Patch for Linux 2.2.2 to Disable PIII PSN 87
An anonymous reader wrote in to say that Phil Karn has posted a
patch to Linux 2.2.2 that will disable the
PSN. He says
"I'm hoping that this patch (or equivalent) will soon make it into the standard Linux kernel so as to dissuade any
application vendors who might be tempted to use the serial number misfeature."
Fools (Score:1)
I think that maybe having a top-notch UNIX (linux/freebsd) is great, but without a cpuid I think that many top-notch 3D, CAD, and hardware-simulation companies will be unwilling to port to Intel.
Therefore, I say that having a cpuid is a good thing. Not good for the things Intel Marketing is wanting it to be used for (web/portal/sales stuff) but I think that it is good for companies that want to protect their software.
You are a fool? continued (Score:1)
Linux is developed for people to run Linux. Right. Need I remind you that Linux is just a kernel? what I choose to run under my kernel is entirely up to me. And being able to have a nifty kernel under my $10k piece of software. And I really laugh at your ``greedy software company.'' You must be one of those people that think that if a software company is charging $10k for a product that they don't need the extra 10 licenses that you and your friends would use. So you pirate it.
Why has slashdot turned into a WaReZ kiddie hangout? Oh, I pine for the days in which slashdot folk talked about interesting things like pipelined cache access and number theory. Now it's John Katz writing silly articles, people flaming him for it, and stupid people complaining about how the big bad software company that makes specialized software and spends millions in research won't give them a copy for free. GROW UP! If I spend three million on research on hardware synthesis tools and then have five companies that are interested in the product, you can be darn sure that I'm not going to release it under an open source license, and you can be darn sure that I am not going to want people pirating it and stealing money from me.
I hardly think that Linux is on the path for World Enlightenment. I think you're probably a tad delusional if you think that. It's currently one of the least-sucky OS's I've used. I currently use it on all my computers (except my NeXTStation) exclusively. But I think it's a good, inexpensive easy-to-use operating system. Not anything remotely relating to anything important, like God.
But, yes, I think that more companies would port to Linux. And if you're using high-priced tools, You're going to get inferior forms of host identification, like dongles (requires user level access to parallel port), MAC addresses (what if you're not using ethernet?), or disk info (which may need user level access to hardware -- a *really* bad thing).
So, I still say that the cpuid is a good thing for anti-piracy. I don't know if it's a real privacy concern, and I certainly think that if you only use software which you have the source to you can darn well compile out the necessity of having the cpuid even read.
It all makes no sense, I change my cpu montly (Score:1)
Not realistcally possible (Score:1)
So this is foolproof? (Score:1)
not to mention... (Score:1)
Permanent disable? feh. (Score:1)
CPUID not needed... (Score:1)
The disturbing thing about Intel's CPUID is the way they expect it to be used. If Visa (for example) distributes electronic wallet software that requires the CPUID to function, and then makes it a requirement for all on-line Visa purchaces, what are you going to do? You can protest, but the clueless masses won't care. You'll either lose the ability to shop on-line or be forced to make your CPUID available.
Sigh (Score:1)
Sigh (Score:1)
This is not hopeless (Score:1)
All the patch does is, at bootup, send the CPU the instruction to turn the PSN off. I'm guessing that intercepting the CPU ID instruction would be a little harder. Note that I know very little about the structure of the x86 architecture. The lowest I can go is C.
Someone mentioned above that the CPU ID can be turned back on without rebooting. Is this true? The patch seems to rely on the fact that this bug^H^H^Hfeature can only be altered at boot time.
--Phil (One of these days, I'll get around to learning x86 assembly.)
A possability (Score:1)
Trapping an unprivileged instruction isn't possable. The CPU won't generate a fault.
The best possability would be a program that scans the machine code starting from the entry point, and recurses through the branches until it finds the offending instruction. Now, patch in a subroutine call that provides a selected number rather than the real one. If necessary, overwrite several instructions and carry them out in the patch. The patch routine is just crammed onto the end of the code section.
That'd be a real pain to write, but should work. Perhaps some of the game unprotect writers from the 80s should come out of retirement?
NOT "A possability" [sic] (Score:1)
If it can run the program, it can parse it.
