Re: [coreboot] T450S + Coreboot

2018-08-30 Thread Angel Pons
Hello again,

> Sorry, I'm going to read the documentation more and make this a
> personal goal by the end of 2019. I didn't want to stir up so much
> drama. Time and money are not constraints on this particular
> problem. One way or another by January 22, 2019 I will have either
> figured it out or I will pay to figure it out. I have used Linux since
> college. I have no kids. I have no girlfriend. I have tons of free time.

Pardon my understanding, or its lack thereof: What will you have
figured out or will have paid to figure out?
If you are referring about Intel Boot Guard, only Intel and/or Lenovo
have the information to bypass it, and I don't believe neither of them
will be willing to give away control over Boot Guard, since it is a
security "feature" (defective by design IMHO). Disclosing information
such as keys or bypass methods would imply knowingly creating a
backdoor, which can be severely damaging to either business'
reputation should this backdoor be made public. I would not expect
neither Intel nor Lenovo to release any material.
If you want some personal goals, I have some recommendations: Get
something that is easy to get coreboot on such as a mainboard that is
already supported, or one with supported chips but not supported by
coreboot yet. If getting the latter option, I feel the easiest boards
to port to coreboot are Ivy/Sandybridge desktop boards. If the
mainboard's SuperIO is supported as well, porting such a board is
easy. I have ported two boards like that, and it is in fact easy.

> according to cpubenchmark's passmark

I find it rather puzzling that you are using the performance scores
provided by such a thing, and at the same time complaining about the
openness of the ME.

> I might be saying wrong things here but aren't ALL cpus affected by
> meltdown?

Not all, IIRC Meltdown (CVE-2017-5754) affects mainly Intel and ARM
chips. And on Intel CPUs, the newer the CPU is, the lower the
performance impact is because of better hardware mechanisms (PCID I
think?).
Regarding AMD, I recall reading Meltdown is not an issue and Spectre
Variant 2 (CVE-2017-5715) is ineffective compared to Intel, but I am
not sure of the latter claim since I barely read about this topic.

> Most CPU's require microcode updates as there are critical errors in
> manufacturing microcode.

Spectre Variant 3a (CVE-2018-3640) seems to be fixed by microcode
updates only, accoring to Intel. And this is not the only error that
has been found in microcode.

>> Actually it might be a good idea for Purism to at least consider the
>> switch to AMD Ryzen CPUs.
> Absolutely not.
> If anything they should leave x86

Suggesting Ryzen as an alternative to Intel for Purism is, in my view,
rather unsound. There is nothing done for Ryzen in coreboot, and even
if there was (probably lots of money are needed to accomplish this),
what do you do about:
- The PSP? The ME was one of the reasons to drop Intel, but Ryzen has
something similar. This is, in fact, the most meaningless issue.
- Memory/silicon init? Would AMD cooperate and release source
code/full datasheets, or would they distribute a blob like the FSP, if
they release anything at all? This is the biggest issue.
- The VBIOS? Most Intel iGPUs can light up using libgfxinit (or NGI),
but what about AMD? Right now the only reasonable option is the VBIOS
(I don't see any progress being made by AtomDis).
- The XHCI blob? Considered an "optional" blob by some, but is it
optional? There is a ML thread regarding an Intel Denverton board
which seems to lack EHCI controllers. If EHCI disappears from AMD too,
what happens with USB support without that "optional" blob? Should a
PCIe card be used instead? Not an option on laptops!
IMHO these issues make Ryzen for Purism stay as a dream, at least in
the foreseeable future.

I am not an economist, but I strogly consider leaving x86 is a losing
move (if things don't change much). There are far more people locked
on x86 for various reasons than people willing to switch to POWER or
RISC-V. I am not saying such a laptop is a bad idea, but would be met
with little profit (large investment, low return). If x86 starts
losing power to POWER (no pun intended) or RISC-V, then a non-x86
laptop (or any type of computer) may gain traction and sound more
reasonable.

> Ivy/sandy = can nerf to BUP
> post ivy/sandy = kernel still runs
> I would argue there is a big difference there

I thought the large ME change was in Skylake with ME version 11,
according to this: [1]

>> This makes me feel I should recall what Nico told you earlier:
>> "please don't spread FUD on this list."
> It isn't exactly "FUD" to believe that there are undocumented ME
> functions

I feel like the important point in Nico's message is not the "FUD"
itself, but rather "don't spread ... on this list". It does not matter
what you believe in if you keep it for yourself. Spreading your
beliefs as if they were objective information is what starts fires.

