Announcement

Collapse
No announcement yet.

Intel's ME backdoor is evil

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Intel's ME backdoor is evil

    It's time for a class action lawsuit and demands for an immediate fix to this back door from Intel. Does AMD have the same kind of back door?

    https://it.slashdot.org/comments.pl?...0717233&tid=11

    Quotes on Intel backdoors:
    A message from RMS [fsf.org]
    by Richard Stallman on Dec 29, 2016 09:45 AM

    The current generation of Intel and AMD processor chips are designed with vicious back doors that users cannot shut off. (In Intel processors, it's the "management engine".)
    No users should trust those processors.

    2. The backdoor is next to impossible to decode and reverse engineer:
    Due to multiple instruction sets + custom compression algorithm.
    The Trouble With Intel's Management Engine [hackaday.com]

    While most of the firmware for the ME also resides in the Flash chip used by the BIOS, the firmware isn't readily readable; some common functions are in an on-chip ROM and cannot be found by simply dumping the data from the Flash chip.
    This means that if you're trying to figure out the ME, a lot of the code is seemingly missing. Adding to the problem, a lot of the code itself is compressed with either LZMA or Huffman encoding. There are multiple versions of the Intel ME, as well, all using completely different instruction sets: ARC, ARCompact, and SPARC V8. In short, it's a reverse-engineer's worst nightmare.
    To break the Management Engine, though, this code will have to be reverse engineered, and figuring out the custom compression scheme that's used in the firmware remains an unsolved problem.
    But unsolved doesn't mean that people aren't working on it. There are efforts to break the ME's Huffman algorithm. Of course, deciphering the code we have would lead to another road block: there is still the code on the inaccessible on-chip ROM. Nothing short of industrial espionage or decapping the chip and looking at the silicon will allow anyone to read the ROM code. While researchers do have some idea what this code does by inferring the functions, there is no way to read and audit it. So the ME remains a black box for now.

    3. The backdoor is active even when the machine is powered off:
    Intel rolled out something horrible [hackaday.com]
    The ME has network access, access to the host operating system, memory, and cryptography engine. The ME can be used remotely even if the PC is powered off. If that sounds scary, it gets even worse: no one knows what the ME is doing, and we canâ(TM)t even look at the code.

    4. Onboard ethernet and WiFi is part of the backdoor:
    The ME has its own MAC and IP address for the out-of-band interface, with direct access to the Ethernet controller; one portion of the Ethernet traffic is diverted to the ME even before reaching the host's operating system
    If your CPU has Intel Anti-Theft Technology enabled, it is also possible to directly access the backdoor from cell towers using 3G.

    5. The backdoor uses encrypted communication:
    https://en.wikipedia.org/wiki/Intel_...sing_Intel_AMT [wikipedia.org]
    AMT version 4.0 and higher can establish a secure communication tunnel between a wired PC and an IT console outside the corporate firewall. In this scheme, a management presence server (Intel calls this a "vPro-enabled gateway") authenticates the PC, opens a secure TLS tunnel between the IT console and the PC

    Last edited by GreyGeek; Aug 29, 2017, 07:41 PM.
    "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
    – John F. Kennedy, February 26, 1962.

    #2
    from ,,,,,,,, https://github.com/mjg59/mei-amt-check

    Code:
    vinny@vinny-Bonobo-Extreme:~/Downloads/check/mie/mei-amt-check-master$ sudo ./mei-amt-check 
    [sudo] password for vinny: 
    Error: Management Engine refused connection. This probably means you don't have AMT
    maybe a smile ,,,,,,,,,,

    although my CPU dose have vPro

    VINNY
    Last edited by vinnywright; Aug 29, 2017, 08:37 PM.
    i7 4core HT 8MB L3 2.9GHz
    16GB RAM
    Nvidia GTX 860M 4GB RAM 1152 cuda cores

    Comment


      #3
      I get the same result,

      Code:
      [FONT=monospace][COLOR=#000000] sudo ./mei-amt-check  [/COLOR]
      [sudo] password for jerry:  
      Error: Management Engine refused connection. This probably means you don't have AMT
      
      [/FONT]
      but I believe that it is due to a missing mei_me driver:

      " Requires that the mei_me driver (part of the upstream kernel) be loaded."

