Disabling Intel ME in Firmware
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Plasma on Mobile Devices
Plasma on Mobile devices Application Ecosystem MC Bhushan Shah KDE Developer Agenda ● Initial development of the Plasma Mobile ● Basic architecture details ● Advantages to KDE community ● Application ecosystem and development ● Future for Plasma Mobile ● Challenges Introduction ● KDE developer and sysadmin ● Plasma Mobile maintainer and lead developer ● Employed by Bluesystems GmbH ● From Vadodara, India KDE ● Previously known as the K Desktop Environment ● Now community, which creates free software for end users ● Several products including Plasma, KDE Frameworks, KDE applications. Plasma Mobile ● Announced in the July 2015 ● Vision of providing completely free and open-source mobile platform which respects user’s privacy and freedom. ● Initial prototype on the LG Nexus 5. Initial Development ● LGE Nexus 5 as reference device ● Ubuntu Touch 15.04 (vivid) as base system ● Makes use of the Android binary blobs / drivers ● Can also run on the desktop system for development Basic architecture details ● KWin wayland as compositor ● DRM/GBM or hwcomposer backends ● plasmashell and mobile shell package ● QtQuickControls2 and Kirigami for application development Advantages to KDE community ● Several performance improvements ● Better touch input support in applications and shell ● Improvements in Wayland support ● More modular and re-usable user interfaces Application ecosystem and development ● QtQuickControls2 and Kirigami as toolkit ● CMake/QMake as a buildsystem ● Various bundle formats as well as native distribution packaging for the distribution -
How to Hack a Turned-Off Computer Or Running Unsigned
HOW TO HACK A TURNED-OFF COMPUTER, OR RUNNING UNSIGNED CODE IN INTEL ME Contents Contents ................................................................................................................................ 2 1. Introduction ...................................................................................................................... 3 1.1. Intel Management Engine 11 overview ............................................................................. 4 1.2. Published vulnerabilities in Intel ME .................................................................................. 5 1.2.1. Ring-3 rootkits.......................................................................................................... 5 1.2.2. Zero-Touch Provisioning ........................................................................................... 5 1.2.3. Silent Bob is Silent .................................................................................................... 5 2. Potential attack vectors ...................................................................................................... 6 2.1. HECI ............................................................................................................................... 6 2.2. Network (vPro only)......................................................................................................... 6 2.3. Hardware attack on SPI interface ..................................................................................... 6 2.4. Internal file system ......................................................................................................... -
Issue #63, July 2000 Starting Our SIXTH Year in Publishing!
Issue #63, July 2000 Starting our SIXTH year in publishing! 64a Page 1 Wed, Jul 2000 Cover by: Bill Perry [email protected] Published by My Mac Productions 110 Burr St., Battle Creek, MI 49015-2525 Production Staff Tim Robertson • [email protected] Publisher / Creator / Owner Editor-in-Chief Adam Karneboge • [email protected] Webmaster / Contributing Editor Roger Born • [email protected] Website Edior Barbara Bell • [email protected] Director, Public Relations •Jobs & Woz • Inspiration Artwork Created by: •Mike Gorman• [email protected] •Bill Perry• [email protected] •Tim Robertson• [email protected] •Adam Karneboge• [email protected] This Publication was created with: DOCMaker v4.8.4 http://www.hsv.tis.net/~greenmtn & Adobe Acrobat 4.0 http://www.adobe.com 64a Page 2 Wed, Jul 2000 Other Tools: Adobe Photoshop 5.5, 5.0.1 ColorIt! 4.0.1 BBEdit Lite ClarisWorks 5.0 Microsoft Word 98 GraphicConverter Snapz Pro 2.0 SimpleText Netscape Communicator 4.6.1 Internet Explorer 4.5 Eudora Pro 4.0.2 FileMaker Pro 4.0v3 QuickKeys 4.0 and the TitleTrack CD Player (To keep us sane!) Website hosted by Innovative Technologies Group Inc. http://www.inno-tech.com My Mac Magazine ® 1999-2000 My Mac Productions. All Rights Reserved. 64a Page 3 Wed, Jul 2000 http://www.inno-tech.com http://www.smalldog.com http://www.megamac.com 64a Page 4 Wed, Jul 2000 Advertising in My Mac = Good Business Sense! With over 500,000 website visits a month and thousands of email subscribers, You just can't go wrong! Send email to [email protected] for information. -
Intel Management Engine Deep Dive
