INTEL-SA-00086 security report , some links + my questions.

plopke

Senior member
Jan 26, 2010
238
74
101
Not sure if i should have made a separate thread about this , this security statement of Intel was mentioned in http://www.portvapes.co.uk/?id=Latest-exam-1Z0-876-Dumps&exid=thread...onal-jtag-for-intel-csme-via-usb-dci.2526365/

INTEL :
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
short version : Intel remote Management Engine exploits for almost all 6-8 generation cpu's and more.

DETECTION TOOL:
https://downloadcenter.intel.com/download/27150 , unzip run the GUI edition

HOW TO FIX :
driver +bios update , for example Gigabyte is shipping new bios already for 300-200series and i assume many others.

IMPACT :
I can not figure this one out so I had some questions , it sounds kinda bad.

My questions:
1) there is no way to disable this in bios? If I understand this NO.
2)What if your system was never setup for remote managements logins , if i read the instruction you would have had it setup once locally or by OEM?
3)Does this effect only local LAN?




UPDATE :

I did not pay attention to this but they updated affected cpu's from generation 6-8 -> 1-8 in top list and specific cpu's all the way down to the 3/4 core generation. Well uuuuuuuurgh.

this is NOT related to the addressable user/kernal memory space violation that is resulting in rumoured new kernel code in linux/OS X/windows , that a other thing to cry about.
 
Last edited:

gorobei

Diamond Member
Jan 7, 2007
3,714
1,069
136
oh its major league bad. it allows all kinds of malicious exploits and it operates below the os so anti virus and other tools cant see it. it also allows access to ram so encryption keys are potentially visible.

linus tech covered it in their podcast.
https://www.youtube.com/watch?v=neQhMG4izuU#

the big takeaway is that most systems will never be properly patched with the bios update.

never been a better time to go red as far as security goes. the sad part is that people were sounding the warning bells when IME first came out.
 

VirtualLarry

No Lifer
Aug 25, 2001
56,453
10,120
126
the big takeaway is that most systems will never be properly patched with the bios update.

never been a better time to go red as far as security goes. the sad part is that people were sounding the warning bells when IME first came out.
Does this mean that ALL Intel (last 8 years?) rigs, with IME in the chipset, regardless if you have AMT BIOS support, are vulnerable to below-OS-level exploits? That's HORRIBLE.

Thank GOD my main rigs are all AMD now.

Edit: Can we say that "Security through obscurity" is a BAD IDEA yet?
 

Dayman1225

Golden Member
Aug 14, 2017
1,153
982
146
Does this mean that ALL Intel (last 8 years?) rigs, with IME in the chipset, regardless if you have AMT BIOS support, are vulnerable to below-OS-level exploits? That's HORRIBLE.

Thank GOD my main rigs are all AMD now.

Edit: Can we say that "Security through obscurity" is a BAD IDEA yet?


Heres the effected list.
 

SarahKerrigan

Senior member
Oct 12, 2014
609
1,489
136
Does this mean that ALL Intel (last 8 years?) rigs, with IME in the chipset, regardless if you have AMT BIOS support, are vulnerable to below-OS-level exploits? That's HORRIBLE.

Thank GOD my main rigs are all AMD now.

Edit: Can we say that "Security through obscurity" is a BAD IDEA yet?

AMD has an equivalent of their own, with the Platform Security Processor. It has had far less reverse-engineering effort directed at it so far.

For those of you in the position of doing enterprise-scale computer purchasing, I really recommend that you make it clear to your channel representatives that mandatory magic black boxes are not acceptable. Remote management features are useful, but transparency and controllability need to be key.
 

Dayman1225

Golden Member
Aug 14, 2017
1,153
982
146
That's the point, it's a government backdoor. Intel is probably muzzled from saying much about ME.

They will only say something when they are forced too (or in this case do an overview of security). I'm just glad they acknowledged it instead of ignoring it and pretending it isn't problem. Though either way isn't ideal.
 

SarahKerrigan

Senior member
Oct 12, 2014
609
1,489
136
That's the point, it's a government backdoor. Intel is probably muzzled from saying much about ME.

Considering other CPU vendors (IBM being the obvious example) don't have an ME equivalent, that seems dubious to me.

The media industry seems to be a more likely source of ME pushing, since the Protected Audio/Video Pathway runs on it.
 

thecoolnessrune

Diamond Member
Jun 8, 2005
9,673
580
126
Considering other CPU vendors (IBM being the obvious example) don't have an ME equivalent, that seems dubious to me.

The media industry seems to be a more likely source of ME pushing, since the Protected Audio/Video Pathway runs on it.

That's really only an effect of scale. ME is designed for end-user systems. IBM CPUs aren't in those devices. The devices that those CPUs are in already have a low-level access system built in by mandatory design called the Flexible Service Processor (FSP). It must be installed for a supported IBM System to function, as it's used by the IBM HMC (Hardware Management Console) that IBM also mandates in most supported environments. The only differences between the two come down to use cases, as the ME Engine is mostly suited to Auditing and Recovery Tasks, while the FSP is a core design for everyday systems administration (because servers aren't as likely to walk away or be stolen).

Unfortunately, alot of it is just in the nature of Baseband access. Lots of devices have it, and while it would be nice if every one of them showed their cards, the fact of the matter is, showing all your cards means a commitment to keep it working. By not showing the inner workings, you keep your system protected from anyone who isn't willing to really get their hands dirty with messing with the system. And when it does fail, you can say "well it was old anyways" (especially in the case of home electronic devices). From a business standpoint, it's just easier.
 

