TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

CPU Backdoors

271 点作者 2510c39011c5超过 10 年前

14 条评论

Animats超过 10 年前
An obvious place for a backdoor is in remote management CPUs embedded in the network card.<p><a href="http://www.ssi.gouv.fr/IMG/pdf/csw-trustnetworkcard.pdf" rel="nofollow">http:&#x2F;&#x2F;www.ssi.gouv.fr&#x2F;IMG&#x2F;pdf&#x2F;csw-trustnetworkcard.pdf</a><p>Network cards which support RMCP&#x2F;IPMI protocol are obvious points of attack. They can reboot machines, download boot images, install a new OS, patch memory, emulate a local console, and control the entire machine. CERT has some warnings:<p><a href="https://www.us-cert.gov/ncas/alerts/TA13-207A" rel="nofollow">https:&#x2F;&#x2F;www.us-cert.gov&#x2F;ncas&#x2F;alerts&#x2F;TA13-207A</a><p>If there&#x27;s a default password in a network card, that&#x27;s a backdoor. Here&#x27;s a list of the default passwords for many common systems:<p><a href="https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi" rel="nofollow">https:&#x2F;&#x2F;community.rapid7.com&#x2F;community&#x2F;metasploit&#x2F;blog&#x2F;2013&#x2F;...</a><p>&quot;admin&#x2F;admin&quot; is popular.<p>The network card stores passwords in non-volatile memory. If anyone in the supply chain gets hold of the network card briefly, they can add a backdoor by plugging the card into a chassis for power, connecting a network cable, and adding a extra user&#x2F;password of their own using Linux &quot;ipmitool&quot; running on another machine. The card, when delivered to the end user, now has a backdoor installed. If you have any servers you&#x27;re responsible for, try connecting with IPMI and do a &quot;list&quot; command to see what users are configured. If you find any you didn&#x27;t put there, big problem.<p>CERT warns that, if you use the same userid&#x2F;password for multiple machines in your data center, discarded boards contain that password. So discarded boards must be shredded.
评论 #9002281 未加载
tomerv超过 10 年前
While the main point of the article is interesting, some of the details don&#x27;t really make sense.<p>For example, it would be difficult to make an instruction like fyl2x or fadd cause a privilege level change. The reason is that floating point instructions are executed on a separate unit (the FPU), with a separate decoder. This unit would not have the means to communicate back information such as &quot;change privilege level&quot; (normally it can only signal floating point exceptions, and other than that its only output is on the floating point registers). It would make more sense to encode the backdoor on an illegal opcode, i.e. an opcode that under normal conditions would generate a UD# exception, but with the correct values in the registers it would trigger some undocumented behavior.<p>Another question is how to hide this backdoor in the microcode. Presumably, at some point someone might stumble upon the backdoor and ask around about it. If the backdoor depends on some &quot;magic values&quot;, it would be relatively easy to spot just by looking at the microcode.<p>There&#x27;s also the point that the author mentioned of &quot;fixing&quot; the processor at some point during the production process. I don&#x27;t think that the author understands the way mass production of microchips works. It&#x27;s very much not possible to do something like this while keeping the production price on the same level (or someone noticing this extra step in the production process).<p>All in all, it sounds much easier to find security bugs in other parts of the system.
评论 #9002153 未加载
评论 #9003754 未加载
评论 #9003055 未加载
评论 #9002025 未加载
评论 #9002304 未加载
higherpurpose超过 10 年前
Who needs dirty trace-able CPU backdoors when Intel&#x27;s SGX technology will allow them perfect plausible deniability to give NSA (or China if they force them by law) the key to all &quot;secure apps&quot; that will be using the SGX technology:<p>&gt; <i>Finally, a problem that is hard to ignore today, in the post-Snowden world, is the ease of backdooring this technology by Intel itself. In fact Intel doesn&#x27;t need to add anything to their processors – all they need to do is to give away the private signing keys used by SGX for remote attestation. This makes for a perfectly deniable backdoor – nobody could catch Intel on this, even if the processor was analyzed transistor-by-transistor, HDL line-by-line.</i><p><a href="http://theinvisiblethings.blogspot.com/2013_09_01_archive.html" rel="nofollow">http:&#x2F;&#x2F;theinvisiblethings.blogspot.com&#x2F;2013_09_01_archive.ht...</a>
agumonkey超过 10 年前
The Novena laptop seems almost devoid of backdoors. <a href="http://www.wired.co.uk/news/archive/2014-01/20/open-source-laptop" rel="nofollow">http:&#x2F;&#x2F;www.wired.co.uk&#x2F;news&#x2F;archive&#x2F;2014-01&#x2F;20&#x2F;open-source-l...</a>
评论 #9006747 未加载
ce4超过 10 年前
