Viktor Petersson logo

Podcast

Follow Me

Join Viktor, a proud nerd and seasoned entrepreneur, whose academic journey at Santa Clara University in Silicon Valley sparked a career marked by innovation and foresight. From his college days, Viktor embarked on an entrepreneurial path, beginning with YippieMove, a groundbreaking email migration service, and continuing with a series of bootstrapped ventures.

Unlocking Firmware Secrets with Christian Walter: BIOS Vulnerabilities & Security Insights

Play On Listen to podcast on YouTube Listen to podcast on Spotify Listen to podcast on Apple Listen to podcast on Amazon music
30 JUN • 2024 1 hour 4 mins
Share:

In this captivating episode of “Nerding Out with Viktor,” host Viktor Petersson sits down with Christian Walter, a renowned expert in firmware and IT security from 9Elements. With over six years of experience, Christian offers an unparalleled deep dive into the world of firmware, shedding light on the most pressing issues facing the industry today.

As they kick off the conversation, Christian shares his background, highlighting his role as the leader of the firmware development department at 9Elements and his involvement with ventures like a company focused on firmware testing and the Open Source Firmware Foundation. This glimpse into Christian’s expertise sets the stage for an engaging discussion that delves into the intricacies of firmware security.

The conversation takes a fascinating turn as Christian delves into recent high-profile firmware vulnerabilities, such as LogoFail and PixiFail. With his exceptional technical knowledge, he breaks down the technical aspects and broader implications of these vulnerabilities, underscoring the significant security challenges they present. Viktor and Christian engage in a thought-provoking discussion about the urgent need for improved security measures in firmware, making it an essential listen for anyone passionate about IT security.

The conversation then shifts towards the complexities of BIOS security, with Christian highlighting the reuse of code bases across vendors, the challenges in auditing, and the lengthy disclosure periods for firmware vulnerabilities. This insightful exploration of BIOS security provides listeners with a nuanced understanding of the industry’s current state and the pressing need for innovation.

As they delve deeper into the world of Trusted Platform Modules (TPMs), Christian provides an engaging overview of the different types of TPMs, their role in hardware security, and recent vulnerabilities. He shares a startling revelation about how attackers could unseal Intel TPMs by reassigning pins from user space, making it a must-listen for anyone invested in the future of firmware.

The conversation takes an exciting turn as Christian introduces the innovative Firmware CI project at 9Elements. This revolutionary project aims to transform firmware testing and validation by offering a user-friendly, scalable framework for continuous integration and testing on actual hardware. Viktor and Christian engage in a lively discussion about the importance of modern tooling in firmware development and how this project bridges the gap between traditional firmware practices and contemporary software development methodologies.

As the episode draws to a close, Christian shares his thoughts on the mission of the Open Source Firmware Foundation and its efforts to unite the industry in advancing open-source firmware. This inspiring conclusion underscores the potential for collaboration and innovation that exists within the world of firmware.

In this enlightening conversation, listeners will find valuable insights into the world of firmware security, BIOS complexities, TPM vulnerabilities, and innovative projects like Firmware CI. Christian Walter’s expertise shines through as he provides a unique perspective on the industry’s current state and its future possibilities. With Viktor Petersson at the helm, this episode is an absolute must-listen for anyone passionate about IT security, hardware, and the future of firmware.