> After all ME/PSP was something 

Re: [coreboot] T450S + Coreboot

2018-08-30 Thread ron minnich
My suggestion: pick a laptop or system you like, for whatever reason you
like it. And work on it. And produce and upstream code.

If you do that, and you create more code, you are moving us all to a better
place. The more knowledge we can put into source code form, the better.

And, if you are one of those people moving us to a better place (and you
all are, since you are here), please support the others of us who are also
trying to do the right thing, maybe in a different way.

We're all trying to do the right thing. We're all dealing with the
compromises that arise from our particular set of decisions. We don't
always agree on those choices. I think we should be able to agree that
increasing our knowledge and skills as we have in this project is good for
all.

Just my take.

ron
p.s. Mike, just one thing. If you have never installed coreboot before,
your first trip should be on a system known to work, before you start on a
system not known to work. It's harder than it looks.
p.p.s. I keep telling folks that the coreboot conference (now osfc) is the
most fun, and interesting, and creative event I get to go to. I am really
looking forward to seeing you all again!
-- 
coreboot mailing list: coreboot@coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] T450S + Coreboot

2018-08-30 Thread taii...@gmx.com
On 08/30/2018 11:47 AM, Nico Huber wrote:

>> Actually it might be a good idea for Purism to at least consider the
>> switch to AMD Ryzen CPUs.

Absolutely not.

If anything they should leave x86 not simply waste money going to
another blobbed never-owner-controlled platform with a now unfriendly
vendor (such a shame AMD used to be really cool with coreboot) and
having to spend even more to create hardware initiation code etc.

Creating a POWER laptop is technically possible thanks to the low power
consumption of POWER9 - and tim said raptor will make one if sales of
the TALOS 2 are good.

The bottom line is that "jailbreaking" is rolling a boulder up a hill
that gets steeper at every rise you get to - you are supporting the
development of further anti-features if you buy new intel/amd hardware
no matter if you manage to make a hack to "free" it or not.

x86 is dead freedomwise - bottom line.

On 08/28/2018 01:50 PM, Th3Fanbus . wrote:
> Taiidan,
> 
>> I doubt those guys have the skill to do so but for those who do - you'd
>> spend tens of thousands in order to have a port for an old machine that
>> still is stuck with ME and hardware init done entirely by binary blobs.
> 
> It is not about the skill or money involved in the process, it is about the
> *possibility* of even running coreboot on said machine, which is most
> likely zer>>
>> I would save your money and instead buy an ivy/sandybridge thinkpad (can
>> nerf the ME - but not disable which is impossible)
> 
> AFAIK, you can still run me_cleaner on a Broadwell laptop. I don't think the
> ME is the main reason to get a XX20/XX30 Thinkpad over newer models.

Ivy/sandy = can nerf to BUP
post ivy/sandy = kernel still runs

I would argue there is a big difference there

> Mike,
> 
>> microcode - is optional
> 
> I assume you refer to microcode *updates*, not the microcode that is
> hard-coded inside the CPU. Still, I fail to understand why there is so much
> worry about microcode updates, as if they were going to open a backdoor
> of some sorts. To me, the only gain of not updating the microcode is in the
> number of bugs.

Mike as I said before too with piledriver cpus you need microcode
updates or you are very easily rooted via the NMI>root exploit.

> I do understand temporarily delaying the updates of known unstable
> microcode versions while awaiting for a fix, though.
> 
>> as far as I know its impossible to completely replace ME, only to trim
>> its' firmware as much as possible and hope for the best that it
>> doesn't have some undocumented "backdoor restore" mechanism that could
>> restore the original uncut blob under some conditions. Undoubtedly,
>> Intel ME is a backdoor, e.g. because it contains some antitheft
>> features which could be used to control your computer remotely: shut
>> it down, wipe or retrieve data from it, etc
> 
> This makes me feel I should recall what Nico told you earlier:
> "please don't spread FUD on this list."

It isn't exactly "FUD" to believe that there are undocumented ME
functions - lots of hardware has undocumented functions or problems that
were later patched out such as the many cisco router rooting functions
"accidently" left in again and again or the recent VIA C3 issue.

I agree that ME isn't really a "backdoor" since being a remote access is
its primary use but in this case a backdoor would be an undocumented
function that persists after one has set remote access to off or used me
cleaner.

I can't understand why some people here think it a conspiracy theory of
the fringe that there just might be an undocumented backdoor in every
computer something I imagine many organizations around the globe are
currently working on if they don't already have one.

After all ME/PSP was something that no one really asked for, IBM has a
supervisor processor with equivilant power (hehe power) however it is
open source and owner controlled no reason they couldn't have done that
here and have the hollywood DRM junk as an addon module so in a way
satisfying everyone.



