From: firstname.lastname@example.org Subject: Re: [9fans] Support for SATA hard drives. Date: 2004年6月20日 15:12:59:JST To: email@example.com Reply-To: firstname.lastname@example.org On Sun Jun 20 00:46:50 EDT 2004, email@example.com wrote: Does anyone have a SATA hard drive working under Plan 9? I'm looking forward to using a 250GB or larger SATA hard drive in a venti server. I figure someone must have given this idea some thought, but I haven't heard it discussed anywhere. --Vester Thacker The controllers look to all intents and purposes just like regular ATA controllers (unless you want to initialise them from scratch), so there's not much to do other than make sure the controller is recognised by the driver. There's one there alraeady: devi% grep SATA /sys/src/9/pc/sdata.c case (0x3149<<16)|0x1106: /* VIA VT8237 SATA/RAID */ devi% and it has on it devi# cat /dev/sdC0/ctl inquiry ST380013AS config 0C5A capabilities 2F00 dma 00550040 dmactl 00550040 rwm 16 rwmctl 0 lba48always off geometry 156301488 512 16383 16 63 part data 0 156301488 devi#
From: firstname.lastname@example.org Subject: Re: [9fans] ISP filtering - update (fwd) Date: 2005年5月8日 23:07:52:JST To: email@example.com Reply-To: firstname.lastname@example.org [Replace this with your comments.] From: Ralph Corderoy <email@example.com> Date: 2005年4月25日 17:59:53:JST Subject: Re: [9fans] ISP filtering - update Hi, Presotto wrote: I wrote: What I don't understand is why the worms don't trigger some harm at some point in the future, like setting the hard drive password to a random string. Requiring the `master' password from the drive manufacturer or OEM would cause enourmous amounts of hassle. The worm would have meanwhile re-produced elsewhere so its not `shooting itself in the head'. I didn't even realize that there were hardware enforced passwords on disks. I just looked up ata specs and found a whole slew of security cruft I never knew about. Thanks. c't have recently published an article covering the potential misuse of the ATA security functions so perhaps we'll start seeing some exploits of it now. http://www.heise.de/ct/english/05/08/172/ Cheers, Ralph.
From: firstname.lastname@example.org Subject: Re: [9fans] writing code Date: 2005年5月9日 1:15:25:JST To: email@example.com Reply-To: firstname.lastname@example.org Tim Newsham wrote: i think it's realistic. a boot cd would get you the same access. if you get physical machine access, you win. typing a password to authenticate to the local system gives you the feeling of security, not actual security. To prevent this you either need to prevent someone from booting (ie. bios password and hope they dont go through the trouble of yanking the drive or resetting the bios) or you need to protect the disk (after all thats probably what they want to get at after they log in, not network access or the gui). The ATA spec. has passwords that are stored in the hard drive unit. The password must be given before the drive will respond with anything useful. It isn't a BIOS password so moving the drive doesn't help. Forgetting the password is a pain; there's a `master' one known to the manufacturer but that just lets you re-format the drive if you can persuade them, e.g. Dell, to give it to you. Cheers, Ralph.