On Friday, 6 March 2020 13:48:00 GMT Rich Freeman wrote:
> On Fri, Mar 6, 2020 at 3:50 AM Michael <confabul...@kintzios.com> wrote:
> > I have lost count with the naming scheme of Intel's embedded spyware to
> > know if this is yet another vulnerability, or something to convince me to
> > throw away the last Intel powered box still in my possession (mind you
> > its >10yr old):
> > 
> > https://arstechnica.com/information-technology/2020/03/5-years-of-intel-cp
> > us-and-chipsets-have-a-concerning-flaw-thats-unfixable/
> The article is actually pretty well-written.  I haven't studied the
> issue in any depth but here are my impressions:
> 
> 1.  You need a firmware update to prevent software vulnerabilities.
> 2.  Even with a firmware update you are vulnerable to somebody with
> physical access to your device.
> 
> The whole issue centers around TPM essentially.  This potentially
> impacts you if you don't care about TPM, but it impacts you more if
> you do care about TPM.
> 
> If you don't use TPM (probably many on this list), then your main
> concern should just be with getting your firmware patched (#1 above).
> Otherwise you could be vulnerable to rootkits that hijack the TPM on
> your machine and use it to spy on you in hard-to-detect ways.  Based
> on the article a firmware patch should block the ability for software
> to get into your TPM and mess with it.  Then you're basically safe.
> If you aren't using TPM you're already vulnerable to somebody with
> physical access to your device, so there is no real change in the
> threat model for you.
> 
> Now let's get to those who use TPM or the other impacted trusted
> services.  You use these if:
> 1.  You rely on secure boot (with any OS - Linux does support this
> though I imagine it is rare for Gentoo users to use it).
> 2.  You rely on TPM-backed full disk encryption.  This includes
> Bitlocker and most commercial solutions.  This doesn't include LUKS.
> If your disk is unreadable if you remove it from the computer, but you
> don't need any password to boot it, then you're probably using
> TPM-backed encryption.
> 3.  You are Netflix/etc and are relying on remote attestation or any
> of the technologies RMS would term "treacherous computing."
> 4.  You are a corporate owner of computers and are relying on the same
> technologies in #3 but to actually protect your own hardware.  Or
> maybe if you're the only person in the world using Trusted GRUB.
> 
> If you fall into this camp you need to still update your firmware to
> address the non-TPM-user and to avoid making it trivial for software
> to steal your keys/etc.  However, you need to be aware that you are no
> longer secure against physical theft of your device.  Somebody who
> steals your laptop with passwordless encryption might be able to break
> the encryption on your device.  They would need to steal the entire
> laptop though - if you throw out a hard drive nobody will be able to
> recover it from the trash.  If you're Netflix I'm not sure why you're
> even bothering with this stuff because all your content is already
> available in full quality on torrent sites, but I guess you can lose
> even more sleep over it if you want to.  If you're using secure boot
> then somebody with physical access might be able to change the
> authorization settings and let another OS boot.  If you're a
> corporation with sensitive data you probably have the biggest impact,
> because you're distributing laptops to people who lose them and who
> don't have a ton of security hygiene to begin with.
> 
> The only people who probably will consider replacing hardware are
> corporate users.  Most on this list are going to be fine with a
> firmware update as you're probably not using the TPM features.
> Indeed, even getting those working on Linux is a PITA - I'm not aware
> of any distro that has TPM-backed encryption out of the box.  Windows
> has this in the pro edition (Bitlocker) and it is probably fairly
> popular.
> 
> If you use LUKS-based encryption you are going to be secure with
> patched firmware as long as nobody installs a keylogger on your
> device.  That will be easier with the vulnerability, though somebody
> could just hack the keyboard hardware anyway and LUKS wouldn't protect
> you against that.  TPM has pros and cons compared to LUKS in general.
> If you don't patch your firmware then it is possible a rootkit might
> get in there and steal your keys at boot time.
> 
> If somebody has more to add from researching this more I'm all ears.
> Now I need to check if my windows tablet with Bitlocker is vulnerable.
> This also shows the downside to TPM encryption - it is convenient but
> if somebody steals a laptop and just keeps it stored away they could
> always use a vulnerability like this to break in sometime in the
> future.  It is probably still worth using as a minimum because it does
> protect against hard drive loss, and it works if your TPM isn't
> vulnerable.

Thanks for this analysis Rich, quite thorough as usual.

TBH I have avoided using TPM so far because it requires an implicit trust on 
the OEM and most observers and reports evidence this is invariably misplaced.

I seem to recall a TPM vulnerability (not sure which version, I think TPM2), 
which cause TPM to always spew out the same limited number of ephemeral keys, 
making an unwarranted entry by a determined attacker possible.

This is another reason I don't trust obscure closed code solutions like 
Ubikey.

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to