Intel Management Engine: Difference between revisions

From coreboot
Jump to navigation Jump to search
 
(11 intermediate revisions by the same user not shown)
Line 16: Line 16:
== Versions ==
== Versions ==
{| class="wikitable"  border="1"
{| class="wikitable"  border="1"
! ME version
! ME firmware version
! Microarchitecture
! Microarchitecture
! Chipset
! Chipset
Line 54: Line 54:
* No TPM
* No TPM
|-
|-
| 6.0<ref name=me_cleaner-how-does-it-work>https://github.com/corna/me_cleaner/wiki/How-does-it-work%3F</ref>
|-
| Nehalem
|
|
* 6.0<ref name=Silent-Bob-is-Silent>https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075</ref>
* 6.1<ref name=Silent-Bob-is-Silent/>
* 6.2<ref name=Silent-Bob-is-Silent/>
| 1st Gen Core:<ref name=Silent-Bob-is-Silent/>
* Nehalem?
* Other?
|
|
|
|
|
|
|
|
| rowspan="3"|
|
* BUP<ref name=me_cleaner-how-does-it-work/>
| rowspan="6"|
| rowspan="3"|
* BUP<ref name=me_cleaner-how-does-it-work>https://github.com/corna/me_cleaner/wiki/How-does-it-work%3F</ref>
| rowspan="6"|
* AltMeDisable<ref name=me_cleaner-HAP-AltMeDisable-bit>https://github.com/corna/me_cleaner/wiki/HAP-AltMeDisable-bit</ref>
* AltMeDisable<ref name=me_cleaner-HAP-AltMeDisable-bit>https://github.com/corna/me_cleaner/wiki/HAP-AltMeDisable-bit</ref>
|-
|-
Line 73: Line 79:
|
|
|-
|-
| 10.x<ref name=me_cleaner-how-does-it-work/>
|
| Broadwell
* 7.0<ref name=Silent-Bob-is-Silent/>
* 7.1<ref name=Silent-Bob-is-Silent/>
| 2nd Gen Core<ref name=Silent-Bob-is-Silent/>
|
|
|
|
|
|-
|
* 8.0<ref name=Silent-Bob-is-Silent/>
* 8.1<ref name=Silent-Bob-is-Silent/>
| 3rd Gen Core<ref name=Silent-Bob-is-Silent/>
|
|
|
|
|
|-
|
* 9.0<ref name=Silent-Bob-is-Silent/>
* 9.1<ref name=Silent-Bob-is-Silent/>
* 9.5<ref name=Silent-Bob-is-Silent/>
| 4th Gen Core<ref name=Silent-Bob-is-Silent/>
|
|
|
|
|
|-
|
* 10.0<ref name=Silent-Bob-is-Silent/>
| 5th Gen Core:<ref name=Silent-Bob-is-Silent/>
* Broadwell
* Other?
|
|
|
|
Line 81: Line 121:
|
|
|-
|-
| 11.x<ref name=me_cleaner-how-does-it-work/>
|  
* 11.x<ref name=me_cleaner-how-does-it-work/>
| Skylake
| Skylake
|
|
Line 88: Line 129:
|
|
|
|
|
| rowspan="3"|
* RBE
* RBE
* BUP
* BUP
Line 95: Line 136:
|
|
* HAP<ref name=me_cleaner-HAP-AltMeDisable-bit>https://github.com/corna/me_cleaner/wiki/HAP-AltMeDisable-bit</ref>
* HAP<ref name=me_cleaner-HAP-AltMeDisable-bit>https://github.com/corna/me_cleaner/wiki/HAP-AltMeDisable-bit</ref>
|-
|
* 11.0<ref name=Silent-Bob-is-Silent/>
| 6th Gen Core<ref name=Silent-Bob-is-Silent/>
|
|
|
|
|
|-
|-
|
* 11.5<ref name=Silent-Bob-is-Silent/>
* 11.6<ref name=Silent-Bob-is-Silent/>
| 7th Gen Core<ref name=Silent-Bob-is-Silent/>
|
|
|
|
|
|}
|}



Latest revision as of 16:00, 12 January 2018

Uses of the Management Engine

The Intel Management Engine (abbreviated "ME") is a CPU which:

  • permits out of band management of the computer. See the Wikipedia AMT article for example use cases.
  • on recent versions:
    • initializes the hardware, before the boot firmware(BIOS/EFI/UEFI/Coreboot/etc...).
    • DRM
    • TPM
    • Other applications

Freedom and security issues

  • The code that is running inside the management engine is proprietary and signed. Therefore, it cannot easily be audited, tested, or replaced, except by those people with access to the relevant private keys, i.e. a handful of Intel staff (and possibly government agents).
  • The ME has access to a lot of things, see "physical capabilities" column below for more details.
  • In addition to obvious attack vectors (the ME could be used by an adversary to spy on the PC user, tamper with their documents, etc), it could also potentially be used to alter the contents of the motherboard's BIOS flash chip, thereby polluting Coreboot builds based upon extracting the contents of that flash chip.

