LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-26-2018, 07:27 PM   #1
LinuxMintyFresh
LQ Newbie
 
Registered: Feb 2018
Posts: 19

Rep: Reputation: Disabled
Exclamation Intel ProxZzzy the next Intel ME?


Read https://www.ecma-international.org/p...T/ECMA-393.pdf

ECMA-393 "proxZzzy" was developed by Intel. Source A sleep proxy service built inside the NIC. It allows the host to sleep while the NIC stays awake, and the NIC can do things like respond to ARPs and other simple jobs to keep the host "visible" on the network even while the PC sleeps. "ProxZzzy combines Wake-on-LAN technology with a packet sniffer. As either an embedded core or a small discrete chip within the network interface card, the ProxZzzy technology investigates each incoming packet according to a predefined set of rules. If the appropriate criteria are met, the NIC orders the PC to wake up, perhaps to accept a series of patches."

Intel's ProxZZZy is triggered by remote access protocol bits, what has been described in the above document as "wake up" protocols; while the ECMA admit that by design it has security flaws "This Standard does not specifically address Security concerns out of the proposed proxy protocol design" and that Intel's NIC embedded ProxZZZy can be hijacked and remotely controlled and turned from a sniffer to a rogue packet generator, they admit they do not provide all the data and security risks that are present. I've yet to determine if disabling Intel's ProxZZZy at the software level effectively mitigates hardware level exploitation. An on already compromised hosts attackers could re-enable the hardware level attack vector. For whatever reasons I have my doubts its 100% secure at the hardware level; given the revelations of Intel ME's HAP bit, only given to the least trustworthy organization on the planet, the NSA. The NSA may have the bugger bits to enable all kinds of funnygoingson.

Look at the data sheets to find out what protocols your lan/wifi card used or you can find out if its available and enabled on your adapter in Windows and disable it under device manager / adapters advanced settings "ECMA." (photo) It would be wise to do this in linux as well. Rlt8111g adapters have this inbuilt, which also include highly secure OTP (one time write embedded flash memory; here is a picture 1 2 3 military grade, no flash to compromise, rootkits cant be installed inside it, unless it ALREADY BUILT TO BE ONE then well what are you gonna do? its hammer time!) Disabling ProxZZZy and 'Wake on Lan' will prevent "denial of sleep attacks" and possibly mitigate against other potential unforeseen inb or oob vulnerabilities.

There are other standards, such as Microsoft Wake on Lan, Magic Packet, and others which provide similar functionality; Every Intel chip since 2006 (Via Intel ME) ensures the onboard Network card remains irreversibly enabled and remotely accessible, even when the computer is powered completely off, (unless you hard flash it) allowing total remote control and exploitation of users PCs, critical infrastructure and all the rest Source 1, Source 2; As of the time of this post, users of Intel products are forced to buy new products or wait for Intel to release updated firmware. Whadda ya gonna do while your reactor is going into meltdown? Or your online exchange lost 60 billion dollars. Wait for a patch from Intel? Ask the NSA to flip your HAP bit? The cat and mouse game goes on ad infinitum until it is totally disabled.

Intel's ProxZZZy looks like it could be a close runner up to Intel's ME.

From the ecma document:

4.2 proxy, network proxy:

An entity that maintains network presence for a sleeping higher-power host (The proxy is the man in the middle; you are the host)

If your Network card supports Intel's ECMA-393 proxZZZy™ for sleeping hosts; the following can occur!

A.2 Security Considerations; according to its designers:

This Standard does not specifically address Security concerns arising out of the proposed proxy protocol design. However, a number of potential threat scenarios have been identified and potential mitigation is suggested below.

• Denial of Sleep Attack – It is possible that an adversary may send periodic unauthenticated end-to-end packets to the proxy, denying the system from entering or staying in the Sleep state. This can be partially mitigated by using defense mechanisms (Firewalls, Intrusion Detection and Prevention systems), either externally and/or as part of the system.

• Compromised Proxy – It is possible that an adversary may assume control of the proxy and use the Proxy to launch attacks on the system, on the network, or on other Internet connected machines. This can be partially mitigated by using System measurement techniques for ensuring the integrity and robustness of the software/firmware/hardware that executes within the proxy.

• Subversion Attacks – It is possible that an adversary may take control of the proxy and use it to generate IP packets with Option headers that circumvent external defense mechanisms. This can be partially prevented by disallowing the proxy to generate IP packets with Options in its header.

(editor: Packet generators can be used to launch a ProxZZZy attack on any supported host, hijacking the proxy, then the proxy (which includes an embedded packet sniffer) can be turned into a rogue packet generator)

• IPsec - IPsec can be deployed in one of two modes – tunnel and transport modes. Tunnel mode is used for IPsec-encapsulation of VPN traffic where a remote client accesses one or more nodes in a trusted network via a VPN gateway. Traffic to the nodes in the trusted network is typically in-the-clear.

IPsec Transport mode is used to protect individual connections between IP endpoints within a network. In this case, each peer-to-peer connection between nodes could be protected by an IPsec Security Association (SA). The decision to protect or not is by IPsec policy, and the recommended enterprise IPsec policy is to require inbound IPsec but not require outbound IPsec. The receiver challenges the initiator to establish IPsec if needed. The visible side-effect is initial TCP connections (TCP SYN) are sent in the clear. Furthermore, under these policies, the IPsec negotiation happens in parallel with the connection request. Traffic after the initial TCP SYN, including additional retires of the TCP SYN, will likely be within IPsec, as will further traffic.

Although not the common policy, the initiator policy may also require outbound IPsec. If this is the case, the connection setup will be preceded by a probe packet to the IKE or AuthIP UDP port.

In the IPsec use case with a proxy, the initial IPv6 TCP SYN packet from the initiator used to wake the host may be encrypted by IPsec (if an existing SA matching policy has been previously negotiated between the peers). However, the expected common-case is for the initial IPV6 TCP SYN packet to be sent in the clear (by the recommended enterprise IPsec policies mentioned above). To simplify these two cases, the host should explicitly delete or invalidate existing IPsec SAs prior to going to sleep and transition to proxy mode.

If IPsec is configured to either use “shared secret” or require outbound IPsec, then the initial IPv6 TCP SYN will first be IPsec authenticated and encrypted. In either of these sequences, the wake can be from the IKE negotiation initiation. The proxy should be enabled to wake on an IKEv1/AuthIP pattern to handle this configuration.

The potential remote access dangers of proxzzzy

Intel's ProxZZZy gives the host Ethernet / Wifi adapter the ability to accept remote "Session initiation protocals"

What is a Session Initiation Protocol?

Session Initiation Protocol

Also called a SIP server or SIP proxy server, in telecommunications it is one of the main components of an IP PBX that is used by SIP to perform many of the call set-up functions. As described in RFC 3621 - SIP: Session Initiation Protocol SIP makes use of elements, called proxy servers (SIP proxy) "to route requests to the user's current location, authenticate and authorize users for services, implement provider call-routing policies, and provide features to users".

Within the SIP network the SIP proxy actually manages the setup of calls between SIP devices including the controlling of call routing and it also performs necessary functions such as registration, authorization, network access control and in some cases it also handles network security.

IP PBX Short for Internet Protocol Private Branch eXchange, a telephone switch that supports VoIP. An IP PBX provides services similar to PBX services, but over data networks like a LAN or WAN rather than circuit-switched networks. IP PBX typically can switch calls between VoIP on local lines or between VoIP and traditional telephone users in the same way PBX does. IP PBX may also be seen abbreviated as IPPBX or IP/PBX.

Source: https://www.ecma-international.org/p...T/ECMA-393.pdf

5.7 Remote Access using SIP and IPv4

In this Standard, SIP (RFC 3261) is used by a remote entity to wake a host. SIP proxies along the path can facilitate the traversal of NATs and firewalls. The reason for waking the host (i.e., the particular host application that needs to be used) is outside the scope of this Standard. SIP methods and responses used in the remote wake functionality are REGISTER, INVITE, ACK, and SIP Status Codes.

The following diagram (see above document) shows a sample SIP implementation that may be used by the proxy to wake the host. Only the messages into and out of the Device Network Proxy are included in this specification. All other messages and entities are a possible implementation and not covered by this specification.

5.8 Remote Access using Teredo for IPv6 (Teredo (RFC 4380) is an IPv6 transition technology that allows peer to peer connectivity between peers behind a NAT. The Teredo protocol encapsulates IPv6 packets inside UDP IPv4 packets. One of the tunnels a Teredo client maintains is with the Teredo server in the cloud. The proxy maintains this tunnel by sending Router Solicitation (RS) messages at regular intervals. The proxy ignores any responses from the server to the RS packet.

And what is the unobstructed out of bound communication they are referring to in their document? There may be many OOB applications and functions. Intel ME / AMT's remote access protocol's function in OOB. Using an aftermarket network card will bypass Intel ME OOB.

Out-of-band management

In computer networks, out-of-band management involves the use of a dedicated channel for managing network devices. This allows the network operator to establish trust boundaries in accessing the management function to apply it to network resources. It also can be used to ensure management connectivity independent of the status of other in-band network components.

About Blocking Clients and Out of Band Management, Blocking AMT-Based Computers in Configuration Manager https://technet.microsoft.com/en-us/.../ee344337.aspx

Intel's Prozzzy mandatory vs optional components:

IPv4 ARP Mandatory IPv6 Neighbor Discovery Mandatory DNS Option DHCP Option IGMP Option MLD Option Remote Access using SIP and IPv4 Option Remote Access using Teredo for IPv6 Option SNMP Option Service Discovery using mDNS Option Name Resolution with LLMNR Option Wake Packets Mandatory

Last edited by LinuxMintyFresh; 02-28-2018 at 06:18 AM. Reason: Added a picture link!
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Delayed screen refresh (Intel GM45, 2.6.39, Xorg 1.9.5, xf86-video-intel 2.15.0) CTM Slackware 6 06-04-2011 12:02 PM
Does Fedora 10 supports Intel Xeon Processor & Intel S3000AH Motherboard ??? PrakashB Linux - Newbie 10 05-20-2009 10:07 PM
Linux Installation Halted on Intel Core 2 Duo on intel 946G MotherB srilinux Linux - Hardware 3 10-06-2007 08:30 AM
does red hatlinux 9 support intel core 2 duo and intel DG965RY motherboard sa_2400 Linux - Hardware 8 07-11-2007 12:13 PM
: Intel® 865G Chipset with Intel® Extreme Graphics 2 -driver for linux7.0 ker 2.4.1 schandak Red Hat 1 10-28-2004 12:43 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:59 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration