CN109472131A - A kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification - Google Patents

A kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification Download PDF

Info

Publication number
CN109472131A
CN109472131A CN201811330476.6A CN201811330476A CN109472131A CN 109472131 A CN109472131 A CN 109472131A CN 201811330476 A CN201811330476 A CN 201811330476A CN 109472131 A CN109472131 A CN 109472131A
Authority
CN
China
Prior art keywords
capsule
firmware
bmc
uefi
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811330476.6A
Other languages
Chinese (zh)
Inventor
于晓艳
仇誉博
田梦哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan Inspur Hi Tech Investment and Development Co Ltd
Original Assignee
Jinan Inspur Hi Tech Investment and Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan Inspur Hi Tech Investment and Development Co Ltd filed Critical Jinan Inspur Hi Tech Investment and Development Co Ltd
Priority to CN201811330476.6A priority Critical patent/CN109472131A/en
Publication of CN109472131A publication Critical patent/CN109472131A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention provides a kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification, belong to computer system firmware security technology area, the present invention is according to Capsule protocol encapsulation more new data, pass through the remote-control mode of BMC platform, the management control of specified module and entirety is carried out to client UEFI firmware, increase safety certification process simultaneously, reinforces firmware safety, improve the maintainability of fixer system.

Description

Capsule type UEFI firmware remote control method based on BMC with security authentication
Technical Field
The invention relates to a computer system firmware security technology, in particular to a capsule type UEFI firmware remote control method based on BMC (baseboard management controller) with security authentication.
Background
The UEFI unified extensible firmware interface is a set of definitions of interfaces and data structures between platform firmware and an operating system. UEFI BIOS is rapidly developed and more popular in application, and the maintainability and safety requirements of UEFI BIOS are higher and higher.
The UEFI starting process includes several stages, such as SEC (security sets the CPU protection mode), PEI (PEI initialization before EFI), DXE (execution driver, Device handle installation, protocol installation), BDS (boot Device selection), TSL (temporary system load), RT (run time), and the like. The UEFI program is classified into kernel, driver, and application 3 classes. The UEFI kernel provides services including memory management, event management, task priority management, handle management and the like, and drives to realize access and management of hardware resources and support drive development and expansion of new equipment. The application program provides services of firmware function extension, customization, value increment and the like.
Capsule is a specification defined by UEFI for data transfer between an operating system and a firmware system. PPI is an interface defined by UEFI for transferring functions and data between PEI phase modules (PEIM).
The customer needs specific function customization to UEFI BIOS, and needs not to carry out whole firmware update to the firmware system repair of the fixed module, etc. and reduces the risk brought by the update process. Or the mass client server platforms need to be maintained in a unified way, and manufacturers can perform ready-made upgrading and respective maintenance in the modes of hardware refreshing, storage media and the like, which obviously brings inconvenience for management. Moreover, in the firmware maintenance process, if there is no necessary security measure, malicious attack is suffered, which will bring serious consequences.
Disclosure of Invention
In order to solve the technical problems, the invention provides a capsule-type UEFI firmware remote control method based on BMC (baseboard management controller) with security authentication, which is used for centrally updating and managing the firmware of a large-scale client in a remote management mode, managing and maintaining a fixed module and ensuring the security of firmware maintenance.
The technical scheme adopted by the invention is as follows:
the invention relates to a BMC (baseboard management controller) based Capsule UEFI (unified extensible firmware interface) firmware remote control method with security authentication.
Further, the UEFI BIOS data needing to be changed are packaged into a data packet according to a Capsule (Capsule) protocol, communication is established with the UEFI BIOS platform through a BMC (baseboard management controller) remote management platform resident in the server, and after the BMC security authentication is passed, the data packet is sent to a firmware system of the client server platform. And identifying and analyzing the Capsule data packet and encapsulating the Capsule data packet into a PEI service, after the validity verification is passed, performing drive allocation loading at a DXE stage of UEFI, updating and writing the firmware, and modifying to complete system restart.