Transcript

Show/Hide Transcript
[00:00] Viktor Petersson
Welcome back to another episode of nerding out with Victor.
[00:04] Viktor Petersson
Today I'm joined by Christian Walter from nine elements and many other things.
[00:09] Viktor Petersson
And today we'll be diving deep into the world of firmware and hardware.
[00:14] Viktor Petersson
So welcome to the show, Christian.
[00:16] Christian Walter
Hey, thanks.
[00:18] Christian Walter
Hi, Victor.
[00:19] Christian Walter
Thanks for having me.
[00:20] Viktor Petersson
So maybe for the audience, do you do a quick introduction to yourself so people understand a bit more your background and just paint a little bit of the conversation I guess we'll be having in the next 45 minutes an hour?
[00:33] Christian Walter
Yeah, sure.
[00:35] Christian Walter
Yeah.
[00:37] Christian Walter
My name is Chris, obviously, and I'm, you know, I've been around vmware for a couple of years now, six years, seven years now.
[00:46] Christian Walter
So my background is a little bit on it security.
[00:50] Speaker 1
Right.
[00:50] Christian Walter
I studied it security a decade ago now and, yeah, worked, but I was always amazed by hardware.
[00:59] Christian Walter
So I did like a lot of hardware security in terms of side channel techs and this kind of stuff, and then kind of emerged into the firmware space.
[01:08] Christian Walter
And since five, six years, I'm at nine elements now leading the department that does firmware development and also do a bunch of other things there.
[01:20] Christian Walter
So I founded another company now that does firmware testing as a product.
[01:26] Christian Walter
A couple of years ago, we founded the open Source Firmware foundation, which is a nonprofit organization in the US and all these kind of things.
[01:35] Christian Walter
So basically my day, my week, Monday to Sunday, that's all about firmware and everything in between.
[01:43] Christian Walter
And the focus is really on open source, pushing open source firmware forward.
[01:50] Viktor Petersson
That's kind of the amazing.
[01:53] Christian Walter
Yeah.
[01:53] Viktor Petersson
So I was introduced to you by David Hendricks from Coreboot and the reason why initially I wanted to have you on the show before knowing more about your background, which made me even more interested in having you on the show, was around bias security because I asked David, who I should speak to kind of chat about the whole new wave of bias vulnerabilities that we've seen in the last 18 months or so by now.
[02:22] Viktor Petersson
And your name came up as a good person that can both speak about it from a technical perspective, but it's also good at understanding the big picture of the whole ecosystem.
[02:32] Viktor Petersson
So maybe that's a good starting point.
[02:36] Viktor Petersson
So we've seen in last twelve months, we've seen logo fail, we've seen pixie fail.
[02:41] Viktor Petersson
Let's just start there.
[02:42] Viktor Petersson
Let's talk a bit about them.
[02:44] Viktor Petersson
How did they, what happened?
[02:47] Viktor Petersson
What are they?
[02:48] Viktor Petersson
Let's start with Logofell, perhaps just describing what that is and why it's so, I guess, so critical and.
[02:55] Viktor Petersson
Yeah, like why it really should be drawn more attention to.
[02:59] Christian Walter
Yeah, yeah.
[03:01] Christian Walter
Okay.
[03:01] Christian Walter
That's a lot of pressure now that you're bringing in here from David, right?
[03:05] Christian Walter
Yes.
[03:06] Christian Walter
So logo fail is a vulnerability that got, you know, recently published I think from binary really on a couple of firmware winners allow you to know, customize your bios, right.
[03:22] Christian Walter
Firmware that is basically, and how they, how you can do that is that if you boot up machines you probably want your own, you know, boot logo showed in the boot process.
[03:34] Christian Walter
Right?
[03:35] Christian Walter
So it's nice for, I don't know, corporate companies let's say, right, you're a big company and you want all your corporate machines having the same logos, right?
[03:44] Christian Walter
So you want customize that it's.
[03:47] Christian Walter
Right or it's nice for people like us, right.
[03:50] Christian Walter
You want your hacker logo shown why you're putting up your Lenovo instead of the red Lenovo sign.
[03:58] Christian Walter
And so, and these companies actually give you a way on how you could customize that by uploading basically images into the firmware, right.
[04:11] Christian Walter
Saying we have a couple of restrictions, it needs to be that in that format and that's the only restriction and resolution.
[04:24] Christian Walter
Probably two resolution.
[04:25] Christian Walter
Probably two, exactly.
[04:28] Christian Walter
However, there is a vulnerability in the parser of the images.
[04:36] Christian Walter
How that works is you write that into a specific partition in your firmware, in your flash drive where the firmware is stored and it picks it up from there and tries to display.
[04:49] Christian Walter
And while parsing it doesn't check the boundaries of the image.
[04:54] Christian Walter
It only cares about is it a png, is the file N png?
[05:00] Christian Walter
And if not, off you go.
[05:03] Christian Walter
This leads to that.
[05:07] Christian Walter
You can basically execute any code there because you can trick, you can work around the parser and you can basically execute code out of that memory space that is dedicated for that.
[05:23] Viktor Petersson
So you didn't even need to fake the mime type.
[05:25] Viktor Petersson
It's just so naive.
[05:27] Viktor Petersson
It just looks file extensions, that's how rudimentary these checks were.
[05:31] Christian Walter
Yes, exactly.
[05:34] Christian Walter
This is a huge problem and I think that has been there for many many years.
[05:40] Christian Walter
And this was recently discovered by binary, which is part of the, or who are part of the current development that so many vulnerabilities actually get exposed.
[05:56] Christian Walter
Right, because they are doing a pretty good job in actually doing.
[06:00] Viktor Petersson
Absolutely, yeah.
[06:02] Viktor Petersson
So that's, and the blast radius for this vulnerability is pretty massive, right, because it's basically game over once you can get to that level of intrusion in the device, right, exactly.
[06:14] Christian Walter
I mean if you think about it from a security perspective, right?
[06:17] Christian Walter
You have a couple of let's say measurements in firmware that you can then actually can do to counter any attacks that are happening in firmware.
[06:27] Christian Walter
There's like the whole secure boot process, right?
[06:29] Christian Walter
There's these, you know, into boot guard and all these kind of technologies that you have, however you circumvent all of them basically because you are not implanting anything in firmware as you're not overriding anything, but rather you're just executing it in memory.
[06:46] Viktor Petersson
Right.
[06:47] Christian Walter
And then, and that means it's really not preventable in that sense.
[06:52] Christian Walter
And you don't catch it with any other, with any of the technologies that are actually there.
[06:58] Christian Walter
So.
[06:58] Christian Walter
And this really like has a massive impact on your, on the security of your systems.
[07:04] Viktor Petersson
Right.
[07:04] Christian Walter
And as you said, I think all big ipvs basically were affected by that.
[07:11] Christian Walter
Right.
[07:12] Christian Walter
And then that shows you that some probably share the same code base, right.
[07:20] Christian Walter
So, and that's like a huge issue.
[07:22] Viktor Petersson
Right?
[07:22] Christian Walter
And this, this image pardon algorithm, let's say, that gets used on, you know, all platforms basically, right.
[07:30] Christian Walter
It's one of the core things basically that is, which is part of the value add that you get by going through these ipvs.
[07:40] Christian Walter
And that is really, that has a mess of it.
[07:44] Viktor Petersson
And that was something that came up in the episode I had with coreboot.
[07:50] Viktor Petersson
So with David and Matt.
[07:53] Viktor Petersson
And one thing I didn't really quite know about the bias structures is how much of this code base that is reused cross vendors.
[08:00] Viktor Petersson
So it's not just like AMi would have their set of binaries, they share across their biases, but it's almost like open source components that are dealt between vendors as well.
[08:11] Viktor Petersson
So the blast radius span so many vendors.
[08:16] Viktor Petersson
And to make matters worse, I guess at least from an audit perspective, is there's no easy way to tell if you were affected by it because there's no s bomb or something that you can say, oh, this component is used in my bios.
[08:30] Viktor Petersson
It's just like you were affected.
[08:32] Viktor Petersson
Maybe, maybe if you have a good bios vendor they will tell you.
[08:35] Viktor Petersson
But more often than not, if you bought your device through an ODM or some supplier, you would most likely not even know that you're available.
[08:45] Viktor Petersson
Right.
[08:45] Viktor Petersson
Which is biosecurity is fascinating that way.
[08:49] Christian Walter
Yeah, exactly.
[08:50] Viktor Petersson
Right.
[08:50] Christian Walter
And this is, I think David explained that pretty good in the other episode, right.
[08:54] Christian Walter
This is how because of the whole supply chain on what you have.
[08:59] Christian Walter
Right.
[08:59] Christian Walter
So, and actually there's an interesting paper from the uefi.org, right.
[09:05] Christian Walter
That talks about this as well.
[09:07] Christian Walter
But what they're trying to do is trying to make a case to.
[09:12] Christian Walter
So if you fight a CVE.
[09:14] Christian Walter
Right.
[09:14] Christian Walter
There's normally something like a 90 day period.
[09:17] Viktor Petersson
Right.
[09:17] Christian Walter
Where after 90 days it gets disclosed.
[09:20] Viktor Petersson
Right.
[09:20] Christian Walter
And, yeah.
[09:21] Christian Walter
You have to fix it for U of I security vulnerabilities.
[09:29] Christian Walter
It's 300 days.
[09:30] Viktor Petersson
Right.
[09:30] Christian Walter
So that's like, wow, three and a half.
[09:33] Viktor Petersson
Right.
[09:33] Christian Walter
Or something like that.
[09:34] Viktor Petersson
Yeah.
[09:34] Christian Walter
And that paper kind of talks about this.
[09:36] Viktor Petersson
Right.
[09:37] Christian Walter
Why this is exactly the case.
[09:39] Christian Walter
