1 with the changes that I > have done in 5.0 (separating out the ISAPNP code to isapnp.c and > isapnp.h and other updates).=A0 Where in the directory structure should > they go?=A0 Should I leave them in drivers/net or move them to somewhere > like core/ or arch/i386/core/ I would place the in: core/isapnp.c include/isapnp.h And if there is something that is demonstrably x86 specific the code can code in arch/i386/core. But isapnp primarily depends on the isa bus and inb/outb none of which are x86 specific. And inb/outb already have arch dependent implementations. Eric |
|
From: Timothy L. <tl...@ro...> - 2003-04-01 02:33:22
|
Sorry for the html format, here is the text Hi=20 =A0 I am going to update the 3c515 driver in 5.1 with the changes that I have done in 5.0 (separating out the ISAPNP code to isapnp.c and isapnp.h and other updates).=A0 Where in the directory structure should they go?=A0 Should I leave them in drivers/net or move them to somewhere like core/ or arch/i386/core/ =A0 Tim |
|
From: Timothy L. <tl...@ro...> - 2003-04-01 02:10:17
|
Hi I am going to update the 3c515 driver in 5.1 with the changes that I have done in 5.0 (separating out the ISAPNP code to isapnp.c and isapnp.h and other updates). Where in the directory structure should they go? Should I leave them in drivers/net or move them to somewhere like core/ or arch/i386/core/ Tim --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.465 / Virus Database: 263 - Release Date: 3/25/2003 |
|
From: <ebi...@ln...> - 2003-03-31 20:11:33
|
"Jason A. Pattie" <pat...@pc...> writes: > Eric W. Biederman wrote: > > As I understand encryption most encryption techniques fail to > > be effective about disguising a message if you send the same > > message over and over again. With network booting this is the > > case. Loading an image that was authenticated at some point > > in time is a reasonable problem. Beyond that the code is complicated > > and it really does not help. > > So, you would see signing a kernel+initial ramdisk package 'a good > thing' so that the client will always boot authenticated code. So even > if a hacker were to send it anything, they would have to send the client > the exact same code, which would hopefully help to prevent them from > succeeding in their attempt or making it much more difficult. Correct. If you want to proceed down that direction feel free. Eric |
|
From: <ebi...@ln...> - 2003-03-31 20:10:30
|
"Sam Leffler" <sa...@er...> writes: > > There is/was a uni project working on secure booting in general, don't > > have the URL handy, Eric has it. > > google "secure bootstrap" leads you quickly to the answer(s). I suspect > you're thinking of Bill Arbaugh's work but there's also been stuff going on > at CITI to use smartcards. Right as Bill and the people working with him have already expressed some interest in LinuxBIOS and etherboot. Eric |
|
From: Sam L. <sa...@er...> - 2003-03-28 23:16:46
|
> There is/was a uni project working on secure booting in general, don't
> have the URL handy, Eric has it.
google "secure bootstrap" leads you quickly to the answer(s). I suspect
you're thinking of Bill Arbaugh's work but there's also been stuff going on
at CITI to use smartcards.
Sam
|
|
From: Jason A. P. <pat...@pc...> - 2003-03-28 15:21:30
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Eric W. Biederman wrote: > As I understand encryption most encryption techniques fail to > be effective about disguising a message if you send the same > message over and over again. With network booting this is the > case. Loading an image that was authenticated at some point > in time is a reasonable problem. Beyond that the code is complicated > and it really does not help. So, you would see signing a kernel+initial ramdisk package 'a good thing' so that the client will always boot authenticated code. So even if a hacker were to send it anything, they would have to send the client the exact same code, which would hopefully help to prevent them from succeeding in their attempt or making it much more difficult. - -- Jason A. Pattie pat...@xp... -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQE+hGhtuYsUrHkpYtARAmLeAJ9cPN/6VGsorpw1My0lcJU8hQ4MwgCeJ1kf yDHO8aWwrxNVHmVjUext5OE= =6QOp -----END PGP SIGNATURE----- -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. |
|
From: <ebi...@ln...> - 2003-03-28 02:31:00
|
"Jason A. Pattie" <pat...@pc...> writes: > Ken Yap wrote: > >>Does Etherboot initialize USB and read this key? > > > > > > No, that would be another project on the wishlist. :-) > > > > > >>Perfect! IPSec implements key exchanges on UDP port 500. > > > > > > Don't you need TCP for data transfers? > > Hmm. I think so. However, the encrypted tunnel would be using packets > on protocols 50 and 51 (ESP/AH), which then get converted to TCP or UDP > packets inside the kernel. As I understand encryption most encryption techniques fail to be effective about disguising a message if you send the same message over and over again. With network booting this is the case. Loading an image that was authenticated at some point in time is a reasonable problem. Beyond that the code is complicated and it really does not help. Eric |
