diff --git a/docs/dasharo-tools-suite/documentation.md b/docs/dasharo-tools-suite/documentation.md index 5512288680..6e19c7dec0 100644 --- a/docs/dasharo-tools-suite/documentation.md +++ b/docs/dasharo-tools-suite/documentation.md @@ -17,7 +17,8 @@ that it boots on the following platforms: * NovaCustom NV4x ([test report](https://docs.google.com/spreadsheets/d/1LOXY9HCu-fMitkYwX08iLsQdSNenzyU0LnMdVbZB5Do/edit#gid=536764189&range=A161)), * NovaCustom NS5x/7x ([test - report](https://docs.google.com/spreadsheets/d/1LOXY9HCu-fMitkYwX08iLsQdSNenzyU0LnMdVbZB5Do/edit#gid=38447675&range=A174)). + report](https://docs.google.com/spreadsheets/d/1LOXY9HCu-fMitkYwX08iLsQdSNenzyU0LnMdVbZB5Do/edit#gid=38447675&range=A174)), +* PC Engines apu2/3/4/6. ## Running @@ -34,51 +35,6 @@ to use. This section describes how to boot DTS using iPXE. -#### Temporary Suspension of Network Booting for DTS - -We wish to inform you of an important security concern that has been identified -in the Dasharo Tools Suite (DTS). As detailed in [Issue -450](https://github.com/Dasharo/dasharo-issues/issues/450) on our GitHub -repository, it has come to our attention that the DTS is currently being -downloaded via HTTP when booting through iPXE. This method, unfortunately, -exposes users to potential man-in-the-middle attacks due to the lack of -encryption and security features inherent in HTTP. - -##### What This Means for You - -* The use of HTTP instead of HTTPS for downloading DTS poses a significant - security risk, potentially allowing unauthorized access or alteration of the - DTS during download. -* As a precaution, we strongly advise against using the network boot feature - for DTS until this issue is resolved. -* To perform firmware updates with DTS, we strongly recommend booting DTS from - an USB drive. This implies the flash locks have to be disabled manually via - Dasharo setup - see [Requirements](#requirements-1). [Firmware Update - Mode](../guides/firmware-update.md#firmware-update-mode) cannot be used for - that purpose due to the usage of network booted DTS in Firmware Update Mode - flow. -* Booting DTS over network via HTTPS can be safely used when running the - following releases: - - NovaCustom 12th Gen 1.7.2 and newer, - - NovaCustom 11th Gen 1.5.2 and newer, - - MSI PRO Z690-A 1.1.3 and newer, - - MSI PRO Z790-P 0.9.1 and newer. - -##### Our Immediate Actions - -* We are actively working on resolving this issue by implementing HTTPS for DTS - downloads. Our team is committed to ensuring the security and integrity of - our software. -* Until a fix is deployed, we recommend users to manually download the DTS - image and use alternative methods such as booting from a USB drive. - -##### Your Security is Our Priority - -* We understand the importance of security in your operations and apologize for - any inconvenience this may cause. -* We are dedicated to resolving this issue promptly and will provide updates as - soon as a solution is available. - #### Requirements Below are the requirements that must be met to run DTS over a network on the @@ -87,9 +43,9 @@ platform: * Dasharo device with DTS functionality integrated, * wired network connection, * [Secure Boot disabled](../dasharo-menu-docs/device-manager.md#secure-boot-configuration), -* disabled BIOS lock feature (if device is already flashed with Dasharo), -* disabled SMM BIOS write protection feature (if device is already flashed - with Dasharo). +* If device if flashed with Dasharo and support following functionality + + disabled BIOS lock feature, + + disabled SMM BIOS write protection feature. #### Launching DTS @@ -98,7 +54,22 @@ To access Dasharo Tools Suite: * attach a wired network cable to the device's Ethernet port, * power on the device, holding down the Boot Menu