And this is because there are so many parties involved in that ecosystem.
[09:43] Christian Walter
That supply chain is so complex, basically that tracking down who owns the code.
[09:49] Christian Walter
Right.
[09:50] Christian Walter
And then it has to be fixed somewhere.
[09:52] Christian Walter
And then it has to kind of flow back through all the stations again until you can actually release it.
[10:00] Christian Walter
It takes so long that 300 days should be like the period until we disclose or they disclose these kind of things.
[10:09] Christian Walter
Right.
[10:09] Christian Walter
And that means a security issue that gets discovered now, right.
[10:14] Viktor Petersson
Yeah.
[10:15] Christian Walter
They fix it next year.
[10:16] Viktor Petersson
Right.
[10:17] Christian Walter
In March.
[10:17] Christian Walter
So this is, and this is pretty amazing.
[10:21] Viktor Petersson
Right.
[10:21] Christian Walter
And I think David really explained that a lot.
[10:24] Viktor Petersson
Right.
[10:24] Christian Walter
You got like the silicon vendors right there doing code.
[10:27] Viktor Petersson
Right.
[10:27] Christian Walter
You got like the ibvs, they do value audio.
[10:30] Christian Walter
The oems.
[10:31] Christian Walter
The Oems, right.
[10:31] Christian Walter
And then it goes happen, then you burn it on flash at the end.
[10:34] Christian Walter
And this is like, that whole chain is extremely complex.
[10:39] Christian Walter
Everything is proprietary in that.
[10:40] Christian Walter
Right.
[10:41] Christian Walter
Sharing code is really sometimes on a zip file basis and this kind of stuff.
[10:47] Christian Walter
So that supply chain is brutal.
[10:50] Christian Walter
And if you find an issue there, it has a huge impact because fixing that issue takes so much time and so much effort that sometimes it's not worth it in that sense, because they say, okay, it's an ado machine, whatever.
[11:07] Viktor Petersson
And also one thing that was fascinating to me is the amount of regressions you're dealing with as well, because you might fix something, but then because things are not version, we're not talking to git repo here.
[11:18] Viktor Petersson
The most sophisticated vendors, they might have a git repo for their source code, but so much of this just dealt with files on some file share.
[11:26] Viktor Petersson
So you pick that and you patch it, but then you forgot the other patch and then you have a regression instead, right?
[11:31] Christian Walter
Yes, yes.
[11:32] Viktor Petersson
Yeah.
[11:33] Christian Walter
I mean, we're all humans, right?
[11:34] Christian Walter
And naturally we make these mistakes.
[11:36] Christian Walter
Right?
[11:37] Christian Walter
Yeah.
[11:38] Christian Walter
But we have some tooling that could help us to prevent these kind of things.
[11:43] Christian Walter
And I want to dive.
[11:44] Viktor Petersson
Yeah, I want to dive into that in a second.
[11:46] Viktor Petersson
I want to kick that kind of liver down the episode.
[11:48] Viktor Petersson
But, yeah, absolutely.
[11:49] Viktor Petersson
That's, that's another thing that I wanted to cover here.
[11:51] Viktor Petersson
So the other thing is pixie fail, which is another one that happened.
[11:57] Viktor Petersson
I think it was disclosed what, three months after logo fail or something along those lines I would imagine.
[12:04] Viktor Petersson
Talk a bit more about what that is and how that attack vector looked like.
[12:10] Christian Walter
Yeah.
[12:10] Christian Walter
So pixie fail, I think it's a bunch of vulnerabilities.
[12:13] Christian Walter
I think they released nine in total or eight.
[12:18] Christian Walter
Eight or nine in total.
[12:19] Viktor Petersson
So it was a chained attack.
[12:21] Christian Walter
No, it's different vulnerabilities that have impacts basically, but they kind of all, I guess explore the same concept, let's say as probably know how to pixie boot a device, right.
[12:36] Christian Walter
So that's kind of the DHCP server.
[12:40] Christian Walter
So it's basically network booting.
[12:41] Viktor Petersson
Right.
[12:42] Christian Walter
That's like the core thing on pixie booting and what happens under the hood is the DHCP server when they send out their responses.
[12:51] Christian Walter
Basically there are fields in that response that tell your device where the PKC server is.
[13:00] Christian Walter
So where can I load my images from and this kind of things.
[13:03] Christian Walter
And there again, Washington, you could craft a DHCP message that when the, when your firmware parses this message you can kind of escape the parlor and do code execution again because they're also, again, we didn't check for, or they didn't check for boundaries correctly and you're kind of escaping that and can basically execute everything.
[13:33] Christian Walter
And the crucial thing here is you don't have to have access to the device rather to the network.
[13:40] Christian Walter
Right.
[13:40] Christian Walter
This is kind of, which makes it for me at least a little bit more critical in that sense because for logo failed you have to have access to the device and probably elevated access in terms of you need to be able to run the tooling that you can update the boot logo for Pixie fair.
[14:04] Christian Walter
You don't have to do that.
[14:05] Christian Walter
You have to be, you know, part of the network and you have to be able to send these messages out and so on and so forth.
[14:12] Christian Walter
And, but this gives you just like whole other privileges that you need basically, and access that you need to device.
[14:21] Christian Walter
Right.
[14:21] Christian Walter
And it's basically remote code execution which is pretty brutal, right?
[14:26] Viktor Petersson
Yeah.
[14:27] Christian Walter
Again it's, I think the vulnerability was found in the upstream EDK tool repository and EDK two is an open source implementation of the UFI spac and that also gets consumed by the SoC vendors and then again drips down the supply chain basically and lands in your device.
[14:55] Christian Walter
And that's again one of these attacks that has huge blast of, you know, really everyone is affected on that and we need to fix the supply chain, you know, walking up the whole thing chain, fix up the upstream repos and then it kind of drips down into each and every device.
[15:15] Viktor Petersson
And was this an attack vector purely exploitable by the fact that I guess most modern motherboards have built in NIcs on the motherboard.
[15:27] Viktor Petersson
If you had say an external network interface, would you still be vulnerable?
[15:33] Viktor Petersson
Or is that kind of like that tag vector is that you get in and because it's kind of in the biospace so to speak, why it's vulnerable or is that unrelated entirely?
[15:43] Christian Walter
I think it's not related to if you have a NiC on board or if you have a separate PCI card that has a NIC on it.
[15:51] Viktor Petersson
Right.
[15:51] Christian Walter
Because once you, I mean, UEFI is a whole operating system basically, right?
[15:56] Christian Walter
You have all the drivers available.
[16:00] Viktor Petersson
You.
[16:00] Christian Walter
Have all nics available most of the time.
[16:03] Christian Walter
You have all the USB ports available.
[16:05] Christian Walter
So basically you could also, if you have these USB dongles that you can plug in the network cable, you can basically boot from that as well.
[16:15] Christian Walter
It's really not bound to one of the nics.
[16:19] Christian Walter
You can in firmware, of course you can dictate everything and said, okay, we only do pixie boot from that specific nic.
[16:27] Christian Walter
This is for sure possible.
[16:30] Christian Walter
However the attack itself is not limited to that.
[16:35] Viktor Petersson
Right.
[16:35] Viktor Petersson
So it's just a channel into the BIOS essentially boots into a special boot shell essentially that you then have direct access to the BIOS essentially, yeah.
[16:44] Viktor Petersson
Okay.
[16:45] Viktor Petersson
Okay, so the most interesting question to me when we look at both logofile and Pixi fail is why now?
[16:53] Viktor Petersson
We've been having biases for ages.
[16:56] Viktor Petersson
But then over the span of eight weeks, eight months or six months, whatever it was between them, we had two that are like, holy shit.
[17:05] Viktor Petersson
Vulnerabilities in the BIOS space after.
[17:08] Viktor Petersson
I think Logofair was the first real severe BIOS vulnerability that I ever heard of.
[17:14] Viktor Petersson
And now we have two in the span of like six to eight months.
[17:17] Viktor Petersson
So why now?
[17:17] Viktor Petersson
What changed?
[17:18] Viktor Petersson
Is it just more eyes on it?
[17:19] Viktor Petersson
Is there something that changed in general or.
[17:22] Viktor Petersson
Yeah, what do you make out of that?
[17:25] Christian Walter
I think it's more eyes on it.
[17:27] Viktor Petersson
Right.
[17:27] Christian Walter
So really I do see that.
[17:32] Christian Walter
So for a very long time, firmware, you know, had one job, right?
[17:35] Christian Walter
Boot up the device.
[17:36] Christian Walter
That's right.
[17:37] Christian Walter
And no one cared about it.
[17:39] Viktor Petersson
Right.
[17:39] Christian Walter
You have it there, right.
[17:40] Christian Walter
Everyone cared about.
[17:42] Christian Walter
Once you hand it off to the bootloader or to your operating system, you know, you care about that stack basically that is running there.
[17:47] Christian Walter
Everyone tried to make that as secure as possible, as open as possible.
[17:51] Christian Walter
But firmware was just there, I think, and it was just, you know, it had the job on booting the device that.
[17:59] Viktor Petersson
Right.
[18:00] Christian Walter
And I think the us government, you know, made was there was like a presidential act that stated firmware is critical software.
[18:12] Christian Walter
Right, right.
[18:13] Christian Walter
We should look at it, right.
[18:14] Christian Walter
And there's this nisten, I think it's called the NIST 800 paper or guidelines, which kind of stack.
[18:22] Christian Walter
Okay.
[18:23] Christian Walter
We need to take care more security firmware.
[18:26] Christian Walter
Right.
[18:26] Christian Walter
There should be certain things that firmware needs to deliver.
[18:30] Christian Walter
Right.
[18:30] Christian Walter
Or there are certain promises that firmware needs to stand upright.
[18:33] Christian Walter
So you need to be able to downgrade, upgrade and all these kind of things, transfer of ownership and so on and so forth.
