Bitcoin Forum
April 26, 2024, 02:41:00 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: 1 2 [All]
  Print  
Author Topic: an example of high-profile chip-level backdoor  (Read 3728 times)
niko (OP)
Hero Member
*****
Offline Offline

Activity: 756
Merit: 501


There is more to Bitcoin than bitcoins.


View Profile
June 07, 2012, 08:50:37 PM
 #1

http://www.csmonitor.com/USA/2012/0607/Report-Hackers-could-access-US-weapons-systems-through-vulnerable-chip

I found the article interesting. Apparently a backdoor has been hard-wired into an FPGA. This has obvious implications for designers of bitcoin-related hardware.

They're there, in their room.
Your mining rig is on fire, yet you're very calm.
1714142460
Hero Member
*
Offline Offline

Posts: 1714142460

View Profile Personal Message (Offline)

Ignore
1714142460
Reply with quote  #2

1714142460
Report to moderator
1714142460
Hero Member
*
Offline Offline

Posts: 1714142460

View Profile Personal Message (Offline)

Ignore
1714142460
Reply with quote  #2

1714142460
Report to moderator
1714142460
Hero Member
*
Offline Offline

Posts: 1714142460

View Profile Personal Message (Offline)

Ignore
1714142460
Reply with quote  #2

1714142460
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714142460
Hero Member
*
Offline Offline

Posts: 1714142460

View Profile Personal Message (Offline)

Ignore
1714142460
Reply with quote  #2

1714142460
Report to moderator
1714142460
Hero Member
*
Offline Offline

Posts: 1714142460

View Profile Personal Message (Offline)

Ignore
1714142460
Reply with quote  #2

1714142460
Report to moderator
Gabi
Legendary
*
Offline Offline

Activity: 1148
Merit: 1008


If you want to walk on water, get out of the boat


View Profile
June 07, 2012, 08:54:04 PM
 #2

This is LOL

terrytibbs
Hero Member
*****
Offline Offline

Activity: 560
Merit: 501



View Profile
June 07, 2012, 09:05:07 PM
 #3

im in ur fpga stealin ur hashez
niko (OP)
Hero Member
*****
Offline Offline

Activity: 756
Merit: 501


There is more to Bitcoin than bitcoins.


View Profile
June 08, 2012, 05:41:48 AM
 #4

im in ur fpga stealin ur hashez

It's ways more serious than that. I'm not surprised with this being possible, but I am amused to read that it actually happened.

They're there, in their room.
Your mining rig is on fire, yet you're very calm.
rjk
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


1ngldh


View Profile
June 08, 2012, 05:51:45 AM
 #5

im in ur fpga stealin ur hashez

It's ways more serious than that. I'm not surprised with this being possible, but I am amused to read that it actually happened.
As far as we know, the major FPGA manufacturers don't give a flying fuck about Bitcoin and haven't coded anything into the devices to interrupt mining. The reason is that the devices that most miners are using are extremely common and in use elsewhere in other applications, and indeed Bitcoin might only represent a fraction of a fraction of a percentage of the total sales of such devices around the world.

If you look, you would notice that the article is specifically referring to an expensive custom FPGA designed for governmental use, likely one that would cost tens of thousands of dollars per chip. Quite a bit different than the $150 chips that most of the Bitcoin miners use.

Mining Rig Extraordinaire - the Trenton BPX6806 18-slot PCIe backplane [PICS] Dead project is dead, all hail the coming of the mighty ASIC!
nimnul
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250


View Profile WWW
June 08, 2012, 06:45:36 AM
 #6

It is not a backdoor. It is a manufacturer diagnostic facility that can be used to bypass security checks. I'd call that "a vulnerability".

The chip manufacturer says it is present physically on the chip but cannot be used. So it is not clear from this usual journalist rubbish what exactly did they found. And I'm too lazy to find and read the original paper.

Such "backdoors" has been known for very long time. They have been used to unlock the phones. These days phones have very secure means to forbid flashing custom firmware - for example, Motorola E398 had a special facility in the chip to check RSA signature on firmware before executing it. However, this check could be disabled programmatically, and people eventually found how.

The only news here is that such "backdoor" was found by examining not software but hardware and I think the paper focuses not on the vulnerability but on the novel method of chip analysis.

Can someone comment on this? I'm not sure I described it correctly.


P4man
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500



View Profile
June 08, 2012, 07:44:27 AM
 #7

This is a storm in a glass of water.