|
From: <ke...@us...> - 2003-03-28 01:42:26
|
>Some time ago someone mentioned that perhaps currticks was not working >correctly on my 486. How can I find out? There are two main sources of timing in PCBIOS hosted Etherboto: the 18.2 Hz clock (currcicks) and the one-shot timer that's clocked at 1.1 MHz or something close (udelay). Insert little code segments in Etherboot to call currticks or udelay respectively in a loop and print something every second. That will tell you which timers are working. |
|
From: Jason A. P. <pat...@pc...> - 2003-03-28 00:11:21
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Ken Yap wrote: >>Does Etherboot initialize USB and read this key? > > > No, that would be another project on the wishlist. :-) > > >>Perfect! IPSec implements key exchanges on UDP port 500. > > > Don't you need TCP for data transfers? Hmm. I think so. However, the encrypted tunnel would be using packets on protocols 50 and 51 (ESP/AH), which then get converted to TCP or UDP packets inside the kernel. - -- Jason A. Pattie pat...@xp... -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQE+g5MauYsUrHkpYtARAqNiAJ9x96jL3xhFFVDHAxqiD1a6OPqSXACePYdK 6ZEU4jEvHNc6cuoQF2okoNs= =FMep -----END PGP SIGNATURE----- -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. |
|
From: <ke...@us...> - 2003-03-27 23:24:31
|
>Does Etherboot initialize USB and read this key? No, that would be another project on the wishlist. :-) >Perfect! IPSec implements key exchanges on UDP port 500. Don't you need TCP for data transfers? |
|
From: Jason A. P. <pat...@pc...> - 2003-03-27 23:19:04
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Ken Yap wrote: >>An idea struck me today as I was thinking about a way to more securely > > Hope it wasn't too painful. :-) Just fried a few brain cells... :D >>verify that the client that is booting via Etherboot is actually >>downloading the kernel/code that you really want it to. Use a preshared >>key built into the Etherboot code that is flashed onto the bootrom to >>validate the kernel image/code. So, in order for the client to >>successfully boot, the image it downloads has to be digitally signed and >>that signature has to match when signed by the clients Etherboot key. >>Otherwise the client refuses to boot. There could be a number of ways >>to go about this, from having a default "Etherboot" maintained key and >>signature to a site-by-site basis where the administrator/deployer would >>build there own version of Etherboot to embed their own key for their >>own thin client workstations. > > > Or a key in a USB dongle. Does Etherboot initialize USB and read this key? > There is/was a uni project working on secure booting in general, don't > have the URL handy, Eric has it. > > Eric's got a hook in 5.1 that verifies download integrity using a > checksum over the image. Verifying a signature is an obvious extension. > > >>Another possibility that this presents is to not only authenticate the >>connection but also be able to create an encrypted tunnel using >>Diffie-Hellman key exchange. This may be a rather involved process just >>to get a secure boot layer, but it may open up the doors to a larger >>audience and wider acceptance of Etherboot. > > > Tunnels are much harder. Etherboot only implements UDP. Perfect! IPSec implements key exchanges on UDP port 500. >>What do you all think? > > > Great idea, looking forward to seeing your code soon. :-) > > But seriously, it's a good idea worth developing further, but as always > implementation depends on someone keen enough to contribute some time to > do it. Heh. I haven't even looked at the source code in any serious way for Etherboot. And definitely not any of the later versions. I usually go to Rom-o-Matic.net to download one whenever I need an image. - -- Jason A. Pattie pat...@xp... -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQE+g4bZuYsUrHkpYtARAuHGAJ9D/WGqZng9CRIKRuPQ1d5JD9eBGgCeIKlR IqHyhBnVKYyDtsiqTqxcTGo= =pAEG -----END PGP SIGNATURE----- -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. |
|
From: <ke...@us...> - 2003-03-27 23:05:48
|
