*Second:* I’m not willing to accept, that CPU/MMU - Microcode can be
changed just by some OS/SW-Updates *without* any physical and local
interventions or with *a secret „ONE WAY“* passwords/ticket
*directly coming from the manufacture company*. Otherwise "very bad
hackers" are able to change the critical CPU/MMUs - Microcode to
prepare some „spyglass-situation|attacks“, which NO uper-layered
"Security-SW or OS“ ever can detect.
*This is a very bad situation (even if this exist many years ago). *
You appear to have the impression that microcode updates are completely
unsigned code that anyone can modify. You might find this an interesting
read:
http://inertiawar.com/microcode/
It explains how microcode updates work in general and specifically how
they work on Intel chips. You cannot simply perform arbitrary microcode
updates on a system. And microcode updates will only load if they are
newer than the one already applied. So you cannot just load an older
insecure version of microcode if an update has already been applied by
either the bios or the kernel. Microcode updates only increase security,
they could only decrease it if Intel released a microcode update that
introduced a weakness and signed that. At the point where you don't
trust your vendor on that level anymore you might as well give up on any
sort of proprietary hardware that needs any sort of binary blobs, which
some decide to do.
*INFO:*
It looks HPE has realized this *serious security thread* and developed
a special ILO-Chip hat help to solve this real problem.
*siehe:*
http://www.zdnet.de/88300819/schutz-vor-firmware-attacken-hpe-sichert-proliant-server-ab/?_ga=2.128992076.1543857168.1515237773-947033226.1515237773&inf_by=5a50b18d671db879058b47d8
👍
*I hope other HW manufactures *(DELL, IBM, CISCO, Oracle, etc.) *are
asap. also have/providing some solution for this problem.*
The link you have provided shows that HPE wants to make sure its
firmware, i.e. UEFI and components are secured. They do not talk about
preventing microcode updates, which I don't think this provides as those
are CPU features directly. I'm not sure if those can be disabled by the
chipset/mainboard as its basically just a special instruction sent to
the CPU (pretty sure they can't be prevented by that).