Another vulnerability

Dave Emery die at pig.die.com
Thu Jul 24 22:02:03 PDT 1997



With Intel, Hackers Check In When Bugs Check Out 

By Alexander Wolfe

SANTA CLARA, Calif. -- Intel's BIOS Update technology to quickly
fix bugs that crop up in its microprocessors without having to recall
the
chips may contain a Trojan horse -- a hole that could potentially enable
hackers to wreak havoc on the company's CPUs -- said a BIOS expert
familiar with the technology.However, other industry experts said they
believe Intel is staking out a pace-setting position with its
bug-busting
technology. They give the semiconductor giant kudos for using BIOS
Update to reduce the impact of bugs in the face of a verification crisis
that
makes it increasingly difficult to ensure that microprocessors with tens
of
millions of transistors are validated and free of flaws.

BIOS Update is a hidden feature that can fix bugs in Pentium Pro and
Pentium II CPUs by patching the microcode inside the microprocessor.
When the processor boots up, the BIOS loads the patches, which are
contained in a 2,048-byte-long BIOS Update data block that is supplied
by Intel.
"The problem is, the BIOS cannot verify whether the BIOS Update data
block contains real microcode or not," claimed one BIOS expert, who
requested anonymity. "As long as the header and the checksum are okay,
the BIOS will load that microcode into the microprocessor. Some hacker
could actually wipe out microcode in the CPU. There is nothing that can
prevent this."

Intel doesn't see such a scenario as a realistic threat, pointing to the
fact
that the BIOS Update data block is encrypted. "We've spent quite a lot
of time thinking about such scenarios to make sure we had sufficient
mechanisms in place so you couldn't introduce your own flavor of BIOS
Update into the processor," said Ajay Malhortra, a technical marketing
manager based here at Intel's microprocessor group. "Not only is the
data block containing the microcode patch encrypted, but once the
processor examines the header of the BIOS update, there are two levels
of encryption in the processor that must occur before it will
successfully
load the update."

But Intel's biggest security feature may lie in keeping the technical
details
behind its BIOS Update technology a closely guarded secret. "There is
no documentation," said Frank Binns, an architect in Intel's
microprocessor group. "It's not as if you can get an Intel 'Red Book'
with
this stuff written down. It's actually in the heads of less than 10
people in
the whole of Intel."

However, some experts remain unconvinced. "This is just like any other
technology -- if you want to reverse-engineer it, you can," said Ed
Curry,
president of Lone Star Evaluation Laboratories, a Georgetown, Texas
microprocessor benchmarking and testing company. "You can do it by
brute force, or a hacker could obtain information from someone inside
the
company or someone who had access to the documentation."

Indeed, Curry, who said he's made presentations on computer-security
issues to the U.S. Defense Department, said he believes microprocessor
hardware in general is much more vulnerable to hacking than is commonly
believed.

"This is the big hole in our government security programs," he said.
"They
don't look at hardware as well as they should; they only look at
software.
This goes beyond desktop computers. You have to remember that
microprocessors are now embedded in our weapons systems."

Nevertheless, it's widely believed that it would be tough for a hacker
to
fake a complete microcode patch, in no small measure because it's also
very difficult to obtain documentation that details the internal
representation -- word widths and usage of all the bits -- of Pentium
Pro
microcode. In the era of the 8086 and 8088, microcode documentation
was readily available. But such information is provided to selected
developers only under tight nondisclosure restrictions. "It's a tightly
held
secret," Intel's Binns said.

New-Tech Jitters

However, it is seen as more feasible for a hacker to successfully fake
the
header and checksum portion of the BIOS Update data block --
something that could still cause the microprocessor to crash or lock up.

According to another BIOS expert, talk of potential Trojan horses might
be nothing more than jitters about new technology. "This is a new thing
in
the market," said the expert, who likened it to the early days of flash
BIOS.

"There was a great fear factor when the industry started using flash
BIOSes," he said, "where concerns were raised that somebody could go
in and destroy a system by flashing in a new BIOS containing an errant
piece of code. I think today there's a fear that someone will play
around
with this BIOS Update feature and try to cause havoc with Intel's
CPUs."

As an added security precaution, some BIOS manufacturers limit access
to their software. "As a matter of policy, we don't make our BIOS code
available to anyone other than a system vendor or motherboard
manufacturer," said Thomas Benoit, corporate marketing manager at
BIOS vendor Phoenix Technologies, Natick, Mass. "We don't believe
anyone should be twiddling the bits in our BIOS code."

Irrespective of Trojan horse scenarios, many experts see Intel's
bug-busting technology as a boon. "This feature benefits everyone -- it
shouldn't be viewed as a liability, but as an asset," said Mark Huffman,
marketing manager at American Megatrends, in Norcross, Ga. "It allows
you to be able to update your processor without pulling it out of the
system. Obviously, you can flash in a new BIOS a lot quicker than you
can pop the case, pop the CPU and wait for a replacement."