>An idea struck me today as I was thinking about a way to more securely Hope it wasn't too painful. :-) >verify that the client that is booting via Etherboot is actually >downloading the kernel/code that you really want it to. Use a preshared >key built into the Etherboot code that is flashed onto the bootrom to >validate the kernel image/code. So, in order for the client to >successfully boot, the image it downloads has to be digitally signed and >that signature has to match when signed by the clients Etherboot key. >Otherwise the client refuses to boot. There could be a number of ways >to go about this, from having a default "Etherboot" maintained key and >signature to a site-by-site basis where the administrator/deployer would >build there own version of Etherboot to embed their own key for their >own thin client workstations. Or a key in a USB dongle. There is/was a uni project working on secure booting in general, don't have the URL handy, Eric has it. Eric's got a hook in 5.1 that verifies download integrity using a checksum over the image. Verifying a signature is an obvious extension. >Another possibility that this presents is to not only authenticate the >connection but also be able to create an encrypted tunnel using >Diffie-Hellman key exchange. This may be a rather involved process just >to get a secure boot layer, but it may open up the doors to a larger >audience and wider acceptance of Etherboot. Tunnels are much harder. Etherboot only implements UDP. >What do you all think? Great idea, looking forward to seeing your code soon. :-) But seriously, it's a good idea worth developing further, but as always implementation depends on someone keen enough to contribute some time to do it. |
|
From: Jason A. P. <pat...@pc...> - 2003-03-27 21:54:58
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I haven't looked through the archives, yet, but wanted to throw an idea out to see what everyone thinks. An idea struck me today as I was thinking about a way to more securely verify that the client that is booting via Etherboot is actually downloading the kernel/code that you really want it to. Use a preshared key built into the Etherboot code that is flashed onto the bootrom to validate the kernel image/code. So, in order for the client to successfully boot, the image it downloads has to be digitally signed and that signature has to match when signed by the clients Etherboot key. Otherwise the client refuses to boot. There could be a number of ways to go about this, from having a default "Etherboot" maintained key and signature to a site-by-site basis where the administrator/deployer would build there own version of Etherboot to embed their own key for their own thin client workstations. Another possibility that this presents is to not only authenticate the connection but also be able to create an encrypted tunnel using Diffie-Hellman key exchange. This may be a rather involved process just to get a secure boot layer, but it may open up the doors to a larger audience and wider acceptance of Etherboot. What do you all think? - -- Jason A. Pattie pat...@xp... -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQE+g3MguYsUrHkpYtARApPUAJ4zPzMp8WrBK/g5hwdXwX454D5I/wCeNq08 XtAWPTZcZltj0u4Z4/h7GIw= =8QF4 -----END PGP SIGNATURE----- -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. |
|
From: <ke...@us...> - 2003-03-27 15:04:04
|
>1) If we drop a DHCP packet because it does not have what > we are looking for we do not even warn once. This is probably > as useful as the fragmented packet handling warning. Yes, some newbies forget to provide a filename and wonder why there's no response. However to know that the warning has been issued, one would have to retain the IP address of the useless server(s). Also the output could get annoying in situations where it's expected that useless servers will make offers. Maybe a config variable that can be turned off? >2) If you do not have a TFTP server setup we ignore the icmp error. > Possibly we should do something with it. Sounds reasonable. |
|
From: <ebi...@ln...> - 2003-03-27 14:50:06
|
Recently I have run into two cases that might be worth at least
thinking about with respect to error handling.
1) If we drop a DHCP packet because it does not have what
we are looking for we do not even warn once. This is probably
as useful as the fragmented packet handling warning.
2) If you do not have a TFTP server setup we ignore the icmp error.
Possibly we should do something with it.
I'm not thinking clearly be it is quite possible that something should
be done on that score.
Eric
|
|
From: Timothy L. <tl...@ro...> - 2003-03-27 02:43:26
|
Hi
In order to get the 3c509 driver to find the card on my 486, I need to
and the old DELAY function:
static void DELAY(int val)
{
int c;
for (c = 0; c < val; c += 20) {
twiddle();
}
}
and change get_eeprom_data as follows (changing the udelay to 60000 does
not help):
static int
get_eeprom_data(int id_port, int offset)
{
int i, data = 0;
outb(0x80 + offset, id_port);
/* Do we really need this wait? Won't be noticeable anyway */
- udelay(10000);
+ DELAY(350);
for (i = 0; i < 16; i++)
data = (data << 1) | (inw(id_port) & 1);
return (data);
}
Some time ago someone mentioned that perhaps currticks was not working
correctly on my 486. How can I find out?