0xDF372A17.asc
Description: application/pgp-keys


0xDF372A17.asc
Description: application/pgp-keys
-- 
coreboot mailing list: coreboot@coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] T450S + Coreboot

2018-08-30 Thread taii...@gmx.com
I agree that the G505S is a superior choice vs the ivy/sandy thinkpads
as it has no ME/PSP thus making it the newest and last owner controlled
x86 laptop but everyone be aware that it NEEDS a microcode update or you
are very easily rooted due to the piledriver+ NMI CPU exploit
additionally without the microcode the IOMMU won't work (and thus no qubes)

Most CPU's require microcode updates as there are critical errors in
manufacturing microcode.

-- 
coreboot mailing list: coreboot@coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot


Re: [coreboot] T450S + Coreboot

2018-08-30 Thread Youness Alaoui
On Thu, Aug 30, 2018 at 9:51 AM Mike Banon  wrote:
>
> Hi Youness,
>
> > The fact that it's closed source and not user-controlled (Even if you had
> > the sources, you can't modify them and update it to your custom ME
> > version) is where the problem actually is. There *might* be a backdoor
> > hidden somewhere in there, or maybe there isn't, nobody knows.
>
> I agree with your statement above. But, please look on this question
> from the end user's perspective, who might be not a software
> developer. Imagine that you have a choice between two
> similar-by-performance coreboot-supported laptops: according to
> cpubenchmark's passmark, Lenovo G505S's AMD A10-5750M = 3342 points
> (from 886 samples) while Librem 15's Intel i7-6500U = 4429 points
> (from 3345 samples), so the CPU performance difference is just 1/3 (
> and at the fresh test results there might be little to none, since the
> Intel-only Meltdown vulnerability requires a patch which eats up to
> 30% performance depending on the workload, and there are also some
> other Intel-specific "performance-eating" vulnerabilities, the most
> serious of which - TLBleed / T1TF - may soon require the disabling of
> HyperThreading at all the Intel CPUs, see [1] and [2] )
>
I might be saying wrong things here but aren't ALL cpus affected by
meltdown? so the 30% performance drop would affect the G505S as well?
Also, when I buy a laptop, I don't look at a benchmark and chose the
one with the higher 'points', there are many many other variables to
consider (the design, the other features, the linux compatibility, the
reputation of the company, the build quality, the keyboard/mouse feel,
the price, etc..) and yes, the G505s might come from a reputable
company who builds quality laptops with a good keyboard and it might
be cheap, but maybe I'll find it too old/obsolete, or maybe I'll want
to support a smaller company that is trying its hardest to improve
linux/freedom support, or maybe I won't care. My point is, that's not
how people chose their next laptop, there are countless variables and
if you decide the G505s is the better solution for your needs, then
great, buy/use that, if it's another model or brand, then chose that.
Freedom also comes from being free to chose what we want, there isn't
one single solution that will fit everybody.
Regardless, I have no idea why, when I say that you spread FUD about
the ME with no backing, and state rumors as facts, your answer is "but
the G505s is better than the Librem".. I actually don't even see what
the Librem has to do with any of this

> The essential power user features like 16GB RAM support and Xen-level
> hardware virtualization technologies ( IOMMU / AMD-V RVI / NPT/SLAT )
> - are also well supported by G505S. But, one laptop has a creepy
> management engine (could be creepy enough to a user who didn't study
> the tons of Intel documentation) where there *might* be a backdoor, is
> not user-controlled (currently) and has a closed-source firmware
> (currently). While another laptop does not contain any hardware
> management engine at all, neither ME nor PSP. Which laptop you would
> have chosen - as a user, not as an employee of Purism - company which
> for some unknown-to-me-reasons is hard-tied to Intel CPUs? Even if we
> wouldn't be considering the significant price difference between G505S
> and Librem 15 - which more than compensates the possible performance
> advantage (if it would still exist after patching those Intel-specific
> vulnerabilities) as well as lack of some nice features like
> kill-switches (unless a user would DIY them), at least to me the
> choice is obvious:
The laptop I use is a T440s, that's the one I bought when I became a
contractor some 5 years ago and that's the one I still use today. Its
CPU is probably outdated, It only has 8GB of RAM, it probably has an
ME in it (I never even checked if AMT is enabled or not, I never
bother to neutralize the ME, etc..). I have some 10 librems here, but
I only use them for testing, not for actual work.
Why? because to me, I give more value to the machine that I spent
weeks researching and customizing and which I paid a high price for
while I was still unemployed, and I'm used to its crappy screen and
used to its keyboard, etc.. so it has more value to me than one of the
newer librems that are sitting on my desk unused. So no, the choice is
not obvious because each person has different views, values,
preferences, but you keep giving your own opinion as a fact.
So again, my point is : I know very very well what the ME is, but I'm
not worried about it because while I don't *know* for sure, I do
*trust* that it's not and that it doesn't have a backdoor. So I don't
care about it. If you tell me that you found a deliberate backdoor
feature in the ME which can only be accessed by some 3rd party, and
there is no way to disable it, then it's another story, but that's not
the case, all you're saying is that "It's there, for sure, trust me,
because my 

