Assurance Activity Report for Apple Filevault 2 on T2 Systems Running Macos Catalina 10.15

Total Page:16

File Type:pdf, Size:1020Kb

Assurance Activity Report for Apple Filevault 2 on T2 Systems Running Macos Catalina 10.15 Assurance Activity Report for Apple FileVault 2 on T2 systems running macOS Catalina 10.15 Apple FileVault 2 on T2 systems running macOS Catalina 10.15 Security Target Version 2.5 collaborative Protection Profile for Full Drive Encryption – Authorization Acquisition, Version 2.0e collaborative Protection Profile for Full Drive Encryption – Encryption Engine, Version 2.0e AAR Version 1.9, April 2021 Evaluated by: 2400 Research Blvd, Suite 395 Rockville, MD 20850 Prepared for: National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme 1 © 2021 Apple Inc., All rights reserved. This document may be reproduced and distributed only in its original entirety without revision. The Developer of the TOE: Apple Inc. The Author of the Security Target: Acumen Security, LLC. The TOE Evaluation was Sponsored by: Apple Inc. Evaluation Personnel: Danielle Canoles Rutwij Kulkarni Dayanandini Pathmanathan Acumen Security, LLC. Common Criteria Version Common Criteria Version 3.1 Revision 5 Common Evaluation Methodology Version CEM Version 3.1 Revision 5 2 © 2021 Apple Inc., All rights reserved. This document may be reproduced and distributed only in its original entirety without revision. Revision History VERSION DATE CHANGES 1.0 November 2020 Initial Release 1.1 December 2020 Update based on updated ST 1.2 January 2021 Internal Review 1.3 February 2021 Updates based on updated ST and AGD 1.4 March 2021 Internal Review 1.5 March 2021 Updates based on updated vendor documents 1.6 March 2021 Updates based on updated ST 1.7 April 2021 Updates based on validator feedback 1.8 April 2021 Updates bases on validator feedback 1.9 April 2021 Updates bases on validator feedback 3 © 2021 Apple Inc., All rights reserved. This document may be reproduced and distributed only in its original entirety without revision. Contents 1 TOE Overview ............................................................................................ 11 1.1 TOE Description .................................................................................................. 11 1.1.1 Evaluated Configuration ................................................................................ 11 2 Assurance Activities Identification ............................................................. 17 3 Test Equivalency Justification .................................................................... 18 3.1 Introduction ....................................................................................................... 18 3.2 Architectural Description .................................................................................... 18 3.3 Analysis .............................................................................................................. 18 3.4 Platform/Hardware Differences.......................................................................... 31 3.5 TOE Device Driver Differences ............................................................................ 31 3.6 Software/OS Dependencies ................................................................................ 32 3.7 Differences in TOE Software Binaries .................................................................. 32 3.8 Differences in Libraries Used to Provide Functionality ......................................... 32 3.9 TOE Functional Differences ................................................................................. 32 3.10 TOE Management Interfaces Differences ............................................................ 32 3.11 Test Subset Justification/Rationale ..................................................................... 32 4 Test Bed Descriptions ................................................................................ 34 4.1 Test Bed (Coffee Lake) ........................................................................................ 34 4.1.1 Visual Diagram #1 .......................................................................................... 34 4.1.2 Configuration Information #1 ........................................................................ 34 4.1.3 Visual Diagram #2 .......................................................................................... 35 4.1.4 Configuration Information #2 ........................................................................ 35 4.3 Test Bed (Ice Lake) .............................................................................................. 37 4.3.1 Visual Diagram #1 .......................................................................................... 37 4.3.2 Configuration Information #1 ........................................................................ 37 4.3.3 Visual Diagram #2 .......................................................................................... 38 4.3.4 Configuration Information #2 ........................................................................ 38 4.4 Test Time and Location ....................................................................................... 39 5 Detailed Test Cases (TSS, Guidance and KMD Activities) ............................ 42 5.1 TSS, Guidance and KMD Activities (Cryptographic Support) ................................. 42 5.1.1 FCS_AFA_EXT.1 .............................................................................................. 42 5.1.1.1 FCS_AFA_EXT.1 TSS 1 ................................................................................. 42 5.1.1.2 FCS_AFA_EXT.1 TSS 2 ................................................................................. 