entry key, * in the Boot Menu, select the `iPXE Network Boot` option, -* in the Network Boot menu, select the `Dasharo Tools Suite` option, +* in the Network Boot menu, select the `Dasharo Tools Suite` option, or enter + iPXE shell and type by hand: + + ```bash + dhcp net0 + chain https://boot.dasharo.com/dts/dts.ipxe + ``` + + !!! warning + + Because of misconfigured iPXE on some firmware releases, booting over + HTTPS is impossible, and the above command will fail. In that case, we + recommend downloading the DTS image to USB. If you feel there is no + risk of an MITM attack, you can proceed with + `http://boot.dasharo.com/dts/dts.ipxe` at your own risk. + * the DTS menu will now appear. ### Bootable USB stick @@ -111,21 +82,22 @@ Below are the requirements that must be met to run DTS from a USB device on the platform: * USB stick (at least 2GB), -* wired network connection, -* [Secure Boot disabled](../dasharo-menu-docs/device-manager.md#secure-boot-configuration), -* disabled BIOS lock feature (if device is already flashed with Dasharo), -* latest image from [releases](https://github.com/Dasharo/meta-dts/releases) +* Latest image from [releases](https://github.com/Dasharo/meta-dts/releases) section. -* disabled SMM BIOS write protection feature (if device is already flashed with Dasharo). +* Wired network connection, +* [Secure Boot disabled](../dasharo-menu-docs/device-manager.md#secure-boot-configuration), +* If device if flashed with Dasharo and support following functionality + + disabled BIOS lock feature, + + disabled SMM BIOS write protection feature. #### Launching DTS To access Dasharo Tools Suite: * flash the downloaded image onto USB stick, - - you can use a cross-platform GUI installer - [Etcher](https://www.balena.io/etcher/) - - you can also use `dd` to flash from the command line + + you can use a cross-platform GUI installer - [Etcher](https://www.balena.io/etcher/) + + you can also use `dd` to flash from the command line ```bash gzip -cdk dts-base-image-v1.1.0.wic.gz | \ @@ -291,12 +263,12 @@ This section describes the functionality of the Dasharo Tools Suite. These are: * [Dasharo zero-touch initial deployment](#dasharo-zero-touch-initial-deployment), * [HCL Report](#hcl-report), * [Firmware update](#firmware-update), - - [Local firmware update](#local-firmware-update), + + [Local firmware update](#local-firmware-update), * [EC transition](#ec-transition), * [EC update](#ec-update), * [additional features](#additional-features), - - [run commands from iPXE shell automatically](#run-commands-from-ipxe-shell-automatically), - - [run DTS using VentoyOS](#run-dts-using-ventoyos). + + [run commands from iPXE shell automatically](#run-commands-from-ipxe-shell-automatically), + + [run DTS using VentoyOS](#run-dts-using-ventoyos). ### Dasharo zero-touch initial deployment @@ -401,12 +373,12 @@ Please consider the following options depending on your situation: hardware. * **NO (default)** - If you decide to not contribute, your situation depends on the boot method you used to execute DTS: - - **Network Boot** - please note that Dasharo booted over iPXE assumes no + + **Network Boot** - please note that Dasharo booted over iPXE assumes no storage available, so the report, and your BIOS backup are stored in temporary memory and will not be available after reboot. Please make sure to move HCL Report to not volatile storage. This can be done using option `9) Shell`, - - **USB Boot** - HCL Report and BIOS backup are saved to USB storage root + + **USB Boot** - HCL Report and BIOS backup are saved to USB storage root directory. ### Firmware update diff --git a/docs/variants/pc_engines/building-manual.md b/docs/variants/pc_engines/building-manual.md index 8ecee484ec..e10881f685 100644 --- a/docs/variants/pc_engines/building-manual.md +++ b/docs/variants/pc_engines/building-manual.md @@ -53,4 +53,9 @@ apu2/3/4/6 platform. === "(coreboot+SeaBIOS) firmware" - [Work in progress](https://github.com/Dasharo/dasharo-issues/milestone/28) + This release is built using the Dasharo Patchqueue Initiative, which is a proof + of concept of a new approach to Dasharo coreboot downstream maintenance. Please + follow the [dasharo-pq](https://github.com/Dasharo/dasharo-pq/) and + [pce-fw-builder](https://github.com/pcengines/pce-fw-builder) documentation to + build the release version of Dasharo (coreboot+SeaBIOS) for PC Engines + apu2/3/4/6. diff --git a/docs/variants/pc_engines/firmware-update.md b/docs/variants/pc_engines/firmware-update.md index d725a374bd..6905da94b9 100644 --- a/docs/variants/pc_engines/firmware-update.md +++ b/docs/variants/pc_engines/firmware-update.md @@ -1,9 +1,9 @@ # Firmware update The following documentation describes the process of Dasharo open-source -firmware update. If your device is currently flashed with the proprietary -firmware please refer to the [Initial deployment](initial-deployment.md) -documentation. +firmware update. If your device is currently flashed with the original PC +Engines firmware firmware please refer to the [Initial +deployment](initial-deployment.md) documentation. The update process may be different, depending on the currently installed Dasharo firmware version. @@ -31,12 +31,12 @@ protect pin jumper on J2 (apu2) or J3 (apu3/4/6). The settings of all the above options can be restored after a firmware update. -=== "(coreboot+SeaBIOS) firmware" + ## Updating Dasharo - No additional steps required. + ```bash + flashrom -p internal -w pcengines_apu_v.rom --fmap -i WP_RO -i RW_SECTION_A + ``` -## Updating Dasharo +=== "(coreboot+SeaBIOS) firmware" -```bash -flashrom -p internal -w pcengines_apu_v.rom --fmap -i WP_RO -i RW_SECTION_A -``` + 1. Power on the device. diff --git a/docs/variants/pc_engines/initial-deployment.md b/docs/variants/pc_engines/initial-deployment.md index 9deda94538..7f370812cb 100644 --- a/docs/variants/pc_engines/initial-deployment.md +++ b/docs/variants/pc_engines/initial-deployment.md @@ -1,10 +1,10 @@ # Initial deployment -This document describes the process of updating -[PC Engines coreboot firmware](https://pcengines.github.io/) to Dasharo firmware -based on EDK II. +This document describes the process of updating [PC Engines coreboot +firmware](https://pcengines.github.io/) to Dasharo firmware based on EDK II +(aka Dasharo (coreboot+UEFI)) or Dasharo (coreboot+SeaBIOS). -## OS compatibility +## OS compatibility for Dasharo (coreboot+UEFI) Switching from BIOS to UEFI-based firmware might cause compatibility issues if you already had an operating system installed on your platform. Some OSs can @@ -38,7 +38,7 @@ seamlessly. - Select `Install Dasharo firmware` to check for updates - When asked to select your firmware branch, select DES -When the deployment is finished, your apu will reboot into Dasharo +When the deployment is finished, your device will reboot into Dasharo automatically. The demo below shows the process of deploying Dasharo using DTS. diff --git a/docs/variants/pc_engines/overview.md b/docs/variants/pc_engines/overview.md index 7da6042be4..7832cbfc22 100644 --- a/docs/variants/pc_engines/overview.md +++ b/docs/variants/pc_engines/overview.md @@ -26,16 +26,22 @@ topics regarding apu platforms. ## Status -In 2016 PC Engines contracted 3mdeb to take over the maintenance of open-source -firmware for PC Engines products. Development happened in [PC Engines Github -organization](https://github.com/pcengines) until September 2022, when PC -Engines decided to discontinue its sponsorship for open-source firmware. -Dasharo Team working on creating a