Date: 2017-05-02 11:40 pm (UTC)
From: (Anonymous)
What about remote provisioning?
https://en.wikipedia.org/wiki/Intel_AMT#Provisioning_and_integration

What would prevent an attacker on the local network(For instance in a WiFi cafe) from:
- Buy a certificate to do remote provisioning
- Running a DHCP server that responds faster than the WiFi cafe's DHCP server
- Remote provision the laptop they want
- Then bypassing that remote provisioning

Would this work on recent AMT versions?, or is it only a concern for GM45 as this was the chipset used by Vassilios Ververis in his research?

Is it possible to gain code execution from AMT, in a programable way, to the machine trough either:
- Remote storage
- The keyboard

I've only old GM45 laptops that can have AMT, so I've no way to check that.

If both assumptions are correct, then worms can be a grave concern.

In the long term, I see no other way than having completely free software computers to avoid such issues. This would permit people to still benefit from security updates.

Denis.
From:
Anonymous
OpenID
Identity URL: 
User
Account name:
Password:
If you don't have an account you can create one now.
Subject:
HTML doesn't work in the subject.

Message:

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org


 
Notice: This account is set to log the IP addresses of everyone who comments.
Links will be displayed as unclickable URLs to help prevent spam.

Profile

Matthew Garrett

About Matthew

Power management, mobile and firmware developer on Linux. Security developer at Google. Ex-biologist. @mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer.

Expand Cut Tags

No cut tags