[18:42] Christian Walter
That whole topic just gets more attention.
[18:44] Viktor Petersson
Right.
[18:44] Christian Walter
There are a couple of companies, binary for example, did like a huge financial round, right.
[18:52] Christian Walter
And did some marketing around there, finding exploits and this kind of stuff.
[18:58] Christian Walter
So there's really more going on in that space, I think.
[19:02] Christian Walter
Right, so firmware.
[19:03] Christian Walter
But firmware attacks themselves, right?
[19:05] Christian Walter
They're here for years already.
[19:06] Christian Walter
Right?
[19:07] Christian Walter
Yeah, I saw, I think I saw a talk about 1012 years ago where they were attacking AMD Cube, this kind of things, right?
[19:18] Christian Walter
So, yeah, it's there for a very long time.
[19:21] Christian Walter
I just think that people care more about it now, right.
[19:25] Christian Walter
Because it slowly drips down into the brains of the people that security starts in firmware, right.
[19:34] Christian Walter
It has to, because everything is rooted there.
[19:36] Christian Walter
And if you don't take care of that part and do it in a right way, basically, then it will get you.
[19:43] Viktor Petersson
Right.
[19:43] Christian Walter
And there's no way to circumvent that.
[19:46] Christian Walter
There's no way against this.
[19:47] Christian Walter
So I think that's, for me at least one of the main reasons.
[19:53] Viktor Petersson
Yeah, I mean, that's the reason why at least I got excited about things like coreboot and various tool open source buyers and all these things like last year when you started to look into exactly this user space.
[20:09] Viktor Petersson
Security is completely moot if you can't protect the first boot process and biases and all things firmware, really.
[20:17] Viktor Petersson
So I think it's very good that we've seen a lot more attention drawn towards this in particular around tpms as well, because that's tightly coupled with the bias, at least with discrete tpms.
[20:32] Viktor Petersson
So maybe that's a good segue into tpms because I saw a post, you post on LinkedIn the other day, which I think was really interesting about Intel TPM attacks.
[20:40] Viktor Petersson
But maybe let's start with a TPM like what's the primer like?
[20:43] Viktor Petersson
Talk about the different types of tpms, and then we can dive slightly deeper into this news that you shared with these attack vectors.
[20:54] Christian Walter
So TPM itself is a trusted platform module.
[20:57] Christian Walter
So.
[20:57] Christian Walter
And what it is, it's a specifically hardened chip, let's say, which should anchor your security, right?
[21:07] Christian Walter
So the idea is that, okay, all you have on your normal cpu and whatsoever, right, that's like general proposed stuff.
[21:16] Christian Walter
And you need to have something that is specially made for security, which is tamper proof, at least tamper evident things.
[21:25] Christian Walter
When it comes to security, you probably need that.
[21:28] Christian Walter
So you use that as anchor for your whole boot process.
[21:32] Christian Walter
If you think about booting a platform, it's always that you need some kind of anchor or root of trust where you start from.
[21:40] Christian Walter
There's always something that you need to trust.
[21:43] Christian Walter
There's basically no way around it.
[21:46] Christian Walter
There's always something that you need to trust.
[21:47] Christian Walter
And then you build up your chain of trust basically from there.
[21:53] Christian Walter
And the TPM has a couple of interfaces to your cpu, let's say.
[22:00] Christian Walter
And from a functionality point of view, you can actually measure things into a TPM.
[22:06] Christian Walter
So there are a couple of registers in the TPM.
[22:09] Christian Walter
And how that works is you basically write a hash to the TPM.
[22:16] Christian Walter
And what it does under the hood is it takes the value of the register that is already there, concatenate the new hash with it, and hash it all together again, so that you just do not just copy hashes over, but this should prevent replay attacks in that sense of.
[22:38] Christian Walter
And yeah, so you have these couple of registers, you have like an NVRAm where you can store stuff.
[22:45] Christian Walter
And TPM has a couple of functionalities that you can use to do that.
[22:51] Christian Walter
And there's of course like a discrete TPM, which is like a dedicated chip, right, that you have there.
[22:57] Christian Walter
There are firmware tpms which are, for example, intel provides that they have in the intel me, right, they have a software emulated TPM, basically that you can use, or you can use root of trust modules, which are more than just the TPM.
[23:20] Christian Walter
They provide a little bit more functionality around to basically secure your boot process.
[23:29] Viktor Petersson
And so this vulnerability that you mentioned was in that LinkedIn post, maybe talk a bit about that.
[23:36] Viktor Petersson
But intel tpms being essentially you could unseal the Intel TPM by reassigning some pins from user space.
[23:44] Viktor Petersson
So maybe that, I think that was fascinating.
[23:47] Christian Walter
Yeah.
[23:48] Christian Walter
So the concept of sealing and unsealing secrets in tpms is basically.
[23:53] Christian Walter
So we have a bunch of registers that what I explained before.
[23:56] Christian Walter
Right, where you can measure things into.
[23:59] Viktor Petersson
Right?
[23:59] Christian Walter
So you write hash waves into that, get conkey, they get updated.
[24:04] Christian Walter
And the process of sealing and unsealing is that you can put a secret key into the TPM and seal it against the current values of the pcrs.
[24:15] Christian Walter
These are how these registers are called, right, and they call platform configuration registers.
[24:21] Christian Walter
And so that means you have to imagine that like a lock, right?
[24:24] Christian Walter
And you have like all the numbers, right, basically on them.
[24:28] Christian Walter
So you have like 61160, right?
[24:30] Christian Walter
And that's.
[24:31] Christian Walter
And you see your secret key again.
[24:34] Christian Walter
And to unseal that key again from the TPM, that would only work if you have the same PCR values again and you can unsee it, right?
[24:46] Christian Walter
And this is essentially how bitlocker works from windows, right?
[24:49] Christian Walter
So if you boot into windows, there's Bitlocker, which has like, which encrypts your whole hard drive.
[24:55] Christian Walter
And they measure, firmware measures the boot process, right?
[25:00] Christian Walter
So you always take the chunk of the code, put that into the TPM, right, and they sealed a key prior in the TPM.
[25:08] Christian Walter
And if all the registers are right, so that means your firmware is in the state that you want it to be, and they unseal it, right, and then boot it.
[25:17] Christian Walter
And this, the TPM itself is connected to pins to your, you know, to your SoC.
[25:27] Christian Walter
The SoC has to have a way, you know, there's like LPC or Espy to actually talk to that TPM, right?
[25:34] Christian Walter
And send these measurements over.
[25:36] Christian Walter
And on intersocs, you have a couple of gpios, right?
[25:41] Christian Walter
And they have, they are multifunction gpios.
[25:45] Christian Walter
So these gpios have multiple functionalities.
[25:49] Christian Walter
So they can either be an espy reset line or they can be anything, something else.
[25:57] Christian Walter
And you can basically define that on what you want that to be.
[26:01] Christian Walter
And what that guy found out in the article that I posted there was that majority of the firmwares, or he couldn't find any that are actually locking down the GPIO configuration.
[26:14] Christian Walter
So this is written in firmware, but it needs to be locked down saying, okay, this cannot be changed anymore.
[26:21] Christian Walter
And then this is not done on more or less any of the devices.
[26:26] Christian Walter
So that means you can reset the TPM at any state, and you can basically try to replay the, writing the hashes again into the TPM, try to replay what the firmware actually does, and then kind of unseal what secrets are in the TPM.
[26:48] Christian Walter
And you can do that from the operating system, because intel gives you guidelines on how to lock this configuration down.
[26:58] Christian Walter
But if you haven't done that.
[27:00] Christian Walter
You can do that from the operating system.
[27:02] Christian Walter
And so whatever is in your TPM that's not safe anymore.
[27:06] Christian Walter
And imagine you have access to one device where TPM is basically attached to.
[27:15] Christian Walter
If you can boot into any other live operating system whatsoever, you just reset the TPM and replay the whole thing and get the key out of it.
[27:26] Christian Walter
And then you can boot into your other operating system which is basically encrypted maybe, or for whatever you use the key for.
[27:35] Christian Walter
And then you have it.
[27:35] Viktor Petersson
Right.
[27:36] Christian Walter
Because normally you store something like a symmetric key.
[27:39] Viktor Petersson
Yeah.
[27:42] Viktor Petersson
So that means that screenly we use the tpms for our mtls, that's where we store the private key for all mtls.
[27:51] Viktor Petersson
So that means that if you're vulnerable to this kind of attack vector, you could extract that private key and you could mimic mtls or not mimic even, you would actually do proper mtls traffic based on that private key and mimic the device.
[28:06] Viktor Petersson
But I guess it also means that it completely spans encryption technologies, I guess in the sense that it spans encrypted technologies in the sense that it doesn't matter if you're using looks or something on Linux stack, if it's Bitlocker, it's all the same under the hood.
[28:24] Viktor Petersson
It's just some kind of certificate that you have or privacy that you have stored in there, which makes it kind of terrifying from attack vector.
[28:32] Viktor Petersson
Right, yeah, exactly.
[28:33] Viktor Petersson
Right.
[28:34] Christian Walter
And this is someone just handed you over the key.
[28:37] Viktor Petersson
Right.
[28:37] Christian Walter
It doesn't matter, you know, whatever you have afterwards.
[28:39] Viktor Petersson
Right.
[28:39] Christian Walter
You have the secret.
[28:41] Viktor Petersson
Right.
[28:41] Christian Walter
And this is.
[28:42] Viktor Petersson
Yeah.
[28:43] Viktor Petersson