If you are worried about hardware backdoors, just imagine if your PC or laptop had a real hardware backdoor that would allow an attacker to connect remotely over LAN, Wifi or 3G to access your harddrive, your RAM, your display, your keyboard, your microphone, your camera. It would render any and all of your attempts to protect your privacy null and void, including any encryption. Something immune to software protection or detection, completely OS independent, in fact, even independent of the main cpu and therefore impossible to detect. Something that works out of band, even when your PC is powered off. Something that you cant disable, even if you think you can, because it can remotely be enabled again. All it would take is someone having the key to this backdoor

Sounds far fetched? Yet if you have an intel laptop or PC with AMT/vpro; thats precisely what you got.  

http://en.wikipedia.org/wiki/Intel_Active_Management_Technology

And it would be a stretch to believe some 3 letter agencies wouldnt have the keys.

nimnul
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250


View Profile WWW
June 08, 2012, 01:42:32 PM
 #8

FUD?

P4man
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500



View Profile
June 08, 2012, 03:25:58 PM
 #9

FUD?

If thats a reply to my post, just read the documentation, its completely public and in fact marketed heavily by intel for its legitimate use. Look here:
http://software.intel.com/en-us/articles/architecture-guide-intel-active-management-technology/

Its basically the mother of all root kits.

nimnul
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250


View Profile WWW
June 08, 2012, 04:42:00 PM
 #10

The argument "And it would be a stretch to believe some 3 letter agencies wouldnt have the keys." is an invalid FUD argument.

P4man
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500



View Profile
June 08, 2012, 04:46:04 PM
 #11

The argument "And it would be a stretch to believe some 3 letter agencies wouldnt have the keys." is an invalid FUD argument.

You honestly think the NSA or CIA wouldnt have asked intel to get access to say, laptop of Al Qaeda suspects or that intel would have said "No" ?
I do think thats a stretch.

BTW, even if intel said no, some hackers managed to crack older versions of VPro.
http://news.softpedia.com/news/Intel-vPro-Hacked-101286.shtml


A good read here:
http://invisiblethingslab.com/resources/bh09usa/Ring%20-3%20Rootkits.pdf

RodeoX
Legendary
*
Offline Offline

Activity: 3066
Merit: 1145


The revolution will be monetized!


View Profile
June 08, 2012, 04:52:12 PM
 #12

The argument "And it would be a stretch to believe some 3 letter agencies wouldnt have the keys." is an invalid FUD argument.

You honestly think the NSA or CIA wouldnt have asked intel to get access to say, laptop of Al Qaeda suspects or that intel would have said "No" ?
I do think thats a stretch.

BTW, even if intel said no, some hackers managed to crack older versions of VPro.
http://news.softpedia.com/news/Intel-vPro-Hacked-101286.shtml
Agreed. Not a stretch at all. In fact it would surprise me if they did not have keys.

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf
Free bitcoin in ? - Stay tuned for this years Bitcoin hunt!
RodeoX
Legendary
*
Offline Offline

Activity: 3066
Merit: 1145


The revolution will be monetized!


View Profile
June 08, 2012, 05:06:36 PM
 #13

The argument "And it would be a stretch to believe some 3 letter agencies wouldnt have the keys." is an invalid FUD argument.

You honestly think the NSA or CIA wouldnt have asked intel to get access to say, laptop of Al Qaeda suspects or that intel would have said "No" ?
I do think thats a stretch.

BTW, even if intel said no, some hackers managed to crack older versions of VPro.
http://news.softpedia.com/news/Intel-vPro-Hacked-101286.shtml
Agreed. Not a stretch at all. In fact it would surprise me if they did not have keys.

if they did not have the keys they should be shot for incompetence... the us govt pays for most of that work anyway.
Right. Their job is to have access to any and all information. Not to use it, but to be able to get it when/if needed.

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf
Free bitcoin in ? - Stay tuned for this years Bitcoin hunt!
nimnul
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250


View Profile WWW
June 08, 2012, 05:08:21 PM
 #14

Malware can be embedded basically anywhere. AMT just offers yet another way. Relevant technologies (SMM and to some extent option ROMs - google "PCI Rootkits") were there since 80s.

And general fear of   backdoors embedded in hardware go back into cold war era. Russia, for example, still uses its own outdated 180nm technology for military chips out of this fear.

