Intel to Develop Hardware Rootkit Detection 178
Jack writes "ITO is running a story on Intel's latest initiative - a hardware rootkit detector: 'Intel is trying to eliminate the human factor when dealing with root-kits detection by developing a new hardware-based technique to discover and notify users when they are downloading unintentionally a root-kit to their computer.'"
Warning, Will Robinson (Score:5, Interesting)
Seriously, why don't they work with Microsoft to do some kind of checksum and bonk the load when it fails? This 'small chip' smells like something which would persistently degrade memory performance. Why would that be more acceptable than an operating system or BIOS which would block root-kits, i.e. you can only touch this file, this partition, etc, as logged in as root. Oh, right, on Windows processes may run under root authority and be co-opted.
Gee, seems like it's been 20 years since DEC fixed those bugs in RSTS/E
Actually (Score:4, Informative)
But the article is so vague and poorly written that it sounds like either the author didn't know anything about the subject or english was not his first language, or both.
Re:Actually (Score:2)
The writer's English is quite entertaining though. Not quite a candidate for Engrish.com but close.
Pfft! Whats next? (Score:2, Insightful)
Re:Pfft! Whats next? (Score:3, Insightful)
Re:Warning, Will Robinson (Score:5, Funny)
The first thing... (Score:5, Insightful)
Actually, no.... (Score:5, Insightful)
How the hell is it going to know the difference between a rootkit and a security update to the kernel?
Re:Actually, no.... (Score:2)
What's the difference between IE and a rootkit?
Nothing - the IE is a wide accepted remote admin tool (l33t speach = rootkit).
If you update/patch IE you update the kernel because by MS definition, IE is a substantial part of the Windows OS.
Re:Actually, no.... (Score:2)
Re:Actually, no.... (Score:2)
Re:The first thing... (Score:2)
Then I realized: No, they're not that cool.
too bad.
Re: Intel to Develop Hardware Rootkit Detection (Score:3, Insightful)
Re: Intel to Develop Hardware Rootkit Detection (Score:1)
Who watches the watchman, eh?
Probably a court appointed officer who watches Intel watch Microsoft.
Or something like that
Wait until the internet is trained, or should I say controlled to restrict what passes, all in the name of security.
we'll just call it skynet
Re: Intel to Develop Hardware Rootkit Detection (Score:2, Funny)
--- Sam Vimes, Terry Prachett's Discworld
Re: Intel to Develop Hardware Rootkit Detection (Score:5, Funny)
Why... Sony, of course.
Re: Intel to Develop Hardware Rootkit Detection (Score:2, Interesting)
Why... Sony, of course.
While being funny, I think it underscorses a unique point about this proprosal that deserves some thought. It's all fine and dandy to check for rootkits and be big on security. If it was fair and labelled a rootkit as a rootkit, I wouldn't see too much problem with it. In a world of viruses, trojans, spyware/adware, etc... it would be nice to have one less thing to guard against.
But I see this as yet another way to bully the small guy who might be eroding
Re: Intel to Develop Hardware Rootkit Detection (Score:5, Insightful)
Re: Intel to Develop Hardware Rootkit Detection (Score:3, Insightful)
Damn no mod points - I love it when something simple says so much. When it comes down to it, at some level, you're gonna have to trust someone. Might as well be the entity at the bottom - that'd be Intel, at the hardware level. Fact is, unless a human is hacking around in Intel''s hardware (a true unbiased third party) we just sort of inherently (sp?) trust Intel, AMD, ABit, ATrend, NVidia, etc. right now. Some extra protection against rootkits is hardly a bad thing.
Re: Intel to Develop Hardware Rootkit Detection (Score:2)
Unfortunately, the hardware vendors also have the most power when it comes to locking som
Re: Intel to Develop Hardware Rootkit Detection (Score:2)
When it comes down to it, at some level, you're gonna have to trust someone. Might as well be the entity at the bottom - that'd be Intel, at the hardware level.
