Difference between revisions of "BCM5719"
Jump to navigation
Jump to search
(Adding more resources from Guillaume Delugré's talks) |
(→Resources: match style of other presentation descriptions) |
||
Line 26: | Line 26: | ||
==Resources== | ==Resources== | ||
* [[:File:Bcm5719_talos.bin|Firmware image]] for recovery of bricked [[Talos_II|Talos™ II]] on-board NICs. Note that the two MAC addresses inside this image '''must''' be changed to match the MAC addresses on your particular [[Talos_II|Talos™ II]] system; failure to do so may violate law and could potentially cause serious network issues. | * [[:File:Bcm5719_talos.bin|Firmware image]] for recovery of bricked [[Talos_II|Talos™ II]] on-board NICs. Note that the two MAC addresses inside this image '''must''' be changed to match the MAC addresses on your particular [[Talos_II|Talos™ II]] system; failure to do so may violate law and could potentially cause serious network issues. | ||
− | * [https://static.raptorcs.com/TALOSII/contest_files/10-hack.lu-nicreverse_slides.pdf | + | * Reverse engineering work by Guillaume Delugré |
− | * [https://infocon.org/cons/Hack%20In%20The%20Box/HITB%202011%20-%20Malaysia/D2T3%20-%20Guillaume%20Delugre%20-%20Reverse%20Engineering%20Broadcom%20NetExtreme%20Firmware.pdf Slides from second presentation of Guillaume Delugré's talk at HITB Malaysia 2011] | + | ** [https://static.raptorcs.com/TALOSII/contest_files/10-hack.lu-nicreverse_slides.pdf Slides from initial presentation by Guillaume Delugré] at HACK.LU 2010 |
− | * [http://esec-lab.sogeti.com/static/publications/11-recon-nicreverse_slides.pdf Slides from followup presentation by Guillaume Delugré for Recon 2011] | + | ** [https://infocon.org/cons/Hack%20In%20The%20Box/HITB%202011%20-%20Malaysia/D2T3%20-%20Guillaume%20Delugre%20-%20Reverse%20Engineering%20Broadcom%20NetExtreme%20Firmware.pdf Slides from second presentation of Guillaume Delugré's talk at HITB Malaysia 2011] |
− | * [https://infocon.org/cons/REcon/REcon%202011/14_Guillaume_Delugre.mp4 Audio from Recon 2011 presentation (Video in file is broken)] | + | ** [http://esec-lab.sogeti.com/static/publications/11-recon-nicreverse_slides.pdf Slides from followup presentation by Guillaume Delugré for Recon 2011] |
+ | ** [https://infocon.org/cons/REcon/REcon%202011/14_Guillaume_Delugre.mp4 Audio from Recon 2011 presentation (Video in file is broken)] | ||
==References== | ==References== |
Revision as of 16:47, 22 December 2017
Contents
Overview
The BCM5719 is the NIC integrated into the Talos™ II systems. It is based on the wildly popular NetXtreme architecture, and there have been efforts to document the internal operation of devices based on that architecture.
As the BCM5719 is the only on-board device on the non-SAS Talos™ II variants to use proprietary firmware, Raptor Computing Systems has started a contest to see who can create a truly libre replacement firmware[1]. Anyone with the appropriate skill set is encouraged to take up the challenge, and contributions to this page as the device is analyzed in detail are welcomed.
Details
On board EEPROM layout (note: may change as understanding of EEPROM file system evolves)
Offset | Length | Data | CRC Protected |
---|---|---|---|
0x7e | 6 | MAC Address (port 0) | NO |
0xce | 6 | MAC Address (port 1) | NO |
Resources
- Firmware image for recovery of bricked Talos™ II on-board NICs. Note that the two MAC addresses inside this image must be changed to match the MAC addresses on your particular Talos™ II system; failure to do so may violate law and could potentially cause serious network issues.
- Reverse engineering work by Guillaume Delugré