42 5.1.1.4 FCS_AFA_EXT.1 Guidance 1 ........................................................................ 43 5.1.1.5 FCS_AFA_EXT.1 KMD 1 ............................................................................... 43 5.1.1.6 FCS_AFA_EXT.1 KMD 2 ............................................................................... 43 5.1.2 FCS_AFA_EXT.2 .............................................................................................. 44 5.1.2.1 FCS_AFA_EXT.2 TSS 1 ................................................................................. 44 5.1.2.2 FCS_AFA_EXT.2 Guidance 1 ........................................................................ 44 5.1.3 FCS_CKM.1(a) ................................................................................................. 45 5.1.3.1 FCS_CKM.1(a) TSS 1 .................................................................................... 45 5.1.3.2 FCS_CKM.1(a) Guidance 1 .......................................................................... 45 4 © 2021 Apple Inc., All rights reserved. This document may be reproduced and distributed only in its original entirety without revision. 5.1.3.3 FCS_CKM.1(a) Test/CAVP 1 ........................................................................ 45 5.1.3.4 FCS_CKM.1(a) KMD 1 ................................................................................. 47 5.1.4 FCS_CKM.1(b) ................................................................................................. 48 5.1.4.1 FCS_CKM.1(b) TSS 1 .................................................................................... 48 5.1.4.2 FCS_CKM.1(b) Guidance 1 .......................................................................... 48 5.1.4.3 FCS_CKM.1(b) KMD 1 ................................................................................. 48 5.1.5 FCS_CKM.1(c) ................................................................................................. 49 5.1.5.1 FCS_CKM.1(c) TSS 1 .................................................................................... 49 5.1.5.2 FCS_CKM.1(c) TSS 2 .................................................................................... 49 5.1.5.3 FCS_CKM.1(c) TSS 3 .................................................................................... 50 5.1.5.4 FCS_CKM.1(c) KMD 1 .................................................................................. 50 5.1.6 FCS_CKM.4(a) ................................................................................................. 50 5.1.6.1 FCS_CKM.4(a) TSS 1 .................................................................................... 50 5.1.6.2 FCS_CKM.4(a) Guidance 1 .......................................................................... 51 5.1.6.3 FCS_CKM.4(a) KMD 1 ................................................................................. 51 5.1.7 FCS_CKM.4(b) ................................................................................................. 52 5.1.7.1 FCS_CKM.4(b) TSS/KMD 1 .......................................................................... 52 5.1.7.2 FCS_CKM.4(b) TSS/KMD 2 .......................................................................... 52 5.1.7.3 FCS_CKM.4(b) TSS/KMD 3 .......................................................................... 52 5.1.7.4 FCS_CKM.4(b) TSS/KMD 4 .......................................................................... 53 5.1.7.5 FCS_CKM.4(b) TSS/KMD 5 .......................................................................... 53 5.1.7.6 FCS_CKM.4(b) TSS/KMD 6 .......................................................................... 53 5.1.7.7 FCS_CKM.4(b) Guidance 1 .......................................................................... 54 5.1.8 FCS_CKM.4(d) ................................................................................................. 54 5.1.8.1 FCS_CKM.4(d) TSS/KMD 1 .......................................................................... 54 5.1.8.2 FCS_CKM.4(d) TSS/KMD 2 .........................................................................
Recommended publications
  • Porting Darwin to the MV88F6281 Arming the Snowleopard
    Porting Darwin to the MV88F6281 ARMing the SnowLeopard. Tristan Schaap 1269011 Apple Inc. Platform Technologies Group Delft University of Technology Dept. of Computer Science Committee: Ir. B.R. Sodoyer Dr. K. van der Meer Preface! 3 Introduction! 4 Summary! 5 Building a new platform! 6 Booting iBoot! 7 Building the kernelcache! 8 Booting the kernel! 10 THUMBs down! 16 Conclusion! 18 Future Work! 19 Glossary! 20 References! 21 Appendix A! 22 Appendix B! 23 Skills! 23 Process! 26 Reflection! 27 Appendix C! 28 Plan of Approach! 28 2 Preface Due to innovative nature of this project, I have had to limit myself in the detail in which I describe my work. This means that this report will be lacking in such things as product specific- and classified information. I would like to thank a few people who made it possible for me to successfully complete my internship at the Platform Technologies Group at Apple. First off, the people who made this internship possible, John Kelley, Ben Byer and my manager John Wright. Mike Smith, Tom Duffy and Anthony Yvanovich for helping me through the rough patches of this project. And the entirety of Core OS for making my stay an unforgettable experience. 3 Introduction About the Platform Technologies Group As it was described by a manager: “We do the plumbing, if we do our jobs right, you never see it.”. The Platform Technologies Group, a subdivision of the Core OS department, works on the embedded platforms that Apple maintains. Here, platforms are brought up and the embedded kernel and lower level support for the platforms is maintained.
