The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.
← Previous pageNext page →

    IMPORTANT SECURITY UPDATES!

    Discussion in 'Sager and Clevo' started by Prema, Nov 30, 2017.

  1. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    S76 don't officially support Windows and use entirely different BIOS/EC than ALL other stock Clevo systems, even before they disabled the ME, hence the 'IF you are a Windows user' in my first reply.
    Of course you can do the above, all I am saying it ain't very clever to do it on a large scale on systems designed for gamer and OCer like these Clevo's. If the consequences don't matter in your case and security goes above everything, then go ahead and do it for your system. Here the original article: http://blog.ptsecurity.com/2017/08/disabling-intel-me.html
     
    Last edited: Jan 22, 2018
    KY_BULLET and Vasudev like this.
  2. Mangix

    Mangix Notebook Guru

    Reputations:
    12
    Messages:
    69
    Likes Received:
    41
    Trophy Points:
    26
    Oh that is interesting. I did not realize their BIOS is totally different. I wonder if they use coreboot. On an interview they did they mention that AMI has some weird NDA preventing developers working with AMI BIOSes to work on coreboot and that they avoid AMI like the plague. They mentioned it here at 15:30:

    I wonder if I can install their BIOS on my Clevo. I'm currently running one of your BIOSes but my main complaint is the slow initialization speed.
     
    Vasudev likes this.
  3. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    Nvme drives take little more time to initialise so that might be the issue.
    See if Fast boot is enabled/disabled?
     
    Prema and KY_BULLET like this.
  4. Mangix

    Mangix Notebook Guru

    Reputations:
    12
    Messages:
    69
    Likes Received:
    41
    Trophy Points:
    26
    I don't think 15 seconds of BIOS time is notmal
     
  5. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    For NVMe drives it is...
     
    hmscott and KY_BULLET like this.
  6. Mangix

    Mangix Notebook Guru

    Reputations:
    12
    Messages:
    69
    Likes Received:
    41
    Trophy Points:
    26
    Even with no NVME drives installed? Guess I'll try disabling PCIe ports.
     
  7. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    Do you have any apps running at Startup, esp. Win32/desktop apps?
    UWP apps doesn't increase boot time at all.
    I have mediocre PCIe NVME SSD and boot time is 6-8 sec with 4 apps running. On SATA SSD with Linux, it boots in 3-4 sec.
    Optionally you get detailed info in Task Mgr's Startup tab. Simply right click on Name or publisher or startup impact to get Disk IO at startup, CPU overhead and other details.
     
    hmscott likes this.
  8. Mangix

    Mangix Notebook Guru

    Reputations:
    12
    Messages:
    69
    Likes Received:
    41
    Trophy Points:
    26
    Are you joking right now? I specifically said BIOS initialization. Why are you talking about Windows?
     
  9. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    I wrote, its an optional step in case you wanted to investigate further.
    If you want System Logo to be disaplayed then disable Quiet boot and enable Fast boot.
     
    hmscott likes this.
  10. Mangix

    Mangix Notebook Guru

    Reputations:
    12
    Messages:
    69
    Likes Received:
    41
    Trophy Points:
    26
    There is nothing to investigate. Clevo BIOSes have slow initialization, others like MSI or ASRock do not. Simple as that.

    And yes, fastboot is enabled.
     
  11. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    What about Quiet boot? (If its Aptio 5 BIOS/EFI)
     
  12. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    I have a P775TM1-G and was going through the windows event logs and found this

    Source: TPM-WMI
    Event ID: 1794
    Level: Error
    User: SYSTEM
    OpCode: Info

    "The Trusted Platform Module (TPM) firmware on this PC has a known security problem. Please contact your PC manufacturer to find out if an update is available. For more information please go to https://go.microsoft.com/fwlink/?linkid=852572"

    Current Status:
    ME Firmware Version: 11.8.50.3425
    BIOS Version: 1.05.04PS
    KBC/EC Firmware Revision: 1.05.03

    Any fix available for this issue?
     
  13. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    Last edited: Feb 1, 2018
    Prostar Computer, steberg and Vasudev like this.
  14. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,742
    Messages:
    29,856
    Likes Received:
    59,714
    Trophy Points:
    931
    And Intel continue push out new versions of their Intel-SA-00086 Detection Tool. Now up in the 5 version - (Version: 1.1.169.0 - Latest Date: 1/24/2018) :p
     
    Vasudev and KY_BULLET like this.
  15. steberg

    steberg Notebook Evangelist

    Reputations:
    248
    Messages:
    562
    Likes Received:
    461
    Trophy Points:
    76
    Ok you should probably open a new thread about this update, to not hijack Premas thread.. But it works fine. Upgraded my TPM from version 5.51 to 5.62. Thank you! +Rep

    [​IMG]
     
    Vasudev likes this.
  16. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    I am sitting on a bunch of TPM updates and will request the Mods to Edit the OP once I am confident in the method, so that we have all the security stuff in one place.

    Right now if the old TPM isn't properly cleared before flashing the new one the old and vulnerable keys will be migrated into the new firmware and there will be no way to get rid of them after the flash. Clearing them only in Windows doesn't clear them in the TPM, that has to be done in BIOS prior to disabling the chip.
    So I have to make it as fool proof as possible or it'll cause more damage than good.
     
    Vasudev, kong, KY_BULLET and 2 others like this.
  17. steberg

    steberg Notebook Evangelist

    Reputations:
    248
    Messages:
    562
    Likes Received:
    461
    Trophy Points:
    76
    Yes, I saw the clear TPM option in BIOS and did that too. It's good to know you're working on it!
     
    Prema likes this.
  18. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    @Prema

    The TPM Endorsement Key (TPM EK) is permanent and generated at the factory which cannot be changed.

    The TPM vulnerability exploits a weakness in an algorithm and the user keys generated by it and not the TPM EK itself.

    Not sure what stays trapped forever because the user keys can be cleared anytime again and again. Also, if the TPM user keys are not cleared in Windows then it should allow you to log in using your old fingerprint which it does not in this case.
     
  19. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    It has to do with the way the public key is generated. Think of it as a too thin thread which has to be cut back to it's origin as otherwise all the thicker threads that are attached later on remain weak due the original one remaining.
     
    Vasudev likes this.
  20. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    Would prefer a more technical response as TPM EK is from factory and cannot be changed. Clearing TPM clears the user generated keys and the vulnerable algorithm is updated with the firmware.

    What's left now? What's the name of the "thin thread"?

    Sent from my SM-G950F using Tapatalk
     
  21. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    We need 14 different TPM updates just to cover the Clevo Infineon models/revisions. We have been testing for a while and e.g. that 5.62 has already been succeeded by a newer version and they require to be updated in steps.
    Please be patient...


    This should help:

    https://docs.microsoft.com/en-us/wi.../manage/component-updates/tpm-key-attestation
     
    Last edited: Feb 1, 2018
    Papusan likes this.
  22. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    The link talks about TPM EK and how to use the EK public key to authenticate with the CA..nothing about stuck certificates or inability to clear TPM.

    Still trying to know which "certificates are left forever and cannot be changed"..are these TPM EK or TPM SK? TPM EK are from factory and cannot be changed..vulnerable code is fixed and updated..that leaves TPM SK user certificates which Windows resets and can be rest again and again before and after firmware update..

    Which certificates are left now and cannot be cleared later? I am a crypto major and can understand the most technical details and some more.

    Sent from my SM-G950F using Tapatalk
     
  23. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    Forget about the OS part of that link. It's only to explain that the EK consists of a private and a public key.
    One is hardcoded, the other one is not. The instructions to hard-clear the chip comes directly from Infineon (incl. the reason and side effects of not doing it) and while many ODMs have been designing their 'readmes' and 'patcher' accordingly, Clevo has not been following their guidelines. Hence the warning.