The capsule mode is adopted to facilitate the customized updating of the firmware product, selectively update the firmware system file or module, pertinently solve the computer fault, perform the firmware function expansion and the like; meanwhile, the BMC remote management control method reduces the dependence on firmware refreshing tools, facilitates the remote centralized management of mass customers and increases the maintainability of a computer; and a safety authentication process is added, so that malicious tampering is avoided, and the safety of the firmware system is ensured.
The specific operation steps are as follows:
1) firstly, packaging the specified modules needing to be changed into a Capsule data packet according to a Capsule specification.
The Capsule data packet consists of a header structure and a volume.
Wherein,
the Capsule eImageSize in the Capsule header structure indicates the file size, the OffsetToCapsuleBody indicates the position of the Capsule in the firmware volume, and the instanceId indicates the partition identifier of the Capsule.
The Capsule volume structure is the same as the standard firmware volume file structure.
2) And sending the Capsule data packet to a BMC remote management platform resident in the server.
3) And the BMC platform carries out safety certification, stops firmware maintenance if the certification is not passed, and continues to carry out the next operation if the certification is passed.
4) And the BMC remote management platform reads the IP from the IP list of the server BMC and establishes communication with the UEFI BIOS platform.
5) And sending the Capsule data packet to a firmware system of the client server platform according to the network protocol.
6) UEFI firmware starts, and PPI identifies and parses the Capsule data packet to be re-encapsulated into PEI service at the PEI stage of the firmware.
7) And the firmware continues to run to a DXE stage, acquires the Capsule information from the HOB linked list, extracts the size of the data packet and the position of the firmware volume, performs validity check judgment, exits firmware writing if invalid, calls a drive allocation loading service Dispatch at the stage if valid, and searches and executes UEFI firmware writing maintenance according to a specified sequence.
8) And restarting the system after the writing is executed.
The invention has the advantages that
The capsule mode is convenient for customizing and updating the firmware product, selectively updating a firmware system file or module, pertinently solving computer faults, expanding firmware functions and the like; meanwhile, the BMC remote management control method reduces the dependence on firmware refreshing tools, facilitates the remote centralized management of mass customers and increases the maintainability of a computer; and a safety authentication process is added, so that malicious tampering is avoided, and the safety of the firmware system is ensured.
The method can be applied to centralized management and customized updating and maintenance of firmware of a plurality of servers, is convenient for remote management and maintenance, and simultaneously ensures the safety.
Drawings
FIG. 1 is a flow diagram of a firmware maintenance phase of the present invention.
FIG. 2 is a block diagram of a firmware remote maintenance flow of the present invention.
Detailed Description
The invention is explained in more detail below:
the capsule UEFI firmware remote control method based on BMC with security authentication maintains UEFI firmware, is packaged according to capsule rules, and has remote management and security authentication functions.
And encapsulating a data packet according to a Capsule (Capsule) protocol for UEFI BIOS data needing to be changed, establishing communication with the UEFI BIOS platform through a BMC (baseboard management controller) remote management platform resident in a server, and sending the data packet to a firmware system of a client server platform after the BMC security authentication is passed. And identifying and analyzing the Capsule data packet and encapsulating the Capsule data packet into a PEI service, after the validity verification is passed, performing drive allocation loading at a DXE stage of UEFI, updating and writing the firmware, and modifying to complete system restart.
The specific operation steps are as follows:
1) firstly, packaging the specified modules needing to be changed into a Capsule data packet according to a Capsule specification. The Capsule packet consists of a header structure and a volume. Wherein the Capsule eImageSize in the Capsule header structure represents the file size, the OffsetToCapsuleBody represents the position of the Capsule in the firmware volume, and the instanceId represents the partition identifier of the Capsule. The Capsule volume structure is the same as the standard firmware volume file structure.