    [Show full text]
  • Learn Yosemite OS X from PCM's Apple Experts
    Learn Yosemite OS X from PCM’s Apple Experts Yosemite 101: OS X Support Essentials Give PCM the opportunity to train your team to support users of Apple’s Mac OS X Yosemite. Our Apple certified trainers are ready to come to your location and provide PCM’s Apple certified trainers will teach your team Yosemite OS X fundamentals and how to be efficient with you with invaluable Yosemite tools and resources. hands-on instruction. OS X Yosemite Support Essentials is a three-day, Who Should Attend hands-on course that provides an in-depth explo- • Help desk specialists, technical coordinators, ration of troubleshooting on Mac OS X v10.10 Yo- service technicians, and others who support semite. This course is designed to give you a tour Mac users. of the breadth of functionality of Mac OS X v10.10 • Technical support personnel in businesses that Yosemite and the best methods for effectively use Macs. supporting users of Mac OS X v10.10 Yosemite • Technical coordinators or power users who systems. The course is a combination of lectures manage networks of computers running and hands-on case study exercises that provide Mac OS X — such as teachers and technology practical real-world experience. specialists who manage networks or computer labs. At your location For a class at your location, PCM will provide an What You Will Learn Apple Certified Trainer, all the student materials, • The troubleshooting process and how to and an exam voucher for each attendee (up to become more efficient with available tools 6 students included in price).
    [Show full text]
  • Security Analysis and Decryption of Lion Full Disk Encryption
    Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary Felix Grobert¨ ∗ Joachim Metz ∗ University of Cambridge [email protected] [email protected] [email protected] Abstract 1 Introduction Since the launch of Mac OS X 10.7, also known as Lion, With the launch of Mac OS X 10.7 (Lion), Apple has Apple includes a volume encryption software named introduced a volume encryption mechanism known as FileVault 2 [8] in their operating system. While the pre- FileVault 2. Apple only disclosed marketing aspects of vious version of FileVault (introduced with Mac OS X the closed-source software, e.g. its use of the AES-XTS 10.3) only encrypted the home folder, FileVault 2 can en- tweakable encryption, but a publicly available security crypt the entire volume containing the operating system evaluation and detailed description was unavailable until (this is commonly referred to as full disk encryption). now. This has two major implications: first, there is now a new functional layer between the encrypted volume and We have performed an extensive analysis of the original file system (typically a version of HFS Plus). FileVault 2 and we have been able to find all the This new functional layer is actually a full volume man- algorithms and parameters needed to successfully read ager which Apple called CoreStorage [10] Although this an encrypted volume. This allows us to perform forensic full volume manager could be used for more than volume investigations on encrypted volumes using our own encryption (e.g. mirroring, snapshots or online storage tools.
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • Mac OS X Server in Education Collaboration and Communication Solutions for 21St-Century Academic Environments
    Mac OS X Server in Education Collaboration and communication solutions for 21st-century academic environments. Podcasts. Blogs. Wikis. Group calendars. Video chats. Instant access to centralized resources. Welcome to the 21st-century academic environment. With Mac OS X Server version 10.5 Leopard, Apple puts the power of a server into the hands of everyone in your institution. So students, educators, and researchers are always connected and always communicating and collaborating—whether they’re around the globe or just across campus. 10 Reasons for Mac OS X Server in Education 1. End-to-end production of professional-quality podcasts. Podcast Producer in Mac OS X Server is a complete, customizable solution for producing podcasts of lectures, development sessions, research presentations, and campus updates. Starting with the Podcast Capture application in Mac OS X Leopard, it’s a snap for users to capture audio and video, record onscreen actions, or submit existing QuickTime content to the server. Once the content is uploaded, Podcast Producer automatically publishes it to your choice of distribution services—including iTunes U—in formats optimized for playback on almost any device, from HD video to iPod, Apple TV, or any multimedia-enabled cell phone. 2. Group collaboration on wiki-powered websites. Mac OS X Server gives students, educators, and research teams an instant space for collaboration. With their own group wiki—complete with blog, group calendar, and mailing-list archive—authorized users can create entries, tag and cross-reference material, upload files and images, add comments, and perform keyword searches. Best of all, these powerful capabilities are accessible from any modern browser in just a few clicks—there’s no need to learn an arcane markup language.