A better idea, IMO (Score:1)
Sigh (Score:1)
1. Never run untrusted programs as root. PGP signatures and the like are there for a reason. If you're habitually downloading and running stuff as root without any clear idea where the program came from or who wrote it, you're just asking for trouble.
2. Any program that is discovered to exhibit this sort of behavior will be treated like any other trojan horse. The application will be reported to the various security lists and it will be removed from download.
It seems like everyone is pointing out these "new" threats about how people can write malicious programs to retrieve your CPU ID, but really folks, this is nothing more than a trojan. One could just as easily write in a little bit of code that retrieves your e-mail address, passwords, etc. and mails them to a collection address. The threat of having a CPU ID is negligible when compared to this.
Trust me, if you end up running trojaned software, the CPU ID will NOT be a primary target. Think about it, folks.
A better idea, IMO (Score:1)
The CPU ID's could actually serve a useful purpose in a NOC or privileged network where each and every machine needs to be accounted for and identified. Since Linux is popular in these settings, it only makes sense to have the ID available for use.
Funny... (Score:1)
Good work.
--
Something that would be interesting..... (Score:1)
"Gee, Boss, this guy with s/n 1234567890 sure seems to be hitting our site pretty heavy!"
Fascinating... (Score:1)
--
Aaron Gaudio
"The fool finds ignorance all around him.
Alan who? (Score:1)
This is funny (Score:1)
Another approach (Score:1)
You see, you know your serial number and can thus make the kernel or any other deamon cactch that number and replace it with some other number or a blank.
Monchi
ps my spam email adress is just a mailbox which is scanned for usefull messages and dumped.
Hmm (Score:1)
Ha! (Score:1)
Is this hopeless? (Score:1)
Danm, I just love this community. (Score:1)
--
Sigh (Score:1)
Anyhow, if you install to a root like
Installing software in superuser-owned places is a superuser thing, that's just all there is to it.
This is not hopeless (Score:1)
A: go read www.bigbrotherinside.com (Score:1)
Read OLD posts. Hurray for Intel supporting OSS!!! (Score:1)
Lovely...
Intel has unintentionally screwed all M$ users. Beautyful...
I am using AMD anyway
RING 0 instruction, sorry... (Score:1)
caller ID (Score:1)
and NIC numbers can be changed (at least with some cards)
Fools (Score:1)
People are replacing the CPU in their computer all
the time these days. Even I have (I actually forgot that for a moment..),
and I'm no "upgrade at all costs" guy.
Can you imagine the hassle to get all your CPU-tied license
servers for all your "top-notch 3D, CAD, and hardware-
simulation" tools working again after a CPU change?
TA
Optional (Score:1)
Something that would be interesting..... (Score:1)
Not realistcally possible (Score:1)
This is a new processor instruction, right? Let's say I have an application that calls this instruction, and I try to run it on a PII or something; it will generate an illegal instruction fault, right?
If so, then the kernel's handler could spoof the instruction instead of killing the application with SIGILL.
So it seems to me that a PIII spoofer would be possible on an older Pentium system.
Maybe I'm way out in left field, though...
Why is this a big deal (Score:1)
ethernet card has a unique id. Why is a CPU
id worse than that? Is two unique ids per
computer worse than one? Could someone please
explain this to me.
How do SPARC serial numbers really work? (Score:1)
I can see how this would be a pain in the ass if you wanted to upgrade near the end of the year from a 450Mhz P3 to a 550Mhz P3. You'll have to reinstall all of the software that is dependant on that ID, or at least reregister the software.
If Intel is trying to accomplish what Sun did with their ID numbers, they ought to rethink where the ID comes from on the computer. They could stick the ID number in the motherboard chipset, or in the BIOS.
I don't care much about all of this, though. I'm an AMD user.
SaDan
stick it in the kernel (Score:1)
Something that would be interesting..... (Score:1)
More ideas on spoofing:
1) all use the same PSN as a protest.
2) use PSN's of machines at Intel.
3) echo back the PSN from the requesting machine.
How is the serial number request negotiated? Is it encrypted?
-D
The real problem... (Score:1)
Thus the problem centers around how to get the kernel to trap this request and emulate, fake, or mangle it.
Does anyone know a work around?
here's some URL's that Phil Karn provides in his patch:
(AP-485) [intel.com], (AP-909) [intel.com], a href =
"http://www.amd.com/K6/k6docs/pdf/20734j.pdf"> AMD K6