Indeed, BIOS Update has already been successfully used in the field to
fix glitches in Pentium Pro-class CPUs, according to an Intel spokesman
and to sources at several major BIOS vendors.

"Yes, it is used," said an engineer at one vendor. "I personally know of
five different things in the Pentium Pro related to multiprocessing,
system
management interrupt and other areas."

"I think it'll be very useful," Phoenix Technology's Benoit said. "It's
really to Intel's benefit that BIOS vendors are implementing this
feature."

"It's a very good feature," said Laurent Gharda, vice president of
marketing at BIOS vendor Award Software International, in Mountain
View, Calif. "The downside is going to be lower performance, perhaps.
But the upside is avoiding a chip recall, as took place a few years
ago."
Intel's Pentium was recalled in January 1995 following the revelation of
a
bug in the processor's floating-point divide operations.

Moreover, some say BIOS Update may signal the start of an
industrywide trend. "These new Pentium-class clone CPUs that have
recently been announced -- like the Centaur microprocessor -- they're
going to do the same type of process," said Huffman at American
Megatrends. Centaur -- officially the IDT-C6 -- is made by Centaur
Technology, an Austin, Texas-based subsidiary of Integrated Device
Technology. It was introduced in May and delivered to beta customers in
Taiwan last month.

At Centaur, a spokesman said, "The current silicon we are sampling has
that capability, but in the production version of the chip we are
dropping
the feature, because it necessitates an increased die size."

As a result, any bugs that crop up will have to be fixed via a mask
revision
-- a path the spokesman described as preferable. "Ideally, you want to
do
fixes by mask changes," he said. "That way, you'll have clean silicon
moving forward. Otherwise, you have lots of different versions of BIOS
floating around." But Centaur can easily add the feature back into
future
versions, if it wishes.

For its part, Advanced Micro Devices of Sunnyvale, Calif., does not have
the feature in its K5 and K6 microprocessors, according to a company
spokesman. "There are some errata that can't be fixed by a BIOS update
-- specifically, a hardwired instruction can't be changed." He added
that
AMD has the ability to add the feature into future designs, if it deems
it
necessary.

Still, Huffman of American Megatrends thinks the BIOS Update feature
has legs. "I think you'll see a trend toward CPU manufacturers
incorporating this capability so they can perform microcode updates in
the
field," he said. "It gives them more flexibility in their manufacturing
process -- they can keep their fab lines running and don't have to stop
them to make a mask change and switch to a new stepping every time
there's an
erratum. More important, they don't have to recall the stepping that has
the bug. They can just issue a BIOS update."

Intel doesn't tell the BIOS vendors what bugs are being fixed in any
given BIOS Update. However, there appears to be a way to figure that
out.

 "It's true you can't see what's happening from a binary standpoint,"
the
BIOS expert who requested anonymity said. "But Intel does release
errata along with the update, which gives an explanation of what the
update is for. To that extent, you know what they're fixing, though you
don't know the exact binary details of what's occurring."

Although the BIOS Update feature is firmly in place in the Pentium Pro
and Pentium II families, Intel declined to comment on whether it is
being
used in Pentiums with the MMX multimedia extensions. Looking ahead,
deciding whether to implement the technology in future CPU families will
involve architectural considerations that extend far beyond a desire to
bust
bugs.

"We're just learning the power this technology really has," Intel's
Malhortra said. "In concert with that, we're also becoming more aware of
some of its limitations. For example, the trade-off between die size
that's
used for microcode-patchable space [i.e., for the BIOS Update feature]
vs. die size that can be devoted to performance enhancements or to
additional micro-architectural features is a tough one."

Validation Boost

"One could make the argument that, with improved validation processes,
you won't need to expand silicon real estate devoted to the
microcode-patch feature, because early validation would catch the bulk
of
problems," Malhortra added.

Nevertheless, there's a growing concern that microprocessor bugs could
become a bigger problem as 64-bit CPU architectures -- which will be
orders of magnitude more difficult to validate than current designs --
are
introduced toward the end of the decade.

"It's becoming abundantly clear that the ability to manufacture in high
volume and to provide a reliable product through validation are somewhat
mutually exclusive," Intel's Binns said. "It takes a fairly large amount
of
time to wring all the errata out of a processor. Fixing errata by making
changes to silicon is OK, if you can make those changes quickly.
Unfortunately, with the complexity of the processors we've got today,
that's not acceptable. The smarter we can get with features like this,
the
less errata we bring to market. And if we do see errata after we ship,
we
can correct them in situ."

----- End of forwarded message from Richard Crisp -----







More information about the cypherpunks-legacy mailing list