Hamvention 2022: The Reunion Begins Today

Calling all hams! Hamvention 2022 is underway and runs through the weekend at the Greene County Fair and Expo Center in Xenia, Ohio. It’s been three long years since Hamvention took place in person, and this year marks the 70th reunion of what has got to be the largest hamfest in the Midwest. If you’re in the area, you don’t want to miss it. You will need a ticket, though, and here are a few places you pick one up.

Indoors, you’ll find six buildings full of commercial vendors. But outside is where the real fun takes place — the flea market. What treasures will you uncover? There’s only one way to find out.

If you want to get into ham radio, there’s no place like a ham fest to kick off your journey. And if you’ve been poring over the ARRL handbook, you’re in luck, because they’re proctoring ham exams for free at the church across the street on Friday and Saturday.

Can’t make it out for whatever reason, but live close to the fairgrounds? Want to get in the mood on your way there? Tune to 1620AM within a five-ish mile radius to hear weather, traffic, and parking info, plus interviews and other assorted radio fun. If you live nowhere near Ohio, don’t despair — they are livestreaming it on YouTube.

[Note: the Hara Arena, pictured in our awesome Joe Kim artwork, is the old home of Hamvention, and was demolished in 2016. Better head off to the Greene County Fairgrounds instead.]

This Week In Security: IPhone Unpowered, Python Unsandboxed, And Wizard Spider Unmasked

As conspiracy theories go, one of the more plausible is that a cell phone could be running malicious firmware on its baseband processor, and be listening and transmitting data even when powered off. Nowadays, this sort of behavior is called a feature, at least if your phone is made by Apple, with their Find My functionality. Even with the phone off, the Bluetooth chip runs happily in a low-power state, making these features work. The problem is that this chip doesn’t do signed firmware. All it takes is root-level access to the phone’s primary OS to load a potentially malicious firmware image to the Bluetooth chip.

Researchers at TU Darmstadt in Germany demonstrated the approach, writing up a great paper on their work (PDF). There are a few really interesting possibilities this research suggests. The simplest is hijacking Apple’s Find My system to track someone with a powered down phone. The greater danger is that this could be used to keep surveillance malware on a device even through power cycles. Devices tend to be secured reasonably well against attacks from the outside network, and hardly at all from attacks originating on the chips themselves. Unfortunately, since unsigned firmware is a hardware limitation, a security update can’t do much to mitigate this, other than the normal efforts to prevent attackers compromising the OS.
Continue reading “This Week In Security: IPhone Unpowered, Python Unsandboxed, And Wizard Spider Unmasked”

linear motor pcb model railroad track

PCB Linear Motors For Model Trains

Modeling a railroad is hard. Railroads are large, linear pieces of civil engineering. So many modelers are drawn to the smallest scale they can use. Recently a new scale, named T, at 1:450 has been pushing this barrier. But fitting a reliable mechanical drive mechanism and MCU board in a package this size is a challenge. In practice, even more of a problem is getting reliable electrical contact through a metal wheel on metal track (about the worst possible design for a contact).T scale electric locomotive held on a human finger

T always seemed to us a long way out on the bleeding edge. But all that may have changed. In a recent Hackaday.io writeup, author [Martin] describes a PCB technology based linear motor system to externally drive T scale locomotives.

The system uses 4mm planar coils. The underside of the PCB has another coil, so the effective pitch is 2mm. With microstepping, a step of 0.25mm is possible, and trains run smoothly. Current is 3-400mA. Continue reading “PCB Linear Motors For Model Trains”

Asahi GPU Hacking

[Alyssa Rosenzweig] has been tirelessly working on reverse engineering the GPU built into Apple’s M1 architecture as part of the Asahi Linux effort. If you’re not familiar, that’s the project adding support to the Linux kernel and userspace for the Apple M1 line of products. She has made great progress, and even got primitive rendering working with her own open source code, just over a year ago.

Trying to mature the driver, however, has hit a snag. For complex rendering, something in the GPU breaks, and the frame is simply missing chunks of content. Some clever testing discovered the exact failure trigger — too much total vertex data. Put simply, it’s “the number of vertices (geometry complexity) times amount of data per vertex (‘shading’ complexity).” That… almost sounds like a buffer filling up, but on the GPU itself. This isn’t a buffer that the driver directly interacts with, so all of this sleuthing has to be done blindly. The Apple driver doesn’t have corrupted renders like this, so what’s going on?
Continue reading “Asahi GPU Hacking”

NVIDIA Releases Drivers With Openness Flavor

This year, we’ve already seen sizeable leaks of NVIDIA source code, and a release of open-source drivers for NVIDIA Tegra. It seems NVIDIA decided to amp it up, and just released open-source GPU kernel modules for Linux. The GitHub link named open-gpu-kernel-modules has people rejoicing, and we are already testing the code out, making memes and speculating about the future. This driver is currently claimed to be experimental, only “production-ready” for datacenter cards – but you can already try it out!

