> From David.Chieu at sun.com Thu Dec  6 14:54:30 2007
> Date: Thu, 06 Dec 2007 14:54:44 -0800
> From: David Chieu <David.Chieu at sun.com>
> Subject: Re: PSARC 2007/601 FastTrack timeout 12/05/2007 - "spec.txt" added to
>  the materials directory
> To: Gary Winiger <gww at eng.sun.com>
> Cc: psarc-ext at sun.com, intel-amt-iteam at sun.com
> Content-transfer-encoding: 7BIT
> X-PMX-Version: 5.2.0.264296
> User-Agent: Thunderbird 2.0.0.6 (X11/20070924)
> 
> Gary Winiger wrote:
> > ...
> >     Team, thanks for the excellent update.  Still a few open questions:
> >
> >     * Other than the IOCTL, I've missed seeing interface taxonomies.
> >     * I've also missed seeing the release binding.
> >     * What's the set of exported interface?
> >   
> The interface taxonomy for the IOCTLs is "project private", release 
> binding: micro/patch.
> Other than that there's no other exported interface. The users are 
> directly talking
> to the firmware which is AMT's real interface-provider. This project 
> only provides
> an HTTP(s) service on TCP port 16992/16993 to relay the messages to/from 
> the firmware.
> >     * 5.6-5.8 seem incomplete to me.  What privileges?  What Rights
> >       Profiles, and why?  Perhaps more explicitly, what's the
> >       method_context of svc:/network/lms and how does this proposed
> >       service comply to the SMF policy:
> >       http://opensolaris.org/os/community/arc/policies/SMF-policy/
> >       (which unfortunately is 2 revs behind the internal
> >       http://sac.eng/cgi-bin/bp.cgi?NAME=SMF.bp)
> >       Yes I'm sending John email once again ;-{
> >   
> The method_context section of LMS includes a limited set of privileges:
> basic,sys_net_config,net_rawaccess
> This is to grant LMS the rights to open /dev/heci and send IOCTLs.
> 
> A new authorization "solaris.smf.manage.lms" will be defined and listed 
> under the
> "Network Management" profile in /etc/security/prof_attr. Using RBAC, 
> Only users with the
> "solaris.smf.manage.lms" authorization can enable/disable the LMS service.
> >     * 6.15 " is there any way for other software in the system ...
> >       that a given network interface is running AMT?"
> >       Answer:  "It *should* be possible ..."
> >       will this be done?
> >   
> Lacking hardware related information from Intel, this will not be done 
> in phase I. However, it's added to the plan for Phase II. Good catch.
> >     * 7 "? Remotely Protect Computing Assets : Through Out of Band
> >       communication, each system's software version numbers are checked
> >       and, if necessary, system software and virus protection are
> >       remotely updated with the most recent patches and virus definitions.
> >       Viruses and worms can also be contained at their source, if needed,
> >       by means of built-in circuit-breaker functionality.
> >
> >       "Intel AMT infrastructure supports the creation of setup and
> >       configuration interfaces for management applications, as well
> >       as network, security, and storage administration."
> >
> >       What does this mean relative to this project?  How are Solaris
> >       veriion numbers (service tags ;-) being checked?  How is Solaris
> >       system software and virus protection being remotely updated
> >       with the most recent patches and virus definitions?
> >
> > Gary..
> >   
> This project currently does not deliver these features for phase I. But 
> after the integration of
> this project will work with ISVs (i.e. anti-virus vendors, etc.) to add 
> the above mentioned feature.
> The implementation detail is TDB. However, we realize/document the 
> following AMT capabilities
> e.g.
> Remote software version checking/updating can be done by the using the 
> EEPROM
> named 3PDS (3rd Party Data Storage), and share it with remote management 
> console.
> See 6.18 about StorageRealm.
> 
> -- The Solaris AMT team
> 
!v

Reply via email to