Basics
Types of "engine":
- Management engine which can do many things, including network access, remote control.
- Trusted module / hardware security module (HSM) which contains crypto keys and runs crypto algorithms.
- Trusted store which contains an audit trail of system actions.
Wikipedia's "Trusted execution environment"
/u/SupposedlyImSmart on reddit 11/2018
Gwern's "How Many Computers Are In Your Computer?"
Matthew Garrett's "PKCS#11. hardware keystores, and Apple frustrations"
From ekr's "Hardware Security Modules":
... Instead of deriving the encryption key from the password, they generate a random encryption key inside of a piece of hardware security module (HSM). What "secure" means varies but ideally it's something like:
- It can do encryption and decryption internally without ever exposing the keys.
- It resists physical attacks to recover the keys. For instance it might erase them if you try to remove the casing from the HSM.
The main function of the HSM is to limit the rate at which you can try passwords. ...
TPM (Trusted Platform Module)
TPM is a passive device: firmware or OS or software can use it to do functions, but TPM does not initiate actions on its own.
TPM 1.x and TPM 2 are quite different. In the future, there will be "Pluton", which is backward-compatible with TPM (2?), but has TPM functionality on same chip die as the CPU, and adds more functions.
What a TPM can do/provide:
- Provide a hardware random-number generator (RNG).
- Provide hardware hash and encryption functions.
- Generate and store cryptographic keys, maybe in association
with a password supplied by the user.
- Provide Platform Configuration Registers (PCRs) that form history chains.
"each operation that wants to add a value to these PCRs doesn't set them, but rather 'extends' them, which essentially means creating a new hash based on the current value plus the new value". - Store a private key, so OS/software holding the public key can
securely communicate with TPM.
nandhithakamal's "How to TPM - Part 2 : TPM Software Stack"
Paolo Fabio Zaino's "Hardware: TPM module"
What a TPM can be used for:
- Automatic disk decryption at boot, using a key stored in the TPM, so the disk
can't be attached to any other system and decrypted.
From reddit 2/2024: - Measured boot, where each step's check-sum is added to a PCR and
if the final result doesn't match the expected value, something has been changed / tampered with.
Paraphrased from MiniTool's "AMD CPU fTPM":
"There are 5 types of TPM 2.0 implementations: Firmware TPM (fTPM), Discrete TPM (dTPM), Software TPM (sTPM), Integrated TPM (iTPM), Hypervisor TPM (hTPM)."
In Windows, check by pressing Windows Key + R, type "tpm.msc", then click OK.
In Linux, check via:
fwupdmgr security --force
ls /sys/class/tpm/
cat /sys/class/tpm/tpm0/tpm_version_major
sudo fwupdtool security --force # security state of system
In BIOS, Advanced Settings, there may be choice between fTPM (firmware TPM) or Discrete TPM. Also there is Intel PTT.
AMD Security Processor may serve as a TPM; your OS may say you have a TPM even though there is no TPM option in BIOS.
Michael Peters' "What Can You Do with a TPM?"
Sergio Prado's "Introduction to TPM (Trusted Platform Module)"
ArchWiki's "Trusted Platform Module"
Microsoft's "TPM recommendations"
Microsoft's "How Windows uses the Trusted Platform Module"
UAPI's "Linux TPM PCR Registry"
Raymond Chen's "Notes on BitLocker and the TPM and the pre-boot password or PIN"
Dell's "Dell Trusted Device: BIOS Security"
Will Arthur, David Challener, and Kenneth Goldman's "A Practical Guide to TPM 2.0" (book)
Lenovo's "A Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux"
Paolo Fabio Zaino's "Linux: What can I do with a Trusted Platform Module (TPM)?"
Pid Eins's "The Strange State of Authenticated Boot and Disk Encryption on Generic Linux Distributions"
Eric Chiang's "The Trusted Platform Module Key Hierarchy"
Michael Altfield's "Trusted Boot"
From someone on reddit 7/2021:
"... just about any modern PC, phone, or tablet is relying on some kind of TPM or TPM-like device to provide disk encryption and other security protections. ChromeOS uses TPMs, Android phones use TPMs or equivalent features, and Apple's devices all use the 'Secure Enclave' to handle many TPM-ish functions."