    [Show full text]
  • Filevault, Choose an Unlock Method, and Set a • Create a Recovery Key
    Overview Power and Mac State 8. Choose how to unlock your disk and reset Encryption occurs only while plugged into a your login password if you forget it. If your Mac is eligible, you just need to enable power source and in the Awake Status. • Use your iCloud account OR FileVault, choose an unlock method, and set a • Create a recovery key. Write down the few other options. Once enabled, files are Prevent Your Mac From Sleeping recovery key, or take a photo with your encrypted as they are added. 1. Go to the Apple menu. phone (be sure your phone is set up to 2. Select System Preferences. use a passcode to unlock), and keep it in Macs that are managed by WashU IT 3. Select Energy Saver. a safe place. are encrypted. If you need access to 4. Select the Power Adapter tab and your FileVault key, please contact the then slide the timer to Never. Don’t WashU IT Help Desk. forget to reset it when you are done encrypting. Requirements to Use FileVault Enabling FileVault 9. Select Continue. 10. If your Mac has multiple users, each Correct Mac OS Version If you meet the requirements in 1, 2, and 3, account that needs login access will need to OS X 10.7 Lion or newer and your mac is plugged into a power source, be enabled. You will need to know the follow the steps below. associated password for each account, or Check Your OS Version 1. Go to the Apple menu. have the user enter it during this process.
    [Show full text]
  • Dell Encryption Enterprise for Mac Administrator Guide V10.9
    Dell Encryption Enterprise for Mac Administrator Guide v10.9 March 2021 Rev. A02 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2012-2021 Dell Inc. All rights reserved. Registered trademarks and trademarks used in the Dell Encryption and Endpoint Security Suite Enterprise suite of documents: Dell™ and the Dell logo, Dell Precision™, OptiPlex™, ControlVault™, Latitude™, XPS®, and KACE™ are trademarks of Dell Inc. Cylance®, CylancePROTECT, and the Cylance logo are registered trademarks of Cylance, Inc. in the U.S. and other countries. McAfee® and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. in the US and other countries. Intel®, Pentium®, Intel Core Inside Duo®, Itanium®, and Xeon® are registered trademarks of Intel Corporation in the U.S. and other countries. Adobe®, Acrobat®, and Flash® are registered trademarks of Adobe Systems Incorporated. Authen tec® and Eikon® are registered trademarks of Authen tec. AMD® is a registered trademark of Advanced Micro Devices, Inc. Microsoft®, Windows®, and Windows Server®, Windows Vista®, Windows 7®, Windows 10®, Active Directory®, Access®, BitLocker®, BitLocker To Go®, Excel®, Hyper-V®, Outlook®, PowerPoint®, Word®, OneDrive®, SQL Server®, and Visual C++® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. VMware® is a registered trademark or trademark of VMware, Inc. in the United States or other countries.
    [Show full text]
  • LAPTOP ENCRYPTION for MAC How to Check If Filevault Is Enabled
    LAPTOP ENCRYPTION FOR MAC How to check if FileVault is enabled? In systems running OS X Yosemite 10.10 and newer, Apple encourages you to turn on FileVault 2 during setup. So, if you’re using a newer Mac, there’s every chance that your files are already being encrypted. Here’s how to check: 1. Click on the Apple menu and select System Preferences. 2. Select Privacy & Security. 3. Click on the FileVault tab and the status will be displayed. Before you turn on FileVault, be aware that the initial encryption process can take hours. However, it does run in the background so you can continue using your Mac as normal, albeit not at peak levels of performance. Also, FileVault encrypts the entire disk. Any additional users will need to be enabled so that they can unlock the disk by entering their password. How to turn on FileVault disk encryption 1. Click on the Apple menu and select System Preferences. 2. Select Privacy & Security. 3. Click on the FileVault tab, then click the lock in the bottom left corner of the window. 4. Enter your administrator name and password and click Unlock. 5. Click Turn On FileVault. 6. Choose whether you want to link your iCloud account to FileVault to unlock the disk and reset your password or create a recovery key and click Continue. 7. Click Restart to reboot your Mac and begin the encryption process. Choosing a FileVault Recovery Key The FileVault recovery key deserves special mention here. If you choose this option over linking your iCloud account, it’s critical that you make a note of the recovery key and keep it in a safe place that’s not on your hard drive.
    [Show full text]
  • Administering Filevault on Macos 10.13 with Jamf Pro
    Administering FileVault on macOS 10.13 with Jamf Pro Technical Paper Jamf Pro 9.81 or Later 5 November 2020 © copyright 2002-2020 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100 Minneapolis, MN 55401-2155 (612) 605-6625 Jamf, the Jamf Logo, JAMF SOFTWARE®, and the JAMF SOFTWARE Logo® are registered or common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Apple, FileVault, Keychain, macOS, and OS X are registered trademarks of Apple Inc., in the United States and other countries. All other product and service names mentioned herein are either registered trademarks or trademarks of their respective companies. Jamf would like to acknowledge Rich Trouton for contributing content to this technical paper. Contents Contents 5 Introduction 5 What's in This Guide 5 Important Concepts 5 Additional Resources 6 Overview 7 General Requirements 8 Activating FileVault Disk Encryption Using a Configuration Profile 9 Choosing a Recovery Key 10 Creating and Exporting an Institutional Recovery Key 10 Creating and Exporting an Institutional Recovery Key with the Private Key 11 Creating and Exporting an Institutional Recovery Key without the Private Key 13 Creating a Disk Encryption Configuration 15 Deploying the Disk Encryption Configuration 18 Creating Smart Computer Groups for FileVault 18 Creating a Smart Group for FileVault Eligible Computers that are Not Yet Encrypted 19 Creating a Smart Group of Computers with a Partition in a Specific Encryption
    [Show full text]
  • UNITED STATES DISTRICT COURT for the Western District of Michigan
    Case 1:12-mj-00304-JGS Doc #4 Filed 10/09/12 Page 1 of 5 Page IDiffllED- GR . October 9, 2012 3:46PM AO 93 (Rev. 12109) Search and Seizure Warrant TRACEY CORDES, CLERK U.S. DISTRICT COURT WESTERN DISTRICT OF MICHIGAN BY: dmh /____ _____ UNITED STATES DISTRICT COURT for the Western District of Michigan In the Maner of the Search of (8riefl.v describe the property to be searched or identify the person by name and address) Case No. 1: 12-mj-304 an Apple 1-Phone model A 1332 with IC # SEARCH AND SEIZURE WARRANT To: Any authorized law enforcement officer An application by a federal law enforcement officer or an attorney for the government requests the search of the following person or property located in the Western District of Michigan (identify thl! person or describe the property to be searched and giw its location): One black-colored Apple 1-Phone telephone bearing model# A 1332 and IC # ••••. recovered from····· bedroom localed at····· The person or property to be searched, described above, is believed to conceal (id('ntif:v til(' pason ur dt•saib~t the property to be sei=ed): historical information regarding call activity, "phone book" directory information. stored voice-mails and text messages. and electronic files, photographs, and video images I find that the affidavit(s). or any recorded testimony, establish probable cause to search and seize the person or property. YOU ARE COMMANDED to execute this warrant on or before ·---··- ... Sep~ l9. ~1.2. ··--· ·--..... (not to I!.T,'el!d I-I days) gf in the daytime 6:00 .a.m.
    [Show full text]
  • Securing Mac OS X - Presentation Slides
    Securing Mac OS X - Presentation Slides Securing Mac OS X Paul Day, pd(at)csse.uwa.edu.au “Keep others out - With Mac OS X, you may never need to worry about security again.” Top 10 reasons to upgrade Apple web-site 1 Securing Mac OS X - Presentation Slides Introduction Background • Mac OS X made a major transition from Classic to X. – Introduced Unix in the form of FreeBSD, NeXT and the Mach/Darwin Kernel • One of the more secure Unix installations by default, but still plenty of drawbacks. 2 Securing Mac OS X - Presentation Slides Overview Aims of this talk: • Discuss methods of hardening OS X from a: – Local user perspective – Network perspective • Point out vulnerabilities in recommendations and existing technologies. Similar work - why bother? • Tried not to let paranoia result in recommendations with little/no benefit but large inconvenience. • Included recommendations, and discussed vulnerabilities others have over-looked. • Simplified and reduced background and semi-relevant information. 3 Securing Mac OS X - Presentation Slides Local Security Local security? Methods to harden security within Mac OS X from a local user perspective: – With local physical access to the machine via its console, OR – With interactive local access to the machine via methods such as Secure Shell (SSH) or Apple Remote Desktop (ARD). 4 Securing Mac OS X - Presentation Slides Login Window • Enable it • Disable auto-login • Insert login window message • Change your password Login Window Enable it and disable auto-login •Uncheck “Automatically log in as:”
    [Show full text]
  • Tinkertool System 6 Reference Manual Ii
    Documentation 0632-1969/2 TinkerTool System 6 Reference Manual ii Version 6.99, July 21, 2021. US-English edition. MBS Documentation 0632-1969/2 © Copyright 2003 – 2021 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, macOS, iCloud, and FireWire are registered trademarks of Apple Inc. Intel is a registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Broadcom is a registered trademark of Broadcom, Inc. Trademarks or service marks are used for identification purposes only.
    [Show full text]