    Edit: Removed the signing info I got confused with TBT firmware due to me playing Fortnite all night long while answering this stuff. Sorry for that. Next time I'll just shut up and keep playing.
     
    Last edited: Feb 2, 2018
  24. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    A key "pair" is always 2 keys (public and private) and changing any of these will break the encryption chain. It is not possible to modify the TPM EK public or TPM EK private key so this is one half of the TPK EK and there is no danger of overwriting or erasing it.

    Next is TPM EKCert which is provided by the Manufacturer. Some TPM manufacturers do not include an EKCert but Infineon does.

    The TPM EK public key, the TPM EK private key and also the TPM EKCert are issued from Infineon and not CLEVO so there is nothing with CLEVO and no way to overwrite any of these.

    I have uploaded the most recent EKCerts (ECC and RSA) for Infineon TPM SLB 9665 firmware version 5.62.x (December 05, 2017) below for you but EKCerts are of no use or hamper any update for CLEVO machines.

    Infineon-OPTIG(TM) RSA Manufacturing CA 029 Issued by RootCA-C-v01_00-EN.crt and Infineon-OPTIGA(TM) ECC Manufacturing CA 029 Issued by RootCA-C-v01_00-EN.crt
    https://onedrive.live.com/download?...=1E25BD0C9E57C3DA!600&authkey=AABfmHANALZzC0o

    PS. I still want to know which vulnerable keys will migrate to the new system and remain there forever..so far it doesn't look like any keys are doing that.
     
    Last edited: Feb 1, 2018
    Vasudev likes this.
  25. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    I can't share confidential material to tell you what exactly they do only why it is important and that they advised vendor to flash accordingly. Point being it is very important to also clear the chip via BIOS function and not only reset it via OS call, something Clevo simply ignored in their SOP. I don't work for Infineon, it's simply what we have been given. I really did my best here, sorry if it doesn't satisfy your curiosity... :oops:

    Edit: Removed the signing info I got confused with TBT firmware due to me playing Fortnite all night long while answering this stuff. Sorry for that. Next time I'll just shut up and keep playing.
     
    Last edited: Feb 2, 2018
    Papusan, KY_BULLET and Vasudev like this.
  26. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    I am less curious and more surprised that you are constantly changing your response and incorrectly describing how encryption and TPM works.

    1. Your first mentioned "if the old TPM isn't properly cleared before flashing the new one the old and vulnerable keys will be migrated into the new firmware and there will be no way to get rid of them after the flash." - no keys can get stuck in the TPM and you have still not responded which keys are these and constantly dodging with random reponse
    2. When I asked about the keys again and mentioned TPM Endorsement Key, again instead of replying with something meaningful, you responded with a Microsoft article about TPM Key Attestation which is nothing to do with this vulnerability or how TPM keys are stored
    3. When I again pointed this out, you incorrectly described asymmetric encryption and TPM EK saying one is hardcoded and one is not..when in fact, both of these keys are hardcoded and from Infineon and not from CLEVO

    and now you are saying these are not generic and unique for vendors..and also that these are signed for the ODM and there is some confidential information involved.

    This is completely wrong!! Infineon TPMs are only signed by Infineon and anyone can check that by running Windows Powershell in admin mode and typing the following command:

    Get-TpmEndorsementKeyInfo

    The above mentioned command will show who has signed the TPM certificate which is always going to be Infineon and not HP or DELL, or CLEVO. I have checked TPM updates from HP, DELL, TOSHIBA and Infineon itself and all of the firmware updates are EXACTLY THE SAME and the firmware files can be verified with an EXACT SIGNATURE MATCH i.e. there is no unique signature and all vendors use Infineon signed TPM firmwares so your response about unique signatures and confidential information is not based on facts.

    CEVO owners can run Windows Powershell and the above command to confirm if their TPM is running Infineon "generic" certificate or a CLEVO signed one which will prove my point.

    here are the TPM firmware updates from some vendors that others can verify to be exactly the same as Infineon

    TOSHIBA
    https://cdgenp01.csd.toshiba.com/content/support/downloads/EN-2017-001082-005-TPMFW.exe
    HP
    ftp://15.73.48.59/pub/softpaq/sp82001-82500/sp82147.exe

    PS. I have updated my P775TM1-G firmware to 1.05.06 after the TPM "generic" firmware update with no issues whatsoever.
     
    Last edited: Feb 2, 2018
    Vasudev likes this.
  27. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    OK, this is all pointless. Let me just prepare some proper instructions and upload all the latest updates in a bit...

    [​IMG]
     
    sicily428 and Vasudev like this.
  28. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    OK, 'OP' and 'Team Blog' are updated with the latest security updates for 'CLEVO INFINEON TPM 1.2 & 2.0'.

    Now please let me focus on the important stuff and continue to work on that Win in Fortnite... ;)
     
    Last edited: Feb 2, 2018
  29. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    it wasn't pointless at all.

    you tried to cover up but it didn't work and you burst your own bubble by releasing the "generic" Infenion firmware that any CLEVO owner can verify using the Windows PowerShell command I posted earlier before and after the update.

    good luck for the future :)
     
    Vasudev likes this.
  30. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    Even most hardware companies say they use secret sauce on their hardware on specific hardware so you need Spl. sign to get it working. You just proved Infineon supplies generic TPM firmware for most hardware.
    I just made a modded BIOS to flash on my dell, guess what it bricked even when BIOS lock was disabled. Dell simply has added additional logic at FW level to stop Flash image writes that doesn't have or match the Hash/signing server.
    Good to know your Clevo uses generic drivers and firmwares.
     
    Falkentyne likes this.
  31. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    Did you see my edit? The signature thing was from the TBT firmware not the TPM...totally my bad!
    I was just feeling the need to reply via mobile to a file posted in my thread with missing instructions, while gaming all night...
    Point being of all my replies was the additional BIOS TPM reset required to clear the thing properly, which was provided in big red letters in the factory TPM update documentation warning us about the vulnerable keys being migrated if neglected. Anyway you are welcome for the latest TPM firmware and instructions. And don't worry I got them through proper channels and not by googling on the net...

    Clevo BIOS & TBT firmware are factory signed as well.
     
    Last edited: Feb 2, 2018
    steberg likes this.
  32. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    Is it AMI signing server or what?
     
  33. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    BIOS are signed by AMI, TBT are signed by Intel Israel. The annoying part about the TBT is that it can not be cross-flashed even to the same TBT chip model as it is motherboard specific.
    So while a P870DM may use the same TBT chip as the P750DM, you need to request an additional signed file.
    It's something I am fighting with atm to finally fill that blank section on the blog, hence me bringing it up accidentally out of context with the tpm stuff.
     
    Last edited: Feb 2, 2018
    steberg and Vasudev like this.
  34. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    Windows event says my TPM make is Intel, is it true?
     
  35. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    Probably, but I don't have service manuals for your Alienware...
     
    Vasudev likes this.
  36. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    Dell actually makes it publicly available. Anyway, what's TBT?
     
  37. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    Then just double check it there. Thunderbolt
     
    sicily428 and Vasudev like this.
  38. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    That I didn't know. Thanks.
    Did you get your hands on beta microcodes from Intel, does the performance really affects when CPU is loaded 100%. I had a issue where my CPU got into a deadlock state on 100% utilisation. I had to manually push the pwr button to switch it off and on to get it back to working state.
     
  39. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    They haven't frozen them yet and still advise vendor to downgrade to pre-fix revisions.
    I hope we get clearance next week as holding everything back is a royal waste of time...
     
    steberg, Papusan and Vasudev like this.
  40. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    Yeah, my argument was about the TPM signatures as they are signed by Infenion and all the details about TPM EK didn't make any sense.