Intel-based Macs have a "T2" chip running "BridgeOS".
Jeffrey Paul's "On Trusting Macintosh Hardware"
"China has its own [alternative] standard called the Trusted Cryptography Module (TCM)"
TPM 2
Two articles about same operation:
Dan Goodin's "Trusted platform module security defeated in 30 minutes"
Dolos Group's "From Stolen Laptop to Inside the Company Network"
Firmware TPM
Intel Management Engine (AKA 'ME' or 'CSME')
Wikipedia's "Intel Management Engine"
Intel's "Intel Converged Security and Management Engine (Intel CSME)"
Lily Hay Newman's "Intel Chip Flaws Leave Millions of Devices Exposed"
Erica Portnoy and Peter Eckersley's "Intel's Management Engine is a security hazard, and users need a way to disable it"
Purism's "Intel's Management Engine"
coreboot Wiki's "Intel Management Engine"
Ronald Minnich talk (video)
Igor Skochinsky's "Intel ME Secrets"
Igor Skochinsky's "Intel ME: Two Years Later"
"AMT for Linux"
From someone on reddit:
"Do you have an Intel CPU from the last 10+ years? If so, then yes ME is enabled. If it weren't via HAP, you'd know."
Shane McGlaun's "Here's How To Disable Intel Management Engine And Slam Its Alleged Security Backdoor Shut"
"Sakaki's EFI Install Guide / Disabling the Intel Management Engine"
Steven J. Vaughan-Nichols' "Computer vendors start disabling Intel Management Engine"
Skochinsky and Corna's "Intel ME: Myths And Reality" (PDF)
corna's "me_cleaner"
mostav02's "Neutralizing Intel ME via internal flashing with Intel FPT"
Vault Labs' "What every CISO and security engineer should know about Intel CSME"
Intel Management Engine Interface driver for Linux
Intel Management Engine Client bus API for Linux
Russell Coker's "AMT/MEBX on Debian"
libreboot's "Intel Management Engine (ME)" section
"Intel ME and AMT" section of PrivSec article
"ls /dev/mei*"
Test your system ?
Intel's "Management Engine Critical Firmware Update (Intel-SA-00086)"
intelmetool from coreboot / coreboot ? But the project's build process is very strange, and failed for me. Also tried to build just intelmetool, and failed.
From someone on reddit:
"After I did the firmware update for my version of IME, I just made sure and disabled everything relating to IME/vPro in my BIOS/UEFI settings and also disabled its related services and related serial port in device manager in Windows."
From someone on reddit:
"Intel ME listens on ports 623, 664 and 16992-16995. So if you're behind a firewall block these ports. Though you'd be better off to create a whitelist instead."
AMD's PSP and CCP
AMD's PSP (Platform Security Processor) and CCP (Cryptographic Coprocessor) hardware.
Wikipedia's "AMD Platform Security Processor"
Google's "AMD Secure Processor for Confidential Computing - Security Review"
"What is known about the capabilities of AMD's Secure Processor?"
"AMD PSP 2.0 AMD Secure Processor"
Specter's "Reversing the AMD Secure Processor (PSP) - Part 1: Design and Overview"
Specter's "Reversing the AMD Secure Processor (PSP) - Part 2: Cryptographic Co-Processor (CCP)"
PSPReverse project/repos
libreboot's "AMD Platform Security Processor (PSP)" section
Apparently this just verifies firmware contents, it has no remote capability ? But see: reddit thread
sudo lshw -class generic
sudo ss -lptun | grep :8732 # supposedly listens here; not on my system
sudo dmesg -T | grep -i -E 'ccp|psp'
grep -i ccp /proc/crypto
modinfo ccp
Greg Marsden's "Using AMD Secure Memory Encryption with Oracle Linux"CCP-related source code in kernel
more kernel code
OpenSSL and AMD Cryptographic CoProcessor (CCP)
"apt show librte-pmd-ccp20.0"
https://doc.dpdk.org/guides/cryptodevs/ccp.html
"apt show dpdk"
https://forum.gigabyte.us/thread/9479/bug-linux-x570-aorus-initialize
https://elixir.bootlin.com/linux/latest/source/drivers/crypto/ccp/ccp-dev-v5.c#L791
AMD CCP dev says it's a BIOS issue.