Intel Management Engine Deep Dive Peter Bosch About me Peter Bosch ● CS / Astronomy student at Leiden University ● Email : [email protected] ● Twitter: @peterbjornx ● GitHub: peterbjornx ● https://pbx.sh/ About me Previous work: ● CVE-2019-11098: Intel Boot Guard bypass through TOCTOU attack on the SPI bus (Co-discovered by @qrs) Outline 1. Introduction to the Management Engine Operating System 2. The Management Engine as part of the boot process 3. Possibilities for opening up development and security research on the ME Additional materials will be uploaded to https://pbx.sh/ in the days following the talk. About the ME About ME ● Full-featured embedded system within the PCH ○ 80486-derived core ○ 1.5MB SRAM ○ 128K mask ROM ○ Hardware cryptographic engine ○ Multiple sets of fuses. ○ Bus bridges to PCH global fabric ○ Access to host DRAM ○ Access to Ethernet, WLAN ● Responsible for ○ System bringup ○ Manageability ■ KVM ○ Security / DRM ■ Boot Guard ■ fTPM ■ Secure enclave About ME ● Only runs Intel signed firmware ● Sophisticated , custom OS ○ Stored mostly in SPI flash ○ Microkernel ○ Higher level code largely from MINIX ○ Custom filesystems ○ Custom binary format ● Configurable ○ Factory programmed fuses ○ Field programmable fuses ○ SPI Flash ● Extensible ○ Native modules ○ JVM (DAL) Scope of this talk Intel ME version 11 , specifically looking at version 11.0.0.1205 Platforms: ● Sunrise Point (Core 6th, 7th generation SoC, Intel 100, 200 series chipset) ● Lewisburg ( Intel C62x chipsets ) Disclaimer ● I am in no way affiliated with Intel Corporation. ● All information presented here was obtained from public documentation or by reverse engineering firmware extracted from hardware found “in the wild”. ● Because this presentation covers a very broad and scarcely documented subject I can not guarantee accuracy of the contents. -
Coreboot - the Free firmware
coreboot - the free firmware Linux Club of Peking University April 9th, 2016 . Linux Club of Peking University coreboot - the free firmware April 9th, 2016 1 / 30 1 History 2 Why use coreboot 3 How coreboot works 4 Building and using coreboot 5 Flashing 6 Utilities and Debugging 7 Contribute to coreboot 8 Proprietary Components 9 References . Linux Club of Peking University coreboot - the free firmware April 9th, 2016 2 / 30 History: from LinuxBIOS to coreboot coreboot has a very long history, stretching back more than 15 years to when it was known as LinuxBIOS. While the project has gone through lots of changes over the years, many of the earliest developers still contribute today. Linux Club of Peking University coreboot - the free firmware April 9th, 2016 3 / 30 LinuxBIOS v1: 1999-2000 The coreboot project originally started as LinuxBIOS in 1999 at Los Alamos National Labs (LANL) by Ron Minnich. Ron needed to boot a cluster made up of many x86 mainboards without the hassles that are part of the PC BIOS. The goal was to do minimal hardware initilization in order to boot Linux as fast as possible. Linux already had the drivers and support to initialize the majority of devices. Ron and a number of other key contributors from LANL, Linux NetworkX, and other open source firmware projects successfully booted Linux from flash. From there they were able to discover other nodes in the cluster, load a full kernel and user space, and start the clustering software. Linux Club of Peking University coreboot - the free firmware April 9th, 2016 4 / 30 LinuxBIOS v2: 2000-2005 After the initial success of v1, the design was expanded to support more CPU architectures (x86, Alpha, PPC) and to support developers with increasingly diverse needs. -
Announcement
Announcement Total 100 articles, created at 2016-03-15 00:04 1 Five things to expect from Apple's imminent iPhone launch All the rumours about Apple's 21 March launch in one handy place,Hardware,Mobile 2016-03-15 00:03 2KB www.v3.co.uk (2.00/3) Phones,Communications ,Apple,iPhone 2 Microsoft is Ticking People Off with Automatic Windows 10 Upgrades (2.00/3) The Internet community is up in arms at Microsoft pushing out automatic and supposedly unauthorized Windows 10 upgrades. 2016-03-14 17:24 3KB www.maximumpc.com 3 Microsoft to bolster artificial intelligence using Minecraft Not just a blockhead now 2016-03-14 15:54 2KB www.theinquirer.net (2.00/3) 4 Code.org volunteer emails exposed in information leak As a result, a Singaporean firm decided to try and poach a few members. 2016-03-14 12:59 3KB www.zdnet.com (2.00/3) 5 CityFibre CEO Greg Mensch's ambitious plan to bring FTTP to 100 UK towns and cities - and beat BT in the process Firm's £90m acquisition of Kcom in December has made it a force to be reckoned with in the broadband space,Telecoms ,BT 2016-03-15 00:03 749Bytes www.v3.co.uk 6 Microsoft releases 13 security bulletins in latest Patch Tuesday Patch now or be vulnerable as hackers get to work on coding exploits,Security ,Microsoft,patch Tuesday 2016-03-15 00:03 2KB www.theinquirer.net 7 Microsoft accused of bundling new Windows 10 nagware into latest Patch Tuesday updates More Windows 10 nagware being sneaked into Microsoft updates,Operating Systems,Software,Security ,Microsoft,operating system,Windows Update,security,patch Tuesday -