Along the same lines, I guess somebody should post this [acm.org] -- lest all the 5+-digit-UID kiddies grow up thinking they can trust their C compilers.
Re: Intel to Develop Hardware Rootkit Detection (Score:2)
Those 6-digit whippersnappers, now...
Re: Intel to Develop Hardware Rootkit Detection (Score:2)
Re: Intel to Develop Hardware Rootkit Detection (Score:2)
Re: Intel to Develop Hardware Rootkit Detection (Score:3, Funny)
Chip off the old block (Score:2)
Pop the chip off the motherboard and your problem is solved?
Re:Chip off the old block (Score:4, Insightful)
Re:Chip off the old block (Score:2)
Skynet!!!! (Score:4, Funny)
Screw SkyNet! (Score:3, Funny)
trusted computing, surely (Score:5, Funny)
--
No, I didn't RTFA. I didn't RTFSummary either.
Re:trusted computing, surely (Score:2)
The first time I installed redhat on my P2 233, the BIOS's "boot virus detection" freaked out about LILO.
Re:trusted computing, surely (Score:2, Informative)
Re:trusted computing, surely (Score:2)
That boot sector virus crap has always given me crap since Win95 onward. The Bios simply can't display its warning when your in Windows. Also, I haven't heard of a new virus that attacks the boot sector since about the same time. As a result, I've left it off since about that time. Why turn on something that can protect against less than 0.1% of the problem but bothers you 3% of the time when a software solution protects against 99% of the problem and doesn't cause a
Re:trusted computing, surely (Score:3, Funny)
Because this is Slashdot, I, like you brother, did not RTFA. But I concur that this will be used to control what software can and can not be run.
I will not be able to listen to my Sony music CDs either because the hardware detector will think that it is a rootkit.
oh wait..
Re:trusted computing, surely (Score:3, Funny)
Yeah, everybody knows NSA uses Gentoo.
Re:trusted computing, surely (Score:2)
I'll just use OpenBSD. (Score:4, Insightful)
Re:I'll just use OpenBSD. (Score:2, Interesting)
If we entered the twilight zone and imagine that OpenBSD was the dominent player in the consumer OS market we would still have tons of zombies doing bad things. Sure, thanks to ProPolice, W^X, and Guard Pages bugs in MSN and Outlook Express for OpenBSD would be less exploitable than is th
Re:I'll just use OpenBSD. (Score:3, Insightful)
Better still pick your own favorite OS. The more diversity out there, the harder it is to create root kits for everything. No OS is perfect. Pick the one that feels ri
Do all Operating systems work the same way? (Score:4, Insightful)
As the system grows, so the number of entry points which need covering will grow.
after reading the article, I think they are sneaking in paladium under our noses.
Using the rootkit news as cover.
should we tremble?
Re:Do all Operating systems work the same way? (Score:5, Funny)
How to market restrictive TCPA technology to users (Score:5, Interesting)
Re:How to market restrictive TCPA technology to us (Score:2)
Re:How to market restrictive TCPA technology to us (Score:2)
Considering the history of the Wintel monopolistic hegenomy, why should I as an IT professional accept at face value ANY third party control over the computers I govern, much less a hardware "solution" whose keys are held by whom (besides Intel)?
I would place far greater trust in an OS that supports memory segmentation between execute-only, read-only, and rea
Re:How to market restrictive TCPA technology to us (Score:2)
Online gamers who suffer from cheaters would disagree. Movie producers who have a $10 million film to finance and want to make it available for download would also disagree.
People are so paranoid about TCPA, it's funny. Hello people, go read the specs like I did. You'll come away with a different impression.
The TPM chip is a tool just like encryption is. Like encryption it can be used for both bad and good. Ju
Wha? (Score:5, Informative)
Either this is only memory protection (which I thought we could already do in modern processors and thus would make an additional chip redundant) or it is going to "connect the computers directly to the data" which is content free market speak. Or trusted computing, but it that market speak sounds different.
Re:Wha? (Score:3, Insightful)
I think most architectures now are not guaranteed to maintain cache coherency. I used to write self-modifying code for 3d stuff on a 486's... it seemed to work then, but by all rights shouldn't have!
Re:Wha? (Score:2, Insightful)
I think most architectures now are not guaranteed to maintain cache coherency. I used to write self-modifying code for 3d stuff on a 486's... it seemed to work then, but by all rights shouldn't have!
Newer architectures do not tend to guarantee cache coherency. However, if there is no hardware cache coherency, then there must be a cache flush instruction. It is needed.
While we don't tend to think of it that way, dynamic
Re:Wha? (Score:2)
Actually, a rootkit fools the *user* into thinking he still is root, while he actually isn't.
Re:Wha? (Score:2)
A software that merely provides root access from the outside isn't a rootkit. To be a rootkit, it also needs hide itself, especially from the legitimate root account of the system. Since by definition a root account has or can acquire all rights on the system, the rootkit somehow needs to take rights away from the legitimate root (for examp
Article this translated use to what software? (Score:5, Funny)
The project is timidly scheduled...
Yet another attempt... (Score:1)
How would it know... (Score:2, Interesting)
Re:How would it know... (Score:2, Insightful)
Re:How would it know... (Score:2)
All these architectures failed, as Itanium is failing, because people want to run the precompiled proprietary software they already have, and proprietary vendors won`t bother supporting a platform which doesn`t have a user base..
It's a catch 22, which basically means proprietary software will kill any new and innovative architecture and hold everyone back in a world of nasty kludges
vaporware (Score:2, Funny)
vaporware
Re:vaporware (Score:2)
How is it going to work? (Score:4, Interesting)
Then there are going to be applications which will need to utilise the same patterns of operation that malicious programs use, E.G Uninstallers which wipe considerable amount of data off block devices for instance.
Perhaps such a system could be implemented on a software level on the OS's buffer cache, sort of like the way the Linux Secure Journalling system was going to operate, but this was thrown out the window because of inefficencies.
Maybe i should RTFA
Re:How is it going to work? (Score:3, Insightful)
Any hints? (No, I didn't RTFA, if it's in there, just tell me that)
Re:How is it going to work? (Score:2, Interesting)
If keeping to these levels of standard a _proper_ RK doesnt do anything really out of the
TCPA (Score:2)
Aren't there some limits? (Score:3, Insightful)
It looks like they'll have to err on the side of rejecting programs that just happen to look like rootkits. What would those be?
If the OS vendor wants to release a patch or extension, won't it look "evil" to the detector chip? It will be altering the OS -- so maybe it is a rootkit.
It seems like the marketing is running things here. With the trusted boot stuff that was a different story -- that has a good theoretical basis.
Re:Aren't there some limits? (Score:4, Insightful)
For some time I thought that "podcasting" might be an ingenious way of linking mobile music players through an ad-hoc wireless networking scheme which allowed one to disseminate an audio stream through a multicasting protocol which would utilise some kind of peer-to-peer filesharing technique to reduce end-to-end bandwidth.
Imagine my disappointment when I learned it meant "putting an mp3 file on your homepage". And for those those still caught up in the rapture of tech-newspeak, a "blog" is what we used to call a "homepage". Believe me, renaming them has not made them more interesting.
Re:Aren't there some limits? (Score:2)
I agree with your "podcasting" (in my book, "crapcasting") and "blog" assessment!
Re:Aren't there some limits? (Score:2)
Pure Crazyness! (Score:2)
Dumb idea (Score:5, Insightful)
Intel has been smarting since AMD beat them to the punch with the NX bit.
The only thing a Rootkit will do that any other software install won't usually is over-write and modify a lot more system files than it should. Hardware can't be aware of which version of hal.dll you're supposed to be running (heck, it shouldn't even know you're running windows!). This really is something the O/S should be doing.
Which it does. If you follow best security practices, well, heck, you're not logged on with admin privelege anyway. So how is the rootkit going to overwrite your stuff anyway? Or has your system been compromised by a hacker through an open port exploit? So your firewall failed you and you haven't patched up your O/S, and if the hacker is installing the rootkit, there's no point stopping the rootkit, because he's already in and he's just installing his zombie housekeeping tools. It'll just slow him down a bit.
Now that Intel has legitimized it... (Score:2)
Craziest thing ever (Score:2)
Sony (Score:2, Funny)
Re:Sony (Score:2)
More and more, hackers and pirates are looking like a lesser threat than those who claim to want to protect us from them.
Which OS? (Score:4, Interesting)
I thought not.
H.
Re:Which OS? (Score:2)
MS comments (Score:3, Funny)
A Microsoft spokesperson was heard commenting on this news: "When we release Windows Vista, we intend to make it so secure that we fully believe it will render such technology totally unnecessary."
Updates? (Score:3, Insightful)
Will it come with automatic updates over the internet? The ability to detect new rootkits? The ability to let users run code they know is safe but still trips the alarm? Not slow the computer to the speed of the chip itself?
This sounds like a really bad idea from a bunch of people who are supposed to be really smart.
How the hell? (Score:2)
How can it do this without being intimately tied to the OS?
I mean, a multi-tasking, networked operating system with devices doing DMA and everything else, how the heck can it know what is dodgy?
For once, I'm impressed with the crowd! (Score:2)
Dang, I think I'm ready to *bless* Sony! It's good we have a shake-down every now and then; keeps the community on it's toes!
By the way, not only do I run FOSS on every box, but I have a policy of just upgrading my hardware
Sounds familiar ... (Score:2)
ALAN: It's called Tron. It's a security program itself, actually. Monitors all the contacts between our system and other systems... If it finds anything going on that's not scheduled, it shuts it down. I sent you a memo on it.
DILLINGER: Mmm. Part of the Master Control Program?
ALAN: No, it'll run independently. It can watchdog the MCP as well.
--Tron (1982)
Separation of OS and user space (Score:3, Interesting)
Using a physical switch or key on the machine to set this mode would work, and wouldn't be possible to boot the OS if write mode was enabled. A form of automation would also work, in that you could have it unset this switch upon exiting the update mode of the system. Something along these lines, neh? Then you would be limited to user space corruption/exploitation/etc. True, this is a fine line to care much about, but at least you couldn't exploit a buffer overflow or some such to modify system files.
Just my 2 coppers.
I smell an Intel OS (Score:2)
Bottom line we use computers to run applications, and realy shouldn;t have to get tied down running an OS. My atari ST works fine, OS in BIOS, not many rootkits on that. Now application rootkits that root the application, that another area of concern as applications sit on the OS so if a hacker gains access to your system at the level you deal with then they will get all the juice they need.
TCB, naaaaaa i'd never install an OS if
Yet another reason (Score:2)
(Although personally I'd prefer to avoid the whole x86 thing altogether. I compromise with x86-64, and some older PPC and Sparc boxes.)
one more "guardian" ? (Score:2)
My point is, it's good (?) to have rootkit-protection. Still, an automated rootkit-detector will never ever in this life work flawlessly, on all OSes and for all kernels. How many times will it bother people unnecessarily. How many times will it block software because it falsely thinks it's malicious ?
Maybe I'm nuts, but I never trust any
Sony subroutine (Score:2)
if (manufacturerIsSony(manufacturer, os)) {
avoidLawSuite(os);
}
public void avoidLawSuite(os) {
die(os)
}
public void die(os) {
if (osFromMicrosoft(os)) {
haltWithShinyBlueScreenOfDeath();
} else {
segFault();
}
}
Should you trust information from Intel? (Score:2)
Intel should improve their processor designs. (Score:2)
All the solutions so far (the NX bit, the chip the article refers to, etc) are partial solutions to the problem of componentisation of compiled software running directly on a processor. Even microkernels based on message passing are a solution for this problem. The real solution is this:
The memory map.
Just as each process has/can have its own page table, each software component in memory should have its own memory map. Each address in the memory map would lead to a new active memory map when jumped to
Natural Progression (Score:2)
First there is the problem, which is real.
Then there is response, which is real.
Then there is FUD. Which is unwarrented.
Then there is marketting, which is amusing but unnescissary.
Root kits have been around for awhile, and this is the first one that has seen much attention. Just because of the former part of the proposition doesn't make them a huge threat. But the lay person will not see this, and thus think that Intel is sav
Real prevention (Score:2)
Re:Its an OS thing.. (Score:1, Informative)
You're joking right? Rootkits have only become a bigger part of Windows users recently. Rootkits date back to the 80's on various UNIX boxes and have certianly been installed on Linux boxes.
Re:Its an OS thing.. (Score:4, Insightful)
Re:Its an OS thing.. (Score:4, Interesting)
Infact, if you do a search for root kits on google, I am willing to bet that 90% of what google returns will be about linux/unix based rootkits. Why? Because they make it easier to over-take a server and we all know that most -big servers- are linux machines. Those are the ones that the little script kiddies want so they can take advantage of big pipes and try to DDoS their schools or something -- whatever the hell these 12 year olds are doing these days.
So yes, in this case, "Windows is the problem" doesn't really fly. Any OS is technically open to an attack from a rootkit. It all depends on the author of said rootkit to be persistant.
Don't get me wrong - I'm a linux lover and don't really like Windows that much (even though I use it) but the whole Linux Vs Windows argument isn't going to fly very far in this case. Infact, if I'm correct in thinking (Think I am, correct me if I'm not) the first rootkit was on AT&T unix (?) and did much of the same things todays rootkits do; replace core commands such as ls, ps, top, etc. They're just now morphing over to Windows.
Re:Its an OS thing.. (Score:2, Insightful)
Ohhh????
Because they make it easier to over-take a server
Wrong again. Rootkit doesn't overtake your system, hacker does. Rootkit is usualy installed to preserve the OS access to hacker only after that system was ove
Re:Its an OS thing.. (Score:2)
Re:Its an OS thing.. (Score:4, Funny)
Rainwulf is not misinformed, I simply posted that message after I rooted his box.
Re:Its an OS thing.. (Score:5, Insightful)
You're being dumb on purpose, right? Why in the world are you making such definitive statements that are so definitively false?
Anyway, look here [windowsitpro.com], or if not: This was written by Mark Russinovich, the guy that found the Sony rootkit.
Also, Wikipedia [wikipedia.org] has some good info on rootkits, like this: Hmmm, it appears this is a *nix problem that has migrated to Windows.
Re:Its an OS thing.. (Score:3, Insightful)
Hmmm, it appears this is a *nix problem that has migrated to Windows.
Oh dear, you've fallen into the trap of being as daft as the person you're responding to. Rootkits are a response to system security, not a sign of a badly designed system. The reason that *nix had rootkits and Windows didn't was that early versions of Windows had no security, especially not a separate administrative account. The reason we now of rootkits for MS systems is that these systems now have some of the security measures th
Re:First Post!! (Score:2, Funny)
What sort of program would that be? Oh yeah, "It's a Sony!"(TM)
Re:First Post!! (Score:2)
Defining a root kit is hard... (Score:2)
Windows has the same silly indexing service, but at least they make it easy to turn off with a GUI checkbox.
Re:Read Hardware Digital Rights Management (DRM) (Score:2)
All of this has been said before in threads about DRM. Independent and hobbyist developers will be the hardest hit