Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Intel Management Engine is a proprietary technology that consists of a microcontroller integrated into the Platform Controller Hub (PCH) chip and a set of built-in peripherals. The PCH carries almost all communication between the processor and external devices; therefore Intel ME has access to almost all data on the computer. The ability to execute third-party code on Intel ME would allow for a complete compromise of the platform. We see increasing interest in Intel ME internals from researchers all over the world. One of the reasons is the transition of this subsystem to new hardware (x86) and software (modified MINIX as an operating system). The x86 platform allows researchers to make use of the full power of binary code analysis tools. Previously, firmware analysis was difficult because earlier versions of ME were based on an ARCompact microcontroller with an unfamiliar set of instructions."
Posted Aug 29, 2017 21:32 UTC (Tue)
by SEJeff (guest, #51588)
[Link] (5 responses)
Posted Aug 30, 2017 1:03 UTC (Wed)
by jhoblitt (subscriber, #77733)
[Link] (4 responses)
Posted Aug 30, 2017 2:02 UTC (Wed)
by mjg59 (subscriber, #23239)
[Link] (3 responses)
Posted Aug 30, 2017 10:20 UTC (Wed)
by nix (subscriber, #2304)
[Link] (2 responses)
Really this is such a complicated tangle I'm amazed modern servers manage to boot at all. No wonder they take so damn long to do it. I guess it helps that both the ME and the BMC have watchdog timers so if the other one messes up too badly and the boot hangs an immediate reboot-and-try-again can be triggered.
Posted Aug 30, 2017 16:01 UTC (Wed)
by mjg59 (subscriber, #23239)
[Link] (1 responses)
Posted Aug 30, 2017 19:04 UTC (Wed)
by rahvin (guest, #16953)
[Link]
Which is part of the reason it's such a major security vulnerability. It's unknown and untested code running on a CPU the user has no control over that has DMA access and can override the main CPU. It can copy any data off the system and send it wherever it wants and the only way to block it would be to firewall it externally because the host OS would never see the communication. I understand the Enterprise idea behind these things but the code should be open source and updateable because there is as big of a security vulnerability here than there is in the awful IPMI BMC linux stacks that are out there. One of these days the Blackhats are going to start probing these things and I have no doubt there is going to be vulnerability after vulnerability that's going to allow blackhats to take completely control of connected computers. It will make the Mirari botnet look like childs play.
Posted Aug 29, 2017 23:00 UTC (Tue)
by ewan (guest, #5533)
[Link] (4 responses)
Who saw that coming?
Posted Aug 30, 2017 12:18 UTC (Wed)
by fratti (guest, #105722)
[Link] (3 responses)
If ME11 was older and smartphones didn't happen you'd probably be right.
That being said, MINIX being used to boot Linux is already funny enough in of itself.
Posted Sep 1, 2017 12:58 UTC (Fri)
by nix (subscriber, #2304)
[Link] (2 responses)
Posted Sep 2, 2017 0:59 UTC (Sat)
by rahvin (guest, #16953)
[Link] (1 responses)
Posted Sep 8, 2017 21:02 UTC (Fri)
by nix (subscriber, #2304)
[Link]
(I believe that at least some BMCs can function with no (other) CPUs, because my motherboard has a special front panel and mobo light state for 'no CPUs detected'. Those lights are driven by the BMC.)
Posted Aug 30, 2017 1:02 UTC (Wed)
by jhoblitt (subscriber, #77733)
[Link]
Posted Aug 30, 2017 1:44 UTC (Wed)
by ncm (guest, #165)
[Link] (2 responses)
Posted Aug 30, 2017 16:53 UTC (Wed)
by rahvin (guest, #16953)
[Link] (1 responses)
Enterprise customers are demanding these features, the ME allows you to provision any computer remotely and perform reboots, bios edits and anything else you can think of short of replacing hardware. The big companies want this and they pay Intel's exorbitant fee to turn the ME on because even though the ME runs at all times you can't actually use it without paying Intel.
Posted Aug 31, 2017 0:45 UTC (Thu)
by Garak (guest, #99377)
[Link]
That strikes me as exceptionally naive. I suspect the spooks work at Intel and have many friends and contacts that work at Intel. And in various enterprise software development groups, and related journalistic organizations. The spooks in my estimation have tremendous ability to influence very precisely this sort of thing. To imagine they all choose not to leverage that influence... yeah, can't see it.
"the ME allows you to provision any computer remotely and perform reboots, bios edits and anything else you can think of short of replacing hardware."
I'm skeptical of this assertion. bios edits are just writing bits, I'm quite certain that long ago I saw pre-ME era computers that could manage that. Likewise a reboot-on-magic-lancookie KISS alternative for rebooting sounds like something I would trust more. If this was all innocent of any consciousness of decreased security for users, they would let the FOSS community freely analyze and enhance the code. But no, I imagine the spooks are quite happy hoarding that ability as much as they can for as long as they can. And my money is on them having entrenched themselves two layers deeper by the time the FOSS community gets into the security enhancement game of ME code. I mean, we witnessed how the Snowden story was reacted to by the government.
Posted Sep 6, 2017 0:43 UTC (Wed)
by metux (guest, #60789)
[Link]
That could give us interesting opportunities: put our own OS on it - maybe an barebox, plan9 or linux.
The hard part probably is finding out what the lowlevel initialization code actually does
I'm really looking forward to MACH_X86_PCH ;-)
If we continue this idea, we maybe could even get rid of the whole BIOS/UEFI crap, along w/ ACPI, etc.
The new system could look like some AMP approaches, we already have on some embedded platforms:
* own OS on PCH, with serial console (maybe even ssh ?)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
On a side note, this probably makes Minix one of the world's most widely deployed OSes.
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
Disabling Intel ME 11 via undocumented mode (Positive Technologies)
(IOW: what's necessary to bring up the main CPU). OTOH, I'm sure, sooner or later
they'll find out. Hopefully they also find something that can be used as serial console (gpios ?)
* does all the power management, clocking, etc, all the really board specific stuff
* provides an virtio interface to the main CPU(s)
* maybe can partition multiple CPUs into separate memory / IO spaces
* maybe can directly talk to storage devices (perhaps SDHC ?) for filesystems
* additional functionalities like suspend, board-specific IOs, etc, via 9P channels
* provides an early VGA console