Existence of such backdoors could have been revealed long ago. Many countries import US hardware and use them in critical applications, so their security agencies should have been fired for not finding the backdoors if they existed.

rjk
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


1ngldh


View Profile
June 08, 2012, 05:33:19 PM
 #15

Option ROMs are why INT19 traps are disabled by default in most BIOSes. Wonder if the next hardware spying system will be a cheap RAID card with its own BIOS.

Mining Rig Extraordinaire - the Trenton BPX6806 18-slot PCIe backplane [PICS] Dead project is dead, all hail the coming of the mighty ASIC!
P4man
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500



View Profile
June 08, 2012, 05:38:54 PM
 #16

Option ROMs are why INT19 traps are disabled by default in most BIOSes. Wonder if the next hardware spying system will be a cheap RAID card with its own BIOS.

Why? its already integrated in the northbridge, has its own embedded cpu, but uses the same bios chip as the rest of the system. See the last PDF I linked above.

rjk
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


1ngldh


View Profile
June 08, 2012, 05:49:28 PM
 #17

Option ROMs are why INT19 traps are disabled by default in most BIOSes. Wonder if the next hardware spying system will be a cheap RAID card with its own BIOS.

Why? its already integrated in the northbridge, has its own embedded cpu, but uses the same bios chip as the rest of the system. See the last PDF I linked above.
Right but for remote activation you would need to use the built in ethernet port, I would think, and if there is a separate NIC installed you would have to attack from a different angle. So the attack could instead originate from an expansion card.

Mining Rig Extraordinaire - the Trenton BPX6806 18-slot PCIe backplane [PICS] Dead project is dead, all hail the coming of the mighty ASIC!
Bitco
Sr. Member
****
Offline Offline

Activity: 746
Merit: 253



View Profile
June 08, 2012, 09:20:02 PM
 #18

This has nothing to do with bitcoin mining.

This was a FPGA which had a security feature where you could program the chip and then lock out further changes.  Well, the manufacturer left themselves a back door where they could unlock the chip, and this was discovered.

All bitcoin miners use unlocked chips where you can load your own software, so this is completely irrelevant to bitcoin mining.
Littleshop
Legendary
*
Offline Offline

Activity: 1386
Merit: 1003



View Profile WWW
June 08, 2012, 09:33:24 PM
 #19

The argument "And it would be a stretch to believe some 3 letter agencies wouldnt have the keys." is an invalid FUD argument.

You honestly think the NSA or CIA wouldnt have asked intel to get access to say, laptop of Al Qaeda suspects or that intel would have said "No" ?
I do think thats a stretch.

BTW, even if intel said no, some hackers managed to crack older versions of VPro.
http://news.softpedia.com/news/Intel-vPro-Hacked-101286.shtml


A good read here:
http://invisiblethingslab.com/resources/bh09usa/Ring%20-3%20Rootkits.pdf

The power of Vpro to infect a computer remotely is amazing if it was compromised. Heck, you can even turn Vpro on remotely even when it is turned off!  That is the most troubling part of all with vpro.  The only solution to stop vpro is to use a separate nic card from the built in one. 

This has nothing to do with bitcoin mining.

This was a FPGA which had a security feature where you could program the chip and then lock out further changes.  Well, the manufacturer left themselves a back door where they could unlock the chip, and this was discovered.

All bitcoin miners use unlocked chips where you can load your own software, so this is completely irrelevant to bitcoin mining.

Not only that, but it assumes a level of access to the pretty much says that the hardware/software talking to the chip needs to be pwned as well.  The backdoor is not a non issue, but not at all the kind of problem the original article headline makes it seem.

niko (OP)
Hero Member
*****
Offline Offline

Activity: 756
Merit: 501


There is more to Bitcoin than bitcoins.


View Profile
June 09, 2012, 01:20:35 AM
 #20

This has nothing to do with bitcoin mining.

This was a FPGA which had a security feature where you could program the chip and then lock out further changes.  Well, the manufacturer left themselves a back door where they could unlock the chip, and this was discovered.

All bitcoin miners use unlocked chips where you can load your own software, so this is completely irrelevant to bitcoin mining.

My first thoughts after reading the article were not pointed at present-day Bitcoin miners, but at Bitcoin users in general. Bitcoin enables decentralized, peer-to-peer monetary transactions, and therefore also shifts the responsibility for secure storage and handling of coins to the peers themselves. The past year is full of sad examples of just how unprepared the public is.

