Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Intels AES-NI instructions

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    25 Posts 7 Posters 4.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      Guest
      last edited by

      Is anybody else out there concerned with a US company(knowing what we now know) building these helper instructions into silicon and widespread adoption like nothing could be afowl…How is this audited when in hardware? I realize these are just mathematical equations but i am seriously skeptical. Between gag orders and deliberate sabotage of crypto this looks like a trojan to me. Am I the only non-believer?

      http://rense.com/politics2/crypto.htm

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        I am concerned with Intel in general. The AMT thing is a complete, total backdoor.

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          What do you mean?

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            This: http://www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html

            1 Reply Last reply Reply Quote 0
            • K
              kejianshi
              last edited by

              Yeah - For sure the newest most convenient secure systems are the newest least secure systems…

              1 Reply Last reply Reply Quote 0
              • ?
                Guest
                last edited by

                Here is a skeptical look at all the intel Vpro features.

                http://semiaccurate.com/2012/05/15/intel-small-business-advantage-is-a-security-nightmare/

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  You got iJacked?

                  1 Reply Last reply Reply Quote 0
                  • ?
                    Guest
                    last edited by

                    Not that i know!

                    http://security.stackexchange.com/questions/46398/how-to-circumvent-compromised-cpus-in-major-foss-operating-systems

                    1 Reply Last reply Reply Quote 0
                    • H
                      Harvy66
                      last edited by

                      The output from AES-NI is verifiable. Just randomly sample the results and compare against a software implantation. Also, if you are using AES to encrypt a stream, the instant AES breaks, the other side is going to freak out, unless both sides are compromised at the exact same time, which is going to be hard because the same code is used for both encryption and decryption and there will be packets in flight.

                      I would be more concerned with AES-NI on the harddrive being broken, because someone could read your data if they've gained access. But again, you could use a software implementation for non-performance needed parts of code, like decrypting/encrypting the kernel and boot code, then use AES-NI to encrypt/decrypt mass storage, and randomly sample your encrypted data against a software implementation.

                      More than likely, it'll be a one time use thing, where they trigger the back-door, assuming there is one, then immediately have to break in and confiscate your hardware.

                      1 Reply Last reply Reply Quote 0
                      • ?
                        Guest
                        last edited by

                        I'm not going to mention "side channel attacks" because i have simply watched a related slideshow. I feel there are undocumented registers that could be flashed with a microcode update and you would never know. They probably ship from factory good but get injected later.

                        Where i would like to have seen the debate turn is whether CPU based implementations of speed enhancements of crypto with its possible -security issues- are worth the trade off for security of something that can be analyzed at length(software code). AES in software versus AES-NI. I know all about yarrow, i am just talking is this speed boost worth it for the security risk? Even in mom and pop shops with "Nothing to hide"… Everybody here seems hip to AES-NI it but i don't see any naysayer's...Am i just a paranoid loon?

                        1 Reply Last reply Reply Quote 0
                        • stan-qazS
                          stan-qaz
                          last edited by

                          This gives me no warm fuzzy feels either

                          http://www.theregister.co.uk/2015/02/17/kaspersky_labs_equation_group

                          America's National Security Agency (NSA) has infected hard disk firmware with spyware in a campaign valued as highly as Stuxnet and dating back at least 14 years, and possibly up to two decades, according to an analysis by Kaspersky labs and subsequent reports.

                          The campaign infected possibly tens of thousands of computers in telecommunications providers, governments, militaries, utilities, and mass media organisations among others in more than 30 countries.

                          The agency is said to have compromised hard drive firmware for more than a dozen top brands, including Seagate, Western Digital, IBM, Toshiba, Samsung and Maxtor, Kaspersky researchers revealed.]/quote]

                          1 Reply Last reply Reply Quote 0
                          • K
                            kejianshi
                            last edited by

                            Well I guess if I'm going call being jacked by intel iJacked then firmware hijacking in general should be fJacking.

                            1 Reply Last reply Reply Quote 0
                            • H
                              Harvy66
                              last edited by

                              @Phishfry:

                              I'm not going to mention "side channel attacks" because i have simply watched a related slideshow. I feel there are undocumented registers that could be flashed with a microcode update and you would never know. They probably ship from factory good but get injected later.

                              Where i would like to have seen the debate turn is whether CPU based implementations of speed enhancements of crypto with its possible -security issues- are worth the trade off for security of something that can be analyzed at length(software code). AES in software versus AES-NI. I know all about yarrow, i am just talking is this speed boost worth it for the security risk? Even in mom and pop shops with "Nothing to hide"… Everybody here seems hip to AES-NI it but i don't see any naysayer's...Am i just a paranoid loon?