Re: [coreboot] T450S + Coreboot

2018-08-30 Thread Youness Alaoui
On Thu, Aug 30, 2018 at 2:15 AM Brian Herman
 wrote:
>
> Sorry, I'm going to read the documentation more and make this a personal goal 
> by the end of 2019. I didn't want to stir up so much drama. Time and money 
> are not constraints on this particular problem. One way or another by January 
> 22, 2019 I will have either figured it out or I will pay to figure it out. I 
> have used Linux since college. I have no kids. I have no girlfriend. I have 
> tons of free time.
>
Sorry to see your thread going off-topic.
I don't know if it will help you but I've wirtten detailed blog posts
on my experience in getting coreboot to work on the broadwell and
skylake librems. It's not a "guide how to port to coreboot" but it
explains some of the problems I've had and it might help you save some
time.
You can go to https://puri.sm/coreboot/timeline/ and search for
"Youness" to see my blog posts in chronological order on the right
side bar.
Good luck with your project!

> Make It So,
> Brian Herman
>
>
>
>
>
>
>
>
>
>
>
> So you have made it to the end..
> Thanks for reading!
>
> On Wed, Aug 29, 2018 at 4:42 PM Youness Alaoui 
>  wrote:
>>
>>  Wow, Mike, seriously, I am going to side 100% with Nico, you are
>> spreading FUD, making your own personal opinions (which are themselves
>> derived from other people's FUD) and stating them as the universal
>> law.
>> The ME is not known to be a backdoor. It doesn't mean that it's not a
>> backdoor, it simply means that it's not known to be a backdoor. The
>> fact that it's closed source and not user-controlled (Even if you had
>> the sources, you can't modify them and update it to your custom ME
>> version) is where the problem actually is. There *might* be a backdoor
>> hidden somewhere in there, or maybe there isn't, nobody knows, but
>> there has been a lot of research done on the ME and so far, none have
>> been found as far as I know.
>>
>> Your worry about what the ME does, how it can give someone control
>> over the PC, etc.. are NOT what qualifies it as a "backdoor", but like
>> Nico said, it's a frontdoor, it's not a "hidden access", it's a
>> "promoted access" to the PC, it's the main ME functionality which is
>> well documented. You don't have to use some "only known to some secret
>> person" trick to access the ME, you just need to point your web
>> browser to the right port on localhost.
>> Your comparison of saying the ME is a backdoor is like saying that a
>> webcam is a spying device because it can capture images of you! Yeah,
>> sure, that's technically true, it can capture images of you, but only
>> after you plug it in and open an image capture software, and you still
>> have control of those images. The fact that the webcam schematics
>> isn't open means that it could still have a small wifi or GSM chip
>> embedded inside which makes it send the images to the CIA, but it's
>> not a guarantee that it does. So, yes, you can complain that the
>> webcam isn't open hardware so you can't technically trust what it
>> does, but you can't just come out and say with absolute certainty that
>> any and all webcams in the world are spying devices for the CIA,
>> that's just ridiculous.
>>
>> So, back to the ME, we know exactly what it does, it's all extremely
>> well documented and explained, the fact that it allows remote control
>> of the PC is actually the reason for its existence and it's a very
>> very valid reason in the corporate context and the fact that those
>> features also 'coincidentally' resemble the features of an actual
>> 'trojan horse' virus, doesn't mean that the ME itself is a virus..
>> otherwise the 'rm' linux command would be considered a virus since it
>> deletes files and there are some viruses that can delete your files as
>> well
>> Now the problem is that it's closed source, and not user controlled
>> (remote control features *are* user controlled, I'm talking about
>> being able to replace the firmware with your own), so yes, it can't be
>> audited by the larger open source community, but that also doesn't
>> guarantee any security necessarily (how many open source programs
>> still have security bugs?).
>>
>> Either way, you yourself said earlier, when talking about the AtomBIOS
>> that "it could be disassembled quite well with AtomDis -
>> https://github.com/mikebdp2/AtomDis - reducing any security concerns
>> regarding this blob to a minimum.", well, the ME can be disassembled
>> with any x86 disassembler, so why can't you also say that "reduces any
>> security concerns regarding the ME to a minimum".
>>
>> We're about to get full control back of the ME. I've been working for
>> the past few weeks on reproducing the PTResearch buffer overflow
>> exploit on the ME, and yesterday they released a PoC for Apollolake
>> (in case you missed it : https://github.com/ptresearch/IntelTXE-PoC),
>> so with the progress I made and with that, I should be able to soon
>> port it to skylake (and write docs on how to port to other platforms
>> as 

