GPL About Home
    Home
    About
    Papers
    Projects
      Mercury
      Jupiter
      Saturn
      Pluto
      Chaos / CosMos
      Agent Smith
      Discontent
      libMidnightCode
      CubeCart
      ATS
      Picview
      SpamStats
      Babel
      Toad
      HAC Rack
      Tank
      Clock
      TGXF
      Freezer

Papers
Project Saturn

Saturn Installation and Operations Manual (version 0.1):
Saturn is an embedded platform that creates a Network Attached Storage (NAS) device from any modern x86 computer and without specialist hardware.

Saturn is built on GlusterFS which caters for most standard RAID-like configurations (distributed, redundant and striped storage models), as well as supporting network-based asynchronous file replication to enable more common enterprise storage network (multi-box, multi-rack, multi-site) configurations. Beneath GlusterFS, Saturn is a portable Linux distribution produced by Midnight Code.

This manual is a guide to assist people with the assembly, configuration and operation of a Midnight Code Saturn storage appliance. The manual has been designed so that it can be read from start to finish to build a capability from infrastructure to service, or it can be used as a ready reference to seek out targeted information, by concept.
Access: /papers/Saturn Manual - Midnight Code - v0.1.pdf


Project Pluto

Understanding the Belkin extended firmware for OpenWRT development:
In this paper the Belkin F5D7230-4 is explored for its availability as a fully integrated wireless firewall router and VPN end-point. This work must be done in order to achieve a best-practice security solution in the Small Office / Home Office (SOHO) price-point. Where, while almost all of the casual risks are equivalent to those experienced by large enterprise, no mitigation technologies are available at an appropriate cost. By collating a mass of publicly available information, the paper concludes by providing a root shell into the device, and a number of Linux-based reports on the hardware make-up of the router. It is hoped that this information can be used to adapt the OpenWRT embedded Linux distribution, for this Belkin router.
Access: /papers/OpenWRT on the Belkin F5D7230-4.pdf

Attaining console access via the native Belkin serial port for OpenWRT development:
By collating a mass of publicly available information, and experimenting with a single unit, the paper concludes by providing a physical console into the device, providing local root user level access, and a schematic diagram for a solder-less project that will allow individuals to try this experiment for themselves. It is hoped that this information can be used to debug open source firmware and to then adapt the OpenWRT, and Sveasoft, embedded Linux distributions for this Belkin router.
Access: /papers/OpenWRT on the Belkin F5D7230-4 - Serial Console.pdf

Compiling and Installing the GPL Broadcom Reference Firmware:
Belkin published the Broadcom reference firmware; a small Linux distribution, designed to act as a proof-of-concept and development environment for the Belkin engineers. To minimize the amount of experimentation required to adapt the OpenWRT and Sveasoft firmware for use on the Belkin, the published Broadcom reference firmware was compiled to see if it was functional, and able to provide driver and configuration information for the open source distributions.
...
Furthermore, this process was developed rapidly due to the excellent work performed by Rick Bronson.
Access: /papers/OpenWRT on the Belkin F5D7230-4 - Broadcom Firmware.pdf


Project Chaos / CosMos

Securely deploying SSI cluster technology over untrusted networking infrastructure:
The pinnacle of success for any Single System Image (SSI) based cluster, should be the achievement of a global deployment on commodity x86 computing equipment; leveraging both the public communications infrastructure and existing capital equipment (personal computing) expenditure.

In this white paper we will explore the openMosix network architecture, network level risk mitigation techniques for the redeployment of organizational infrastructure in "open" clusters, a practical application of those techniques in the CHAOS and ClusterKnoppix Linux distributions, and proposals for extending both the security model and the flexibility of the openMosix architecture.
Access: /papers/White Paper - Security and openMosix.pdf

Running ClusterKnoppix as a master node to a CHAOS drone army:
There is a somewhat conflicting interest between the security and manageability of a compact operating system and the need for a user friendly and fully featured operating system, in the cluster environment.

Heterogeneous clusters provide the best of both worlds.

In this two-part HowTo, you will find details on how a heterogeneous cluster works, why it is advantageous, and instructions on building a heterogeneous cluster from the ClusterKnoppix and CHAOS Linux openMosix distributions.
Access: /papers/How To - Heterogeneous Clusters.pdf

How to build a working openMosix cluster without touching a compiler:
The openMosix community has provided numerous ways for new users to easily and rapidly build clusters. Unfortunately, for the community, there are those new users who want to test openMosix on their own terms but haven't the understanding required to do so. These users are often disheartened by their initial experience and turned away from openMosix, simply because of their own configuration faults.

For these users, this paper will provide a basic, step-by-step process for installing a working openMosix cluster, using only an off-the-shelf Linux distribution and two openMosix RPMs.

This build process will not require code modification or compiling, it will be repeatable, and will not require prior openMosix experience.
Access: /papers/How To - Instant openMosix.pdf


Project TGXF

Presentation - Piano Thieving for Experts - SABSA COSAC 2014:
This presentation was performed on the 30th of September 2014 at the SABSA/COSAC conference in Naas, Ireland. The session titled "Piano Thieving for Experts: That Bathroom Window IS Big Enough" took participants from the first principle (that any user controlled bit is a communications channel) through development and execution of the Through Glass Transfer (TGXf) proof of concept, the Through Keyboard Transfer (TKXf) proof of concept and then combined as the Through Console Transfer capabilities of TCXf, ending with a demonstration of SSH over PPP over the screen and keyboard via a hardened end user platform.
Access: /papers/Piano Thieving for Experts - SABSA 2014 - v1.5.ppt

TCXf White Paper:
The Through Console Transfer (TCXf) WhitePaper explores one example of how user controlled bits (keyboard input and screen output) can be re-imagined as a network interface.

The paper includes: sufficient technical specifications and diagrams to explain the underlying technical principles, and source code to the software, and assembly instructions for the hardware, required to reproduce the outcomes described for assessment of the proposed technology solution in your own environment.

The paper goes on to evaluate: the architectural implications of human versus machine interfacing, and one example of the legal impact of misunderstanding the subtle differences involved.
Access: /papers/TCXf White Paper - Midnight Code - v1.1.pdf

TKXf Specification:
This document is a guide to assist people with the understanding and implementation of a Midnight Code Thru-Keyboard Xfer (TKXf) protocol and application.
Access: /papers/TKXf Specification - Midnight Code - v1.0.pdf

TGXf Specification:
This document is a guide to assist people with the understanding and implementation of a Midnight Code Thru-Glass Xfer (TGXf) protocol and application.
Access: /papers/TGXf Specification - Midnight Code - v1.4.pdf




© 2004-2017 Ian Latter, All rights reserved.
Midnight Code is a registered trademark of Ian Latter
  All Midnight Code source code is distributed under
version 2 of the GNU General Public License (GPL).