{{Header}} {{title|title= Open Source Hardware }} {{#seo: |description=Establishing Hardware Trust, Open-source Hardware Alternatives |image=Opensourcehardware.png }} {{boot_firmware}} [[File:Opensourcehardware.png|200px|thumb]] {{intro| Establishing Hardware Trust, Open-source Hardware Alternatives }} = Introduction = {{mbox | type = notice | image = [[File:Ambox_notice.png|40px|alt=Info]] | text = This chapter contains general security advice and is unspecific to {{project_name_long}}. Readers interested in this topic should undertake significant research before purchasing any open-source hardware. It is also recommended to learn more about [https://www.gnu.org/philosophy/free-hardware-designs.en.html free hardware designs]. }} = Hardware Trust in Modern Computing = Security researcher and Qubes founder, Joanna Rutkowska, has noted that modern computing and networking security relies upon a critical foundation - trusted hardware and firmware domains. Even high-security operating systems have a security upper bound, since that is defined by the trustworthiness of hardware components that are ideally placed to compromise the entire system if bugs or backdoors are present: https://blog.invisiblethings.org/papers/2015/x86_harmful.pdf
... for years we have been, similarly, assuming the underlying hardware, together with all the firmware that runs on it, such as the BIOS/UEFI and the SMM, GPU/NIC/SATA/HDD/EC firmware, etc., is all... trusted.Rutkowska has concluded the following hardware components and mechanisms are all vulnerable to exploitation and often flawed in their implementation, making them easy to "backdoor":
But isn’t that a rational assumption, after all?
Well, not quite: today we know it is rather unwise to assume all hardware and firmware is trusted. Various research from the last ten years, as discussed below, has provided enough evidence for that, in the author’s opinion. We should thus revisit this assumption. And given what’s at stake, the sooner we do this, the better.
The clock rate achieved will depend on the technology node and particular process selected. As a rough guide we would expect ~0.5-1GHz at 40nm and ~1.0-1.5GHz at 28nm.some open source some not Not yet compatible with Qubes OS. (October 2024) RISC-V isn't that far behind... https://deepcomputing.io/product/dc-roma-risc-v-laptop-ii/ https://youtube.com/watch?v=3mhd98AGNXQ Performance is being shown in the video. It's usable. == single-board computers - SBCs == the closest thing available is [https://www.fsf.org/resources/hw/single-board-computers single-board computers (SBCs)], which are delivered as one circuit board that are powerful enough to run a real operating system. These systems generally contain a SoC with an ARM processor, with options like * [https://spectrum.ieee.org/novena-a-laptop-with-no-secrets Novena] ([https://www.crowdsupply.com/sutajio-kosagi/novena/updates/novena-five-year-anniversary EOL (end of life)]), and * [https://eu.mouser.com/new/pandaboardorg/pandaboardES/ PandaBoardES] falling into this category. However, they still have a number of closed-source binary blobs and the FSF also notes "severe flaws" in these products due to proprietary design concerns. {{quotation |quote= The Pandaboard has another serious flaw: a WiFi and Bluetooth chip that can't work without nonfree software. The workaround is to get an external USB device for these functions, if you want them. See the documentation of your board for information about using these USB devices with it. |context=[https://www.fsf.org/resources/hw/single-board-computers single-board computers (SBCs)] }} Running tier 1 Linux distributions is often difficult or impossible. See [[Dev/boot#ARM|Dev/boot wiki page chapter ARM]]. == Security-Focused Hardware Vendors == There isn't a well defined definition of the "Security-Focused Hardware Vendors" term yet. Potential criteria: * Intel ME disabled using HAP method * Freedom Software based firmware * blob free (no non-freedom firmware required and no non-freedom device drivers required) * open hardware design Some hardware producers seek to remove as many proprietary blobs as possible, for example by using the Freedom Software coreboot in place of the standard closed source BIOS or EFI implementation. * in no particular order * no recommendation by Kicksecure yet * the user must carefully review each vendor and device on its own * this list cannot guarantee that all devices are free from Intel ME and come with Open Source firmware such as coreboot * https://system76.com/ * https://puri.sm/ * https://shop.nitrokey.com * https://novacustom.com * https://se.starlabs.systems * https://insurgo.ca * https://www.tuxedocomputers.com ** https://www.tuxedocomputers.com/en/Infos/News/TUXEDO-disables-Intels-Management-Engine.tuxedo ** https://www.tuxedocomputers.com/en/Infos/Help-Support/Frequently-asked-questions/Coreboot-on-TUXEDO-Computers-devices.tuxedo ** https://docs.dasharo.com/variants/tuxedo_ibs15/releases/ * https://3mdeb.com/open-source-hardware/ * https://shop.vikings.net/ * https://www.thinkpenguin.com/ * https://tehnoetic.com/ * https://minifree.org/ ** Does not mention HAP (High Assurance Platform) Intel ME disablement method. TODO: Unfortunately, this solution is expensive and still relies on an Intel processor. Despite the claims that ME is "neutralized", the ME still poses potential security threats to the user as highlighted in Rutkowska's research. https://www.theregister.com/2015/12/31/rutkowska_talks_on_intel_x86_security_issues/ == OpenPOWER == * Worthy mention: [https://www.raptorcs.com/ Raptor Computing Systems] have built their processors based on IBM OpenPOWER technology. ** OpenPOWER is not fully open-source. The instruction set architecture is source-available and allows one to freely produce POWER-compliant processors, and it is allowable to implement extensions to the architecture, however implementing remixes of the ISA is not permitted. See https://openpower.foundation/blog/final-draft-of-the-power-isa-eula-released/. Note that this is only the license for the ISA, it does not cover individual chip designs. Those may be kept proprietary or made open as each designer sees fit. ** Examples of source-available POWER CPU cores may be seen at https://git.openpower.foundation/cores. ** Available user guides For example, see the [https://wiki.raptorcs.com/w/images/e/e3/T2P9D01_users_guide_version_1_0.pdf T2P9D01 Mainboard document]. appear to at least partially meet [https://en.wikipedia.org/wiki/Open-source_hardware opensource hardware principles]. This requires:
... that information about the hardware is easily discerned so that others can make it – coupling it closely to the maker movement. Hardware design (i.e. mechanical drawings, schematics, bills of material, PCB layout data, HDL source code and integrated circuit layout data), in addition to the software that drives the hardware, are all released under free/libre terms.** Unfortunately it is not compatible with Qubes OS, but it will run Linux. It is possible to run the [https://wiki.raptorcs.com/wiki/Whonix {{project_name_short}} KVM version as it is documented in the Raptor Computing Systems Wiki], but this is [[unsupported]] by {{project_name_short}} developers. For further information, see footnotes. https://www.fsf.org/blogs/licensing/support-the-talos-ii-a-candidate-for-respects-your-freedom-certification-by-pre-ordering-by-september-15 https://twitter.com/Whonix/status/1190634591045865472 == Future == In the coming years when open-source processors and hardware designs further mature and the necessary functionality is provided for virtualization, reasonable and fairly-priced alternatives to proprietary architectures will start to emerge. = Firmware Considerations = [https://en.wikipedia.org/wiki/Open-source_hardware Open-source hardware] is not affected by the non-freedom firmware updates issue described in the previous chapter. Such hardware might be more trustworthy, but open-source firmware can be just as insecure as a proprietary one. Fortunately, open-source firmware increases the chances of actually making it secure, with options like coreboot appearing to be a promising solution. = See Also = * [https://forum.qubes-os.org/t/intel-vs-arm-vs-power-vs-risc-v-architecture-freedom-perspective/14172/11 hardware is solidified software] * [[Malware_and_Firmware_Trojans#Firmware_Trojans|Firmware Trojans]] * Hardware Backdoors ** {{VideoLink |videoid=Fw5FEuGRrLE |text=Keynote: Precursor - Trustable Open Hardware for Everyday Use - Bunnie Huang }} topics: *** cannot hash hardware *** NSA JTAG implants *** NSA interception cisco routers *** phone implants * [[Mobile_Operating_System_Comparison#Betrusted|Betrusted]] * Flashkeeper ** https://nlnet.nl/project/Flashkeeper/ ** https://github.com/linuxboot/heads-wiki/issues/107#issuecomment-2211839100 ** https://dodoid.com/flashkeeper ** [https://forum.qubes-os.org/t/flashkeeper-the-solution-to-spi-flash-firmware-tampering/28028 Flashkeeper: The Solution to SPI Flash Firmware Tampering?] [login required] = References = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]