Your cipher or how you encrypt, it doesn't really matter at that point.
[28:46] Christian Walter
Yeah.
[28:47] Christian Walter
Right, right.
[28:48] Christian Walter
It really doesn't matter anymore.
[28:49] Viktor Petersson
Right.
[28:49] Christian Walter
So if someone handed you the keys, you know, to my house.
[28:52] Christian Walter
Right.
[28:53] Christian Walter
The lock doesn't matter anymore.
[28:54] Christian Walter
Yeah, you got the key.
[28:57] Christian Walter
So, and this is why it's, it's for me I think critical.
[29:00] Christian Walter
And what I find even more astonishing is, you know, he explains, you know, in the article, you know, on how it works and you know, what he did to actually, you know, find that out and he, you know, he contacted intel.
[29:16] Christian Walter
Right, saying I found this.
[29:19] Viktor Petersson
Right.
[29:19] Christian Walter
And I think it's a security issue.
[29:22] Viktor Petersson
Right.
[29:23] Christian Walter
And inter kind of responded.
[29:25] Christian Walter
Yeah, no, we have in the BIOS writer guide which you have on the NDA, there's a section which says this is how you lock it down if you don't do it.
[29:36] Viktor Petersson
Right.
[29:36] Christian Walter
That's not our problem anymore.
[29:37] Christian Walter
So there's no CVE for that.
[29:42] Christian Walter
And then they agreed on the disclosure date, right.
[29:45] Christian Walter
And he said, okay, I think, like two months ago or something like that.
[29:48] Christian Walter
He said, yeah, I will disclose things June 1.
[29:51] Christian Walter
And everyone was like, yep, fine, right.
[29:53] Christian Walter
And then.
[29:54] Christian Walter
And then there was no disclosure process.
[29:56] Christian Walter
And this is.
[29:58] Christian Walter
I don't know.
[29:58] Viktor Petersson
Right.
[29:59] Christian Walter
So I would have hoped for more responsibility on, you know, on an intern side, saying maybe it's not our problem, right.
[30:05] Christian Walter
But we are getting in the people because we see in the wild, no one is doing that.
[30:10] Christian Walter
Right.
[30:11] Christian Walter
So we are going to our vendors saying, this is an issue, guys, can we fix that up?
[30:18] Viktor Petersson
It basically comes down to sensible defaults at the end of the day, why is this a default configuration when it will have massive security implications for the vast majority of the odms and oems that do not reconfigure these super low level settings?
[30:39] Viktor Petersson
So I guess that brings me over to one of the projects that you've been working on, the firmware CI project.
[30:46] Viktor Petersson
So maybe we can speak a bit about that and speak a bit about what it is in the first place, how that fits into trying to solve for problems like this and similar attack vectors in general, and bringing modern tooling into the firmware world, I guess.
[31:02] Christian Walter
Yeah.
[31:03] Christian Walter
So, I mean, nine elements is an ifv, right?
[31:09] Christian Walter
That's how we call independent.
[31:12] Christian Walter
And while we work on a lot of firmware and with a lot of customers, we notice that not a lot of customers actually have a proper CI system for their firmware, because firmware is.
[31:28] Christian Walter
Because firmware is the first code that starts on every device.
[31:30] Christian Walter
So that means there is no abstraction layer between firmware and the hardware, because firmware is the abstraction layer.
[31:39] Christian Walter
But everything that you test on the operating system run on the operating system.
[31:42] Christian Walter
You have an abstraction layer, drivers that abstract the hardware for you and for firmware, that's just not possible.
[31:50] Christian Walter
So that means firmware has to be tested on hardware.
[31:54] Christian Walter
There's no way around it.
[31:56] Christian Walter
So you can test limited things, you know, in QMU and this kind of things, right.
[32:02] Christian Walter
And if you have enough money and people, you can write your own simulator for your hardware that you build.
[32:07] Christian Walter
But if you are a normal company, that's kind of out of scope.
[32:10] Viktor Petersson
But even if you do, like, you're still building those assumptions.
[32:15] Viktor Petersson
Assumptions essentially.
[32:16] Viktor Petersson
So it's still not as valid.
[32:18] Christian Walter
Of course.
[32:18] Christian Walter
Yeah, of course.
[32:19] Christian Walter
I mean, you get certainty, I think, to a very high degree.
[32:22] Viktor Petersson
Right.
[32:22] Christian Walter
If you build your own simulator.
[32:25] Christian Walter
But, yeah, it's not the real deal.
[32:26] Viktor Petersson
Right.
[32:27] Christian Walter
Because in the end it has to.
[32:30] Christian Walter
And, yeah, that's why we thought of.
[32:32] Christian Walter
Okay, maybe we can come up with a test framework that makes this easier.
[32:38] Viktor Petersson
Right.
[32:38] Christian Walter
So certainly there are test frameworks already out there, a lot of out there.
[32:43] Christian Walter
And, you know, some are used for testing firmware, right?
[32:48] Christian Walter
So there's the open BMC test automation.
[32:51] Viktor Petersson
Tool.
[32:53] Christian Walter
And other things that you can actually test firmware with.
[32:57] Christian Walter
However, my view on this was always, okay, it has to be easy for the end user.
[33:03] Christian Walter
So the end user is the guy or the girl that we're actually working with, and he or she needs to be able to easily set up the whole thing and write tests and things.
[33:13] Christian Walter
So we built a framework that makes this much easier.
[33:19] Christian Walter
And we.
[33:20] Christian Walter
It's a server client model, right.
[33:22] Christian Walter
And the server orchestrates everything and the client is there to interface with the hardware.
[33:29] Christian Walter
Right.
[33:30] Christian Walter
So if you have a new image, you write to it, you get like the serial logs or you get display output or whatever you have from the device under test, and you perform your tests.
[33:44] Christian Walter
And with that, we saw that this is useful for us, nine elements in the first place, because this really helps us scale better.
[33:57] Christian Walter
And we also see that for customers that there was a need actually that they wanted to have that, because reality was the customers that we talked to, a lot of them do manual testing.
[34:12] Christian Walter
We are talking to one company that every, they're not even doing firmware development, but they want to validate the firmware that is running on their devices.
[34:20] Christian Walter
Right?
[34:20] Christian Walter
So that means when they get a new firmware drop from their, you know, OEM, dell, Inovo, whatever, they want to put that on the machines, and then they have like tests that they want to run on that seeing, you know, does this, does everything still make sense?
[34:35] Christian Walter
Right?
[34:35] Christian Walter
Is it configured the way that we want it to be?
[34:37] Christian Walter
Right.
[34:38] Christian Walter
Can I switch the variables that if I turn on secure boot, can I still turn on things on and off, or is that prohibited the way it should be made?
[34:52] Viktor Petersson
So basically writing unit tests against hardware.
[34:55] Viktor Petersson
Essentially, yeah.
[34:56] Christian Walter
Right, right.
[34:57] Christian Walter
You could say that.
[34:58] Christian Walter
And that helped them.
[35:00] Christian Walter
For example, that was like a process for each firmware drop, for each hardware.
[35:04] Christian Walter
Five days, one guy kind of sitting there and trying to do all the tests.
[35:12] Christian Walter
You know, I have some extra seats and this kind of stuff and writing it all down.
[35:15] Christian Walter
And they automated the whole thing down to 36 hours, 40 hours, because the test still need to run.
[35:23] Viktor Petersson
Right.
[35:23] Christian Walter
This takes time, but no one needs to sit there.
[35:28] Christian Walter
And that was like the overall goal that we are aiming for.
[35:32] Christian Walter
And it's starting out pretty good because we see a lot of feedback that this is something that people want and that they help them.
[35:42] Christian Walter
Everything is very user friendly.
[35:46] Christian Walter
I think that's what we're trying to do is here really the tools that have been used for many years already on the higher level stacks, websites development and back end frontend.
[36:02] Christian Walter
If you write an iOS application, I think you have a whole simulator and you run tests all over again.
[36:09] Christian Walter
And this kind of stuff for firmware that's just not there.
[36:12] Christian Walter
And so we try to break that and say, okay, there's an easy way to do that.
[36:17] Christian Walter
We still need hardware for sure, but you can easily get.
[36:22] Viktor Petersson
Yeah, I think that has been a recurring theme in a lot of the episodes that we've done around hardware is around fact that hardware firmware build development, testing and distribution is really just so far behind modern software development.
[36:39] Viktor Petersson
Like it's like it's kind of the works on my machine kind of setup for a lot of these.
[36:44] Viktor Petersson
Like some guy built the firmware on his machine, sent it to some file share and then well that's a release and that's just obviously miles away from how like away from how modern software development is done in general.
[37:00] Christian Walter
Totally.
[37:00] Christian Walter
And I mean, and this is not Joe, right.
[37:03] Christian Walter
Zip fights is still like one of the standards, right?
[37:06] Christian Walter
And this is, I don't know, you are getting, you know, I'm panicking, right.
[37:13] Christian Walter
Sometimes if I see that saying this is like where the world runs on, right?
[37:18] Christian Walter
And with all the cloud stuff that is happening nowadays, right, with all the push to AI now where this, all the whole infrastructure gets, just gets more and bigger, right?
[37:30] Christian Walter
And there's still, you know, two people sitting there.
[37:33] Christian Walter
I don't say that they're not smart people, right?
[37:35] Christian Walter
They're probably good, but still two people sitting there, right, for I principle sending zip files with the dash underline, you know, find or whatever, right?
[37:45] Christian Walter
So, and this is, yeah, and we have to think about that, right?
[37:48] Christian Walter
If we make want to lift that into 2024 and say let's do modern software development.