    I understand and it is true that the user generated keys if not cleared will migrate and this is exactly how they should work..else a simple firmware or BIOS update will render a whole encrypted disk useless.

    The TPM user area can be cleared after a firmware update so if someone forgot to clear it, he can always do it after the update. Windows will give you an error if there is a problem clearing TPM using TPM.MSC or the command line. Some BIOS versions will prompt you after a software clear to press a key to continue and some will just boot up without any notification after a software TPM clear but if you you were using a fingerprint/PIN or disk encryption then they will stop working which will confirm that TPM was successfully cleared by software. For average joe user, best to follow vendor instructions I agree.

    I know you get things officially and go through a lot of testing so have no doubt about your sources or your mods :)
     
  41. W00d_m3

    W00d_m3 Notebook Enthusiast

    Reputations:
    10
    Messages:
    24
    Likes Received:
    14
    Trophy Points:
    6
    Just follow the readme.txt guide. Its all there

    I updated from 5.51.2098.0 to 5.63 without any issues!
     
    Prema likes this.
  42. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,050
    Messages:
    11,278
    Likes Received:
    8,816
    Trophy Points:
    931
    @Prema Thanks for the ME FW update, it worked splendidly. I made a guide for those using BGA Alienware's using Skylake HQ/HK users on 15 r2/17 r3.
    New BIOS for 15R2/17R3 v1.4.4
     
    Last edited: Feb 5, 2018
  43. Dennismungai

    Dennismungai Notebook Deity

    Reputations:
    785
    Messages:
    933
    Likes Received:
    867
    Trophy Points:
    106
    And this is double true if you use other facilities such as Intel's SGX.

    Intel ME is needed on production platforms.

    The HAP bit, even if set, is not some magic bullet that automatically disables ME. If unsure on how to proceed, consider disabling ME on consumer SKUs as deliberate crippling. For one, consumer SKUs do not have the management engine provisioned for AMT, making them immune to SOL attacks over the network.
     
    Prema and Vasudev like this.
  44. Dennismungai

    Dennismungai Notebook Deity

    Reputations:
    785
    Messages:
    933
    Likes Received:
    867
    Trophy Points:
    106
    And related, this thread on Reddit might help you to understand how and why System76 go "out of band" with their systems: https://www.reddit.com/r/pop_os/comments/6kn82m/ability_to_install_system76s_drivers_nvidia/djnbiuj/
     
    Prema and Vasudev like this.
  45. Dennismungai

    Dennismungai Notebook Deity

    Reputations:
    785
    Messages:
    933
    Likes Received:
    867
    Trophy Points:
    106
    Yes, see Prema Mod's Firmware Update section, and make sure to follow these steps without fail.
     
    Prema and Vasudev like this.
  46. Qadhi79

    Qadhi79 Notebook Geek

    Reputations:
    30
    Messages:
    75
    Likes Received:
    58
    Trophy Points:
    26
    You are late..I already updated mine and created a new thread for the update process

    Sent from my SM-G950F using Tapatalk
     
    Vasudev likes this.
  47. Dennismungai

    Dennismungai Notebook Deity

    Reputations:
    785
    Messages:
    933
    Likes Received:
    867
    Trophy Points:
    106
    Perfect, my bad. Good thread, OP.
     
    Prema and Vasudev like this.
  48. W00d_m3

    W00d_m3 Notebook Enthusiast

    Reputations:
    10
    Messages:
    24
    Likes Received:
    14
    Trophy Points:
    6
    hmscott likes this.
  49. Dennismungai

    Dennismungai Notebook Deity

    Reputations:
    785
    Messages:
    933
    Likes Received:
    867
    Trophy Points:
    106
    Vasudev likes this.
  50. Prema

    Prema Your Freedom, Your Choice

    Reputations:
    9,368
    Messages:
    6,297
    Likes Received:
    16,486
    Trophy Points:
    681
    We are testing for about a week now, but they haven't cleared them all, yet...
     
    Last edited: Feb 8, 2018
← Previous pageNext page →