Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
winbootibft [2006/09/19 19:58] mcb30 |
winbootibft [2006/09/20 06:17] (current) mcb30 |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Decoding the iSCSI Boot Firmware Table ====== | ====== Decoding the iSCSI Boot Firmware Table ====== | ||
- | Representatives of Microsoft have recently raised objections to the publication of information describing the iSCSI Boot Firmware Table (iBFT). The iBFT is a data structure used when Windows is booted from an iSCSI disk hosted on a remote computer, or on an iSCSI network-attached storage (NAS) box. | + | Representatives of Microsoft have recently raised objections to the publication of information describing the iSCSI Boot Firmware Table (iBFT). The iBFT is a data structure used when Windows is booted from an iSCSI disk hosted on a remote computer, or on an iSCSI network-attached storage (NAS) box; a high-level overview is published by Microsoft at http://download.microsoft.com/download/5/b/9/5b97017b-e28a-4bae-ba48-174cf47d23cd/STO026_WH06.ppt. |
The Microsoft representatives seem to have taken the position that the details of this table are confidential, and that anyone with knowledge of its structure must have been privy to information covered by a non-disclosure agreement. | The Microsoft representatives seem to have taken the position that the details of this table are confidential, and that anyone with knowledge of its structure must have been privy to information covered by a non-disclosure agreement. | ||
Line 59: | Line 59: | ||
==== Conclusions ==== | ==== Conclusions ==== | ||
- | * At no point during this process did we have to sign any non-disclosure agreement with Microsoft or any other party. | + | * At no point during this process did we need to sign any non-disclosure agreement with Microsoft or any other party. |
* At no point during this process did we reverse-engineer any piece of software or use it for anything other than its explicitly stated purpose, according to its own documentation. | * At no point during this process did we reverse-engineer any piece of software or use it for anything other than its explicitly stated purpose, according to its own documentation. | ||
- | * The information obtained from this process is completely sufficient for a programmer wishing to write code to generate or parse an iSCSI Boot Firmware Table. | + | * The information obtained from this process is entirely sufficient to allow a programmer to write code for generating or parsing an iSCSI Boot Firmware Table. |
* It is therefore incorrect for anyone to claim that the structure of the iSCSI Boot Firmware Table is confidential information. | * It is therefore incorrect for anyone to claim that the structure of the iSCSI Boot Firmware Table is confidential information. | ||