Transcript
Page 1: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Attacking Intel® Trusted Execution Technology

Rafal Wojtczuk and Joanna Rutkowska

http://invisiblethingslab.com/

Black Hat DC, February 18-19, 2009Washington, DC, USA

Page 2: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 3: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Trusted Execution Technology (TXT)

Attacking TXT

More on the Implementation Bugs

More on the TXT design problem

1

2

3

4

Page 4: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Intel® Trusted Execution Technology (TXT)

Page 5: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Trusted Computing

Page 6: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

TPM 1.2 Passive I/O device (master-slave) Special Registers: PCR[0...23] Interesting Operations:

Seal/Unseal, Quote (Remote Attestation) some crypto services, e.g. PRNG, RSA

Page 7: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

PCR registers

Page 8: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

PCR “extend” operation

PCRN+1 = SHA-1 (PCRN + Value)

A single PCR can be extended multiple times It is computationally infeasible to set PCR to a specified value (ext(A), ext(B)) ≠ (ext(B), ext(A))

Page 9: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

TPM

PCR 17

PCR 18

PCR 19

0x12345678abcdef01

0x22443dd937495955

0xaaa9244ff3445574

TPM: Seal/Unseal Operation

secret (key)

secret (key)

sealing

unsealing

Page 10: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

# echo 'Secret!!!' | tpm_sealdata -z -i/proc/self/fd/0 -o./mysecret.blob -p17 -p18 -p19

// assuming PCR’s are the same# tpm_unsealdata ./mysecret.blob Secret!!!

// assuming PCR’s are different# tpm_unsealdata ./mysecret.blob error 24: Tspi_Data_Unseal: 0x00000018 - layer=tpm, code=0018 (24), Wrong PCR value

TPM seal/unseal example

Page 11: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

TPM: Quote Operation (Remote Attestation)

TPM

PCR 17

PCR 18

PCR 19

0x12345678abcdef01

0x22443dd937495955

0xaaa9244ff3445574

[PCR17,18,19] + signature (AIK)

Page 12: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Both seal/unseal and quote operations can use any subset of PCR registers (e.g. PCR17, 18, 19)

Page 13: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Static Root of Trust Measurement (SRTM)

Page 14: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

BIOS ROM BIOS FLASH BOOT LOADER OS kernel

TPM

PCI ROMs

PCR

0

PCR

1

PCR

2

PCR

3

PCR

4 ...

PCR Usage (convention)

0 BIOS ROM & FLASH

1 Chipset config

2 PCI ROMs

3 PCI config

4 bootloader

5 bootloader config

6 ...

7 ...

8 e.g. OS kernel

Page 15: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

SRTM in practice

Page 16: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Example #1: Disk Encryption

Disk encrypted with a key k, that is sealed into the TPM...Now, only if the correct software (VMM, OS) gets started it will get access to the key k and would be able to decrypt the disk!MS’s Bitlocker works this way.

Page 17: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

But the key k must be present in the memory all the time...(the OS needs it to do disk on-the-fly decryption)

Page 18: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

So, a malware can sniff it…

Page 19: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Two ways to solve it...

Page 20: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Example #2: User’s Picture Test :)

During installation, a user takes a picture of themselves using a built-in in laptop camera...This picture is stored on disk, encrypted with key kpic, which is sealed by the TPM…Now, on each reboot — only if the correct software got loaded, it will be able to retrieve the key kpic and present a correct picture to the user.Important: after the use accepts the picture, the software should extend PCR’s with some value (e.g. 0x0), to lock access to the key kpic

Page 21: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Example #3: Remote Attestation

Each computer needs to “authenticate” itself to the monitoring station using the TPM Quote command…If a computer is discovered in a corporate network that hasn’t authenticated using TPM Quote with expected PCR registers, an alarm should be raised (e.g. this computer should be disconnected from the corporate network).Convenient for corporate scenarios with centralized monitoring server.

Page 22: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Problems with SRTM

Page 23: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

COMPLETENESS — we need to measure every possible piece of code that might have been executed since the system boot!

SCALABILITY of the above!

Page 24: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Dynamic Root of Trust Measurement (DRTM)

Page 25: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Attempt to address the SRTM’s weaknesses —lack of scalability and the need for completeness...

