[coreboot] Re : Re: Is Goryachy's JTAG hack a chance for free firmware ?

echelon at free.fr echelon at free.fr
Fri Dec 1 18:32:55 CET 2017


Enrico,
Do you know what is an HSM and how public-key cryptography works?
Sorry for the sarcasm, but I can assure you that no-one without VERY HIGH security clearances from Intel would ever approach at less than 1 yard from an Intel HSM containing ME signing keys..
So for the jtag acess.....
Regards,
 Florentin

----- Mail d'origine -----
De: Enrico Weigelt, metux IT consult <info at metux.net>
À: Igor Skochinsky <skochinsky at mail.ru>
Cc: coreboot <coreboot at coreboot.org>, Zoran Stojsavljevic <zoran.stojsavljevic at gmail.com>
Envoyé: Thu, 30 Nov 2017 23:38:45 +0100 (CET)
Objet: Re: [coreboot] Is Goryachy's JTAG hack a chance for free firmware ?

On 30.11.2017 20:51, Igor Skochinsky wrote:

> The private key does not exist anywhere in the firmware or in the chip, only somewhere
> in Intel's HSM (I assume).

hmm, could there be an jtag access part to it ?

>   1) factor the public key (RSA-1024)
>   2) find a pair of keys where the pubkey hash matches one of those
>   accepted by the ME (the hash is SHA512 in the latest versions, was
>   SHA-1 before).

maybe we should ask our friends @google, whether they could spend
enough computing power to crack it ;-)


--mtx

-- 
Enrico Weigelt, metux IT consult
Free software and Linux embedded engineering
info at metux.net -- +49-151-27565287

-- 
coreboot mailing list: coreboot at coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot




More information about the coreboot mailing list