On Fri, Mar 6, 2020 at 3:50 AM Michael <confabul...@kintzios.com> wrote:
>
> I have lost count with the naming scheme of Intel's embedded spyware to know
> if this is yet another vulnerability, or something to convince me to throw
> away the last Intel powered box still in my possession (mind you its >10yr
> old):
>
> https://arstechnica.com/information-technology/2020/03/5-years-of-intel-cpus-and-chipsets-have-a-concerning-flaw-thats-unfixable/

The article is actually pretty well-written.  I haven't studied the
issue in any depth but here are my impressions:

1.  You need a firmware update to prevent software vulnerabilities.
2.  Even with a firmware update you are vulnerable to somebody with
physical access to your device.

The whole issue centers around TPM essentially.  This potentially
impacts you if you don't care about TPM, but it impacts you more if
you do care about TPM.

If you don't use TPM (probably many on this list), then your main
concern should just be with getting your firmware patched (#1 above).
Otherwise you could be vulnerable to rootkits that hijack the TPM on
your machine and use it to spy on you in hard-to-detect ways.  Based
on the article a firmware patch should block the ability for software
to get into your TPM and mess with it.  Then you're basically safe.
If you aren't using TPM you're already vulnerable to somebody with
physical access to your device, so there is no real change in the
threat model for you.

Now let's get to those who use TPM or the other impacted trusted
services.  You use these if:
1.  You rely on secure boot (with any OS - Linux does support this
though I imagine it is rare for Gentoo users to use it).
2.  You rely on TPM-backed full disk encryption.  This includes
Bitlocker and most commercial solutions.  This doesn't include LUKS.
If your disk is unreadable if you remove it from the computer, but you
don't need any password to boot it, then you're probably using
TPM-backed encryption.
3.  You are Netflix/etc and are relying on remote attestation or any
of the technologies RMS would term "treacherous computing."
4.  You are a corporate owner of computers and are relying on the same
technologies in #3 but to actually protect your own hardware.  Or
maybe if you're the only person in the world using Trusted GRUB.

If you fall into this camp you need to still update your firmware to
address the non-TPM-user and to avoid making it trivial for software
to steal your keys/etc.  However, you need to be aware that you are no
longer secure against physical theft of your device.  Somebody who
steals your laptop with passwordless encryption might be able to break
the encryption on your device.  They would need to steal the entire
laptop though - if you throw out a hard drive nobody will be able to
recover it from the trash.  If you're Netflix I'm not sure why you're
even bothering with this stuff because all your content is already
available in full quality on torrent sites, but I guess you can lose
even more sleep over it if you want to.  If you're using secure boot
then somebody with physical access might be able to change the
authorization settings and let another OS boot.  If you're a
corporation with sensitive data you probably have the biggest impact,
because you're distributing laptops to people who lose them and who
don't have a ton of security hygiene to begin with.

The only people who probably will consider replacing hardware are
corporate users.  Most on this list are going to be fine with a
firmware update as you're probably not using the TPM features.
Indeed, even getting those working on Linux is a PITA - I'm not aware
of any distro that has TPM-backed encryption out of the box.  Windows
has this in the pro edition (Bitlocker) and it is probably fairly
popular.

If you use LUKS-based encryption you are going to be secure with
patched firmware as long as nobody installs a keylogger on your
device.  That will be easier with the vulnerability, though somebody
could just hack the keyboard hardware anyway and LUKS wouldn't protect
you against that.  TPM has pros and cons compared to LUKS in general.
If you don't patch your firmware then it is possible a rootkit might
get in there and steal your keys at boot time.

If somebody has more to add from researching this more I'm all ears.
Now I need to check if my windows tablet with Bitlocker is vulnerable.
This also shows the downside to TPM encryption - it is convenient but
if somebody steals a laptop and just keeps it stored away they could
always use a vulnerability like this to break in sometime in the
future.  It is probably still worth using as a minimum because it does
protect against hard drive loss, and it works if your TPM isn't
vulnerable.

-- 
Rich

Reply via email to