intel hopefully fucked
On Thu, Mar 05, 2020 at 07:37:57PM -0300, Punk-Stasi 2.0 wrote:
http://blog.ptsecurity.com/2020/03/intelx86-root-of-trust-loss-of-trust.html
This is great news. Countdown to end user control over TPM from the sound of it. It's always good when hubris is put in its place, and further when end users regain control over the 'inanimate' objects they purchase...
I'm sending this again because it seems kinda on-topic (as opposed to say, the flu hysteria, 'womens day' and similar garbage) http://blog.ptsecurity.com/2020/03/intelx86-root-of-trust-loss-of-trust.html It's not clear to me how the exploit is supposed to work, and I haven't researched it further, but as far as I can tell it seems as if all chips have one single, master private key in them...or something like that. My naive assumption is that all locked down hardware-malware has a publick key in ROM, and that the chip will only accept signed firmware. So there shouldn't be any private key. But the intel system looks a lot more complex. So, what's going on?
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Monday, March 9, 2020 8:20 PM, Punk-Stasi 2.0 <punks@tfwno.gf> wrote:
I'm sending this again because it seems kinda on-topic (as opposed to say, the flu hysteria, 'womens day' and similar garbage)
http://blog.ptsecurity.com/2020/03/intelx86-root-of-trust-loss-of-trust.html
It's not clear to me how the exploit is supposed to work, ...
So, what's going on?
i'll break this into two parts. the scope, and the details. regarding scope: - "The larger worry is that, because this vulnerability allows a compromise at the hardware level, it destroys the chain of trust for the platform as a whole." this means that the security boundary of root(s) of trust get violated through exploitation of this vulnerability. a fatal error, from an integrity perspective... how do these roots get r00ted? - "Intel's security is designed so that even arbitrary code execution in any Intel CSME firmware module would not jeopardize the root cryptographic key (Chipset Key), but only the specific functions of that particular module." one root / trust anchor here, the Chipset Key. being able to manipulate this key is equivalent to having the private key, to sign malicious code in CSME context. so while the system is designed to robustly protect the Chipset Key, exploitation in early ROM compromises this Chipset Key root of trust. - "Unfortunately, no security system is perfect. Like all security architectures, Intel's had a weakness: the boot ROM, in this case. An early-stage vulnerability in ROM enables control over reading of the Chipset Key and generation of all other encryption keys." yup, early exploit in boot ROM lets you control Chipset key, and by extension, all of the other keys generated from this compromised root of trust, including Soft TPM keys, content protection keys, etc. - "One of these keys is for the Integrity Control Value Blob (ICVB). With this key, attackers can forge the code of any Intel CSME firmware module in a way that authenticity checks cannot detect. This is functionally equivalent to a breach of the private key for the Intel CSME firmware digital signature, but limited to a specific platform." what is meant by limited to a specific platform, is that this exploit is low level and platform specific. to attack another platform, you'd need to adjust exploit accordingly. they don't state what other platforms, if any, they've successfully exploited via this same vulnerability. - "We will provide more technical details in a full-length white paper to be published soon." will be fun to see :) best regards,
On 3/9/20 1:22 PM, Punk-Stasi 2.0 wrote:
I'm sending this again because it seems kinda on-topic (as opposed to say, the flu hysteria, 'womens day' and similar garbage)
http://blog.ptsecurity.com/2020/03/intelx86-root-of-trust-loss-of-trust.html
It's not clear to me how the exploit is supposed to work, and I haven't researched it further, but as far as I can tell it seems as if all chips have one single, master private key in them...or something like that.
My naive assumption is that all locked down hardware-malware has a publick key in ROM, and that the chip will only accept signed firmware. So there shouldn't be any private key. But the intel system looks a lot more complex.
So, what's going on?
The one malicious use I've seen mentioned is the possibility of a virtually undetectable keylogger running at bios level during the machine's operation. Rr
On Mon, 9 Mar 2020 19:07:19 -0700 Razer <g2s@riseup.net> wrote:
The one malicious use I've seen mentioned is the possibility of a virtually undetectable keylogger running at bios level during the machine's operation.
well, that's the "out of the box" configuration of the IME(intel 'management' engine) and the keylogger is the gchq-nsa keylogger, and it's not at bios level, but even lower. And not just a keylogger but it has access to all of system memory etc. so one malicious application would be for 'bad' people other than gchq-nsa to have control of the ME. But funnily enough, that means that the guy who paid for the computer could also replace the gchq-nsa firm-malware with some FOSS code and have a processor that he actually 'owns'. but, that sounds too good to be true, so we'll see....
participants (4)
-
coderman
-
Punk-Stasi 2.0
-
Razer
-
Zenaan Harkness