      That kernel driver isn't in Neon's repository. So, the jury is still out.
      Last edited by GreyGeek; Aug 29, 2017, 10:41 PM.
      "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
      – John F. Kennedy, February 26, 1962.

      Comment


        #4
        Originally posted by GreyGeek View Post
        but I believe that it is due to a missing mei_me driver:

        " Requires that the mei_me driver (part of the upstream kernel) be loaded."

        That kernel driver isn't in Neon's repository. So, the jury is still out.
        The kernel module is not a separate installable package, it's part of the mainline kernel. One can load the module with "sudo modprobe mei_me". (unload with "sudo modprobe -r mei_me").
        You can use "lsmod | grep mei_me" to see if the module is loaded.

        Comment


          #5
          Originally posted by kubicle View Post
          The kernel module is not a separate installable package, it's part of the mainline kernel. One can load the module with "sudo modprobe mei_me". (unload with "sudo modprobe -r mei_me").
          You can use "lsmod | grep mei_me" to see if the module is loaded.
          O it was loaded when I ran the tool

          Code:
          vinny@vinny-Bonobo-Extreme:~$ lsmod | grep mei_me
          mei_me                 40960  0
          mei                   102400  1 mei_me
          VINNY
          i7 4core HT 8MB L3 2.9GHz
          16GB RAM
          Nvidia GTX 860M 4GB RAM 1152 cuda cores

          Comment


            #6
            I got the same results as Vinny; i7-6700K CPU

            Please Read Me

            Comment


              #7
              Originally posted by kubicle View Post
              The kernel module is not a separate installable package, it's part of the mainline kernel. One can load the module with "sudo modprobe mei_me". (unload with "sudo modprobe -r mei_me").
              You can use "lsmod | grep mei_me" to see if the module is loaded.
              My bad. I thought it was referring to an a kernel not yet delivered.
              "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
              – John F. Kennedy, February 26, 1962.

              Comment


                #8
                Since I'm on a private network they'd either have to break into my house or hack my router first
                we see things not as they are, but as we are.
                -- anais nin

                Comment


                  #9
                  Originally posted by vinnywright View Post
                  O it was loaded when I ran the tool

                  Code:
                  vinny@vinny-Bonobo-Extreme:~$ lsmod | grep mei_me
                  mei_me                 40960  0
                  mei                   102400  1 mei_me
                  VINNY
                  mei_me wasn't listed before I ran it but was afterwards. I rmmod'd it.
                  "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
                  – John F. Kennedy, February 26, 1962.

                  Comment


                    #10
                    A scary thought: Stallman's msg was posted more than eight months ago. WHAT IF the people behind the backdoor uploaded a patch to block the app which checks for its existence shortly after he posted that note? After all, the "Management Engine" is still present and active, otherwise it wouldn't be able to "refuse connection".
                    "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
                    – John F. Kennedy, February 26, 1962.

                    Comment


                      #11
                      Originally posted by GreyGeek View Post
                      A scary thought: Stallman's msg was posted more than eight months ago. WHAT IF the people behind the backdoor uploaded a patch to block the app which checks for its existence shortly after he posted that note? After all, the "Management Engine" is still present and active, otherwise it wouldn't be able to "refuse connection".
                      it's not a back door per say as much as a "feature" for admins to manage large workstation installs ,,,,,,,if you have windows running and have the money you can perches the software to use it to administer the machines.

                      if even hosed to the point that it can not boot the "admin" can get in ,remove ,edit, upload ,change settings ,whatever in an attempt to fix it .

                      the problem is (as far as I can tell from googeling this) is that some versions of it have been hacked .

                      an open network connection to the ports it listens on has to be present to "attack" it and it has to be active and listening ,,,, but that is from articles on the net ,,,,it could be more ? dangerous than that .

                      try this one
                      Code:
                      sudo nmap -p 16992,16993,16994,16995,623,664 192.168.1.0/24
                      or change the 192.168.1.0 to the base of your router ...it is supposed to show if something is listening on one of those ports (supposedly the ones it uses) as per one article on the net .

