Date: Wed, 13 Oct 1999 13:18:31 -0700 From: Mike Smith <mike@smith.net.au> To: jkruger@oskar.nanoteq.co.za Cc: freebsd-hackers@freebsd.org Subject: Re: Generating interrupts ? Message-ID: <199910132018.NAA00823@dingo.cdrom.com> In-Reply-To: Your message of "Wed, 13 Oct 1999 16:55:17 %2B0200." <38049D55.FF4E2812@oskar.nanoteq.co.za>
next in thread | previous in thread | raw e-mail | index | archive | help
> Your close. > I actually made a bootable CD which installs a modified version of FreeBSD, with > our product running on on top of it. The CD automatically boots up, installs > everything, configures everything and then it asks you for a password. At this > stage it gathered information of the particular system. > It uses this information and a private key to encrypt the root password and then > generates a signiture. The customer phones / mail us with this signiture, we > decrypt it using our public key. Now we generate the required key which they > have to enter for the installation to complete. > > In this signiture we got from them we have the followinf info : > --> Motherboard used > --> Bios Revision > --> Root password > --> admin password > --> other info like disk sizes etc. "gross" > So can you pleasssseee now tel me how to get this info ? > --> Motherboard used > --> Bios Revision See sys/i386/bios.c for how to make BIOS calls out of the kernel. But note that obtaining this information in the kernel is too late. See sys/boot/i386/libi386/biosdisk.c for how to call the BIOS in the loader, where you have a chance to obtain this information and use it to decrypt your kernel. -- \\ Give a man a fish, and you feed him for a day. \\ Mike Smith \\ Tell him he should learn how to fish himself, \\ msmith@freebsd.org \\ and he'll hate you for a lifetime. \\ msmith@cdrom.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199910132018.NAA00823>