[37:55] Viktor Petersson
Yeah.
[37:56] Viktor Petersson
And I think I remember first exposure that I had to working with firmware or even embedded code base was like modern coding principles like linting your code base.
[38:07] Viktor Petersson
And these things are like, they are completely foreign concept and like unit testing, they were like completely foreign concept for the traditional firmware developer, right?
[38:15] Viktor Petersson
And that's kind of like it's terrifying when you do see the real implication of that with things like poke, pixie fail, logo fail, all these problems, right?
[38:24] Christian Walter
Yeah, totally.
[38:25] Christian Walter
I mean to be fair, right, for example, unit tests are hard also in feature sometimes, right?
[38:32] Christian Walter
It really?
[38:33] Christian Walter
Because for unit test you need to also be able to abstract interfaces.
[38:38] Christian Walter
Right.
[38:39] Christian Walter
To any other hardware that you have.
[38:42] Christian Walter
And this is not easily possible in firmware always, right?
[38:46] Christian Walter
It's not always easily possible, right.
[38:47] Christian Walter
So UEFI, in UFi it's better possible because they have these protocols and these handles and can easily hand that in for coreboot, for example.
[38:59] Christian Walter
That's also harder, right.
[39:00] Christian Walter
Because we have a different concept on how we access the hardware.
[39:07] Christian Walter
There are efforts and we have unit testing for parts of the code, but some parts are just not effectively, just not possible.
[39:18] Christian Walter
And then the only way is testing on real hardware.
[39:21] Christian Walter
And then I think you need something that you can easily get going.
[39:24] Christian Walter
Instead of everyone writing their own python or bash scripts again, you try to punch that into your own GitLab runner and see how then someone else does something else again.
[39:37] Christian Walter
And if we can unify on that a little bit, I think that's good.
[39:41] Viktor Petersson
I mean, we've had the same exact problem at screenly, right?
[39:44] Viktor Petersson
Like we build a device that's an end to end device that does something on a screen, but like doing that in automated end to end fashion is very difficult because like you basically end up having to like do some kind of HDMI capturing device, do assertion on the image.
[40:00] Viktor Petersson
It gets very complicated very quickly to do that well at scale.
[40:06] Viktor Petersson
Right.
[40:06] Viktor Petersson
Because you are chested across like ten different types of devices.
[40:09] Viktor Petersson
Well, that gets very difficult very quickly.
[40:12] Christian Walter
Yeah, totally understand that.
[40:13] Viktor Petersson
Right.
[40:13] Christian Walter
And finger.
[40:15] Christian Walter
It's exactly the same problems.
[40:17] Christian Walter
Right.
[40:18] Christian Walter
And for example, to give you an example, right, when we do this firmware validation, basically.
[40:25] Christian Walter
So what we're doing is we, for example, testing secure boot and we are also enrolling broken certificates.
[40:33] Christian Walter
So we're trying to see if the machine recognized that.
[40:37] Christian Walter
And from time to time we are breaking the machines along.
[40:41] Christian Walter
And then you have, depending on the vendor that you're working with, there's a more or less complicated process which involves copying over text from the screen and punching it into the third party tool and then getting the secret again and punching that into the device again and so on and so forth.
[41:01] Christian Walter
So you need to screen capture, right.
[41:03] Christian Walter
You need to be able to read the text that is actually displayed on the screen.
[41:07] Viktor Petersson
Right.
[41:07] Viktor Petersson
So you have serial console capturing probably as well.
[41:10] Viktor Petersson
Yeah.
[41:11] Christian Walter
And this is, and it's insane how complex this kind of stuff is, actually.
[41:16] Viktor Petersson
Yeah.
[41:17] Christian Walter
And I of course understand that this is a hard thing to do.
[41:21] Christian Walter
Right.
[41:21] Christian Walter
Think that working with hardware is indeed hard, right?
[41:25] Viktor Petersson
Yes.
[41:27] Christian Walter
And I think everyone that works in the hardware field kind of agrees with that.
[41:31] Christian Walter
And sometimes I would wish for a much higher level stack.
[41:36] Christian Walter
But yeah, that's what it is.
[41:38] Christian Walter
And we just have to make it more easy for people to use that because I think it all comes down to usability and how low can you actually put the barrier for people to, you know, get into that?
[41:51] Viktor Petersson
Absolutely.
[41:51] Christian Walter
This is part of the problem.
[41:52] Christian Walter
Why, why really the whole security is in such a crucial state.
[41:57] Christian Walter
Let's say because the barrier is so high and everyone is looking on the budget.
[42:03] Christian Walter
Right.
[42:03] Christian Walter
There's always of course, no budget for testing and especially this extensive testing that you have to do on hardware.
[42:12] Christian Walter
Everything, you know, is cost, if cost intensive to set up and so on and so forth.
[42:19] Christian Walter
That's like a huge pain.
[42:20] Christian Walter
Right.
[42:21] Christian Walter
And we have to really look into that and see how we can solve that.
[42:25] Christian Walter
Absolutely.
[42:26] Viktor Petersson
So looking back a little bit, what we spoke about a few minutes ago about the push towards security in software and it seems like a lot of these pushes, they've come from the executive order.
[42:39] Viktor Petersson
It seems like that was like the first like force for hardware vendors to actually, I guess take security serious.
[42:46] Viktor Petersson
Right.
[42:47] Viktor Petersson
And it seems to kind of go hand in hand with the whole s bomb requirements as well.
[42:53] Viktor Petersson
And I think that has kind of shook in the hardware industry significantly.
[42:58] Viktor Petersson
And I've had quite a few conversations with BIOS vendors and firmware vendors that are really like, they are, it was a rude awakening for them to like really get into like, oh, we actually need to start doing this now.
[43:11] Viktor Petersson
It's like secure has been brushed under the rug for decades and now it's like these are smart people.
[43:17] Viktor Petersson
They knew they had a problem, right.
[43:18] Viktor Petersson
That just was never prioritized.
[43:21] Viktor Petersson
But now with these new mandates from the us government and you see the same thing in other like follow on legislation in other countries.
[43:30] Viktor Petersson
But that's, it seems that was the tipping point that was needed for people to start paying attention, I feel.
[43:37] Viktor Petersson
Yddeh I'm usually not one for over regulation, but security feels like one of these spaces where it was needed to change the status quo to get to where we actually need to go.
[43:51] Viktor Petersson
Right.
[43:52] Viktor Petersson
It's almost like where the invisible hand will fail otherwise because there is no market.
[43:58] Viktor Petersson
Well, there's no demand otherwise.
[43:59] Viktor Petersson
Otherwise it's a race to the bottom.
[44:00] Viktor Petersson
Right?
[44:02] Christian Walter
Yeah, but sometimes I think these things have to come basically top to bottom.
[44:07] Viktor Petersson
Right?
[44:07] Christian Walter
Let's say like that because security is always like why do people do security, right.
[44:15] Christian Walter
I mean, why do you care about security?
[44:17] Viktor Petersson
Yeah.
[44:17] Viktor Petersson
Right.
[44:18] Christian Walter
And you don't.
[44:20] Viktor Petersson
Right.
[44:20] Christian Walter
The majority of the people don't care about it, right.
[44:23] Christian Walter
So it either has to be, you have to be, you know, compliant with something, right.
[44:31] Christian Walter
Very little part of, you know, of the developers or, you know, companies or whatever do security out of their own strong belief that it has to be like that, right.
[44:42] Christian Walter
Most of the people is, okay, we need to be compliant with that, right.
[44:45] Christian Walter
Because someone else is dictating that on us.
[44:46] Christian Walter
Right.
[44:47] Christian Walter
And if we don't, if we're not compliant, we're not able to sell it.
[44:51] Christian Walter
And that's the main driver along, you know, with all of these kind of things.
[44:56] Christian Walter
And yes, it's, you know, it's terrifying to see this exploits, right.
[45:01] Christian Walter
And it's.
[45:02] Christian Walter
It's terrifying to see what, in what state famous security is.
[45:06] Christian Walter
But if there's no mandate, right.
[45:08] Christian Walter
If no one is mandating it from the top saying, okay, if you want to sell something here, right, there has to be, you know, a bottom line that you have to fulfill.
[45:17] Christian Walter
Right.
[45:17] Christian Walter
Otherwise, you know, take your stuff and, you know, go somewhere else that it will not change.
[45:22] Viktor Petersson
Right.
[45:23] Christian Walter
And that's, that's a fact because everything is running on business and we see that in the US a lot.
[45:30] Christian Walter
Right.
[45:30] Christian Walter
The European Union also, there's like the sovereignty cloud kind of things.
[45:37] Christian Walter
Right.
[45:37] Christian Walter
So we have to own and so on and so forth.
[45:40] Viktor Petersson
Right.
[45:41] Christian Walter
And they also slowly get to the point that probably starts in firmware.
[45:44] Christian Walter
So I'm also not really a fan of, you know, as you said, over regulating everything and so on and so forth.
[45:51] Christian Walter
But I think sometimes it's necessary to push the companies that are responsible for that basically into the rent.
[46:01] Viktor Petersson
Yeah.
[46:01] Viktor Petersson
And I think there is a similar one on the EU side with the EU cybersecurity law because a lot of these things, they come from the Iot world, right?
[46:09] Viktor Petersson
They are like, oh, your baby camera cannot have a default password.
[46:14] Viktor Petersson
That's like, yeah, we all know this.
[46:17] Viktor Petersson
Like, anybody who has any sense of, like, understanding of security understands that.
[46:20] Viktor Petersson
Yes, of course you don't do this, but unless there is a legal push for this, the cheapest vendor in China will kind of gain market share.
[46:29] Viktor Petersson