Download Android Os for Phone Open Source Mobile OS Alternatives to Android
download android os for phone Open Source Mobile OS Alternatives To Android. It’s no exaggeration to say that open source operating systems rule the world of mobile devices. Android is still an open-source project, after all. But, due to the bundle of proprietary software that comes along with Android on consumer devices, many people don’t consider it an open source operating system. So, what are the alternatives to Android? iOS? Maybe, but I am primarily interested in open-source alternatives to Android. I am going to list not one, not two, but several alternatives, Linux-based mobile OSes . Top Open Source alternatives to Android (and iOS) Let’s see what open source mobile operating systems are available. Just to mention, the list is not in any hierarchical or chronological order . 1. Plasma Mobile. A few years back, KDE announced its open source mobile OS, Plasma Mobile. Plasma Mobile is the mobile version of the desktop Plasma user interface, and aims to provide convergence for KDE users. It is being actively developed, and you can even find PinePhone running on Manjaro ARM while using KDE Plasma Mobile UI if you want to get your hands on a smartphone. 2. postmarketOS. PostmarketOS (pmOS for short) is a touch-optimized, pre-configured Alpine Linux with its own packages, which can be installed on smartphones. The idea is to enable a 10-year life cycle for smartphones. You probably already know that, after a few years, Android and iOS stop providing updates for older smartphones. At the same time, you can run Linux on older computers easily. -
The Strangeness Magnetic Moment of the Proton in the Chiral Quark Model
The Strangeness Magnetic Moment of the Proton in the Chiral Quark Model L. Hannelius, D.O. Riska Department of Physics, University of Helsinki, 00014 Finland and L. Ya. Glozman Institute for Theoretical Physics, University of Graz, A-8019 Graz, Austria Abstract The strangeness magnetic moment of the proton is shown to be small in the chiral quark model. The dominant loop contribution is due to kaons. The K∗ loop contributions are proportional to the difference between the strange and light constituent quark masses or −2 mK∗ and therefore small. The loop fluctuations that involve radiative transitions between K∗ mesons and kaons are small, when the cut-off scale in the loops is taken to be close to the chiral symmetry restoration scale. The net loop amplitude contribution to the strangeness magnetic moment of the proton is about −0.05, which falls within the uncertainty range of arXiv:hep-ph/9908393v2 24 Aug 1999 the experimental value. 0 1. Introduction The recent finding by the SAMPLE collaboration that the strangeness magnetic moment s 2 2 of the proton is small, and possibly even positive [1] (GM (Q = 0.1 GeV )=0.23 ± 0.37) was unexpected in view of the fact that the bulk of the many theoretical predictions for this quantity are negative, and outside of the experimental uncertainty range (summaries are given e.g. in refs. [2, 3, 4]). A recent lattice calculation gives −0.36 ± 0.20 for this quantity [5], thus reaffirming the typical theoretical expectation, while remaining outside of the uncertainty range of the empirical value. -
Open Hardware: Pureos and Arduino
Published on Tux Machines (http://www.tuxmachines.org) Home > content > Open Hardware: PureOS and Arduino Open Hardware: PureOS and Arduino By Rianne Schestowitz Created 07/01/2021 - 7:39am Submitted by Rianne Schestowitz on Thursday 7th of January 2021 07:39:57 AM Filed under Hardware [1] PureOS: freedom, privacy, and security [2] A recent blog post from Purism?the company that developed PureOS to run on its security- focused hardware?celebrates three years of FSF endorsement of the Linux distribution. While this endorsement is an achievement that is not as highly valued by our communities as one might think, the work done to obtain and maintain that endorsement is useful even to those who disdain the FSF or disagree with its definition of what makes a distribution "free". While Purism and PureOS have been on our radar for a few years now, it seems worth a look at where things have gone with the distribution?and the company behind it. The blog post notes that PureOS and Purism "sit on a three-legged stool of Freedom, Privacy and Security". The three are intertwined, of course, since PureOS consisting of only free software allows users to ensure there are no antifeatures being slipped into the OS or applications that would impact their privacy or security. Beyond that, free software is an excellent defense against various software supply-chain attacks; in addition the scrutiny of the code afforded to free software, it can also be built in a manner that provides more security... [...] As might be guessed, security and privacy features do not come for free?or even inexpensively. -
Coreboot - the Free Firmware