                      VINNY
                      Last edited by vinnywright; Aug 30, 2017, 04:20 PM.
                      i7 4core HT 8MB L3 2.9GHz
                      16GB RAM
                      Nvidia GTX 860M 4GB RAM 1152 cuda cores

                      Comment


                        #12
                        nmap said im ok as well ,,,,,filtered is on the router and a windows box . .19 is me with the CPU that dose suport it (vPro)

                        Code:
                        vinny@vinny-Bonobo-Extreme:~$ sudo nmap -p16992,16993,16994,16995,623,664 192.168.0.0/24
                        
                        Starting Nmap 7.01 ( https://nmap.org ) at 2017-08-30 18:03 EDT
                        Nmap scan report for 192.168.0.1
                        Host is up (0.013s latency).
                        PORT      STATE    SERVICE
                        623/tcp   filtered oob-ws-http
                        664/tcp   filtered secure-aux-bus
                        16992/tcp filtered amt-soap-http
                        16993/tcp filtered amt-soap-https
                        16994/tcp filtered unknown
                        16995/tcp filtered unknown
                        MAC Address: <snip> (Hon Hai Precision Ind.)
                        
                        Nmap scan report for 192.168.0.2
                        Host is up (0.0095s latency).
                        PORT      STATE  SERVICE
                        623/tcp   closed oob-ws-http
                        664/tcp   closed secure-aux-bus
                        16992/tcp closed amt-soap-http
                        16993/tcp closed amt-soap-https
                        16994/tcp closed unknown
                        16995/tcp closed unknown
                        MAC Address: <snip> (Dell)
                        
                        Nmap scan report for 192.168.0.4
                        Host is up (0.013s latency).
                        PORT      STATE    SERVICE
                        623/tcp   filtered oob-ws-http
                        664/tcp   filtered secure-aux-bus
                        16992/tcp filtered amt-soap-http
                        16993/tcp filtered amt-soap-https
                        16994/tcp filtered unknown
                        16995/tcp filtered unknown
                        MAC Address: <snip> (Hon Hai Precision Ind.)
                        
                        Nmap scan report for 192.168.0.19
                        Host is up (0.000022s latency).
                        PORT      STATE  SERVICE
                        623/tcp   closed oob-ws-http
                        664/tcp   closed secure-aux-bus
                        16992/tcp closed amt-soap-http
                        16993/tcp closed amt-soap-https
                        16994/tcp closed unknown
                        16995/tcp closed unknown
                        
                        Nmap done: 256 IP addresses (4 hosts up) scanned in 5.45 seconds
                        VINNY
                        i7 4core HT 8MB L3 2.9GHz
                        16GB RAM
                        Nvidia GTX 860M 4GB RAM 1152 cuda cores

                        Comment


                          #13
                          this ,,,, https://security-center.intel.com/ad...nguageid=en-fr

                          which leads to this ,,,,,, https://github.com/intel/INTEL-SA-00...tigation-Tools

                          gives this ,,,,,,,,,,,,,

                          Code:
                          vinny@vinny-Bonobo-Extreme:~/Downloads/check/check2/INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools-master$ make
                          cc    -c -o INTEL-SA-00075-Discovery-Tool.o INTEL-SA-00075-Discovery-Tool.c
                          cc    -c -o INTEL-SA-00075.o INTEL-SA-00075.c
                          cc   INTEL-SA-00075-Discovery-Tool.o INTEL-SA-00075.o   -o INTEL-SA-00075-Discovery-Tool
                          cc    -c -o INTEL-SA-00075-Unprovisioning-Tool.o INTEL-SA-00075-Unprovisioning-Tool.c
                          cc   INTEL-SA-00075-Unprovisioning-Tool.o INTEL-SA-00075.o   -o INTEL-SA-00075-Unprovisioning-Tool
                          strip INTEL-SA-00075-Discovery-Tool INTEL-SA-00075-Unprovisioning-Tool
                          
                          vinny@vinny-Bonobo-Extreme:~/Downloads/check/check2/INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools-master$ [COLOR=#0000ff]sudo ./INTEL-SA-00075-Discovery-Tool [/COLOR]
                          [sudo] password for vinny: 
                          
                          INTEL-SA-00075-Discovery-Tool -- Release 1.0
                          Copyright (C) 2003-2012, 2017 Intel Corporation. All rights reserved
                          
                          ------------------Vulnerability Status--------------------
                          System is not Vulnerable, no further action needed.
                          
                          ----------------------------------------------------------
                          last update ,,2 months ago

                          so,,,,,,,,again ,,,,maybe we are good @hear

                          VINNY
                          i7 4core HT 8MB L3 2.9GHz
                          16GB RAM
                          Nvidia GTX 860M 4GB RAM 1152 cuda cores

                          Comment


                            #14
                            I've used nmap and wireshark a lot.
                            My ufw firewall is turned off because I am using the SPI firewall in my Buffalo router.

                            My nmap shows:
                            Code:
                            [FONT=monospace][COLOR=#54FF54][B]jerry@jerry-Aspire-V3-771[/B][/COLOR][COLOR=#000000]:[/COLOR][COLOR=#5454FF][B]~[/B][/COLOR][COLOR=#000000]$ sudo nmap -p 16992,16993,16994,16995,623,664 192.168.11.1/24 [/COLOR]
                            [sudo] password for jerry:  
                             
                            Starting Nmap 7.01 ( https://nmap.org ) at 2017-08-30 20:10 CDT 
                            Nmap scan report for DD-WRT (192.168.11.1) 
                            Host is up (0.00039s latency). 
                            PORT      STATE  SERVICE 
                            623/tcp   closed oob-ws-http 
                            664/tcp   closed secure-aux-bus 
                            16992/tcp closed amt-soap-http 
                            16993/tcp closed amt-soap-https 
                            16994/tcp closed unknown 
                            16995/tcp closed unknown 
                            MAC Address: xxx (Buffalo.inc) 
                             
                            Nmap scan report for Jerry-Ls-iPhone.neb.rr.com (192.168.11.102) (my iPhone6. Filtered? :( )
                            Host is up (0.25s latency). 
                            PORT      STATE    SERVICE 
                            623/tcp   filtered oob-ws-http 
                            664/tcp   filtered secure-aux-bus 
                            16992/tcp filtered amt-soap-http 
                            16993/tcp filtered amt-soap-https 
                            16994/tcp filtered unknown 
                            16995/tcp filtered unknown 
                            MAC Address: xxx (Apple) 
                             
                            Nmap scan report for 192.168.11.100  (my eth to USB dongle on this laptop)
                            Host is up (0.000045s latency). 
                            PORT      STATE  SERVICE 
                            623/tcp   closed oob-ws-http 
                            664/tcp   closed secure-aux-bus 
                            16992/tcp closed amt-soap-http 
                            16993/tcp closed amt-soap-https 
                            16994/tcp closed unknown 
                            16995/tcp closed unknown 
                             
                            Nmap scan report for jerry-Aspire-V3-771 (192.168.11.101) (my wireless on this laptop)
                            Host is up (0.000030s latency). 
                            PORT      STATE  SERVICE 
                            623/tcp   closed oob-ws-http 
                            664/tcp   closed secure-aux-bus 
                            16992/tcp closed amt-soap-http 
                            16993/tcp closed amt-soap-https 
                            16994/tcp closed unknown 
                            16995/tcp closed unknown 
                             
                            Nmap done: 256 IP addresses (4 hosts up) scanned in 10.01 seconds 
                            
                            [/FONT]
                            I am going to check out that Linux detection tool.
                            "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
                            – John F. Kennedy, February 26, 1962.

                            Comment

                            Working...
                            X