Re: [coreboot] REG : GOP Driver

2018-08-30 Thread Matt DeVillier
On Thu, Aug 30, 2018 at 11:41 AM nagaraj a  wrote:

> Hi DeVillier,
>
> Thanks a lot for the kind response.
>
> <<
> Windows is fine as long as valid VBT data has been loaded into the Intel
> ACPI OpRegion, and the OpRegion is valid/has been fully populated.
> >>
>
> For the above note this holds good for already installed OS.
>
> In case if we are trying to install windows OS for the first time and GOP
> driver is not loaded for the Intel iGPU in that case I understand there
> will be blank out.
>

I'd have to test to be sure, but that sounds correct.  I know the Windows
installer uses a basic driver of some sort, and likely assumes a working
framebuffer exists


>
> Correct me if I'm wrong.
>
> //BR
> Nagaraj A
>
>
> On Thu, 30 Aug 2018, 8:57 pm Matt DeVillier, 
> wrote:
>
>> with Intel iGPUs and using Tianocore UEFI payload, Linux is fine
>> regardless if the display is initialized or not by GOP driver.  Windows is
>> fine as long as valid VBT data has been loaded into the Intel ACPI
>> OpRegion, and the OpRegion is valid/has been fully populated.
>>
>> On Thu, Aug 30, 2018 at 7:57 AM nagaraj a  wrote:
>>
>>> All,
>>>
>>> I have query regarding GOP driver in UEFI.  Here is query details.
>>>
>>> If BIOS don't load UEFI GOP driver for  GPU and system boots into OS.
>>> Will latest windows /linux OS will be up with display or the display
>>> will be blank out.
>>>
>>> //BR
>>> Nagaraj A
>>>
>>> --
>>> coreboot mailing list: coreboot@coreboot.org
>>> https://mail.coreboot.org/mailman/listinfo/coreboot
>>
>>
-- 
coreboot mailing list: coreboot@coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] REG : GOP Driver

2018-08-30 Thread nagaraj a
Hi DeVillier,

Thanks a lot for the kind response.

<<
Windows is fine as long as valid VBT data has been loaded into the Intel
ACPI OpRegion, and the OpRegion is valid/has been fully populated.
>>

For the above note this holds good for already installed OS.

In case if we are trying to install windows OS for the first time and GOP
driver is not loaded for the Intel iGPU in that case I understand there
will be blank out.

Correct me if I'm wrong.

//BR
Nagaraj A


On Thu, 30 Aug 2018, 8:57 pm Matt DeVillier, 
wrote:

> with Intel iGPUs and using Tianocore UEFI payload, Linux is fine
> regardless if the display is initialized or not by GOP driver.  Windows is
> fine as long as valid VBT data has been loaded into the Intel ACPI
> OpRegion, and the OpRegion is valid/has been fully populated.
>
> On Thu, Aug 30, 2018 at 7:57 AM nagaraj a  wrote:
>
>> All,
>>
>> I have query regarding GOP driver in UEFI.  Here is query details.
>>
>> If BIOS don't load UEFI GOP driver for  GPU and system boots into OS.
>> Will latest windows /linux OS will be up with display or the display will
>> be blank out.
>>
>> //BR
>> Nagaraj A
>>
>> --
>> coreboot mailing list: coreboot@coreboot.org
>> https://mail.coreboot.org/mailman/listinfo/coreboot
>
>
-- 
coreboot mailing list: coreboot@coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] T450S + Coreboot

2018-08-30 Thread Nico Huber
Hi Mike,

On 30.08.2018 15:51, Mike Banon wrote:
>> The fact that it's closed source and not user-controlled (Even if you had
>> the sources, you can't modify them and update it to your custom ME
>> version) is where the problem actually is. There *might* be a backdoor
>> hidden somewhere in there, or maybe there isn't, nobody knows.
> 
> I agree with your statement above. But, please look on this question
> from the end user's perspective, who might be not a software
> developer. Imagine that you have a choice between two
> similar-by-performance coreboot-supported laptops: according to
> cpubenchmark's passmark, Lenovo G505S's AMD A10-5750M = 3342 points
> (from 886 samples) while Librem 15's Intel i7-6500U = 4429 points
> (from 3345 samples), so the CPU performance difference is just 1/3 (
> and at the fresh test results there might be little to none, since the
> Intel-only Meltdown vulnerability requires a patch which eats up to
> 30% performance depending on the workload, and there are also some
> other Intel-specific "performance-eating" vulnerabilities, the most
> serious of which - TLBleed / T1TF - may soon require the disabling of
> HyperThreading at all the Intel CPUs, see [1] and [2] )

You are comparing worst case scenarios of one CPU that would be
considered secure by current research and one that hasn't been
researched as much. That alone doesn't make much sense. Also, why
do you assume that one runs untrusted code on his laptop? If one
doesn't, he also doesn't need performance eating mitigations for
these vulnerabilities. You probably need to do more research about
what Meltdown and the Spectre vulnerabilities are and what they
imply.

>> Your comparison of saying the ME is a backdoor is like saying that a
>> webcam is a spying device because it can capture images of you! [...]
>> The fact that the webcam schematics isn't open means that it could
>> still have a small wifi or GSM chip embedded inside
> 
> Yes, but I could easily put a tape over that webcam, disconnect and
> remove a webcam module from the laptop's case (or even make a custom
> DIY kill-switch). Same for a microphone - could be easily desoldered
> (and maybe soldered back but through a kill-switch). And for the
> speakers: according to the recent researches the speakers could act as
> a microphone - see [3] - so Librem 15 should have a kill-switch for
> the speakers as well. Meanwhile you can't throw away ME the same easy
> way.

Your are talking past each other. That you can put some tape over a
webcam doesn't answer the question if you should call it a spying
device. What if you buy a webcam to use it as webcam? is it a spying
device?

> 
>> you yourself said earlier, when talking about the AtomBIOS
>> that "it could be disassembled quite well with AtomDis -
>> https://github.com/mikebdp2/AtomDis - reducing any security concerns
>> regarding this blob to a minimum.", well, the ME can be disassembled
>> with any x86 disassembler, so why can't you also say that "reduces any
>> security concerns regarding the ME to a minimum".
> 
> Actually this AtomBIOS blob is not required to run this laptop, only
> to initialize its' display. It is possible to turn this laptop into a
> miniPC/server and still use its' hardware without this blob, although
> it wouldn't be exactly a laptop after that. But if we would consider
> this blob as required: here is a quality of disassembly I'm getting
> with AtomDis - https://pastebin.com/xKW9FV58 . All the command tables
> and data tables are named and in many cases it could be understood
> what some particular piece of code is doing even after a quick glance.
> Are you sure that your ME blob x86 disassembly is providing a similar
> or higher level of transparency? Perhaps it is this level of
> transparency which allowed to 95% complete the development of the
> opensource AtomBIOS alternative called OpenAtom ( I think the
> development efforts have stopped partially because no-one have noticed
> any backdoors after completing the 95% and it became much less
> interesting to complete the remaining 5% , [4] )

Can you point me to these 95%? What I see in the repository is rather
1% (I only see a replay). Maybe I'm just looking at the wrong files.
Regarding the disassembly, I don't understand shit in there (and I've
written display init code myself).

> Actually it might be a good idea for Purism to at least consider the
> switch to AMD Ryzen CPUs. Yes, unlike the 15h/early16h gen AMD CPUs,
> their new Ryzen CPUs contain the PSP, Platform Security Processor -
> which is also a management engine. But it is significantly younger
> than Intel ME (Skylake's ME is already generation 11), so PSP should
> have less sophisticated protections and it should be easier to
> "jailbreak" this "young PSP" rather than "modern ME". Early ME
> implementations were also weak, after all, and I expect "young PSP" to
> be weak also.

I agree that Purism should evaluate AMD options. Actually I assume,
they do. Saying that 

Re: [coreboot] REG : GOP Driver

2018-08-30 Thread Matt DeVillier
with Intel iGPUs and using Tianocore UEFI payload, Linux is fine regardless
if the display is initialized or not by GOP driver.  Windows is fine as
long as valid VBT data has been loaded into the Intel ACPI OpRegion, and
the OpRegion is valid/has been fully populated.

On Thu, Aug 30, 2018 at 7:57 AM nagaraj a  wrote:

> All,
>
> I have query regarding GOP driver in UEFI.  Here is query details.
>
> If BIOS don't load UEFI GOP driver for  GPU and system boots into OS.
> Will latest windows /linux OS will be up with display or the display will
> be blank out.
>
> //BR
> Nagaraj A
>
> --
> coreboot mailing list: coreboot@coreboot.org
> https://mail.coreboot.org/mailman/listinfo/coreboot
-- 
coreboot mailing list: coreboot@coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] T450S + Coreboot

2018-08-30 Thread Mike Banon
Hi Youness,

> The fact that it's closed source and not user-controlled (Even if you had
> the sources, you can't modify them and update it to your custom ME
> version) is where the problem actually is. There *might* be a backdoor
> hidden somewhere in there, or maybe there isn't, nobody knows.

I agree with your statement above. But, please look on this question
from the end user's perspective, who might be not a software
developer. Imagine that you have a choice between two
similar-by-performance coreboot-supported laptops: according to
cpubenchmark's passmark, Lenovo G505S's AMD A10-5750M = 3342 points
(from 886 samples) while Librem 15's Intel i7-6500U = 4429 points
(from 3345 samples), so the CPU performance difference is just 1/3 (
and at the fresh test results there might be little to none, since the
Intel-only Meltdown vulnerability requires a patch which eats up to
30% performance depending on the workload, and there are also some
other Intel-specific "performance-eating" vulnerabilities, the most
serious of which - TLBleed / T1TF - may soon require the disabling of
HyperThreading at all the Intel CPUs, see [1] and [2] )

The essential power user features like 16GB RAM support and Xen-level
hardware virtualization technologies ( IOMMU / AMD-V RVI / NPT/SLAT )
- are also well supported by G505S. But, one laptop has a creepy
management engine (could be creepy enough to a user who didn't study
the tons of Intel documentation) where there *might* be a backdoor, is
not user-controlled (currently) and has a closed-source firmware
(currently). While another laptop does not contain any hardware
management engine at all, neither ME nor PSP. Which laptop you would
have chosen - as a user, not as an employee of Purism - company which
for some unknown-to-me-reasons is hard-tied to Intel CPUs? Even if we
wouldn't be considering the significant price difference between G505S
and Librem 15 - which more than compensates the possible performance
advantage (if it would still exist after patching those Intel-specific
vulnerabilities) as well as lack of some nice features like
kill-switches (unless a user would DIY them), at least to me the
choice is obvious:

no management engine = one less potential problem, one less headache
to deal with...

> Your comparison of saying the ME is a backdoor is like saying that a
> webcam is a spying device because it can capture images of you! [...]
> The fact that the webcam schematics isn't open means that it could
> still have a small wifi or GSM chip embedded inside

Yes, but I could easily put a tape over that webcam, disconnect and
remove a webcam module from the laptop's case (or even make a custom
DIY kill-switch). Same for a microphone - could be easily desoldered
(and maybe soldered back but through a kill-switch). And for the
speakers: according to the recent researches the speakers could act as
a microphone - see [3] - so Librem 15 should have a kill-switch for
the speakers as well. Meanwhile you can't throw away ME the same easy
way.

> you yourself said earlier, when talking about the AtomBIOS
> that "it could be disassembled quite well with AtomDis -
> https://github.com/mikebdp2/AtomDis - reducing any security concerns
> regarding this blob to a minimum.", well, the ME can be disassembled
> with any x86 disassembler, so why can't you also say that "reduces any
> security concerns regarding the ME to a minimum".

Actually this AtomBIOS blob is not required to run this laptop, only
to initialize its' display. It is possible to turn this laptop into a
miniPC/server and still use its' hardware without this blob, although
it wouldn't be exactly a laptop after that. But if we would consider
this blob as required: here is a quality of disassembly I'm getting
with AtomDis - https://pastebin.com/xKW9FV58 . All the command tables
and data tables are named and in many cases it could be understood
what some particular piece of code is doing even after a quick glance.
Are you sure that your ME blob x86 disassembly is providing a similar
or higher level of transparency? Perhaps it is this level of
transparency which allowed to 95% complete the development of the
opensource AtomBIOS alternative called OpenAtom ( I think the
development efforts have stopped partially because no-one have noticed
any backdoors after completing the 95% and it became much less
interesting to complete the remaining 5% , [4] )

> We're about to get full control back of the ME. I've been working for
> the past few weeks on reproducing the PTResearch buffer overflow
> exploit on the ME, and yesterday they released a PoC for Apollolake
> (in case you missed it : https://github.com/ptresearch/IntelTXE-PoC),
> so with the progress I made and with that, I should be able to soon
> port it to skylake (and write docs on how to port to other platforms
> as well) which will at least give us the ability to gain back the
> 'user-controlled' aspect of it as we'd have code execution on it.

Indeed, the things might 

[coreboot] REG : GOP Driver

2018-08-30 Thread nagaraj a
All,

I have query regarding GOP driver in UEFI.  Here is query details.

If BIOS don't load UEFI GOP driver for  GPU and system boots into OS.
Will latest windows /linux OS will be up with display or the display will
be blank out.

//BR
Nagaraj A
-- 
coreboot mailing list: coreboot@coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] T450S + Coreboot

2018-08-30 Thread Brian Herman
Sorry, I'm going to read the documentation more and make this a personal
goal by the end of 2019. I didn't want to stir up so much drama. Time and
money are not constraints on this particular problem. One way or another by
January 22, 2019 I will have either figured it out or I will pay to figure
it out. I have used Linux since college. I have no kids. I have no
girlfriend. I have tons of free time.

Make It So,
Brian Herman











So you have made it to the end..
Thanks for reading!

On Wed, Aug 29, 2018 at 4:42 PM Youness Alaoui <
kakar...@kakaroto.homelinux.net> wrote:

>  Wow, Mike, seriously, I am going to side 100% with Nico, you are
> spreading FUD, making your own personal opinions (which are themselves
> derived from other people's FUD) and stating them as the universal
> law.
> The ME is not known to be a backdoor. It doesn't mean that it's not a
> backdoor, it simply means that it's not known to be a backdoor. The
> fact that it's closed source and not user-controlled (Even if you had
> the sources, you can't modify them and update it to your custom ME
> version) is where the problem actually is. There *might* be a backdoor
> hidden somewhere in there, or maybe there isn't, nobody knows, but
> there has been a lot of research done on the ME and so far, none have
> been found as far as I know.
>
> Your worry about what the ME does, how it can give someone control
> over the PC, etc.. are NOT what qualifies it as a "backdoor", but like
> Nico said, it's a frontdoor, it's not a "hidden access", it's a
> "promoted access" to the PC, it's the main ME functionality which is
> well documented. You don't have to use some "only known to some secret
> person" trick to access the ME, you just need to point your web
> browser to the right port on localhost.
> Your comparison of saying the ME is a backdoor is like saying that a
> webcam is a spying device because it can capture images of you! Yeah,
> sure, that's technically true, it can capture images of you, but only
> after you plug it in and open an image capture software, and you still
> have control of those images. The fact that the webcam schematics
> isn't open means that it could still have a small wifi or GSM chip
> embedded inside which makes it send the images to the CIA, but it's
> not a guarantee that it does. So, yes, you can complain that the
> webcam isn't open hardware so you can't technically trust what it
> does, but you can't just come out and say with absolute certainty that
> any and all webcams in the world are spying devices for the CIA,
> that's just ridiculous.
>
> So, back to the ME, we know exactly what it does, it's all extremely
> well documented and explained, the fact that it allows remote control
> of the PC is actually the reason for its existence and it's a very
> very valid reason in the corporate context and the fact that those
> features also 'coincidentally' resemble the features of an actual
> 'trojan horse' virus, doesn't mean that the ME itself is a virus..
> otherwise the 'rm' linux command would be considered a virus since it
> deletes files and there are some viruses that can delete your files as
> well
> Now the problem is that it's closed source, and not user controlled
> (remote control features *are* user controlled, I'm talking about
> being able to replace the firmware with your own), so yes, it can't be
> audited by the larger open source community, but that also doesn't
> guarantee any security necessarily (how many open source programs
> still have security bugs?).
>
> Either way, you yourself said earlier, when talking about the AtomBIOS
> that "it could be disassembled quite well with AtomDis -
> https://github.com/mikebdp2/AtomDis - reducing any security concerns
> regarding this blob to a minimum.", well, the ME can be disassembled
> with any x86 disassembler, so why can't you also say that "reduces any
> security concerns regarding the ME to a minimum".
>
> We're about to get full control back of the ME. I've been working for
> the past few weeks on reproducing the PTResearch buffer overflow
> exploit on the ME, and yesterday they released a PoC for Apollolake
> (in case you missed it : https://github.com/ptresearch/IntelTXE-PoC),
> so with the progress I made and with that, I should be able to soon
> port it to skylake (and write docs on how to port to other platforms
> as well) which will at least give us the ability to gain back the
> 'user-controlled' aspect of it as we'd have code execution on it.
> Which by the way, also means that BootGuard can be disabled (since the
> ME is the one checking for the boot guard signatures), which should
> enable the ability to port coreboot to a lot more machines (including
> the T450S that this thread is supposed to be about). Hopefully
>
> On Wed, Aug 29, 2018 at 5:50 AM Mike Banon  wrote:
> >
> > > What suspicious activities? I know, for many people the Intel ME
> firmware
> > > contains unwanted features. But these features are