A serious flaw in AMDs System Management Unit Firmware was very recently discovered:<p><a href="http://media.ccc.de/browse/congress/2014/31c3_-_6103_-_en_-_saal_2_-_201412272145_-_amd_x86_smu_firmware_analysis_-_rudolf_marek.html#video" rel="nofollow">http:&#x2F;&#x2F;media.ccc.de&#x2F;browse&#x2F;congress&#x2F;2014&#x2F;31c3_-_6103_-_en_-_...</a>
rdl超过 10 年前
Wow..light involved in the lithography process causes wear on the lenses? To what degree?
评论 #9001571 未加载
评论 #9007666 未加载
评论 #9001552 未加载
crucini超过 10 年前
Cool article. I didn&#x27;t understand how the privilege escalation would be exploited. Obviously if the attacker already has access to the box, he can get root with this exploit.<p>I think a chip backdoor could also be based on information leaking rather than executing arbitrary code.<p>The steps would be: 1. Identify critical info, like crypto keys, from heuristics. This means keeping a special buffer, since you don&#x27;t know at the beginning of an RSA operation that it&#x27;s an RSA operation. The heuristics are not perfect, of course, but work with standard apps like Firefox, GPG and Outlook.<p>2. Exfiltrate the info. Via spread-spectrum RF, timing jitter in packets, or replacing random numbers in crypto. The article implies that since OSes and apps mix the hardware RNG with other sources, there&#x27;s no point in subverting it. But the CPU can recognize common mix patterns, like in the Linux kernel, and subvert the final output.<p>In this case the output entropy is good, but also leaks some secret to a listener who has the right keys.
评论 #9001555 未加载
bizarref00l超过 10 年前
Another recent article on HN <a href="https://news.ycombinator.com/item?id=8813029" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=8813029</a> on Intel Management Engine.
gaius超过 10 年前
A CPU backdoor is impossible only in the sense that, say, sending a submarine to tap an undersea cable is impossible...
dracolytch超过 10 年前
CPU backdoors are a very real concern, but not only in the CPU but in the growing complexity of the motherboard chipset. For example, a malicious memory controller could manipulate data on the way to the CPU, causing a faithful CPU to do malicious things.<p>For highly secured systems, this is of growing concern. With the amount of stuff made in China the supply chain is considered a considerable attack surface which has to be considered when sourcing electronics.
评论 #9007139 未加载
GigabyteCoin超过 10 年前
Given the fact that the NSA targets linux users [0], is it really that far fetched that they could be adding backdoors to CPUs ordered by certain NSA targets?<p>I&#x27;m assuming most linux enthusiasts build their own rigs, as do I.<p>[0] <a href="http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance" rel="nofollow">http:&#x2F;&#x2F;www.linuxjournal.com&#x2F;content&#x2F;nsa-linux-journal-extrem...</a>
评论 #9002381 未加载
justcommenting超过 10 年前
for many modern desktops&#x2F;laptops (including recent Apple machines, which i don&#x27;t think was the case even just a few product cycles ago), Intel&#x27;s vPro appears capable of many forms of surveillance&#x2F;subversion.<p>in terms of understanding&#x2F;mitigating these types of threats, i wish an open, crowdfunded project to reverse engineer the contents of intel&#x27;s microcode updates existed to the point they were understandable by the tech press.<p>i also wish an easy-to-use package for blacklisting cpu-based and crypto-related kernel modules (like aes-ni) existed for a broad range of processors..<p>and of course only somewhat relatedly, i continue to wish the man page for random(4) would be rewritten in light of the risk of these types of backdoors.
评论 #9002332 未加载
2510c39011c5超过 10 年前
here is another article about CPU backdoors,<p><a href="http://theinvisiblethings.blogspot.com/2009/03/trusting-hardware.html" rel="nofollow">http:&#x2F;&#x2F;theinvisiblethings.blogspot.com&#x2F;2009&#x2F;03&#x2F;trusting-hard...</a><p>and the discussion in the comment section of that one is good and contains some interesting pointers for further sources on this topic...<p>Also, here is a phrack article &quot;System Management Mode Hack&quot; on how to exploit Intel system management mode (with code at the end of the article).<p><a href="http://phrack.org/issues/65/7.html" rel="nofollow">http:&#x2F;&#x2F;phrack.org&#x2F;issues&#x2F;65&#x2F;7.html</a>
stephenmm超过 10 年前
It seems very unlikely that someone would be able to &quot;apply the edit to a partially finished chip&quot;. The adding of a fix like this is probably some of the most scrutinized processes in hardware design. After spending years designing and verifying chip functionality and getting the timing exactly right before production starts there is a very high bar for getting these fixes in to the production flow because if the fix screws anything else up you are FUBARed. Given that, it is probably the hardest place you could ever try and put a back door.