25 July 1997
Source: Mail list cryptography@c2.net
Thanks to DE
To: cryptography@c2.net Date: Fri, 25 Jul 1997 00:47:33 -0400 (EDT) From: Dave Emery <die@pig.die.com> Subject: Another vulnerability With Intel, Hackers Check In When Bugs Check Out By Alexander Wolfe SANTA CLARA, Calif. -- Intel's BIOS Update technology to quickly fix bugs that crop up in its microprocessors without having to recall the chips may contain a Trojan horse -- a hole that could potentially enable hackers to wreak havoc on the company's CPUs -- said a BIOS expert familiar with the technology.However, other industry experts said they believe Intel is staking out a pace-setting position with its bug-busting technology. They give the semiconductor giant kudos for using BIOS Update to reduce the impact of bugs in the face of a verification crisis that makes it increasingly difficult to ensure that microprocessors with tens of millions of transistors are validated and free of flaws. BIOS Update is a hidden feature that can fix bugs in Pentium Pro and Pentium II CPUs by patching the microcode inside the microprocessor. When the processor boots up, the BIOS loads the patches, which are contained in a 2,048-byte-long BIOS Update data block that is supplied by Intel. "The problem is, the BIOS cannot verify whether the BIOS Update data block contains real microcode or not," claimed one BIOS expert, who requested anonymity. "As long as the header and the checksum are okay, the BIOS will load that microcode into the microprocessor. Some hacker could actually wipe out microcode in the CPU. There is nothing that can prevent this." Intel doesn't see such a scenario as a realistic threat, pointing to the fact that the BIOS Update data block is encrypted. "We've spent quite a lot of time thinking about such scenarios to make sure we had sufficient mechanisms in place so you couldn't introduce your own flavor of BIOS Update into the processor," said Ajay Malhortra, a technical marketing manager based here at Intel's microprocessor group. "Not only is the data block containing the microcode patch encrypted, but once the processor examines the header of the BIOS update, there are two levels of encryption in the processor that must occur before it will successfully load the update." But Intel's biggest security feature may lie in keeping the technical details behind its BIOS Update technology a closely guarded secret. "There is no documentation," said Frank Binns, an architect in Intel's microprocessor group. "It's not as if you can get an Intel 'Red Book' with this stuff written down. It's actually in the heads of less than 10 people in the whole of Intel." However, some experts remain unconvinced. "This is just like any other technology -- if you want to reverse-engineer it, you can," said Ed Curry, president of Lone Star Evaluation Laboratories, a Georgetown, Texas microprocessor benchmarking and testing company. "You can do it by brute force, or a hacker could obtain information from someone inside the company or someone who had access to the documentation." Indeed, Curry, who said he's made presentations on computer-security issues to the U.S. Defense Department, said he believes microprocessor hardware in general is much more vulnerable to hacking than is commonly believed. "This is the big hole in our government security programs," he said. "They don't look at hardware as well as they should; they only look at software. This goes beyond desktop computers. You have to remember that microprocessors are now embedded in our weapons systems." Nevertheless, it's widely believed that it would be tough for a hacker to fake a complete microcode patch, in no small measure because it's also very difficult to obtain documentation that details the internal representation -- word widths and usage of all the bits -- of Pentium Pro microcode. In the era of the 8086 and 8088, microcode documentation was readily available. But such information is provided to selected developers only under tight nondisclosure restrictions. "It's a tightly held secret," Intel's Binns said. New-Tech Jitters However, it is seen as more feasible for a hacker to successfully fake the header and checksum portion of the BIOS Update data block -- something that could still cause the microprocessor to crash or lock up. According to another BIOS expert, talk of potential Trojan horses might be nothing more than jitters about new technology. "This is a new thing in the market," said the expert, who likened it to the early days of flash BIOS. "There was a great fear factor when the industry started using flash BIOSes," he said, "where concerns were raised that somebody could go in and destroy a system by flashing in a new BIOS containing an errant piece of code. I think today there's a fear that someone will play around with this BIOS Update feature and try to cause havoc with Intel's CPUs." As an added security precaution, some BIOS manufacturers limit access to their software. "As a matter of policy, we don't make our BIOS code available to anyone other than a system vendor or motherboard manufacturer," said Thomas Benoit, corporate marketing manager at BIOS vendor Phoenix Technologies, Natick, Mass. "We don't believe anyone should be twiddling the bits in our BIOS code." Irrespective of Trojan horse scenarios, many experts see Intel's bug-busting technology as a boon. "This feature benefits everyone -- it shouldn't be viewed as a liability, but as an asset," said Mark Huffman, marketing manager at American Megatrends, in Norcross, Ga. "It allows