Intel's LaGrande trusted platform steers away from DRM

San Francisco (CA) - Intel's next-generation Conroe, Merom, and Woodcrest processors are likely to feature optional components for supporting the Trusted Computing Group's TPM 1.2 specification. To that end, Intel announced today at IDF, the company's LaGrande Technology (LT) specification has been finalized, and was officially published by Intel this morning.

Up until recently, LT has been mentioned in the same breath as Microsoft's Next Generation Secure Computing Base, formerly code-named "Palladium" or its chemical element symbol, "Pd," for short. But a first read of Intel's new LaGrande specifications may thoroughly surprise those who had been foreseeing a kind of digital rights management lockdown technology being built into future CPUs. This morning's documents clearly specify LT as a systems protection platform, using virtualization technology coupled with cryptographic hashing as a way of assuring platform safety, especially to other components that require assurances that a system is indeed what it claims to be.

While Intel and Microsoft did announce a joint venture today on virtualization technology, this is not at all the area that their venture covers. Under the LT scheme, all operating systems plus the software run by them, including DRM software, would run in a world of reduced privilege, separated from the physical world by an impenetrable boundary of virtualization. The OS would literally "think" it's being run on a completely separate machine.

The way LT will work, the VMM will provide a partitioned environment in system memory, where the virtual system will run. But because the VMM is completely made of software, its core image - the part of itself that represents the hardware it virtualizes - is comprised of code. This code can be continually evaluated, or "measured" using a cryptographic hash table, to determine that its contents are precisely the same as with prior measurements. If a single bit has been changed, the integrity of the entire system is compromised; at which point, the VMM takes over and decides what it wants to do, which could mean a system shutdown for safety's sake.

Notice we're not talking about making copies of CDs or DVDs or streaming content over the Internet, because that's not what this is about, and Intel has made great strides today in separating LT from this other side of the "trust" issue. Conceivably, a computer running LT could protect itself from any kind of malicious damage that an outside entity could make to a computer, first of all by presenting the face of a completely non-real computer to the outside world, and second by introducing a monitoring mechanism that runs beneath the operating system level, where antivirus software simply cannot peer.

So going forward, all hypotheticals aside, the only real assuredness a TPM-compliant system might have that another TPM-compliant LT system is what it says it is, will come from the fact that Intel isn't likely to create a VMM that makes it behave like any other kind of system. Still, the power of virtualization may completely redefine the "chain of trust" upon which trusted platforms rely, to the degree that the weak link in the chain, once again, becomes the one that inevitably becomes most exploited.

TOPICS