Tim
---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.465 / Virus Database: 263 - Release Date: 3/25/2003
|
|
From: Timothy L. <tl...@ro...> - 2003-03-27 02:34:39
|
> >I'm going to comment out the gateA20_unset and see what happens. > > Bingo, DOS and ROM images now load and run. I am not sure what happened, but the latest cvs update I did reboots almost immediately on my 486. I will try some debugging tomorrow. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.465 / Virus Database: 263 - Release Date: 3/25/2003 |
|
From: <ebi...@ln...> - 2003-03-26 20:42:06
|
ke...@us... (Ken Yap) writes: > >O.k. Then we need to get a20 handling fixed in 5.1.x > >That is one area 5.0 is definitely doing better. > > The Linux images not running appears to be my bug in the trampoline > (invalid assumption about which 64kB segment it's running in). I'll work > on that. > > It also looked like a bunch of stuff in misc.c should be migrated to > arch/i386/firmware. Yep. The are all conditional upon -DPCBIOS so they are not a problem. But moving the could would certainly be a clean thing to do. Eric |
|
From: <ke...@us...> - 2003-03-26 09:24:02
|
>O.k. Then we need to get a20 handling fixed in 5.1.x >That is one area 5.0 is definitely doing better. The Linux images not running appears to be my bug in the trampoline (invalid assumption about which 64kB segment it's running in). I'll work on that. It also looked like a bunch of stuff in misc.c should be migrated to arch/i386/firmware. |
|
From: <ebi...@ln...> - 2003-03-26 08:00:43
|
Paul <pau...@vi...> writes: > > OK - I'll have a look at where etherboot uses the clock - My embedded PC > has an AMD Elan 520 processor on it which has standard PC stuff > integrated along with it. > > I have only just started looking at ROLO and Etherboot source code so > I'm not exactly sure what I need to do yet. I didn't see pci bus > enumeration/resource allocation going on in ROLO so I am assuming that > this is left to Linux. However, clearly the PCI registers in the > ethernet device will need to be enabled - and perhaps the interrupt? - > again I haven't yet concluded whether Etherboot uses an interrupt... If you get to the point where you need this it may be worth getting LinuxBIOS going or at least looking at the source. It already does the pci bus enumeration/resource allocation. LinuxBIOS may be over kill for an embedded system like that though. > If an etherboot build can provide me with a BIOS extension ROM image for > my PCI ethernet controller device then I can put it straight into my > boot PROM at the appropriate address. ROLO doesn't appear to do any > searching for BIOS extensions but this shouldn't be too much of a > problem to add some code so that it finds the image provided by > etherboot. > > Thanks, Welcome and good luck. Eric |
|
From: <ebi...@ln...> - 2003-03-26 07:50:58
|
ke...@us... (Ken Yap) writes: > >I'm going to comment out the gateA20_unset and see what happens. > > Bingo, DOS and ROM images now load and run. O.k. Then we need to get a20 handling fixed in 5.1.x That is one area 5.0 is definitely doing better. Enabling a20 we can leave in the C code. But the code should: - Test to see if a20 is already enabled. - Test to see if we can use the bios to enable a20 - Test to see if we can directly enable a20 KBC. And we should record how a20 was enabled so when we are in 16bit mode we can restore a20 to the state we can in with. I think there is something else missing from the 5.0.x a20 handling as well. But it should not be hard to move that down to 16bit mode. I believe some things do get grumpy if we don't disable a20 handling when we do the hand off in 16bit mode so. But moving the disable to xstart16 looks like the right place to do it given the consequence if we are above 1MB. We probably did not see this earlier as -DRELOCATE was not the default. Eric |
|
From: <ke...@us...> - 2003-03-26 03:06:52
|
>I'm going to comment out the gateA20_unset and see what happens. Bingo, DOS and ROM images now load and run. |
|
From: <ke...@us...> - 2003-03-26 02:59:39
|
>(1) could be an error in the trampoline that mknbi uses, but with >FreeDOS and the ROM image it should be just straight jumps into 16-bit >code; Etherboot is supposed to just call xstart16. Which makes me >suspect that the 16-bit registers are messed up in RELOCATE mode. Or >maybe it's something to do with A20 routines? Any theories, Eric? Eric, at lines 133 onward in tagged_loader.c there is: gateA20_unset(); xstart16(tctx.img.execaddr, tctx.img.u.location, virt_to_phys(BOOTP_DATA_ADDR)); But if A20 is unset, the relocated Etherboot may be unmapped (depending on whether it's in an odd or even megabyte), and then there's no way to execute xstart16. Am I wrong? Wasn't this discussed last year? Perhaps what's needed is an xstart16 that does the A20 unset as well (in 16-bit mode). I'm going to comment out the gateA20_unset and see what happens. |