Vast majority of discussions pertaining to secure storage and handling of Bitcoins is focused on software (Windows vs. Linux, malware, bots, cracking of passwords, hacking of exchanges, VPS), and the issue of hardwired backdoors has been largely neglected. Sure, few of you in this thread appear to be well versed in this topic, but you have to admit that an average, even advanced, user typically has no idea. This article could be a wake-up call to anyone planning to handle significant amounts of coins, or to develop Bitcoin gadgets (from handheld wallets to ATMs to authentication cards to, yes, miners).

They're there, in their room.
Your mining rig is on fire, yet you're very calm.
RodeoX
Legendary
*
Offline Offline

Activity: 3066
Merit: 1145


The revolution will be monetized!


View Profile
June 09, 2012, 03:17:38 PM
 #21

@niko Thanks for posting this. I think you make some excellent points. I don't know much about these HW back-doors. Even though I try for best practices in security I never feel like it's impossible to be pwned.
I wonder about some of the new tiny form factor computers, are there any chipsets free of backdoors? 

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf
Free bitcoin in ? - Stay tuned for this years Bitcoin hunt!
cypherdoc
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
June 09, 2012, 05:27:27 PM
 #22

one laughable example of US outsourcing to Asian countries.
lame.duck
Legendary
*
Offline Offline

Activity: 1270
Merit: 1000


View Profile
July 25, 2012, 10:47:21 AM
 #23

Existence of such backdoors could have been revealed long ago. Many countries import US hardware and use them in critical applications, so their security agencies should have been fired for not finding the backdoors if they existed.

Those agencies should also have been fired if they would tell it.
check_status
Full Member
***
Offline Offline

Activity: 196
Merit: 100


Web Dev, Db Admin, Computer Technician


View Profile
July 25, 2012, 11:40:46 AM
 #24

Option ROMs are why INT19 traps are disabled by default in most BIOSes. Wonder if the next hardware spying system will be a cheap RAID card with its own BIOS.

Why? its already integrated in the northbridge, has its own embedded cpu, but uses the same bios chip as the rest of the system. See the last PDF I linked above.
Right but for remote activation you would need to use the built in ethernet port, I would think, and if there is a separate NIC installed you would have to attack from a different angle. So the attack could instead originate from an expansion card.

EFI BIOS has it's own network stack and it's operation is undetected by the system. The EFI BIOS can reflash itself without the owners knowledge. It's for this reason the LinuxBIOS Project was created, now Coreboot.

FOSDEM 2007 LinuxBios:
http://www.youtube.com/watch?v=tjS985UQjHg

For Bitcoin to be a true global currency the value of BTC needs always to rise.
If BTC became the global currency & money supply = 100 Trillion then ⊅1.00 BTC = $4,761,904.76.
P2Pool Server List | How To's and Guides Mega List |  1EndfedSryGUZK9sPrdvxHntYzv2EBexGA
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 25, 2012, 12:00:57 PM
 #25

Right. Their job is to have access to any and all information. Not to use it, but to be able to get it when/if needed.

This has to be sarcasm right?  Please tell me you honestly don't believe that.

From ...
Quote
We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.--That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed

To
Quote
Their (agents of the state) job is to have access to any and all information. Not to use it, but to be able to get it when/if needed.

rjk
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


1ngldh


View Profile
July 25, 2012, 01:51:08 PM
 #26

Right. Their job is to have access to any and all information. Not to use it, but to be able to get it when/if needed.

This has to be sarcasm right?  Please tell me you honestly don't believe that.

From ...
Quote
We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.--That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed

To
Quote
Their (agents of the state) job is to have access to any and all information. Not to use it, but to be able to get it when/if needed.


I hate to make it sound like my tinfoil hat is screwed on too tight, but that seems to be the thing that is happening more and more lately. Knowledge at all costs without regards to some old piece of paper (The Constitution).

Mining Rig Extraordinaire - the Trenton BPX6806 18-slot PCIe backplane [PICS] Dead project is dead, all hail the coming of the mighty ASIC!
RodeoX
Legendary
*
Offline Offline

Activity: 3066
Merit: 1145


The revolution will be monetized!


View Profile
July 25, 2012, 02:13:53 PM
 #27

Right. Their job is to have access to any and all information. Not to use it, but to be able to get it when/if needed.

This has to be sarcasm right?  Please tell me you honestly don't believe that.

From ...
Quote
We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.--That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed

To
Quote
Their (agents of the state) job is to have access to any and all information. Not to use it, but to be able to get it when/if needed.

I'm not saying it's great. But yes, I think that is the attitude. If suddenly we had a chance to get at some high value information by using a back door on a chip, the CIA would do it in a heart beat. There would be no time to research it in an emergency. That's why the CIA hires people to know about these things in advance.
Could that knowledge be abused by some "bad" government in the future. Sure it could.  Undecided

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf
Free bitcoin in ? - Stay tuned for this years Bitcoin hunt!
niko (OP)
Hero Member
*****
Offline Offline

Activity: 756
Merit: 501


There is more to Bitcoin than bitcoins.


View Profile
July 25, 2012, 02:52:13 PM
 #28


I'm not saying it's great. But yes, I think that is the attitude. If suddenly we had a chance to get at some high value information by using a back door on a chip, the CIA would do it in a heart beat. There would be no time to research it in an emergency. That's why the CIA hires p0eople to know about these things in advance.
Could that knowledge be abused by some "bad" government in the future. Sure it could.  Undecided
[/quote]

I highlighted the important part. The value for whom? From what I see, US citizens are not reaping benefits at all - the agencies represent interests of large capital - often international. We can keep naively justifying it in one way or another, or we can grow cynical, but that's not going to lead us to a better - or even good - world.

Anyhow, seems like we agree that yes, there are hardware backdoors, and yes, we should be aware of it. The reason for OP was that I felt many are not aware of the problem.

They're there, in their room.
Your mining rig is on fire, yet you're very calm.
conspirosphere.tk
Legendary
*
Offline Offline

Activity: 2352
Merit: 1064


Bitcoin is antisemitic


View Profile
July 25, 2012, 03:30:51 PM
Last edit: July 25, 2012, 03:49:59 PM by conspirosphere.tk
 #29

So for the moment who is using AMD puters is supposed to be safe from this mother-of-all-rootkits?

Otherwise I would suggest to put together some BTC to pay a prize to whoever comes out with a way to kill this orwellian device.
Coinoisseur
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250



View Profile
July 25, 2012, 03:47:21 PM
 #30

Yep, with heck Wake on Lan implementation means there could easily be an exploit present to get low level access to anything attached to the motherboard. This is one occasion where there is probably a bit of safety in using an obscure or low volume product, as I doubt even intelligence agencies want to spend a ton of money backdooring low volume run chips.

This is a storm in a glass of water.

If you are worried about hardware backdoors, just imagine if your PC or laptop had a real hardware backdoor that would allow an attacker to connect remotely over LAN, Wifi or 3G to access your harddrive, your RAM, your display, your keyboard, your microphone, your camera. It would render any and all of your attempts to protect your privacy null and void, including any encryption. Something immune to software protection or detection, completely OS independent, in fact, even independent of the main cpu and therefore impossible to detect. Something that works out of band, even when your PC is powered off. Something that you cant disable, even if you think you can, because it can remotely be enabled again. All it would take is someone having the key to this backdoor

Sounds far fetched? Yet if you have an intel laptop or PC with AMT/vpro; thats precisely what you got.  

http://en.wikipedia.org/wiki/Intel_Active_Management_Technology

And it would be a stretch to believe some 3 letter agencies wouldnt have the keys.

                                                                               
                
                                                       ╓▄▌██P                  
                                                 ╔▄▌███▀███▌                   
                                           ▄▄▌██▀▀╚  ╓██╩██                    
                                     ▄▄███▀▀╙      ▄██  ▓█                     
                               ▄▌███▀▀+          ▄█▀   ▐█                      
                        ,▄▌███▀▀¬              ▓█▀     █▄                      
                  ,▄▌███▀▀                  ,██▀      █▌                       
               '█████▌▄▄,                 ╓██╩       ██                        
                  ▀██▌▐▀▀▀█████▌▌▄▄╓    ▄██¬        ▄█                         
                     ▀██▄        ╚▀▀▀████          ▐█═                         
                        ▀██▄        ▓█▀██          █▀                          
                           ▀██▄  ,██▀   █µ        ██                           
                              ▀███Z     ██       ██                            
                                ▐██     ▐█      ▄█                             
                              ,,╓╓█▓▄▌   █▌    ▐█U                             
                        º▄▓▓▓▓▓▓▓▓▓███   ▀█    █▌                              
                          ▀█▓▓▓▓▓████▀█▌  █▌  ██                               
                            ▀███████▌  ▀█µ▀█ ██                                
                              ▀█████     ███▓█                                 
                                ▐███      ▀██Ñ                                 
                                            ▀                             

Pages: 1 2 [All]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!