2) And sending the Capsule data packet to a BMC platform on the remote management server.
3) And the BMC platform carries out safety certification, stops firmware maintenance if the certification is not passed, and continues to carry out the next operation if the certification is passed.
4) And the BMC remote management platform reads the IP from the IP list of the server BMC and establishes communication with the UEFI BIOS platform.
5) And sending the Capsule data packet to a firmware system of the client server platform according to the network protocol.
6) UEFI firmware starts, and PPI identifies and parses the Capsule data packet to be re-encapsulated into PEI service at the PEI stage of the firmware.
7) And the firmware continues to run to a DXE stage, acquiring the Capsule information from the HOB linked list, extracting the size of the data packet and the position of the firmware volume, carrying out validity check judgment, exiting firmware writing if invalid, calling a drive allocation loading service Dispatch at the stage if valid, searching UEFI USB drive module addresses according to a specified sequence, and executing UEFI firmware writing.
8) And restarting the system after the writing is executed.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. A Capsule UEFI firmware remote control method based on BMC with security authentication is characterized in that updating data is packaged according to a Capsule Capsule protocol, management control of a designated module and the whole is performed on UEFI firmware of a client through a remote control mode of a BMC platform, and meanwhile, a security authentication process is added.
2. The method of claim 1,
further comprising the steps of (a) further comprising,
and encapsulating the UEFI BIOS data needing to be changed according to a Capsule protocol, establishing communication with the UEFI BIOS platform through a BMC remote management platform resident in the server, and sending the data packet to a firmware system of the client server platform after the BMC security authentication is passed.
3. The method of claim 2,
further comprising the steps of (a) further comprising,
and identifying and analyzing the Capsule data packet and encapsulating the Capsule data packet into a PEI service, after the validity verification is passed, performing drive allocation loading at a DXE stage of UEFI, updating and writing the firmware, and modifying to complete system restart.
4. The method of claim 3,
the method further comprises the following specific operation steps:
1) firstly, packaging a specified module to be changed into a Capsule data packet according to a Capsule specification;
2) sending the Capsule data packet to a BMC remote management platform of a resident server;
3) the BMC platform carries out safety certification, if the certification is not passed, the firmware maintenance is stopped, and if the certification is passed, the next operation is continued;
4) the BMC remote management platform reads an IP from an IP list of the server BMC and establishes communication with the UEFI BIOS platform;
5) the Capsule data packet is sent to a firmware system of the client server platform according to a network protocol;
6) UEFI firmware is started, and PPI identifies and analyzes the Capsule data packet at the PEI stage of the firmware and encapsulates the Capsule data packet into PEI service again;
7) the firmware continues to run to a DXE stage, the information of the Capsule is obtained from the HOB linked list, the size of the data packet and the position of the firmware volume are extracted, and validity check judgment is carried out;
8) and restarting the system after the writing is executed.
5. The method of claim 4,
further comprising, in step 1), the Capsule packet is composed of a header structure and a volume.
6. The method of claim 5,
further included is the method, wherein the capsuleImageSize in the Capsule header structure indicates the file size, the OffsetToCapsuleBody indicates the location of the Capsule in the firmware volume, and the InstanceId indicates the partition identifier of the Capsule.
7. The method of claim 6,
further comprising, the Capsule volume structure is the same as the standard firmware volume file structure.
8. The method of claim 4,
further comprising, in step 7), performing validity check judgment, that is, if invalid, exiting firmware writing, and if valid, invoking the driver allocation load service Dispatch at this stage, and performing UEFI firmware writing maintenance according to a specified sequence.
CN201811330476.6A 2018-11-09 2018-11-09 A kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification Pending CN109472131A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811330476.6A CN109472131A (en) 2018-11-09 2018-11-09 A kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811330476.6A CN109472131A (en) 2018-11-09 2018-11-09 A kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification

Publications (1)

Publication Number Publication Date
CN109472131A true CN109472131A (en) 2019-03-15

Family

ID=65672439

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811330476.6A Pending CN109472131A (en) 2018-11-09 2018-11-09 A kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification

Country Status (1)

Country Link
CN (1) CN109472131A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175057A (en) * 2019-05-31 2019-08-27 联想(北京)有限公司 A kind of data processing method, electronic equipment and server
US11789821B1 (en) 2022-04-29 2023-10-17 Microsoft Technology Licensing, Llc Out-of-band method to change boot firmware configuration

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936840A (en) * 2005-09-23 2007-03-28 联想(北京)有限公司 Computer system not relying on operation system renewing software data and method
CN102541606A (en) * 2011-12-31 2012-07-04 曙光信息产业股份有限公司 Method and device for remote management of BIOS (basic input/output system) configuration based on UEFI (unified extensible firmware interface
CN103207797A (en) * 2013-03-15 2013-07-17 南京工业大学 Capsule type customized updating method based on universal extensible firmware interface firmware system
CN108710804A (en) * 2018-05-19 2018-10-26 济南浪潮高新科技投资发展有限公司 A kind of band hardware encryption Rapid Updating of computer UEFI firmwares

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936840A (en) * 2005-09-23 2007-03-28 联想(北京)有限公司 Computer system not relying on operation system renewing software data and method
CN102541606A (en) * 2011-12-31 2012-07-04 曙光信息产业股份有限公司 Method and device for remote management of BIOS (basic input/output system) configuration based on UEFI (unified extensible firmware interface
CN103207797A (en) * 2013-03-15 2013-07-17 南京工业大学 Capsule type customized updating method based on universal extensible firmware interface firmware system
CN108710804A (en) * 2018-05-19 2018-10-26 济南浪潮高新科技投资发展有限公司 A kind of band hardware encryption Rapid Updating of computer UEFI firmwares

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杜振龙等: "基于 UEFI的胶囊式固件定制更新研究", 《计算机工程》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175057A (en) * 2019-05-31 2019-08-27 联想(北京)有限公司 A kind of data processing method, electronic equipment and server
US11789821B1 (en) 2022-04-29 2023-10-17 Microsoft Technology Licensing, Llc Out-of-band method to change boot firmware configuration
WO2023211553A1 (en) * 2022-04-29 2023-11-02 Microsoft Technology Licensing, Llc Out-of-band method to change boot firmware configuration

Similar Documents

Publication Publication Date Title
CN108206847B (en) CDN management system, method and device
US7013462B2 (en) Method to map an inventory management system to a configuration management system
CN111698283B (en) Management and control method, device, equipment and storage medium of distributed cluster host
US20060075076A1 (en) Updating software while it is running
CN105306225B (en) A kind of physical machine remote power-off method based on Openstack
JP2009070375A (en) System and method for custom installation of operating system on remote client
CN109375933B (en) Method and equipment for upgrading client
CN103164244A (en) Firmware system remote updating method based on universal extensible firmware interface
CN104573494A (en) Safety mobile office method based on WMI software whitelist mechanism
CN112491980B (en) Cloud host service management method, system, terminal and storage medium
CN102663298B (en) Safety online detecting system facing to terminal computers
CN109472131A (en) A kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification
CN111273924A (en) Software updating method and device
CN110365524B (en) Mirror image upgrading method and system for server node firmware
CN113434254B (en) Client deployment method, client deployment apparatus, computer device, and storage medium
CN113672336A (en) K8S container cluster deployment method, device, equipment and readable storage medium
CN115665265A (en) Request processing method, device, equipment, storage medium and system
CN107623581A (en) Service list generation method, apparatus and system, acquisition, report method and device
CN107453959B (en) Network card management method and device
EP0791195A1 (en) Method and apparatus for controlling network and workstation access prior to workstation boot
US20230289193A1 (en) Systems and methods for deploying a distributed containers-as-a-service platform architecture for telecommunications applications
CN100386726C (en) Method and system for renewing long-distance operation and control of computer platform system programe
CN115758334A (en) Cloud application access method and device, electronic equipment and storage medium
US11425203B2 (en) Commissioning a virtualized network function
CN114615285A (en) Physical machine deployment method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190315