                              My rule of thumb is if the government comes knocking on my door, I'm going to gladly give them my keys. I am more concerned about malware or a laptop getting stolen.

                              1 Reply Last reply Reply Quote 0
                              • stan-qazS
                                stan-qaz
                                last edited by

                                The problem with back-doors is that they don't stay secret, having NSA peeking at my system is less worrying than having some guy in Bulgaria that found the back-door shopping my information to his buddies.

                                1 Reply Last reply Reply Quote 0
                                • H
                                  Harvy66
                                  last edited by

                                  The most concerning exploit I can think of is the RNG. Almost any changes to AES-NI will cause the system to stop working and will be easily detectable as storage and network instantly breaks. But changes to RNG does not cause catastrophic failure.

                                  Most any back door related to AES-NI will probably require physical access at some point. AES-NI could save the last N keys in non-volatile on-chip storage or at a certain memory location in dram. Storing unexpected data in dram could very likely result in data corruption unless the location was reserved, but the CPU does not reserve memory, it would have to be in concert with another device that is also back-doored.

                                  Most of the end result either involve physical access or your system crashes. My guess is a back-door that causes a system to crash would be not desirable because people would start digging, so that severely limits the types of back-doors.

                                  Any hardware based remote backdoor would require several devices to work together to accomplish this feat. Doing this transparently in a way that doesn't cause an OS to crash would be quite hard, since not all OSs work the same and they change over time.

                                  1 Reply Last reply Reply Quote 0
                                  • K
                                    kejianshi
                                    last edited by

                                    "My rule of thumb is if the government comes knocking on my door, I'm going to gladly give them my keys. I am more concerned about malware or a laptop getting stolen"

                                    Congratulations - If enough of us start thinking that way, North Korea will start looking like a good vacationing spot.

                                    1 Reply Last reply Reply Quote 0
                                    • H
                                      Harvy66
                                      last edited by

                                      I guess I could let them beat it out of me, but I'm not sure I want broken fingers just to protect my anime collection.

                                      1 Reply Last reply Reply Quote 0
                                      • K
                                        kejianshi
                                        last edited by

                                        I'd let them beat it out of me and then laugh when they find my my music collection.
                                        I think wasting their time and effort on a mass scale is in fact the best way to discourage such endeavors. 
                                        Basically, I would like everyone to look as "suspicious" as possible.  IE.  Encrypt everything.

                                        1 Reply Last reply Reply Quote 0
                                        • DerelictD
                                          Derelict LAYER 8 Netgate
                                          last edited by

                                          I guess I could let them beat it out of me, but I'm not sure I want broken fingers just to protect my anime collection.

                                          May your chains set lightly upon you.

                                          Chattanooga, Tennessee, USA
                                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                          1 Reply Last reply Reply Quote 0
                                          • R
                                            reggie14
                                            last edited by

                                            @Phishfry:

                                            I'm not going to mention "side channel attacks" because i have simply watched a related slideshow. I feel there are undocumented registers that could be flashed with a microcode update and you would never know. They probably ship from factory good but get injected later.

                                            Why get that complicated?  If an attacker is in a position to flash a microcode update (which basically means they flashed a modified BIOS), surely they can scrape memory and get your key that way, right?

                                            @Phishfry:

                                            Where i would like to have seen the debate turn is whether CPU based implementations of speed enhancements of crypto with its possible -security issues- are worth the trade off for security of something that can be analyzed at length(software code). AES in software versus AES-NI. I know all about yarrow, i am just talking is this speed boost worth it for the security risk? Even in mom and pop shops with "Nothing to hide"… Everybody here seems hip to AES-NI it but i don't see any naysayer's...

                                            What's the security risk you're worried about?  Keep in mind AES-NI isn't at all like a hardware security module- it's just an accelerator.  Your encryption keys are still managed by software, accessed from memory, and (likely) stored on disk.  I'm struggling to think of a plausible attack that would be better done by injecting malware on the CPU rather than just a rootkit that scrapes your keys from memory.  The latter is much, much easier.

                                            I'll note AES-NI has at least one distinct security advantage: it's non-trivial to write a software AES implementation that's resistant to cache timing side channel attacks.

                                            @Phishfry:

                                            Am i just a paranoid loon?

                                            Probably.  Not that that's a bad thing.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.