SarahKerrigan

Senior member
Oct 12, 2014
609
1,489
136
That's really only an effect of scale. ME is designed for end-user systems. IBM CPUs aren't in those devices. The devices that those CPUs are in already have a low-level access system built in by mandatory design called the Flexible Service Processor (FSP). It must be installed for a supported IBM System to function, as it's used by the IBM HMC (Hardware Management Console) that IBM also mandates in most supported environments. The only differences between the two come down to use cases, as the ME Engine is mostly suited to Auditing and Recovery Tasks, while the FSP is a core design for everyday systems administration (because servers aren't as likely to walk away or be stolen).

Unfortunately, alot of it is just in the nature of Baseband access. Lots of devices have it, and while it would be nice if every one of them showed their cards, the fact of the matter is, showing all your cards means a commitment to keep it working. By not showing the inner workings, you keep your system protected from anyone who isn't willing to really get their hands dirty with messing with the system. And when it does fail, you can say "well it was old anyways" (especially in the case of home electronic devices). From a business standpoint, it's just easier.

An FSP is needed on most (all?) AIX/iSeries machines, but OpenPower (PowerNV) doesn't have it. OpenPower systems have a fully open-source firmware stack*, including the baseband management controller, the power management controller, the self-boot engine, and the system boot firmware.

Pretty cool, no?

* some are better than others - S812LC is missing some open components (mainly BMC), while S822LC is fully open
 

thecoolnessrune

Diamond Member
Jun 8, 2005
9,673
580
126
An FSP is needed on most (all?) AIX/iSeries machines, but OpenPower (PowerNV) doesn't have it. OpenPower systems have a fully open-source firmware stack*, including the baseband management controller, the power management controller, the self-boot engine, and the system boot firmware.

Pretty cool, no?

* some are better than others - S812LC is missing some open components (mainly BMC), while S822LC is fully open

I agree, OpenPower is pretty cool (we even have one in the lab), but I don't think it comes with a "full" stack, even in the S822LC. I do not believe the OpenPower Stack however stipulates anything about Systems Management? There is information on how to interact with the CPU and firmwares, and most, if not all OpenPower Servers communicate with their Management System via IPMI, but there is nothing that I know of in OpenPower that stipulates that the BMC must be open. The BMC in most implementations is a little black box that communicates with the rest of the system, as has the option of being interfaced with via IPMI, but it doesn't stipulate that proprietary command sets can't also be used, it doesn't stipulate that it needs disclosed, and it doesn't stipulate that the code for the BMC itself must be made available (and as far as I know it's not for any BMCs. The two major providers in OpenPower, IBM, and TYAN, don't offer up the code or designs of their BMCs, just that they're in place).
 

SarahKerrigan

Senior member
Oct 12, 2014
609
1,489
136
I agree, OpenPower is pretty cool (we even have one in the lab), but I don't think it comes with a "full" stack, even in the S822LC. I do not believe the OpenPower Stack however stipulates anything about Systems Management? There is information on how to interact with the CPU and firmwares, and most, if not all OpenPower Servers communicate with their Management System via IPMI, but there is nothing that I know of in OpenPower that stipulates that the BMC must be open. The BMC in most implementations is a little black box that communicates with the rest of the system, as has the option of being interfaced with via IPMI, but it doesn't stipulate that proprietary command sets can't also be used, it doesn't stipulate that it needs disclosed, and it doesn't stipulate that the code for the BMC itself must be made available (and as far as I know it's not for any BMCs. The two major providers in OpenPower, IBM, and TYAN, don't offer up the code or designs of their BMCs, just that they're in place).

Tyan doesn't, but IBM does. The S822LC runs OpenBMC, and you can compile your own from source. "A Reference BMC for Power and Beyond" goes into some detail about this; the OP-specific source can be found at https://github.com/openbmc/openbmc/tree/master/meta-openbmc-machines/meta-openpower, and regular builds can be found at openpower.xyz.

You are correct that the spec doesn't mandate an open BMC, which is why I specified that some are more open then others. Firestone (S822LC) is the most open option at this point.
 

thecoolnessrune

Diamond Member
Jun 8, 2005
9,673
580
126
Tyan doesn't, but IBM does. The S822LC runs OpenBMC, and you can compile your own from source. "A Reference BMC for Power and Beyond" goes into some detail about this; the OP-specific source can be found at https://github.com/openbmc/openbmc/tree/master/meta-openbmc-machines/meta-openpower, and regular builds can be found at openpower.xyz.

You are correct that the spec doesn't mandate an open BMC, which is why I specified that some are more open then others. Firestone (S822LC) is the most open option at this point.

Good find. That makes sense. In this situation, Intel has their own stack with Intel ME, and they pretty much control the whens and hows of its implementation. IBM is leveraging two separate projects, OpenPower, and OpenBMC to make an open system, but neither project on its own represents Intel's offering. It does show it can be done, but like most FOSS endeavors, its the initial difficulty with getting the solution packaged together and in products. OpenBMC is its own thing, so it would be up to OpenPower to mandate OpenBMC for it's management capabilities (or better yet, require that any BMC in use be open). At that point you would have an equivalent stack to Intel's closed source offering, but open.

In this situation, it's at least a glimmer of hope that there's at least 1 server out there with an equivalent, but open stack, even if it isn't very popular.
 

plopke

Senior member
Jan 26, 2010
238
74
101
the intel document got updated , was not aware even more system were affected all the way up to generation 3/4 core , document even mention all the way up to first core generation ...........

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! sigh
 

elpokor

Junior Member
May 22, 2017
23
9
51
the intel document got updated , was not aware even more system were affected all the way up to generation 3/4 core , document even mention all the way up to first core generation ...........

I'm not even surprised, to be honest. It's clearly not a bug but a feature for Intel Agencies.

Sorry for the mediocre pun
 
Reactions: NTMBK
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |