900 Embedded Devices Share Hard-Coded Certs, SSH Host Keys 48
An anonymous reader writes: Embedded devices of some 50 manufacturers has been found sharing the same hard-coded X.509 certificates (for HTTPS) and SSH host keys, a fact that can be exploited by a remote, unauthenticated attacker to carry out impersonation, man-in-the-middle, or passive decryption attacks. SEC Consult has analyzed firmware images of more than 4000 embedded devices of over 70 vendors — firmware of routers, IP cameras, VoIP phones, modems, etc. — and found that, in some cases, there are nearly half a million devices on the web using the same certificate.
Re: (Score:2)
Dammit, I knew running the bum smacking machine on a ZigBee was a bad idea.
Re: They can decrypt your private information (Score:2)
Welcome to the internet of everything era, where nothing can possible go wrong.
What's that? (Score:5, Insightful)
What's that? The companies who make consumer electronics do a terrible job of security and routinely deliver products with little or no security?
Well, golly gee, I'm totally shocked.
No, wait, the other one ... where I think it should be self evident that probably 95% or more of all devices which want to connect to the internet should be presumed to be utterly insecure and not used.
It's pretty clear that without some penalties and liability, the companies who are trying to bring us the connected world are either incompetent at, or indifferent to, any form of security.
If it isn't a computer, I pretty much don't trust it with any form of network connection.
Re: (Score:1)
It probably passed their own "security tests", which is running security scan software against the running device. They probably even have a "Security Engineer", that couldn't write "Hello World" in C, look over the data flow diagram to make sure the lines are the right color (encrypted).
I used to work for a company that built products like this. Products routinely went out with hardcoded admin passwords (so support can fix customer device) or worse; And the passwords were handed out like candy, even sales
Re: (Score:1)
Amazing. A third of their time. Considering that it's the job of the CISO, not the CIO, that's quite a lot.
Nice biased article leaving Apple out (Score:1)
Nice biased article leaving Apple out, when part of Apple's touted security is HARD CODED KEYS embedded in hardware.
Why attack the little guys when one of the biggest of them all is given a free pass? Google key0x89b or go straight to http://www.sputtr.com/key0x89b for a copy.
Re: (Score:3)
Nice biased article leaving Apple out, when part of Apple's touted security is HARD CODED KEYS embedded in hardware.
I'd like to know more about this. Link, please?
Re: (Score:2)
Heh. Here's a tip: 'Let Me Google That For You' is only worthwhile when the search terms are obvious. If you put in something as obscure as "key0x89b", then the sarcasm is just lost.
As for the links, thank you, I perused them, but I cannot find why you're raking Apple over the coals on it. The article is about certificates being burned in, "key0x89b" is about burning the decryption keys for the filesystem, unique to each device, into the memory on the machine. There are reasons why this is bad but it h
Re: (Score:2)
And... I put my foot in my mouth. I apologize, I didn't see where you said "Google key0x89b..." That's my bad, please free to point and make fun of me. The only real excuse I have for that is undiagnosed brain-damage or something.
My tasty little slice of humble-pie aside, I hope you'll still consider the rest of my post.
Cost driven engineering (Score:2)
What a bunch of idiots. Not just for sharing the same certificate between multiple devices, but for doing this in devices that clearly have mediocre to non-existent firmware read protection. Knowing how many of these products are put together, there is probably some underpaid graduate developer in China who is whoring out the same firmware to any MBA who wants to pay bottom dollar for everything.
I have worked with some pretty poor embedded developers in my time, but none of them would be this stupid. Their
Re: (Score:2)
Right. But then these OEMs probably represent the low end of the software vendor's customers. If you want your own key, you pay them a few extra bucks to generate one for your product line. And then you take measures to protect your investment. Like specifying firmware read protection in your device hardware.
Exaggerated again ... (Score:2)
There is not that much wrong with doing that. As long as you can not extract the certificate, why care?
Against popular believe SSH and HTTPS don't use public key encryption for the data transfer. A little bit thinking, in case of SSH at least, would make that obvious to everyone.
The public/private key encryption is used in the beginning of the handshake to exchange a stream cypher usually something like DES.
There is absolutely no difference in having a billion devices with the same keys/certificates and try
Re: (Score:2)
I think that simple fact escaped him.
Re: (Score:2)
"The public/private key encryption is used in the beginning of the handshake to exchange a stream cypher usually something like DES."
No one with an ounce of up to date crypto knowledge uses DES. Perhaps you meant AES.
"There is absolutely no difference in having a billion devices with the same keys/certificates and trying to use the data of all transmissions to them to crack them (reversal them) versus a singe certificate like google.com's and having billions of connections per day to that single point."
Sur
Re: (Score:2)
Re: (Score:2)
"The public/private key encryption is used in the beginning of the handshake to exchange a stream cypher usually something like DES."
No one with an ounce of up to date crypto knowledge uses DES. Perhaps you meant AES.
In addition, both DES and AES are block ciphers, not stream ciphers.
Re: (Score:2)
AES used in GCM mode is essentially a stream cipher.
Re: (Score:2)
Odds are that these 900+ devices were built from the same image. Hence the identical keys. And if this is the case, then either all of them have an exposed private key or none of them do. Once a build process has been verified to load the correct components and not load those that should not be, stamping out identical copies is quite secure.
In the case of identical key pairs being loaded on different devices, all that this key does is uniquely identify the particular software build that your IoT device is
Re: (Score:2)
If Data and Lore had been configured with different host keys, a whole lot of anguish could have been avoided.
Understanding Secure Shell Host Keys [vandyke.com]
Re: (Score:2)
Of course it would be cooler if only small badges of devices had the same cert, or if you even would go through the hassle to make individual ones.
Going through this hassle is exactly what is typically done. It is not uncommon for the initial - or post reset - boot of a router to take significantly longer then subsequent boots. This is when the router generates the public / private key combination. I suppose that the manufacturers are bypassing this to simplify support. Alternatively, they are truly incompetent and simply flashing the devices with a firmware that already contains the certificate. But each device should have a different serial nu
Re: (Score:2)
Serial numbers have nothing to do with certificates.
You can make public/privat key combos on your computer as many as you want and use them as you want.
With that private key you can decode the shared AES (or DES) key and subsequently decode all network traffic.
The DES/AES Key is new for every connection.
The key will be stored in FLASH memory and can be accessed via JTAG connection. ...
Only if the device has such a connector. Which it likely has not. Never saw one that has one
Would make more sense, to deso
Comment removed (Score:3)
Re: (Score:2)
Thanks. What would we just do without you.
It's Economics not Cryptography (Score:1)
Until the people who have the ability to fix secu
Re: (Score:2)
Re: (Score:2)
This is an area where I would support government regulation -- banning the sale of devices that don't meet a high security standard, just like we ban food that's unfit for consumption or require specific safety devices in cars. I've hoped that, as cars get more computerized, the regulations around cars would have a bleed-over effect, but, so far, no luck there.
NSA_Key? (Score:2)
Did anybody compare the lists of devices sharing these hardcoded SSL certs to the lists in the Snowden Revelations that various projects in NSA were willing to crack on a wholesale basis for other departments?
Pirelli? (Score:2)
I think of them as tires only (well, and the calendar). What since when do they make/sell/rebadge routers?