So there needs to be some kind of force in the market to make that happen.
[46:35] Christian Walter
Yeah, but this also only makes sense to us.
[46:37] Viktor Petersson
Right.
[46:38] Christian Walter
So for us, yeah, of course you don't.
[46:40] Christian Walter
There should be default.
[46:41] Viktor Petersson
Right.
[46:42] Christian Walter
Or you probably change that or whatever.
[46:43] Christian Walter
Right.
[46:43] Christian Walter
But to 90% of the other people that are just using the baby camera.
[46:50] Christian Walter
All right.
[46:50] Christian Walter
It's easy.
[46:51] Viktor Petersson
Right.
[46:51] Christian Walter
The password is like 1235.
[46:52] Viktor Petersson
Right.
[46:53] Viktor Petersson
That's good.
[46:53] Christian Walter
I can remember that.
[46:54] Christian Walter
Right.
[46:56] Viktor Petersson
And I can accidentally remotely.
[46:58] Christian Walter
Yeah, right.
[46:59] Christian Walter
Oh, that's great.
[46:59] Viktor Petersson
Right.
[47:00] Christian Walter
I can see my kid basically when I'm at work.
[47:02] Viktor Petersson
Right?
[47:02] Christian Walter
Yes, it's good.
[47:03] Christian Walter
But everyone else as well.
[47:04] Viktor Petersson
Right.
[47:04] Christian Walter
And maybe it has an implication on, they know when you are home, probably break into your home and this kind of stuff.
[47:11] Christian Walter
And I think this, I mean, it's footwork basically.
[47:15] Viktor Petersson
Right.
[47:15] Christian Walter
So you have to explain that to the people why you're actually doing that, because I think sometimes this feels like you are making things more complicated than they have to be.
[47:26] Viktor Petersson
Right.
[47:26] Christian Walter
I mean, my mother would say it worked that way before.
[47:30] Viktor Petersson
Right.
[47:30] Christian Walter
So why do I have to now have like 20 characters.
[47:34] Viktor Petersson
Right.
[47:34] Christian Walter
And digits and this kind of stuff.
[47:36] Christian Walter
Right.
[47:37] Christian Walter
It's like.
[47:37] Viktor Petersson
Yeah, until their bank account get compromised and.
[47:40] Christian Walter
Yeah, right, exactly.
[47:42] Viktor Petersson
They're a real consequence stake.
[47:43] Viktor Petersson
Right.
[47:44] Viktor Petersson
And I think that's, and I think that the California law, I'm blanking on the name for the californian Iot provisions that started this whole wave.
[47:52] Viktor Petersson
And now, I mean, I see that as a positive thing, but I don't want to take too much time on that because there are so many things I want to cover with you as well because you have a lot of interesting things you've been working on.
[48:04] Viktor Petersson
So I mentioned, you mentioned open source firmware foundation already.
[48:08] Viktor Petersson
You are my founders for that.
[48:10] Viktor Petersson
Let's talk about that.
[48:11] Viktor Petersson
What's the goal?
[48:13] Viktor Petersson
What are you guys doing?
[48:14] Viktor Petersson
I think that's a foundation that should get a good shout out.
[48:18] Christian Walter
Yeah.
[48:19] Christian Walter
Thanks.
[48:20] Christian Walter
First of all, as I said, we are working a lot in the open source ecosystem.
[48:28] Christian Walter
That means we are reactive in all the communities, and we are really trying to advance the state of open source firmware.
[48:37] Christian Walter
And what we see is that firmware gets very little love and very little attention from a lot of people.
[48:46] Christian Walter
And so with that, okay, there needs to be one point of contact, one umbrella kind of thing, where we can place everything under, in that sense, where people can go, where people can educate themselves on what is firmware, why open source and so on and so forth, and where they can reach out to the individual projects.
[49:09] Christian Walter
And one thing that I deeply believe in is if we want to drive adoption in open source firmware.
[49:17] Christian Walter
So if you want to have open source firmware running on each and every device, that needs specification, right.
[49:24] Christian Walter
And that needs like.
[49:27] Christian Walter
Yeah, we need to specify interfaces, right.
[49:30] Christian Walter
How do we talk to other software?
[49:32] Christian Walter
How do we talk to hardware and these kind of things?
[49:35] Christian Walter
Because this is not existent right now.
[49:38] Christian Walter
Right.
[49:38] Christian Walter
So we have UFI as one big body, let's say.
[49:42] Christian Walter
And that's just a SPAC, right.
[49:44] Christian Walter
It's per se, not proprietary.
[49:46] Christian Walter
However, majority of the implementations are.
[49:50] Christian Walter
There's one implementation which is EDK, two, which is not and which is, you know, which is not great, let's say.
[49:57] Viktor Petersson
Right.
[49:57] Christian Walter
So it's okay.
[49:59] Christian Walter
And so I think, and the UFI sPac is rather complicated for a lot of use cases.
[50:06] Christian Walter
And I think we can simplify a lot of things.
[50:08] Christian Walter
And, yeah, with all these kind of things, we said, okay, we have to have a foundation that incorporates all the players that are in the ecosystem.
[50:20] Christian Walter
So the OEMs, the stock vendors, the open source firmware projects, the ibvs, and of course the communities.
[50:29] Christian Walter
Everyone needs to get on board, basically.
[50:31] Christian Walter
And we have to bring everyone together so that we work towards one common goal.
[50:37] Christian Walter
And we're trying to push that, basically.
[50:40] Christian Walter
So we have like working groups that care about, for example, firmware security, where the founder of Binary is also involved.
[50:53] Christian Walter
We have a work stream or working group that is around silicon incentivization.
[50:59] Christian Walter
If you initialize silicon, there are different interfaces, or every software builds their own interfaces on how you do that.
[51:06] Christian Walter
It would be great if you have a.
[51:08] Christian Walter
So that makes it easier for adoption and this kind of thing.
[51:12] Christian Walter
And we're trying to drive that through a nonprofit foundation because I think this specs shouldn't be owned by a company because that's also the standard.
[51:22] Christian Walter
Right now, intel has the FSP, like the firmware support package specification.
[51:28] Christian Walter
So they specify how their FSP looks like and what interface it has.
[51:35] Christian Walter
Naturally, no other SoC vendors will adopt that spec because, you know, AMD will never ever adopt the spec that is coming from intel in its own way.
[51:45] Christian Walter
So we have to find a neutral ground, basically, where we can play and work this kind of things out.
[51:52] Christian Walter
And yeah, the OSFf can be one of this bodies, basically, and it's tied.
[52:02] Viktor Petersson
To licensing or how do you think about those things?
[52:05] Viktor Petersson
Obviously, licensing is a hot topic right now.
[52:08] Viktor Petersson
Source world, how do you view that side of the firmware?
[52:12] Viktor Petersson
Where is that something that is yet to be kind of emerging in the open source firmware world?
[52:19] Christian Walter
So the foundation itself, we don't care about licensing this kind of thing because that's of course nothing that we want to push.
[52:33] Christian Walter
Our model is basically that the members that are, we have different tiers basically in the foundation.
[52:39] Viktor Petersson
Right.
[52:39] Christian Walter
And depending on the tier, you can kind of be part of the conversation on, you know, what specifications should be drawn, should be driven and, you know, making decisions on that part.
[52:51] Viktor Petersson
Right.
[52:51] Christian Walter
So you have influence on the spec, let's say.
[52:55] Christian Walter
However, licensing in general is an interesting topic in the.
[53:01] Christian Walter
For open source firmware as well.
[53:02] Viktor Petersson
Right?
[53:03] Christian Walter
So we have to think about what's the business model for the companies that develop open source firmware or that have open source firmware on the devices.
[53:14] Christian Walter
And for example there's a polish company, three MDAP, they are running a business model where they pay a fee basically to get the newest core boot version.
[53:31] Christian Walter
So they have downstream fork of that and you have to pay fee basically to get the newest version for your device.
[53:38] Christian Walter
That's one way to go.
[53:40] Christian Walter
Now elements takes another approach saying okay, we are just an agency and we provide support and this kind of stuff, we don't care how many devices you are, but for sure that's an interesting topic in open source firmware.
[53:55] Christian Walter
something where we can all do business.
[53:58] Christian Walter
Right?
[53:59] Christian Walter
I mean naturally again, right.
[54:01] Christian Walter
Even if it's open source, we have to think about how can we do business that is good for everyone, right.
[54:07] Christian Walter
Which is fair for everyone.
[54:08] Viktor Petersson
Yeah.
[54:08] Christian Walter
And licensing is one of them.
[54:14] Viktor Petersson
Absolutely, yeah, I think, I mean, and also like, I guess it's worth doing a shout out to the people actually involved in the foundation.
[54:21] Viktor Petersson
You got some big names in there.
[54:22] Viktor Petersson
Do you want to speak a bit about who are actually part of the members and who are part of that?
[54:25] Viktor Petersson
Because you got some big brands engaged in the actual foundation.
[54:29] Viktor Petersson
So I think it's worth doing a shout out as well.
[54:31] Christian Walter
Yeah, totally.
[54:32] Christian Walter
So one of our co founding members is Siemens for example, which is pretty cool.
[54:42] Christian Walter
Very, very big company and they give us a lot of trust in terms of coming in so early so that we can do what we can do basically, and backing us up.
[54:56] Christian Walter
Because basically when Siemens joined there were only plans, let's say, but their execution was still undergoing and we're still doing things and still moving forward.
[55:10] Christian Walter
Siemens actually provides us a lot of trust there and we have a couple of companies that are actually using open source female in their products and that are actually trying to push for open source.
[55:20] Christian Walter
One of the biggest there for sure is Google, of course, Supermicro, one of.
[55:26] Viktor Petersson
The big ones are super macro using coreboot on their servers or is that something on the roadmap or do you.