coreboot - the free firmware vimacs <https://vimacs.lcpu.club> Linux Club of Peking University May 19th, 2018 . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 1 / 77 License This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. You can find the source code of this presentation at: https://git.wehack.space/coreboot-talk/ . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 2 / 77 Index 1 What is coreboot? History Why use coreboot 2 How coreboot works 3 Building and using coreboot Building Flashing 4 Utilities and Debugging 5 Join the community . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 3 / 77 Index 6 Porting coreboot with autoport ASRock B75 Pro3-M Sandy/Ivy Bridge HP Elitebooks Dell Latitude E6230 7 References . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 4 / 77 1 What is coreboot? History Why use coreboot 2 How coreboot works 3 Building and using coreboot Building Flashing 4 Utilities and Debugging 5 Join the community . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 5 / 77 What is coreboot? coreboot is an extended firmware platform that delivers a lightning fast and secure boot experience on modern computers and embedded systems. As an Open Source project it provides auditability and maximum control over technology. The word ’coreboot’ should always be written in lowercase, even at the start of a sentence. vimacs (LCPU) coreboot - the free firmware May 19th, 2018 6 / 77 History: from LinuxBIOS to coreboot coreboot has a very long history, stretching back more than 18 years to when it was known as LinuxBIOS. -
An Introduction to Morphos
An Introduction to MorphOS Updated to include features to version 1.4.5 May 14, 2005 MorphOS 1.4 This presentation gives an overview of MorphOS and the features that are present in the MorphOS 1.4 shipping product. For a fully comprehensive list please see the "Full Features list" which can be found at: www.PegasosPPC.com Why MorphOS? Modern Operating Systems are powerful, flexible and stable tools. For the most part, if you know how to look after them, they do their job reasonably well. But, they are just tools to do a job. They've lost their spark, they're boring. A long time ago computers were fun, it is this background that MorphOS came from and this is what MorphOS is for, making computers fun again. What is MorphOS? MorphOS is a fully featured desktop Operating System for PowerPC CPUs. It is small, highly responsive and has very low hardware requirements. The overall structure of MorphOS is based on a new modern kernel called Quark and a structure divided into a series of "boxes". This system allows different OS APIs to be used along side one another but isolates them so one cannot compromise the other. To make sure there is plenty of software to begin with the majority of development to date has been based on the A- BOX. In the future the more advanced Q-Box shall be added. Compatibility The A-Box is an entire PowerPC native OS layer which includes source and binary compatibility with software for the Commodore A500 / A1200 etc. -
Licensing & Paradigms
Licensing & Paradigms System and Network Administration Revision 2 (2020/21) Table of contents ▶ What is FOSS ▶ Intellectual Property What is FOSS What is Free and Open Source Software?… ==> SHOW AND SHARE THE RECIPE ▶ written Free Software ▶ written Open Source alone ▶ written open-source something as an ajective ▶ FOSS to be politically correct with both communities… Who is leading the movement(s)?… ==> A fundamentalist – morality come first Richard Matthew Stallman And a realist – efficiency comes first Eric Steven Raymond Schools of thoughts / Paradigms fundamentalism vs. realism ▶ FSF GNU RMS (socialists) ▶ OSI ESR (elitists) ▶ Linus Torvalds (not into politics) ▶ BSD freaks (anarchists & despots) preliminary note Most known distros Debian / Ubuntu Fedora / Redhat / CentOS All are GNU/Linux Linux -- the kernel GNU -- the userland RMS ▶ ~1980 (27 years old), works at MIT/AI lab ▶ wants to fix the driver of the Xerox printer ▶ software used to be free/open, it was the default ▶ he faced a non-disclosure agreement ▶ GNU’s Not Unix, Sep 1983 – no UNIX(tm) code ▶ wrote Emacs ▶ January 1984, quits MIT/AI lab ▶ FSF, Oct 1985 ▶ talks at parliements ▶ paranoid & activist ▶ refuses any binary blob incl. firmwares ▶ Coreboot is not enough –> Libreboot ▶ what about micro-codes? ▶ against Intel Management Engine “backdoor” ▶ against DRM but not necessarily against TPM Thinkpad X200 with Libreboot Trisquel no binary blob at all (but cpu micro-code) ▶ RMS was right about Intel ME ▶ Ermolov and Maxim Goryachy @Positive Technologies Intel Management Engine https: //en.wikipedia.org/wiki/Intel_Management_Engine#Disabling_the_ME https://github.com/corna/me_cleaner Learning curves ESR ▶ likes guns and liberty ▶ The New Hacker’s Dictionary, 1996 ▶ Fetchmail in 1996 ▶ The Cathedral and the Bazaar, Oct 1999 In short ▶ the bazaar is advocated ▶ goes with evolution of SCM and the GIT story Open Source Initiative in 1998 ▶ –> Free Software for business and not for moral terms ▶ Jon “maddog” Hall, Larry Augustin, Eric S.