On Tuesday, May 2, 2017 at 2:50:24 PM UTC-4, Reg Tiangha wrote:
> On 05/02/2017 11:37 AM, David Hobach wrote:
> >
> >
> > On 05/02/2017 07:25 AM, Vít Šesták wrote:
> >> * I wonder what does “exploitable locally” mean. If physical access
> >> is required, I am not sure what would attacker gain (AEM bypass at
> >> most, I guess). If it allows unprivileged user to elevate privileges,
> >> this might be interesting for Qubes, depending on the attack vector:
> >> If it requires attack over network interface, then sys-net can
> >> perform it.
> >
> > @remotely:
> > sys-net probably does not protect you here as Intel AMT (ME) runs even
> > on top of the OS (Xen/Qubes). So it just captures all Intel management
> > traffic directly in cooperation with your Intel chipset ethernet card
> > and forwards it to the ME chipset - it never goes the regular way [3];
> > admittedly, it depends on Intel's implementation of VT-d. I guess they
> > ignored Vt-d for ME though... ah yes, they likely did: "ME’s desire
> > for accessing the host memory cannot be constrained in any way, on the
> > other hand, not even by VT-d." [1]
> >
> > @locally: Not sure whether sys-net helps with AMT enabled. After all
> > an attacker might be able to route packets to your sys-net VM (-->
> > =remotely)?
> > The local forwarding service from [2] is probably not enabled in your
> > sys-net though, so that's a plus.
> >
> > Maybe we'll see a QSB sooner or later... Just my 5 cents.
> >
> > [1] https://blog.invisiblethings.org/papers/2015/x86_harmful.pdf
> > [2]
> > https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075
> > [3] https://www.theregister.co.uk/2017/05/01/intel_amt_me_vulnerability/
> >
> 
> Local access issues aside for a moment, it sounds like if you can
> externally block the affected network ports, then you can also mitigate
> this that way. That could be done on the router level, but may not stop
> someone on the same subnet as you from getting at your machine that way
> (nor if your router is compromised).
> 
> Someone here suggested an Ethernet condom, and I actually think there
> might be some merit to it. Maybe this is where those pocket routers
> (ideally with upgradable open-source firmware) with both wifi and
> ethernet ports can come in. A private, external firewall that connects
> to the network, rather than your machine doing so directly, with rules
> to block those ME management ports and other high-risk ports just for
> your machine. It's sad that we may be at that point, however, where we
> need to seriously consider external hardware blockers for all sorts of
> ports like USB, HDMI, etc, just to protect our devices.

What do you mean by pocket router?  Is this like a cheap little router to 
dongle off your pc?  it seems interesting because I definitely can't trust my 
home router at all...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a9d3929c-e5a1-4aff-b459-a04387fa3a2f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to