[55:33] Christian Walter
Know, I was curious, they have a proof of concept where they run coreboot on their servers.
[55:42] Viktor Petersson
Interesting.
[55:43] Christian Walter
They are eventually doing business.
[55:47] Viktor Petersson
Nice.
[55:47] Christian Walter
Potentially, yeah, they have it on their roadmap, right.
[55:50] Christian Walter
I mean you would be.
[55:51] Christian Walter
I think Supermicro is smart enough at least to, you know, look left and right and see UK, we have, you know, our standard proprietary vendor and there are options.
[56:03] Christian Walter
Right.
[56:03] Christian Walter
And we should, you know, look, what does that, what implications does that have on our business if we go for open source firmware?
[56:10] Christian Walter
Is there other markets that we can kind of tackle?
[56:13] Christian Walter
How does that work from a royalty kind of view?
[56:18] Christian Walter
What does it mean money wise for us and this kind of thing?
[56:20] Christian Walter
So supermarket, I think looking into that for sure.
[56:24] Viktor Petersson
And I imagine they are starting to get more and more nervous from another one on your roster, which is oxide taking them from the left field in terms of that.
[56:34] Viktor Petersson
So yeah, maybe that's a.
[56:35] Viktor Petersson
Oxide is.
[56:36] Christian Walter
I mean oxide is extremely radical in how they do it.
[56:41] Viktor Petersson
Right.
[56:41] Christian Walter
So I mean, if you ever hear Brian speak about it, right.
[56:49] Viktor Petersson
Brian, if you are listening to this, I would love to have you on the show, by the way.
[56:53] Christian Walter
Yeah, I got my.
[56:55] Christian Walter
Yeah.
[56:55] Christian Walter
And if you listen to him, right, he's like very radical in a good way, right.
[57:02] Christian Walter
On his views on how things should be handled and why it should be open source and this kind of things.
[57:08] Christian Walter
And actually I saw the racks in person, so I visited them a couple of times in there in the headquarters and they look neat.
[57:19] Christian Walter
So everything is custom made from the boards, from the blends basically in front of the rack, the whole rack, the bars, I don't know, everything's custom made.
[57:33] Viktor Petersson
And everything looks proper nerd porn, right?
[57:35] Viktor Petersson
Yeah.
[57:35] Viktor Petersson
Really?
[57:36] Christian Walter
I mean you see that.
[57:36] Christian Walter
That's great.
[57:37] Christian Walter
I don't need it.
[57:38] Viktor Petersson
Right.
[57:38] Christian Walter
I mean I will never ever buy such a rag, right.
[57:41] Christian Walter
I have no use case for that, but I want one, right.
[57:45] Christian Walter
Because it just looks great.
[57:47] Christian Walter
And yeah, they are long term supporters on that.
[57:52] Christian Walter
I met Brian like three years ago on the foundation did some mini summit which was in parallel to the OCP, the open project Global summit.
[58:04] Christian Walter
It was like a half day in the back of a conference.
[58:07] Christian Walter
We had peanut and nuts and Brian was giving a talk about Oxide and there's where we met him.
[58:16] Christian Walter
And it's great to see how they actually evolved right now.
[58:20] Christian Walter
And of course a couple of other companies as well.
[58:23] Viktor Petersson
Right.
[58:23] Christian Walter
Ss three, MDEP, of course.
[58:24] Christian Walter
Is there system 76, is there Nova custom, is there.
[58:31] Christian Walter
So yeah, it's really great to see them board and you know, if some company is listening to this, right.
[58:37] Christian Walter
Said, okay, we are doing open source firmware, right.
[58:39] Christian Walter
And we want to be a part of the foundation.
[58:40] Christian Walter
I want to at least show up on that website.
[58:43] Christian Walter
You can always reach out to Victor and he then reaches out to me.
[58:47] Viktor Petersson
Right in for happy to do introductions.
[58:50] Viktor Petersson
The last thing I wanted to cover before we wrap up, because we're running up on time here is, I'm sure this made the news to you as well.
[58:59] Viktor Petersson
And I'm curious about your take, your hot take on this is insides AI bios because they were being a bit ridiculed in the press.
[59:07] Viktor Petersson
I'm kind of curious about what your whole take on that is.
[59:12] Christian Walter
Yeah, no, I saw the news.
[59:13] Christian Walter
Wait a, I think at Computex, they announced it that they have AI.
[59:17] Christian Walter
Don't really understand what it is.
[59:24] Christian Walter
How I read it is that they, I think the customization of the whole thing is now through AI, or you can interact with an MI and it customizes the bios for your needs.
[59:36] Christian Walter
I have no clue how that would practically look like.
[59:40] Christian Walter
And I totally think that this is not a good idea because I couldn't think of a thing why you would need AI in firmware.
[59:50] Christian Walter
So I think firmware should do very little.
[59:56] Christian Walter
It's just the basic minimum, exactly what you need.
[01:00:00] Christian Walter
That should be very strict.
[01:00:02] Christian Walter
There should be no room for AI's to interpret whatever they want in between.
[01:00:07] Christian Walter
But rather than I want to do this and exactly this, and yeah, I'm curious to see what they're doing, but my gut feeling really says I'm not entirely sure if that's a good idea.
[01:00:23] Christian Walter
To me, it sounds like, it feels like taking the current AI hype.
[01:00:34] Christian Walter
We need to do something with AI, right?
[01:00:35] Christian Walter
Every, every hardware vendors does something with AI, right?
[01:00:38] Christian Walter
They, everywhere, they put Nvidia right in building like the new next AI machines.
[01:00:43] Christian Walter
And this now, and every software stack basically, which is, you know, on top of firmware does AI.
[01:00:50] Viktor Petersson
So whether you want or not.
[01:00:52] Christian Walter
Yeah, if you want it or not.
[01:00:53] Christian Walter
Exactly.
[01:00:54] Christian Walter
And so we have to do something as well.
[01:00:57] Christian Walter
Right?
[01:00:57] Christian Walter
So let's go.
[01:00:59] Viktor Petersson
It sounds like a terrifying attack vector from a security perspective, but yeah, let's see what happens with that.
[01:01:06] Christian Walter
Totally, right?
[01:01:07] Christian Walter
I mean, all the models that they're running on is probably proprietary.
[01:01:11] Christian Walter
No one actually knows what's happening inside.
[01:01:14] Christian Walter
And I think you can perfectly.
[01:01:16] Christian Walter
So I talked to a colleague of mine a couple of days ago and he said what an interesting attack vector would be.
[01:01:23] Christian Walter
If you have an LMMe, which you kind of train to inject exploits in the code that it writes.
[01:01:30] Viktor Petersson
Right.
[01:01:30] Christian Walter
Because you're asking an NI, write me a parser for XYZ, whatever.
[01:01:35] Christian Walter
And then who is looking at the code, right.
[01:01:38] Christian Walter
So you copy the code, see if it builds.
[01:01:40] Christian Walter
it does what it does.
[01:01:41] Viktor Petersson
Right.
[01:01:41] Christian Walter
That's great.
[01:01:42] Christian Walter
And what if you have elements that are actually injecting exploits there.
[01:01:48] Christian Walter
Right.
[01:01:48] Christian Walter
And maybe they are learned and trained on code which had exploits in it and this kind of stuff.
[01:01:54] Christian Walter
Right.
[01:01:54] Christian Walter
So, and this kind of, you know, makes up a whole new channel or vector of, you know, possible attacks where you wouldn't even know who injected the code right in the first place.
[01:02:07] Christian Walter
And.
[01:02:08] Christian Walter
Yeah, that really, I think that's terrifying.
[01:02:11] Viktor Petersson
Yeah.
[01:02:12] Christian Walter
To see.
[01:02:13] Viktor Petersson
I would be surprised if the likes of binary and these guys who have done some great research are not using this for similar like fuzzing attacks and similar, I would imagine, at least.
[01:02:24] Viktor Petersson
But yeah, it's definitely, yeah.
[01:02:27] Viktor Petersson
When we get into like obfuscation off backdoors and whatnot, using AI, that's where it gets really dangerous and crazy.
[01:02:36] Viktor Petersson
So.
[01:02:37] Christian Walter
Totally.
[01:02:39] Viktor Petersson
This has been really great.
[01:02:40] Viktor Petersson
Christian, is there anything else you want to do a shout out about before we wrap up?
[01:02:45] Viktor Petersson
I think you have a conference coming up in the fall, so maybe that's.
[01:02:48] Christian Walter
Yeah, that's definitely.
[01:02:50] Christian Walter
So if you.
[01:02:52] Christian Walter
The open source firmware conference is coming up in September, 3 to fifth.
[01:02:57] Christian Walter
It's annual conference surprise around open source firmware and, you know, current developments there.
[01:03:04] Christian Walter
It's very developer centric.
[01:03:06] Viktor Petersson
Right.
[01:03:06] Christian Walter
So really, if you want to get your hands on the topic, that's the conference where you should be.
[01:03:12] Christian Walter
If you want to find people who can do it.
[01:03:15] Christian Walter
Right.
[01:03:15] Christian Walter
That's the place where you can find these people.
[01:03:18] Christian Walter
It will be in Germany.
[01:03:20] Christian Walter
So it will be at the, you know, home at our hometown.
[01:03:23] Christian Walter
Right.
[01:03:24] Christian Walter
Where everything.
[01:03:25] Christian Walter
Where the foundation was born, where the conference was born, when an elements was born.
[01:03:29] Christian Walter
And yeah, if you want to.
[01:03:31] Christian Walter
If you want to check that out, you know, have like through our offices and all this kind of stuff, we would be happy to host you.
[01:03:39] Christian Walter
Osefc IO is the website that you need to check out.
[01:03:44] Christian Walter
Yeah, it would be great if we can see a couple of more faces there.
[01:03:49] Viktor Petersson
Amazing.
[01:03:50] Viktor Petersson
I'll make sure to link that in the show descriptions.
[01:03:52] Viktor Petersson
And thank you so much for coming to the show, Christian and I'll talk to you soon.
[01:03:57] Viktor Petersson
Thanks so much.
[01:03:58] Christian Walter
Bye.
[01:03:58] Viktor Petersson
Cheers.
[01:03:59] Viktor Petersson
Bye.

Found an error or typo? File PR against this file or the transcript.