Browse Source

Check for active Intel backdoor

Bob Mottram 8 years ago
parent
commit
d6222879d2
1 changed files with 15 additions and 0 deletions
  1. 15
    0
      src/freedombone-utils-setup

+ 15
- 0
src/freedombone-utils-setup View File

371
     fi
371
     fi
372
 }
372
 }
373
 
373
 
374
+function check_for_AMT {
375
+    if [[ $ARCHITECTURE == 'arm'* ]]; then
376
+        return
377
+    fi
378
+
379
+    pci_hardware=$(lspci)
380
+    if [[ "$pci_hardware" == *"MEI"* || "$pci_hardware" == *"HECI"* ]]; then
381
+        echo $'Intel Active Management Technology (Management Engine) was detected. This is an active backdoor.'
382
+        exit 782352
383
+    fi
384
+}
385
+
374
 function set_login_umask {
386
 function set_login_umask {
375
     sed -i 's|UMASK\t.*|UMASK\t\t077|g' /etc/login.defs
387
     sed -i 's|UMASK\t.*|UMASK\t\t077|g' /etc/login.defs
376
 }
388
 }
601
     read_config_param "PROJECT_REPO"
613
     read_config_param "PROJECT_REPO"
602
     write_config_param "PROJECT_REPO" "$PROJECT_REPO"
614
     write_config_param "PROJECT_REPO" "$PROJECT_REPO"
603
 
615
 
616
+    function_check check_for_AMT
617
+    check_for_AMT
618
+
604
     function_check separate_tmp_filesystem
619
     function_check separate_tmp_filesystem
605
     separate_tmp_filesystem 150
620
     separate_tmp_filesystem 150
606
 
621