you to be able to update your processor without pulling it out of the system. Obviously, you can flash in a new BIOS a lot quicker than you can pop the case, pop the CPU and wait for a replacement." Indeed, BIOS Update has already been successfully used in the field to fix glitches in Pentium Pro-class CPUs, according to an Intel spokesman and to sources at several major BIOS vendors. "Yes, it is used," said an engineer at one vendor. "I personally know of five different things in the Pentium Pro related to multiprocessing, system management interrupt and other areas." "I think it'll be very useful," Phoenix Technology's Benoit said. "It's really to Intel's benefit that BIOS vendors are implementing this feature." "It's a very good feature," said Laurent Gharda, vice president of marketing at BIOS vendor Award Software International, in Mountain View, Calif. "The downside is going to be lower performance, perhaps. But the upside is avoiding a chip recall, as took place a few years ago." Intel's Pentium was recalled in January 1995 following the revelation of a bug in the processor's floating-point divide operations. Moreover, some say BIOS Update may signal the start of an industrywide trend. "These new Pentium-class clone CPUs that have recently been announced -- like the Centaur microprocessor -- they're going to do the same type of process," said Huffman at American Megatrends. Centaur -- officially the IDT-C6 -- is made by Centaur Technology, an Austin, Texas-based subsidiary of Integrated Device Technology. It was introduced in May and delivered to beta customers in Taiwan last month. At Centaur, a spokesman said, "The current silicon we are sampling has that capability, but in the production version of the chip we are dropping the feature, because it necessitates an increased die size." As a result, any bugs that crop up will have to be fixed via a mask revision -- a path the spokesman described as preferable. "Ideally, you want to do fixes by mask changes," he said. "That way, you'll have clean silicon moving forward. Otherwise, you have lots of different versions of BIOS floating around." But Centaur can easily add the feature back into future versions, if it wishes. For its part, Advanced Micro Devices of Sunnyvale, Calif., does not have the feature in its K5 and K6 microprocessors, according to a company spokesman. "There are some errata that can't be fixed by a BIOS update -- specifically, a hardwired instruction can't be changed." He added that AMD has the ability to add the feature into future designs, if it deems it necessary. Still, Huffman of American Megatrends thinks the BIOS Update feature has legs. "I think you'll see a trend toward CPU manufacturers incorporating this capability so they can perform microcode updates in the field," he said. "It gives them more flexibility in their manufacturing process -- they can keep their fab lines running and don't have to stop them to make a mask change and switch to a new stepping every time there's an erratum. More important, they don't have to recall the stepping that has the bug. They can just issue a BIOS update." Intel doesn't tell the BIOS vendors what bugs are being fixed in any given BIOS Update. However, there appears to be a way to figure that out. "It's true you can't see what's happening from a binary standpoint," the BIOS expert who requested anonymity said. "But Intel does release errata along with the update, which gives an explanation of what the update is for. To that extent, you know what they're fixing, though you don't know the exact binary details of what's occurring." Although the BIOS Update feature is firmly in place in the Pentium Pro and Pentium II families, Intel declined to comment on whether it is being used in Pentiums with the MMX multimedia extensions. Looking ahead, deciding whether to implement the technology in future CPU families will involve architectural considerations that extend far beyond a desire to bust bugs. "We're just learning the power this technology really has," Intel's Malhortra said. "In concert with that, we're also becoming more aware of some of its limitations. For example, the trade-off between die size that's used for microcode-patchable space [i.e., for the BIOS Update feature] vs. die size that can be devoted to performance enhancements or to additional micro-architectural features is a tough one." Validation Boost "One could make the argument that, with improved validation processes, you won't need to expand silicon real estate devoted to the microcode-patch feature, because early validation would catch the bulk of problems," Malhortra added. Nevertheless, there's a growing concern that microprocessor bugs could become a bigger problem as 64-bit CPU architectures -- which will be orders of magnitude more difficult to validate than current designs -- are introduced toward the end of the decade. "It's becoming abundantly clear that the ability to manufacture in high volume and to provide a reliable product through validation are somewhat mutually exclusive," Intel's Binns said. "It takes a fairly large amount of time to wring all the errata out of a processor. Fixing errata by making changes to silicon is OK, if you can make those changes quickly. Unfortunately, with the complexity of the processors we've got today, that's not acceptable. The smarter we can get with features like this, the less errata we bring to market. And if we do see errata after we ship, we can correct them in situ." ----- End of forwarded message from Richard Crisp -----