Versions

ME firmware version Microarchitecture Chipset AMT versions ME firmware versions Applications Location Required modules Bit
N/A (ME predecessor) ICH7 1.0
  • AMT
82573E Gigabit Ethernet Controller<ref name=amt-versions>https://en.wikipedia.org/wiki/Intel_AMT_versions</ref> None ?
Q963<ref name=amt-versions/> 2.0
  • AMT
Q965<ref name=amt-versions/> 2.0 3.0<ref name=ark-DQ965GFE>https://ark.intel.com/products/41972/Intel-Desktop-Board-DQ965GFE</ref>
  • AMT
  • No TPM
1st Gen Core:<ref name=Silent-Bob-is-Silent/>
  • Nehalem?
  • Other?
Nehalem<ref name=intel-5-series>https://en.wikipedia.org/wiki/Intel_5_Series#Ibex_Peak</ref> Q57 6.0<ref name=amt-versions/> 6.0, 6.1 <ref name=ark-q57>https://ark.intel.com/products/42706/Intel-Q57-Express-Chipset</ref>
  • 7.0<ref name=Silent-Bob-is-Silent/>
  • 7.1<ref name=Silent-Bob-is-Silent/>
2nd Gen Core<ref name=Silent-Bob-is-Silent/>
  • 8.0<ref name=Silent-Bob-is-Silent/>
  • 8.1<ref name=Silent-Bob-is-Silent/>
3rd Gen Core<ref name=Silent-Bob-is-Silent/>
  • 9.0<ref name=Silent-Bob-is-Silent/>
  • 9.1<ref name=Silent-Bob-is-Silent/>
  • 9.5<ref name=Silent-Bob-is-Silent/>
4th Gen Core<ref name=Silent-Bob-is-Silent/>
  • 10.0<ref name=Silent-Bob-is-Silent/>
5th Gen Core:<ref name=Silent-Bob-is-Silent/>
  • Broadwell
  • Other?
  • 11.x<ref name=me_cleaner-how-does-it-work/>
Skylake
  • RBE
  • BUP
  • KERNEL
  • SYSLIB<ref name=me_cleaner-how-does-it-work/>
  • 11.0<ref name=Silent-Bob-is-Silent/>
6th Gen Core<ref name=Silent-Bob-is-Silent/>
  • 11.5<ref name=Silent-Bob-is-Silent/>
  • 11.6<ref name=Silent-Bob-is-Silent/>
7th Gen Core<ref name=Silent-Bob-is-Silent/>

Where

Board Firmware Microarchitecture ME location and physical capabilities ME restrictions
Lenovo X60/X60s/X60T None. <ref name="nic-amt">The Ethernet controller is capable of running some fimrwares( like AMT 1.0), but the hardware is not configured to do it on that machine. So no firmwares are loaded. See Intel_82573_Ethernet_controller for more details.</ref> I945 + ICH7
  • Inside the ethernet controller, disabled: no Ethernet controller fimrware. <ref name="nic-amt"></ref>
  • Disabled: No Ethernet controller fimrware. <ref name="nic-amt"></ref>
Lenovo T60
Lenovo x200 Me firmware with AMT and other modules GM45/GS45

The ME is inside the PCH, it:

  • Has access to the computer's memory/RAM
  • Controls the computer's original networking adapters
  • Signed firmware
  • The ME can be disabled (no Fimrware is run by it).
Lenovo x201 Me firmware with AMT and other modules Nehalem
  • Signed firmware
  • If ME firmware is absent, the computer freezes about 30min after boot.
Packard Bell EasyNote LM85 (MS2290) ?
Samsung Series 5 550 Chromebook me.bin Sandy Bridge
  • Signed firmware
Samsung Series 3 Chromebox me.bin
Lenovo t520 Me firmware with AMT and other modules
Google/HP Pavilion Chromebook 14 me.bin Ivy Bridge
  • Signed firmware
Google Chromebook Pixel me.bin
Google/Acer C7 Chromebook me.bin
Google/Lenovo Thinkpad X131e Chromebook me.bin
Lenovo t530 Me firmware with AMT and other modules
Lenovo x230 Me firmware with AMT and other modules
Kotron KTQM77/mITX ?
Google/Acer C720 Chromebook ? Haswell
  • Signed firmware
Google/HP Chromebook 14 ?

Why there is no replacement for it yet

Replacing the ME firmware is not that easy because:

  • The ME bootrom checks the firmware signature.
  • On recent chipset its RAM region is locked while it is allocated.
  • Power glitches(by the ec) while the ME is checking its firmware is probably not practically doable.

So even if some people partially documented some ME firmware format, there is very few probability of having a free software replacement for it one day.

However coreboot also support other systems than the ones with recent intel CPU/chipsets. The List of supported mainboard list some of them.

  • Some of theses don't have a management engine.
  • Some ships without it enabled(that means that the hardware is not used).
  • Some ships with it enabled, but it can be disabled not to use it at all, like on the Lenovo x200.

Neutralizing the ME

A collaborative effort to neutralize the ME has found some success, see here. This tool has been included in coreboot and can be enabled with the option "Strip down the Intel ME/TXE firmware" (CONFIG_USE_ME_CLEANER).

This can free up most of the space used by ME, allowing you to use a larger CBFS. See here.

Using a smaller version of the Intel ME

Most PCs ship a 5MiB version of ME firmware. It is possible to use a smaller version (2MiB), but you have to make sure that it matches the chipset you are running on. You may want to use a smaller version to increase the maximum payload size by 3MiB. Search on the web for BIOS updates of different vendors with the same chipset and extract the ME using available tools. Once you found a smaller ME, you have to update your Intel flash descriptor and decrease the region that is used for ME.

See also

References

<references/>