sustainable path forward for PC Engines' -open-source firmware through a subscription and donation model. For more -details please check [Post EOL firmware +In 2016, PC Engines contracted 3mdeb to take over the maintenance of +open-source firmware for PC Engines products. Development happened in [PC +Engines Github organization](https://github.com/pcengines) until September +2022, when PC Engines decided to discontinue its sponsorship for open-source +firmware. Dasharo Team is working on creating a sustainable path forward for PC +Engines.' open-source firmware through a subscription and donation model. For +more details, please check [Post EOL firmware announcement](post-eol-fw-announcement.md), contact us [directly](mailto:contact@dasharo.com) or through [community -chat](https://matrix.to/#/#dasharo:matrix.org). +chat](https://matrix.to/#/#dasharo:matrix.org). In 2024, the 3mdeb Dasharo Team +was able to bring back PC Engines firmware in the form of Dasharo +Pro/Enterprise Package (formerly known as Dasharo Entry Subscription) in two +flavors [Dasharo +(coreboot+SeaBIOS)](https://shop.3mdeb.com/shop/dasharo-entry-subscription/1-year-dasharo-entry-subscription-for-network-appliance-corebootseabios/) +and [Dasharo +(coreboot+UEFI)](https://shop.3mdeb.com/shop/dasharo-entry-subscription/1-year-dasharo-entry-subscription-for-network-appliance/). ## References diff --git a/docs/variants/pc_engines/releases_seabios.md b/docs/variants/pc_engines/releases_seabios.md index 7d454832fe..4dc5d41944 100644 --- a/docs/variants/pc_engines/releases_seabios.md +++ b/docs/variants/pc_engines/releases_seabios.md @@ -7,15 +7,13 @@ For details about our release process please read [Dasharo Standard Release Process](../../dev-proc/standard-release-process.md).
-[Subscribe to Dasharo Entry Subscription for Network Appliance Legacy Newsletter] +[Subscribe to Dasharo for PC Engines Release Notification Newsletter] [newsletter]{.md-button .md-button--primary .center}
- +[here](https://docs.google.com/spreadsheets/d/1_uRhVo9eYeZONnelymonYp444zYHT_Q_qmJEJ8_XqJc/edit?usp=sharing). COMING SOON -[newsletter]: https://newsletter.3mdeb.com/subscription/1Qv9VNbo7 +[newsletter]: https://newsletter.3mdeb.com/subscription/ReBpt3IZY diff --git a/docs/variants/pc_engines/releases_uefi.md b/docs/variants/pc_engines/releases_uefi.md index 0c8bca309e..64059f677a 100644 --- a/docs/variants/pc_engines/releases_uefi.md +++ b/docs/variants/pc_engines/releases_uefi.md @@ -7,7 +7,7 @@ For details about our release process please read [Dasharo Standard Release Process](../../dev-proc/standard-release-process.md).
-[Subscribe to Dasharo Entry Subscription for Network Appliance Newsletter] +[Subscribe to Dasharo for PC Engines Release Notification Newsletter] [newsletter]{.md-button .md-button--primary .center}
@@ -95,7 +95,7 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/da - [AMD System Management Unit - Software Configuration Settings binary based on 1433 revision a8db7dfe](https://github.com/coreboot/blobs/tree/a8db7dfe/southbridge/amd/avalon/PSP/SmuScs.bin) - [AMD Hudson xHCI firmware based on 1.1.0.0068 revision a8db7dfe](https://github.com/coreboot/blobs/tree/a8db7dfe/southbridge/amd/avalon/xhci.bin) -[newsletter]: https://newsletter.3mdeb.com/subscription/78gF-_gm1 +[newsletter]: https://newsletter.3mdeb.com/subscription/ReBpt3IZY [pcengines_apu2_v0.9.0.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/pcengines_apu2/v0.9.0/pcengines_apu2_v0.9.0.rom.sha256 [pcengines_apu2_v0.9.0.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/pcengines_apu2/v0.9.0/pcengines_apu2_v0.9.0.rom.sha256.sig [pcengines_apu2_v0.9.0_dev_signed.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/pcengines_apu2/v0.9.0/pcengines_apu2_v0.9.0_dev_signed.rom.sha256