Other Security Engines
Chiefio's "For deep security, use ARM, avoid Intel & AMD processors"
But ARM has "TrustZone", used in Android at least ?
Scott Thornton's "Arm TrustZone explained"
Sergio Prado's "Introduction to Trusted Execution Environment and ARM's TrustZone"
Most smartphones have a baseband module running a proprietary OS.
Wikipedia's "Baseband processor"
Qualcomm's AMSS, running in the baseband processor.
Wikipedia's "REX OS"
"AMSS on Qualcomm's MSM Platform"
"Qualcomm amss file structure and compilation process analysis"
vrushabh sutar's "Qualcomm MSM boot process"
From Ronald Minnich talk (video):
"There are 2.5 hidden OS's in the [Windows/Intel/UEFI] system: Intel ME, SMM (the .5), and UEFI."
System Management Mode (SMM):
Microsoft's "System Management Mode deep dive"
"System Management Mode has been around since the 486."
Ronald Minnich talk (video)
Igor Bogdanov's "Security features of the Intel/Windows platform secure boot process"
Jeremy Boone's "Stepping Insyde System Management Mode"
UEFI:
Wikipedia's "UEFI"
Igor Bogdanov's "Security features of the Intel/Windows platform secure boot process"
Anton Shilov's "HP's Endpoint Security Controller: More Details About A New Chip in HP Notebooks"
Pluton:
Eduard Kovacs' "Microsoft Unveils 'Pluton' Security Processor for PCs"
Gabriel Sieben's "The dangers of Microsoft Pluton" (comments)
Matthew Garrett's "Pluton is not (currently) a threat to software freedom"
Matthew Garrett's "AMD's Pluton implementation seems to be controllable"
Matthew Garrett's "Quick update on Pluton and Linux"
From Brandon Lee's "What is Microsoft Pluton Security Processor?":
"Is Microsoft Pluton a new chip?
Surprisingly, no. Microsoft Pluton has actually been around in technology terms for ages now, since 2013! Microsoft Pluton was a chip included in the Xbox One gaming console."
Raspberry Pi has GPU acting as a management engine:
nachoparker's "What's wrong with the Raspberry Pi"
Wikipedia's "ThreadX"
Deepika's "Raspberry Pi Boot Process"
If you're using a "server" motherboard:
You might have a Baseboard Management Controller (BMC) or IPMI.
Chris Siebenmann's "Sorting out IPMI and BMC terminology and technology"
Patrick Kennedy's "Explaining the Baseboard Management Controller or BMC in Servers"
"ipmitool" or "ls -d /dev/ipmi*" on Linux.
Wikipedia's "Out-of-band management"
Dell iDRAC.
One idea: don't connect network to motherboard's network interface, instead use a third-party network interface board, which the ME shouldn't know how to use.
Thom Holwerda's "The second operating system hiding in every mobile phone"
iPhone:
From article:
"When an iPhone is turned off, most wireless chips stay on. For instance, upon user-initiated shutdown, the iPhone remains locatable via the Find My network. If the battery runs low, the iPhone shuts down automatically and enters a power reserve mode. Yet, users can still access credit cards, student passes, and other items in their Wallet. ... On recent iPhones, Bluetooth, Near Field Communication (NFC), and Ultra-wideband (UWB) keep running after power off ..."
OpenTitan (open-source Root Of Trust chips)
Titan C chip is used in Framework Chromebook computer: article.
Miscellaneous
From someone on reddit 6/2024:
Gabriel Sieben's "Remote attestation is coming back. How much freedom will it take?"
But see comments.
Sergio Prado's "RPMB, a secret place inside the eMMC"