On Tue, 5 Sep 2017 at 20:14:04 +0200
mdn <bernardl...@openmailbox.org> wrote:

> Hello,
> To make some precisions:
> -The "High Assurance Platform" belongs to a trusted platform program
> linked to the U.S. National Security Agency (NSA). A graphics-rich
> presentation describing the program can be found here.
> http://fm.csl.sri.com/LAW/2009/dobry-law09-HAP-Challenges.pdf

  It's available at the Internet Archive's Wayback machine:
https://web.archive.org/web/20121211162830/http://fm.csl.sri.com/LAW/2009/dobry-law09-HAP-Challenges.pdf

> note: the link is dead but I have a backup of the pdf.
> If someone needs it just ask.
> 
> -More parts of the ME can be removed thanks to this discovery.
> 
> -The removed part makes the ME go into "TemporaryDisable mode" which is
> undocumented, like a lot of of undocumented instructions
> https://github.com/xoreaxeaxeax/sandsifter/raw/master/references/domas_breaking_the_x86_isa_wp.pdf.
> 
> -This "TemporaryDisable mode" allows the CPU to initialize without the
> ME activated.
>
> -This hack doesn't work on Apollo Lake platforms.
>
> So it doesn't remove the ME it "neutralises" it and for what remains we
> can only hope that nothing reinitialise it afterwards since the
> instruction is called Temporary Disable mode.

  There are many things that can be removed, as stated in the same
provided URL:

 Setting the HAP bit
The aforementioned facts help to reveal the second method of disabling Intel
 ME:

    1. Set the HAP bit.
    2. In the CPD section of the FTPR, remove or damage all modules except
    those required by BUP for startup:

        RBE

        KERNEL

        SYSLIB

        dBUP

    3. Fix the checksum of the CPD header (for more details on the structure
    of ME firmware, see this paper).

> Imo seeing the awful state of X86 platforms, POWER is our only hope to
> own what we buy.

  Not the only one.  We also have ARM from a number of producers and Chinese
and Russian RISC CPUS.


-- 
Alessandro Selli http://alessandro.route-add.net
VOIP SIP: dhatarat...@ekiga.net
Chiavi PGP/GPG keys: B7FD89FD, 4A904FD9
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to