13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 13 - Onward! 203<br />

Palladium’s requirement for cooperation between chipset vendors, OEMs<br />

and Microsoft is a potentially large flaw. There isn’t enough margin in <strong>the</strong><br />

commodity PC hardware industry today to support <strong>the</strong> overhead of an<br />

extensive cryptographic security overhaul. Too, many chipset vendors do<br />

not have any experience with implementing secure systems. On top of <strong>the</strong><br />

language barrier faced by many overseas chipset vendors, chipsets are<br />

usually developed on a short fuse and with a keen eye on <strong>the</strong> pocketbook.<br />

Can chipsets developed under <strong>the</strong>se conditions be expected to protect<br />

sensitive secrets?<br />

The <strong>Xbox</strong> is an example of what can go wrong when security policies are<br />

defined by one body and implemented by ano<strong>the</strong>r very different organization.<br />

Microsoft wrote a specification for a trustable piece of hardware,<br />

namely, <strong>the</strong> <strong>Xbox</strong>. Strong cryptographic algorithms are used liberally in <strong>the</strong><br />

<strong>Xbox</strong>, and <strong>the</strong> master key for <strong>the</strong> system is locked deep inside a complex<br />

piece of silicon. However, experience has demonstrated that <strong>the</strong> <strong>Xbox</strong>’s<br />

security system can be bypassed using a combination of an unsecured debug<br />

port, a flaw in <strong>the</strong> hardware initialization scheme, and a bug in <strong>the</strong> handling<br />

of a boundary case of <strong>the</strong> instruction pointer in <strong>the</strong> CPU. These three minor<br />

oversights, committed by three independent parties (<strong>the</strong> assembly contractor,<br />

<strong>the</strong> <strong>Xbox</strong> firmware designer, and Intel), conspire to provide a<br />

convenient method for defeating <strong>Xbox</strong> security.<br />

Each of <strong>the</strong>se oversights on <strong>the</strong>ir own does not represent a significant<br />

security problem. This leads to <strong>the</strong> disconcerting question of how many<br />

security breaches in a particular Palladium implementation will be caused by<br />

<strong>the</strong> stacking of multiple benign flaws. Every complex consumer electronics<br />

system has minor bugs or design oversights, especially when systems are<br />

composed of components built by multiple independent entities whose<br />

primary interest is in turning a profit.<br />

In <strong>the</strong> consumer electronics industry, one can ei<strong>the</strong>r ship a perfect<br />

product, or one can make money. Products that don’t make money are<br />

quickly cancelled. Thus, it is very rare to find a consumer product that is<br />

technically perfect in all respects. As a result, <strong>the</strong> only practical way to<br />

guarantee <strong>the</strong> security of consumer electronics system as complex as<br />

Palladium is to throw it into <strong>the</strong> wild, and let <strong>the</strong> hackers have <strong>the</strong>ir way<br />

with it for many years until all of <strong>the</strong> big security holes have been<br />

discovered and plugged.<br />

On <strong>the</strong> o<strong>the</strong>r hand, <strong>the</strong> TCPA’s TPM is a device created to solve a certain<br />

set of problems that is smaller in scope than Palladium’s. Thus, <strong>the</strong> TPM<br />

is not as exciting from a market perspective, but it may be more practical<br />

and serviceable for its intended purpose. Both <strong>the</strong> TPM and Palladium<br />

are weak to hardware attacks, but <strong>the</strong> TPM doesn’t attempt to extend<br />

security requirements as far into third-party system design territory. The<br />

TPM is primarily a secured key management module that can detect most<br />

modifications and intrusions to <strong>the</strong> host system. The software layers built<br />

on top of this substrate do <strong>the</strong> rest of <strong>the</strong> heavy lifting, caveat emptor.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!