Page 26: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

VMM VMMSENTER

A VMM we want to load(Currently unprotected)

The VMM loaded and its hash stored in PCR18

TPM

PCR

18 TPM will unseal secrets to the just-

loaded VMM only if it is The Trusted VMMsecret key

Notes: Diagram is not in scale! SENTER also resets and extends PCR17 with hash of SINIT/BIOSACM/(STM)/ LCP

Page 27: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

SENTER — one of a few new instructions introduced by TXT(They are all called SMX extensions)

Page 28: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

TXT bottom line

TXT late launch can transfer from unknown/untrusted/unmeasured system…to a known/trusted/measured systemWithout reboot!

The system state ("trustedness") can be verified (possibly remotely) because all important components (hypervisor, kernel) hashes get stored into the TPM by SENTER.

Page 29: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

TXT implementation: tboot

Page 30: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

GRUB (1st stage)

GRUB (2nd stage)

tboot (“1st stage”)

Disk

xen.gz

SENTER resets PCR18 and extends it with a hash of

tboot’s MLE

tboot MLE

Notes: Diagram is not in scale! SENTER also resets and extends PCR17 with hash of SINIT/BIOSACM/(STM)/ LCP

Page 31: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Xen + tboot example

Page 32: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

First we start “trusted” Xen (built by root@)...and seal some secret to PCR17/18/19

Page 33: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 34: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Now we boot “untrusted” Xen (compiled by hacker@)...

Page 35: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 36: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Thanks to tboot only when the trusted xen.gz was booted we can get the secret unsealed from the TPM!

Page 37: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Now some live demos...

Page 38: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Tboot Demo #1: sealing to a trusted Xen

Page 39: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 40: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Tboot Demo #2: booting an untrusted Xen

Page 41: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 42: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

SENTER is not obligatory!!!TXT and TPM: cannot enforce anything on our hardware! We can always choose not to execute SENTER!

Page 43: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

So what is this all for?

Page 44: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Why would a user or an attacker be interested in executing the SENTER after all?

Page 45: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

It’s all about TPM PCRs and secrets sealed in TPM! — see previous SRTM examples — it’s all the same with DRTM

(alternatively: about Remote Attestation)

Page 46: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

AMD Presidio

AMD’s technology similar to Intel’s TXT, part of AMD-VA special new instruction SKINIT (Similar to Intel’s SENTER)

We haven’t looked at Presidio thoroughly yet.

Page 47: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Launch time protection vs. runtime protection

Page 48: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

VM1 VM2 VM3Management

Domain

hypervisor

MBR/BIOS

SRTM/DRTM(launch-time protection)

e.g. buffer overflow(no runtime protection!)

Page 49: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Theoretically runtime-protection should be implemented effectively using the VT-x/ VT-d technologies...

In practice: see our “Xen Owning Trilogy”(BH USA 2008) ;)

Page 50: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

TXT: exciting new technology with great potential!(Eg. whenever a user boots their machine he or she knows it is secure!)

Page 51: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Attacking TXT

Page 52: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Q: What is more privileged than a kernel code?A: Hypervisor (“Ring -1”)

Page 53: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Q: What is more privileged than a hypervisor?A: System Management Mode (SMM)

Page 54: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Introducing “Ring -2”

SMM can access the whole system memory (including the kernel and hypervisor memory!!!)

SMM Interrupt, SMI, can preempt the hypervisor (at least on Intel VT-x)

SMM can access the I/O devices (IN/OUT, MMIO)

Page 55: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Q: Is this SMM some new thing?A: Nope, it’s there since 80386...

Page 56: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

SMM vs. TXT?

Page 57: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

SMM gets loaded before Late Launch...

Page 58: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Q: Does TXT measure currently used SMM?A: No, TXT doesn’t measure currently loaded SMM

Page 59: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Q: Does TXT reload SMM on SENTER execution?A: No, SENTER doesn’t reload SMM…

(SENTER does not touch currently running SMM at all!)

Page 60: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Q:So, how does the SENTER deal with a malicious SMM?A:Well… it currently does not!

Page 61: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Oh...

