37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware
- Title:
- 37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware
- Description:
-
more » « less
https://media.ccc.de/v/37c3-11781-adventures_in_reverse_engineering_broadcom_nic_firmware
Unlocking a system with 100% open source firmware
In an era where vendors increasingly seek to use proprietary software in the devices around us to exert control over their users, the desire for open source software has expanded to the firmware that allows our machines to function, and platforms which individuals can trust and control have never been more important. However, changes to hardware platforms in recent years such as the Intel ME, vendor-supplied binary blobs and vendor-signed firmware images have repeatedly set back efforts to create open source firmware for the computers we use. The release of Power servers with 99% open source firmware excited many who had been searching for a computer they could trust, but one proprietary firmware blob remained: that of the Ethernet controller. This is the story of how that blob was reverse engineered and replaced with an open source replacement, delivering the first machine with desktop-class performance and 100% open source firmware in many years.
This talk is about how I reverse engineered the final remaining firmware blob on the Talos II/Blackbird POWER9 systems, enabling it to be replaced with an open source replacement, in an intensive reverse engineering effort that spanned several years.
The talk will begin by introducing the open source firmware movement and its practical and ethical motivations, and note the obstacles to delivering fully open source firmware for contemporary x86 and other platforms and explaining the motive behind the project, before moving onto a more technical discussion of the adventure of firmware reverse engineering and the obstacles encountered.
Subjects I intend to cover include: how the original proprietary firmware was reverse engineered from scratch with only limited knowledge of device internals; the long history of Broadcom NIC architecture and its evolution over time; the tools that had to be developed to enable the device probing, testing and reversing process; the story of a horrifying but necessary detour into reversing x86 real mode code and the novel methodology used to aid reversing; how modern NICs allow BMCs in servers to share network ports with the host, and the security hazards this creates; and how fully open source firmware was created legally using a clean room process.
This talk will be accessible to audiences unfamiliar with POWER9 or the open source firmware community, but is also intended to cover some new ground and be of interest to those familiar with the project. The talk will mainly be of interest to those interested in open source firmware and issues such as owner control and the security and auditability issues caused by proprietary firmware, and to those interested in reverse engineering.
Hugo Landau
https://events.ccc.de/congress/2023/hub/event/adventures_in_reverse_engineering_broadcom_nic_firmware/
#37c3 #HardwareMaking
- Video Language:
- English
- Duration:
- 01:00:03
C3Subtitles edited English subtitles for 37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware | ||
C3Subtitles added new URL for 37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware | ||
C3Subtitles added new URL for 37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware | ||
C3Subtitles changed primary url from http://www.youtube.com/watch?v=d_PJC7oo_iw to http://www.youtube.com/watch?v=d_PJC7oo_iw | ||
C3Subtitles added a video: 37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware |