Friday, November 10th 2017

MINIX Creator Andrew Tanenbaum Sends Open Letter to Intel Over MINIX Drama

We recently reported about MINIX, the hidden Unix-like OS that Intel was secretly shipping in all of their modern processors. This came as a shock to most of us and to MINIX creator Andrew Tanenbaum as well. Although Andrew wasn't completely surprised by the news, since Intel approached him couple years back asking him to make a few changes to the MINIX system. He stated in the open letter that he wasn't looking for economic remuneration, but it would have been nice if Intel had told him about their plans to distribute his operating system in their processors.
You can read the complete letter sent to Intel below:

Dear Mr. Krzanich,

Thanks for putting a version of MINIX inside the ME-11 management engine chip used on almost all recent desktop and laptop computers in the world. I guess that makes MINIX the most widely used computer operating system in the world, even more than Windows, Linux, or MacOS. And I didn't even know until I read a press report about it. Also here and here and here and here and here (in Dutch), and a bunch of other places.

I knew that Intel had some potential interest in MINIX several years ago when one of your engineering teams contacted me about some secret internal project and asked a large number of technical questions about MINIX, which I was happy to answer. I got another clue when your engineers began asking me to make a number of changes to MINIX, for example, making the memory footprint smaller and adding #ifdefs around pieces of code so they could be statically disabled by setting flags in the main configuration file. This made it possible to reduce the memory footprint even more by selectively disabling a number of features not always needed, such as floating point support. This made the system, which was already very modular since nearly all of the OS runs as a collection of separate processes (normally in user mode), all of which can be included or excluded in a build, as needed, even more modular.

Also a hint was the discussion about the license. I (implicitly) gathered that the fact that MINIX uses the Berkeley license was very important. I have run across this before, when companies have told me that they hate the GPL because they are not keen on spending a lot of time, energy, and money modifying some piece of code, only to be required to give it to their competitors for free. These discussions were why we put MINIX out under the Berkeley license in 2000 (after prying it loose from my publisher).

After that intitial burst of activity, there was radio silence for a couple of years, until I read in the media (see above) that a modified version of MINIX was running on most x86 computers, deep inside one of the Intel chips. This was a complete surprise. I don't mind, of course, and was not expecting any kind of payment since that is not required. There isn't even any suggestion in the license that it would be appreciated.

The only thing that would have been nice is that after the project had been finished and the chip deployed, that someone from Intel would have told me, just as a courtesy, that MINIX was now probably the most widely used operating system in the world on x86 computers. That certainly wasn't required in any way, but I think it would have been polite to give me a heads up, that's all.

If nothing else, this bit of news reaffirms my view that the Berkeley license provides the maximum amount of freedom to potential users. If they want to publicize what they have done, fine. By all means, do so. If there are good reasons not to release the modfied code, that's fine with me, too.

Yours truly,

Andrew S. Tanenbaum

Note added later: Some people have pointed out online that if MINIX had a GPL license, Intel might not have used it since then it would have had to publish the modifications to the code. Maybe yes, maybe no, but the modifications were no doubt technical issues involving which mode processes run in, etc. My understanding, however, is that the small size and modular microkernel structure were the primary attractions. Many people (including me) don't like the idea of an all-powerful management engine in there at all (since it is a possible security hole and a dangerous idea in the first place), but that is Intel's business decision and a separate issue from the code it runs. A company as big as Intel could obviously write its own OS if it had to. My point is that big companies with lots of resources and expertise sometimes use microkernels, especially in embedded systems. The L4 microkernel has been running inside smartphone chips for years. I certainly hope Intel did thorough security hardening and testing before deploying the chip, since apparently an older version of MINIX was used. Older versions were primarily for education and newer ones were for high availability. Military-grade security was never a goal.

Second note added later: The online discussion got completely sidetracked from my original points as noted above. For the record, I would like to state that when Intel contacted me, they didn't say what they were working on. Companies rarely talk about future products without NDAs. I figured it was a new Ethernet chip or graphics chip or something like that. If I had suspected they might be building a spy engine, I certainly wouldn't have cooperated, even though all they wanted was reducing the memory footprint (= chip area for them). I think creating George Orwell's 1984 is an extremely bad idea, even if Orwell was off by about 30 years. People should have complete control over their own computers, not Intel and not the government. In the U.S. the Fourth Amendment makes it very clear that the government is forbidden from searching anyone's property without a search warrant. Many other countries have privacy laws that are in the same spirit. Putting a possible spy in every computer is a terrible development.
Source: Andrew S. Tanenbaum
Add your own comment

52 Comments on MINIX Creator Andrew Tanenbaum Sends Open Letter to Intel Over MINIX Drama

#1
Steevo
All this is going to do is to get the source code cracked, each and every pin analyzed, each and every block of an Intel processor scanned with an electron microscope to see if its hard coded during wafer manufacturing, and exploits will soon abound.
Posted on Reply
#2
Taloken
I'm out of the loop.

What is the issue for customers about the ME ?

It's a micro-code known for years.
Common in OC to have to reinstall the ME if overclocking is degraded (risky operation, only for competition).
Posted on Reply
#3
RejZoR
SteevoAll this is going to do is to get the source code cracked, each and every pin analyzed, each and every block of an Intel processor scanned with an electron microscope to see if its hard coded during wafer manufacturing, and exploits will soon abound.
AMD just became a lot more interesting to pretty much entire world all of a sudden...
Posted on Reply
#4
W1zzard
OMG :eek: TPU mentioned as 2nd source in his letter. I remember reading Tanenbaum's books and dissecting his operating system concepts in university.
Posted on Reply
#5
biffzinker
SteevoAll this is going to do is to get the source code cracked, each and every pin analyzed, each and every block of an Intel processor scanned with an electron microscope to see if its hard coded during wafer manufacturing, and exploits will soon abound.
It's not the CPU that has the Intel Management Engine but the Platform Controller Hub (PCH.)

The Intel Management Engine was also moved to the PCH starting with the Nehalem processors and 5-Series chipsets.
Posted on Reply
#6
silentbogo
W1zzardI remember reading Tanenbaum's books and dissecting his operating system concepts in university.
Still have the third edition of "Modern Operating Systems", along with Crowley's "Operating Systems: Design Oriented Approach".
Though, I gave up on college way before I got those :laugh:
RejZoRAMD just became a lot more interesting to pretty much entire world all of a sudden...
Don't worry, they've got one of their own.
TalokenWhat is the issue for customers about the ME ?
Several potentially critical vulnerabilities with no way of patching on older platforms (sources mention some were known for many years).
Also, no way of completely disabling ME without harming the hardware (you are lucky if you'll only get a 15 second POST delay, otherwise your mobo won't even start).
Plus, both AMD and Intel are so secretive about their security tech, that it forces people to think whether ME or AMD SecureChip are really that secure, or whether they simply apply the tactics of "obfuscated security".
Posted on Reply
#7
lexluthermiester
SteevoAll this is going to do is to get the source code cracked, each and every pin analyzed, each and every block of an Intel processor scanned with an electron microscope to see if its hard coded during wafer manufacturing, and exploits will soon abound.
The key point most people seem to be missing is that this discovery was prompted by a vulnerability discovered earlier this year. And again, Intel has already publicly confirmed that this technology is not on CPU dies and is elsewhere in specific chipsets. If AMT is disabled, or is enabled and not provisioned, the little "mini SOC" in question sits doing nothing in a sleep-state. Even if the use can not directly access it, it still needs are source of instructions and data to process. If not enabled and provisioned, it does not and can not know how or where to get data or what tasks to carry out. That hardware still depends on software outside it's installed MinixOS, even on such a miniaturized low level. Without the software, it sits dumb, doing nothing. If you know me from elsewhere in the forums, then you know how ultra cautious and security/privacy focused I am, even to the point of being called paranoid[which I won't dispute]. Having said that, I've done my homework on this problem. IF the affected hardware, which limited, has the function disabled, it can not be directly addressed from outside the system, even over a network.

So if you have affected hardware, get into the bios and disable it. If you can't disable it[which I've not seen an instance of yet], than disable and uninstall the drivers for the associated device in the Windows Device Manager. If the software package for the Intel's AMT is installed, uninstall it. This will render the ME non-functional.

Now even though THIS problem can safely be disabled and rendered non-functional, what's really scary is that a slight variation of the design can render it completely unaffected by bios/user settings, leaving us at the mercy of anyone who has the know-how to address and take control of it. At that point the only way to be safe from such control is to keep such a system completely stand alone, IE by never connecting a network.
Posted on Reply
#8
thesmokingman
silentbogoDon't worry, they've got one of their own.
Except AMD are above board about it and not stealing it and hiding it from everyone.
Posted on Reply
#9
lexluthermiester
silentbogoSeveral potentially critical vulnerabilities with no way of patching on older platforms (sources mention some were known for many years).
Also, no way of completely disabling ME without harming the hardware (you are lucky if you'll only get a 15 second POST delay, otherwise your mobo won't even start).
Plus, both AMD and Intel are so secretive about their security tech, that it forces people to think whether ME or AMD SecureChip are really that secure, or whether they simply apply the tactics of "obfuscated security".
And people me paranoid. :kookoo: :wtf:
Posted on Reply
#10
cadaveca
My name is Dave
W1zzardOMG :eek: TPU mentioned as 2nd source in his letter. I remember reading Tanenbaum's books and dissecting his operating system concepts in university.
:respect::respect:You, W1zz, are the GPU god of the enthusiast sphere and we are all your loyal subjects. Of course he (and pretty much any other PC enthusiast) reads TPU!!! :respect::respect:

:lovetpu:
thesmokingmanExcept AMD are above board about it and not stealing it and hiding it from everyone.
Intel announced this when SandyBridge launched. Hardly hidden, and certainly, not stolen. ROFL.
lexluthermiesterNow even though THIS problem can safely be disabled and rendered non-functional, what's really scary is that a slight variation of the design can render it completely unaffected by bios/user settings, leaving us at the mercy of anyone who has the know-how to address and take control of it. At that point the only way to be safe from such control is to keep such a system completely stand alone, IE by never connecting a network.
We did kind of have an issue... that perhaps caused the recall of the P67 chipset? Yet this has been out in the wild for a long time now, and there has yet to be any openly obvious issues presented. Although, the tie-in with Hollywood that Intel had for DRM was something I was sure that people would have been more of an uproar about, but even that fizzled out after a few days. People are quick to forget things that were talked about years ago.
Posted on Reply
#11
thesmokingman
Imagine if Tanenbaum got some backing and went after Intel... The stakes are in the billions. Can you imagine the cease and desist order? lol
Posted on Reply
#12
Steevo
biffzinkerIt's not the CPU that has the Intel Management Engine but the Platform Controller Hub (PCH.)

Even in the PCH its running on a CPU "core" in the die that now has more power as it can look at packets coming and going and there could be a whole networking device inside it cloned and invisible to the existing GBe to allow access at the hardware level if someone wanted, since it can be updated, it can be hacked, and even if not updated due to some large part of it being ROM, there will be those looking and finding exploits. Imagine a virus/malware that gained access by pretending to be a PCIe device with root access to the file system? A few simple commands and an attacker could have easy access to anyone's files, to the OS its just an installed device and hand over complete access.
Posted on Reply
#13
lexluthermiester
SteevoEven in the PCH its running on a CPU "core" in the die that now has more power as it can look at packets coming and going and there could be a whole networking device inside it cloned and invisible to the existing GBe to allow access at the hardware level if someone wanted, since it can be updated, it can be hacked, and even if not updated due to some large part of it being ROM, there will be those looking and finding exploits. Imagine a virus/malware that gained access by pretending to be a PCIe device with root access to the file system? A few simple commands and an attacker could have easy access to anyone's files, to the OS its just an installed device and hand over complete access.
Again, it has to be enabled AND provisioned. If not it sits doing nothing.
Posted on Reply
#14
Upgrayedd
thesmokingmanExcept AMD are above board about it and not stealing it and hiding it from everyone.
Stealing and hiding LMAO. Did you miss the part where it is free?
Posted on Reply
#16
trparky
The difference between what Intel has and what AMD has is AMD gives you a choice, Intel doesn't. The consumer version of Ryzen doesn't have AMD Secure Technology, only a specific line has it. All Intel chips have it and you can't turn it off.

Oops.

Suddenly AMD Ryzen is looking a whole lot more interesting from a pure security point of view.
Posted on Reply
#17
evernessince
thesmokingmanExcept AMD are above board about it and not stealing it and hiding it from everyone.
It's kind of hard to be below what Intel does to be honest. I knew Intel was a shitty company before but now learning they did this with zero credit to the creators and poached Raja right after they made a deal with AMD. They disgust me and I will never buy another Intel processor if I'm not forced to.
Posted on Reply
#19
evernessince
UpgrayeddStealing and hiding LMAO. Did you miss the part where it is free?
Just because something is free doesn't mean you don't have to credit the authors or provide others with access to the code. There are so many pieces of IP under these kinds of licenses. They only provide it for free so that it can be used perpetually to help others.
Posted on Reply
#20
OSdevr
Boy would it be awkward if Mr. Tanenbaum showed up right now.
Posted on Reply
#21
lexluthermiester
OSdevrBoy would it be awkward if Mr. Tanenbaum showed up right now.
Why would it be awkward? It would be interesting actually.
Posted on Reply
#22
StrayKAT
evernessinceJust because something is free doesn't mean you don't have to credit the authors or provide others with access to the code. There are so many pieces of IP under these kinds of licenses. They only provide it for free so that it can be used perpetually to help others.
BSD is one of the most liberal around. All you have to do is give credit. You can do what you want with the software, free or commercial.

This isn't that different than Sony using a modified FreeBSD in their PS4's.
Posted on Reply
#23
Upgrayedd
evernessinceJust because something is free doesn't mean you don't have to credit the authors or provide others with access to the code. There are so many pieces of IP under these kinds of licenses. They only provide it for free so that it can be used perpetually to help others.
Just because Joe decided to share something for free and unlicensed, then Bob makes it better for their own specific products does not mean that Bob has to then share w/e they created. It is Bob's and no one else.
Posted on Reply
#24
lexluthermiester
UpgrayeddJust because Joe decided to share something for free and unlicensed, then Bob makes it better for their own specific products does not mean that Bob has to then share w/e they created. It is Bob's and no one else.
That depends very greatly on the license.
Posted on Reply
#25
phanbuey
just wait until they can separate us and control our emotions through mass ai targeted social and mass media messaging ...

then all the nakedwatermonkeyants will be part of the hive.

and there will be drones. and white chryslers... and puppies.



/tinfoil

time to go break something i guess.
Posted on Reply
Add your own comment
Nov 12th, 2024 16:17 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts