See your PMs, I've sent my instructions to people that want a reconstruction, you will learn what to do following it.
I think my boot rom may need a reconstruction....
See your PMs, I've sent my instructions to people that want a reconstruction, you will learn what to do following it.
Yep, same case as here:
How many MP do you think you have saved from brick?Yep, same case as here:
MP5,1: BootROM thread | 144.0.0.0.0
Earlier today I've talked about the second VSS store being overrun by the first one, some hours latter @fatespawn sent me the dump from his cross-flashed single CPU early-2009 and take a look: DECIMAL HEXADECIMAL DESCRIPTION...forums.macrumors.com
This is worryingly becoming more common lately. I've sent you instructions by PM.
This is not a simple question to answer, there are direct and indirect effects, lot's of people started to save dumps and learned to how to do deep NVRAM resets and followed the best practices.How many MP do you think you have saved from brick?
If you don't manually put a MacPro5,1 in firmware programming mode, nothing can interact with the BootROM itself. The problem is indirect, to do updates a series of NVRAM variables are written to the NVRAM volume and files are written to the EFI partition/main disk. This itself can mess with some installs.Did anyone else have any weird problems with their boot rom after allowing apple’s recent Mojave security update to go through? Mine started acting wonky with my HDD drives for some reason. I tried to reflash by never-booted rom but interestingly after I did that then apple software update suddenly wanted me to do the security update again; which gave me pause. Did the security update mess with the boot rom in some way?
I've wondered about this. Would you say, then, that we are being overly cautious when spoofing the firmware version to a high value in OpenCore?If you don't manually put a MacPro5,1 in firmware programming mode, nothing can interact with the BootROM itself.
MacPro5,1 tiny NVRAM for today's standards is the Achilles heel of the whole design now and I don't think that we are being overly cautious, let me explain my point.I've wondered about this. Would you say, then, that we are being overly cautious when spoofing the firmware version to a high value in OpenCore?
BIOSVersion
, the firmware image for the spoofed Mac and some support files are written to the EFI partition and the NVRAM volume get some variables with giant data to get everything set up for the efiflasher to do it's job. BIOSVersion
to the highest possible value is a best practice when using OC and a MacPro5,1.Why would it be asking for that again when I had already run it a few days before? All the security updates to OSX should have already been installed. Unless somehow it was never completed properly due to the partition map break down maybe....
AppleYea it definitely did something to my EFI, or actually the partition map, the next day I started getting a thing where the whole SATA HDD disk would self-eject itself during the night.. Notification messages that the disk was turned off without properly ejecting or something to that effect. I think probably due to display sleep after so many hours in the middle of the night, but not entirely sure. I rebooted and everything seemed to be working ok. Then it did it again the next night. DiskUtility showed unfixable problems. The drive started acting very slow and unresponsive...I tried to repair the EFI and unfortunately now none of the volumes on that device will mount at all. The error messages I was getting were about the partition map. SMART showed no errors.
I'm pretty sure the security update did something to that partition map, including the EFI that I was using as my primary boot device. The OS wasn't there on that device, just the EFI with RefindPlus and OC...Even when I boot to Mojave without OC...I go through RefindPlus on that drive. Or did. Maybe the partiionMap I had was confusing to the Mojave security updater. I had it setup with three partitions, two of which were separate APFS containers and one was HFS in order to use TimeMachine. Then of course EFI partition was there. Given the fact that the last error messages I saw were saying the partition map was FUBAR, I'd say that somehow my partition map was confusing to the security Update....and/or perhaps the NVRAM issue came up, though my NVRAM doesn't normally have that much stuff in it, and it wasn't that long since I had refreshed my never-booted rom either...so I dunno....
But anyway, then I tried to reflash the bootrom hoping that might fix the issue, but when I booted into Mojave again...it said I needed the security update all over again, which is the part that threw me for a loop. Why would it be asking for that again when I had already run it a few days before? All the security updates to OSX should have already been installed. Unless somehow it was never completed properly due to the partition map break down maybe....
I'm not sure that this is a reissue as much as it was making them available for separate download. There wasn't a change in the software update catalog for these updates since their initial release on the 24th of May.Apple re-issued Security Update 2021-003 for Mojave and Catalina again today:
Thanks for the heads up. I think the security update was applied correctly the first time or second time, it’s just that the disk where I have OC EFI, got completely messed up, partition map was destroyed and after that I tried to do low level full erase but eventually it would not even detect the drive in drive utility. Something got seriously messed up. I have since put it into a pc and running seatools on it, it’s possible the HDD chose this same moment to fail but it’s mighty coincidental that happened on the same night that I originally ran the security update.Applere-issued stand-alone Security Update 2021-003 for Mojave and Catalinaagaintoday:
Direct link to the support page for Security Update 2021-003 (Catalina):I went to have a look at that Catalina Security update, I used the URL I see in your screen shots, but when I open that link it shows the same page as you see, but when I click on the Download button I am getting directed to something that Safari is flagging impersonating "updates.cdn-apple.com to steal your personal or financial information"
What gives?
whois cdn-apple.com
% IANA WHOIS server
% for more information on IANA, visit http://www.iana.org
% This query returned 1 object
refer: whois.verisign-grs.com
domain: COM
organisation: VeriSign Global Registry Services
address: 12061 Bluemont Way
address: Reston Virginia 20190
address: United States
contact: administrative
name: Registry Customer Service
organisation: VeriSign Global Registry Services
address: 12061 Bluemont Way
address: Reston Virginia 20190
address: United States
phone: +1 703 925-6999
fax-no: +1 703 948 3978
e-mail: info@verisign-grs.com
contact: technical
name: Registry Customer Service
organisation: VeriSign Global Registry Services
address: 12061 Bluemont Way
address: Reston Virginia 20190
address: United States
phone: +1 703 925-6999
fax-no: +1 703 948 3978
e-mail: info@verisign-grs.com
nserver: A.GTLD-SERVERS.NET 192.5.6.30 2001:503:a83e:0:0:0:2:30
nserver: B.GTLD-SERVERS.NET 192.33.14.30 2001:503:231d:0:0:0:2:30
nserver: C.GTLD-SERVERS.NET 192.26.92.30 2001:503:83eb:0:0:0:0:30
nserver: D.GTLD-SERVERS.NET 192.31.80.30 2001:500:856e:0:0:0:0:30
nserver: E.GTLD-SERVERS.NET 192.12.94.30 2001:502:1ca1:0:0:0:0:30
nserver: F.GTLD-SERVERS.NET 192.35.51.30 2001:503:d414:0:0:0:0:30
nserver: G.GTLD-SERVERS.NET 192.42.93.30 2001:503:eea3:0:0:0:0:30
nserver: H.GTLD-SERVERS.NET 192.54.112.30 2001:502:8cc:0:0:0:0:30
nserver: I.GTLD-SERVERS.NET 192.43.172.30 2001:503:39c1:0:0:0:0:30
nserver: J.GTLD-SERVERS.NET 192.48.79.30 2001:502:7094:0:0:0:0:30
nserver: K.GTLD-SERVERS.NET 192.52.178.30 2001:503:d2d:0:0:0:0:30
nserver: L.GTLD-SERVERS.NET 192.41.162.30 2001:500:d937:0:0:0:0:30
nserver: M.GTLD-SERVERS.NET 192.55.83.30 2001:501:b1f9:0:0:0:0:30
ds-rdata: 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CFC41A5766
whois: whois.verisign-grs.com
status: ACTIVE
remarks: Registration information: http://www.verisigninc.com
created: 1985-01-01
changed: 2017-10-05
source: IANA
Domain Name: CDN-APPLE.COM
Registry Domain ID: 1623820299_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: http://cscdbs.com
Updated Date: 2020-10-31T05:57:56Z
Creation Date: 2010-11-04T14:41:19Z
Registry Expiry Date: 2021-11-04T15:41:19Z
Registrar: CSC Corporate Domains, Inc.
Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: 8887802723
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: A.NS.APPLE.COM
Name Server: B.NS.APPLE.COM
Name Server: C.NS.APPLE.COM
Name Server: D.NS.APPLE.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2021-06-04T00:48:16Z <<<
Domain Name: cdn-apple.com
Registry Domain ID: 1623820299_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: www.cscprotectsbrands.com
Updated Date: 2020-10-31T01:57:56Z
Creation Date: 2010-11-04T10:41:19Z
Registrar Registration Expiration Date: 2021-11-04T15:41:19Z
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: +1.8887802723
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Domain Administrator
Registrant Organization: Apple Inc.
Registrant Street: One Apple Park Way
Registrant City: Cupertino
Registrant State/Province: CA
Registrant Postal Code: 95014
Registrant Country: US
Registrant Phone: +1.4089961010
Registrant Phone Ext:
Registrant Fax: +1.4089741560
Registrant Fax Ext:
Registrant Email: domains@apple.com
Registry Admin ID:
Admin Name: Domain Administrator
Admin Organization: Apple Inc.
Admin Street: One Apple Park Way
Admin City: Cupertino
Admin State/Province: CA
Admin Postal Code: 95014
Admin Country: US
Admin Phone: +1.4089961010
Admin Phone Ext:
Admin Fax: +1.4089741560
Admin Fax Ext:
Admin Email: domains@apple.com
Registry Tech ID:
Tech Name: Domain Administrator
Tech Organization: Apple Inc.
Tech Street: One Apple Park Way
Tech City: Cupertino
Tech State/Province: CA
Tech Postal Code: 95014
Tech Country: US
Tech Phone: +1.4089961010
Tech Phone Ext:
Tech Fax: +1.4089741560
Tech Fax Ext:
Tech Email: apple-noc@apple.com
Name Server: d.ns.apple.com
Name Server: b.ns.apple.com
Name Server: c.ns.apple.com
Name Server: a.ns.apple.com
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2020-10-31T01:57:56Z <<<
?♂️