Page 62: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

TXT attack sketch (using tboot+Xen as example)

GRUB (1st stage)

GRUB (2nd stage)

tboot.gz

Disk

xen.gz

Attacker patches the bootloader (e.g. GRUB). The

patched code injects a shellcode to SMM

SMRAM

Evil shellcode will infect the Xen hypervisor later...

After xen.gz gets sucesfully loaded, the evil code from

SMRAM can easily infect it...

Notes: Diagram is not in scale! SENTER also resets and extends PCR17 with hash of SINIT/BIOSACM/(STM)/ LCP

Page 63: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Let’s have a look at the actual SMM shellcode

Page 64: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Address of an unused entry in the hypercall_table

Address of the shellcode (in the guest address space)

Page 65: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

... and the shorter version...

Page 66: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 67: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

The final outcome...

Page 68: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 69: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Wait! But how to infect the SMM handler?

Page 70: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Stay tuned!SMM exploiting to be presented in the next chapter...

Page 71: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Let’s take a look at the live demo now...

Page 72: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 73: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

More on the Implementation Bugs

Page 74: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

So how we can get into SMM memory (SMRAM)?

Page 75: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

SMM research quick history

Page 76: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

2006: Loic Duflot(not an attack against SMM, SMM unprotected < 2006)

2008: Sherri Sparks, Shawn Embleton(SMM rooktis, but not attacks on SMM!)

2008: Invisible Things Lab (Memory Remapping bug in Q35 BIOS)

2009: Invisible Things Lab (CERT VU#127284, TBA)

(checked box means new SMM attack presented; unchecked means no attack on SMM presented)

Page 77: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

No SMM bugs known...

...cannot read SMM memory

(TSEG)...

...cannot look for bugs in TSEG!

Oopsss…. A vicious circle!

Page 78: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

So, how did we get around this vicious circle?

Page 79: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

De-soldering?

Page 80: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 81: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 82: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 83: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Meet Atmel 26DF321 SPI-flash

Page 84: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

De-soldered SPI-flash chip

Page 85: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Looks promising, but...

Page 86: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

The BIOS image on the SPI-flash is heavily packed!(inconvenient form for SMM auditing)

Page 87: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

So, we used a different approach…(but we wanted to show the “pics from the lab” anyway;)

Page 88: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Remember our Q35 bug from Vegas?(We couldn’t actually present it during the conference as there was no patch then, but we published the slides a

few weeks afterwards)

Page 89: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

4GB

Processor’s View DRAM

TOLUD

TOUUD 5GB

MMIO

REMAPBASE

REMAPLIMITremapping

This DRAM now accessible from CPU at physical addresses: <REMAPBASE, REMAPLIMIT>Otherwise would be wasted!

Memory Remapping on Q35 chipset

Page 90: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Now, applying this to SMM...

Page 91: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

#define TSEG_BASE 0x7e500000

u64 target_phys_area = TSEG_BASE & ~(0x10000-1);u64 target_phys_area_off = TSEG_BASE & (0x10000-1);new_remap_base = 0x40;new_remap_limit = 0x60;

reclaim_base = (u64)new_remap_base << 26;reclaim_limit = ((u64)new_remap_limit << 26) + 0x3ffffff;reclaim_sz = reclaim_limit - reclaim_base;reclaim_mapped_to = 0xffffffff - reclaim_sz;reclaim_off = target_phys_area - reclaim_mapped_to;

pci_write_word (dev, TOUUD_OFFSET, (new_remap_limit+1)<<6);pci_write_word (dev, REMAP_BASE_OFFSET, new_remap_base);pci_write_word (dev, REMAP_LIMIT_OFFSET, new_remap_limit);

fdmem = open ("/dev/mem", O_RDWR);memmap = mmap (..., fdmem, reclaim_base + reclaim_off);for (i = 0; i < sizeof (jmp_rdi_code); i++) *((unsigned char*)memmap + target_phys_area_off + i) = jmp_rdi_code[i];

munmap (memmap, BUF_SIZE);close (fdmem);

Page 92: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 93: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 94: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,
Page 95: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

We see we can access SMM memory using this Q35 bug :)

Page 96: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Intel patched the bug in August 2008(This was done by patching the BIOS code to properly lock the memory configuration registers)

Page 97: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

So, what now?