The Driver’s Present State

Of course, there’s nuance. This is new code, and unrelated to the well-known proprietary driver. It will only work on cards starting from RTX 2000 and Quadro RTX series (aka Turing and onward). The good news is that performance is comparable to the closed-source driver, even at this point! A peculiarity of this project – a good portion of features that AMD and Intel drivers implement in Linux kernel are, instead, provided by a binary blob from inside the GPU. This blob runs on the GSP, which is a RISC-V core that’s only available on Turing GPUs and younger – hence the series limitation. Now, every GPU loads a piece of firmware, but this one’s hefty!

Barring that, this driver already provides more coherent integration into the Linux kernel, with massive benefits that will only increase going forward. Not everything’s open yet – NVIDIA’s userspace libraries and OpenGL, Vulkan, OpenCL and CUDA drivers remain closed, for now. Same goes for the old NVIDIA proprietary driver that, I’d guess, would be left to rot – fitting, as “leaving to rot” is what that driver has previously done to generations of old but perfectly usable cards. Continue reading “NVIDIA Releases Drivers With Openness Flavor”

This Week In Security: F5 Twitter PoC, Certifried, And Cloudflare Pages Pwned

F5’s BIG-IP platform has a Remote Code Execution (RCE) vulnerability: CVE-2022-1388. This one is interesting, because a Proof of Concept (PoC) was quickly reverse engineered from the patch and released on Twitter, among other places.

HORIZON3.ai researcher [James Horseman] wrote an explainer that sums up the issue nicely. User authentication is handled by multiple layers, one being a Pluggable Authentication Modules (PAM) module, and the other internally in a Java class. In practice this means that if the PAM module sees an X-F5-Auth-Token, it passes the request on to the Java code, which then validates the token to confirm it as authentic. If a request arrives at the Java service without this header, and instead the X-Forwarded-Host header is set to localhost, the request is accepted without authentication. The F5 authentication scheme isn’t naive, and a request without the X-F5-Auth-Token header gets checked by PAM, and dropped if the authentication doesn’t check out.

So where is the wiggle room that allows for a bypass? Yet another HTTP header, the Connection header. Normally this one only comes in two varieties, Connection: close and Connection: keep-alive. Really, this header is a hint describing the connection between the client and the edge proxy, and the contents of the Connection header is the list of other headers to be removed by a proxy. It’s essentially the list of headers that only apply to the connection over the internet. Continue reading “This Week In Security: F5 Twitter PoC, Certifried, And Cloudflare Pages Pwned”

MakerBot And Ultimaker To Merge, Focus On Industry

Nine years ago, MakerBot was acquired by Stratasys in a deal worth slightly north of $600 million. At the time it was assumed that MakerBot’s line of relatively affordable desktop 3D printers would help Stratasys expand its reach into the hobbyist market, but in the end, the company all but disappeared from the hacker and maker scene. Not that many around these parts were sad to see them go — by abandoning the open source principles the company had been built on, MakerBot had already fallen out of the community’s favor by the time the buyout went through.

So today’s announcement that MakerBot and Ultimaker have agreed to merge into a new 3D printing company is a bit surprising, if for nothing else because it seemed MakerBot had transitioned into a so-called “zombie brand” some time ago. In a press conference this afternoon it was explained that the new company would actually be spun out of Stratasys, and though the American-Israeli manufacturer would still own a sizable chunk of the as of yet unnamed company, it would operate as its own independent entity.

MakerBot has been courting pro users for years.

In the press conference, MakerBot CEO Nadav Goshen and Ultimaker CEO Jürgen von Hollen explained that the plan was to maintain the company’s respective product lines, but at the same time, expand into what they referred to as an untapped “light industrial” market. By combining the technology and experience of their two companies, the merged entity would be uniquely positioned to deliver the high level of reliability and performance that customers would demand at what they estimated to be a $10,000 to $20,000 USD price point.

When MakerBot announced their new Method 3D printer would cost $6,500 back in 2018, it seemed clear they had their eyes on a different class of clientele. But now that the merged company is going to put their development efforts into machines with five-figure price tags, there’s no denying that the home-gamer market is officially in their rear-view mirror. That said, absolutely zero information was provided about the technology that would actually go into said printers, although given their combined commercial experience, it seems all but a given that these future machines will use some form of fused deposition modeling (FDM).

Now we’d hate to paint with too broad a brush, but we’re going to assume that the average Hackaday reader isn’t in the market for a 3D printer that costs as much as a decent used car. But there’s an excellent chance you’re interested in at least two properties that will fall under the umbrella of this new printing conglomerate: MakerBot’s Thingiverse, and Ultimaker’s Cura slicer. In the press conference it was made clear that everyone involved recognized both projects as vital outreach tools, and that part of the $62.4 million cash investment the new company is set to receive has been set aside specifically for their continued development and improvement.

We won’t beat around the bush — Thingiverse has been an embarrassment for years, even before they leaked the account information of a quarter million users because of their antiquated back-end. A modern 3D model repository run by a company the community doesn’t openly dislike has been on many a hacker’s wish list for some time now, but we’re not against seeing the service get turned around by a sudden influx of cash, either. We’d also be happy to see more funding go Cura’s way as well, so long as it’s not saddled with the kind of aggressive management that’s been giving Audacity users a headache. Here’s hoping the new company, whatever it ends up being called, doesn’t forget about the promises they’re making to the community — because we certainly won’t.