Correct me if I am wrong, but I think there is a workaround to use vPro systems safely in the Qubes OS context, specifically to prevent Intel AMT remote access.
Intel states in their documentation here:
https://www.intel.com/content/www/us/en/developer/articles/guide/getting-started-with-active-management-technology.html
that remote management via AMT can only be done through an Intel AMT-supported WiFi device:
Physical Device – Wireless Connection
By default, any wireless Intel vPro platform will have an Intel AMT enabled wireless adapter installed, such as an Intel® Dual Band Wireless-AX 201. Any wireless adapter other than one from Intel will not have wireless Intel AMT capabilities.
If we accept Intel’s claims about vPro capabilities as upfront, we should also accept their claim about the hardware needed for AMT to work, as they are equally explicit.
But let’s say, for argument’s sake, that Intel’s claim is incorrect and AMT could somehow use non-Intel WiFi devices for remote access. For this to happen, the WiFi device would likely need to be internal, as IME can theoretically control internal devices, including an internal WiFi card.
However, what if we completely remove the internal WiFi card from the system, including any embedded WiFi cards on the motherboard, and we avoid using Ethernet entirely? This leaves AMT without a compatible network interface for remote access.
Now, we only connect to the internet using a USB WiFi device. Again correct me if I’m wrong, but IME cannot directly control a USB WiFi device because its drivers are loaded at the OS level. In a monolithic OS, malware or support software might bridge IME to the USB WiFi device, enabling remote access. But in Qubes OS, the USB WiFi device is isolated in the sys-net qube, protected by Xen’s virtualization. For AMT to use the USB WiFi device, it would need to break Xen’s isolation, which seems highly unlikely without a significant vulnerability.
Therefore, I believe that by completely removing the internal WiFi card, avoiding Ethernet, and using only a USB WiFi device in sys-net, we can use vPro-enabled systems in Qubes OS while preventing AMT remote access.
Any thoughts on potential side cases where AMT could still enable remote access in this setup?