Page 98: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

VU#127284

Page 99: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

In

te

l

We think TXT is essentially useless without protection against SMM-originating

attacks...

That’s an exaggerated statement - we still believe infecting an SMM is hard...

BTW, we just found a bunch of new SMM bugs for Intel BIOSes + 2 working

exploits ;)

Inv

isible

Th

ing

s La

b

The dialogs between ITL and Intel presented here have been modified for brevity and for better dramatic effect.

December 2008:

Page 100: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

We have provided Intel with the details of the new SMM issues affecting their recent BIOSes on December 10th, 2008.

Page 101: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Intel confirmed the problems in their BIOSes as affecting:“mobile, desktop, and server motherboards", without providing any more

details about which exact models are vulnerable.

Page 102: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

We suspect it might affect all recent Intel motherboards/BIOSes.

Page 103: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Intel believes the issues might affect other vendors as well...

Page 104: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Intel contacted CERT CC informing them about the problem...

Page 105: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

CERT has assigned the following tracking # to this issue:VU#127284

Page 106: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

We plan to discuss the details of the bugs at BH USA 2009 in Vegas...

Page 107: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Stay tuned!(and don’t trust your SMM in the meantime)

Page 108: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

More on the TXT Design Problem

Page 109: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Solution to the TXT attack is called: STM

In

te

l

Can we take a look at this STM?

STM is currently not available.

?

It is simple to write. There was just no market demand yet.

?

Inv

isible

Th

ing

s La

b

The dialogs between ITL and Intel presented here have been modified for brevity and for better dramatic effect.

Page 110: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

SMM Transfer Monitor (STM)

VM1 VM2 SMM

hypervisor (VMM) STM

SMI

Communication protocol

Page 111: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Potential issues with STM

STM seems to be non-trivial to write! CPU, memory and I/O virtualization for the SMM need to be implemented!

VMM-to-STM protocol asks for a standard No STM in existence as of yet…

also...

Page 112: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

In

te

l

Who should write an STM?

OEMs/BIOS vendors!

Hmm… Isn’t Intel a BIOS vendor itself?

Inv

isible

Th

ing

s La

b

The dialogs between ITL and Intel presented here have been modified for brevity and for better dramatic effect.

Page 113: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

In

te

l

Why should we trust BIOS vendors to write bug-free STMs, if we don’t trust they

will write bug-free SMMs?

SMM must be “tuned” to each new motherboard. STM could be written in a generic way — no need to change STM

after it gets mature.

Inv

isible

Th

ing

s La

bFair point.

The dialogs between ITL and Intel presented here have been modified for brevity and for better dramatic effect.

Page 114: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Intel told us they do have STM specification that answers some of our concerns (e.g. that STM is difficult to write), and the spec is

available under NDA.

Page 115: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Intel offered us a chance to read the STM spec…...but required signing an NDA.

… We refused.

(We’d rather not tie our hands with signing an NDA — we prefer to wait for some STM to be available and see if we can break it :)

Page 116: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Intel might be right claiming that STM is the remedy for our attack.

Page 117: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

There are some other issues with STM however…e.g. how the STM will integrate with the SENTER measurement

process?

Page 118: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

We cannot make our mind on this until we see a working STM.…

Stay tuned! And cross your fingers!…

If you are interested in sponsoring this research further, do not hesitate to contact us!

Page 119: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Still, allowing TXT to work without an STM was, in our opinion, a design error.

Page 120: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Summary

Page 121: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

Intel TXT is a new exciting technology! It really is!Intel “forgot” about one small detail: SMM…

We found and demonstrated breaking into SMM,this allowed us to also bypass TXT.Bonus: SMM rootkits now possible on modern systems!

Intel currently is patching the SMM bugs (BIOS),We hope our presentation will stimulate Intel and OEMs to create and distribute STMs — a solution to our attacks against TXT.

Page 122: Rafal Wojtczuk and Joanna Rutkowska - Black Hat · Attacking Intel ¨ Trusted Execution Technology Rafal Wojtczuk and Joanna Rutkowska Black Hat DC, February 18-19, 2009 Washington,

http://invisiblethingslab.com


Top Related