Million More Devices Sharing Known Private Keys For HTTPS, SSH Admin (theregister.co.uk) 54
Millions of internet-facing devices -- from home broadband routers to industrial equipment -- are still sharing well-known private keys for encrypting their communications, reports The Register. From the report: This is according to research from SEC Consult, which said in a follow-up to its 2015 study on security in embedded systems that the practice of reusing widely known secrets is continuing unabated. Devices and gadgets are still sharing private keys for their builtin HTTPS and SSH servers, basically. It is not difficult to extract these keys from the gizmos and use them to eavesdrop on encrypted connections and interfere with the equipment: imagine intercepting a connection to a web-based control panel, decrypting it, and altering the configuration settings on the fly. And because so many models and products are using the same keys, it's possible to attack thousands of boxes at once. SEC Consult senior security consultant Stefan Viehbock scanned the public internet and found that the practice of using known private keys has increased over the past nine months, with the number of net-accessible vulnerable devices ballooning to more than 4.5 million network appliances, IoT devices, and embedded systems around the world. That's up 40 per cent, or 1.3 million, from November, according to SEC Consult.
The good and the bad (Score:2)
This is just as good as it is bad. App and device makers are just as much if not more malicious than what we normally consider malware. Our devices and software are flat out being used against us. I agree that encryption should be as near perfect as possible to man in the middle attacks, but there simply MUST be a future way for the owners of endpoints to be able to tell what traffic their apps and devices are TRULY sending out. The biggest spies on the planet are the creators of so called TRUSTED software
Re: (Score:2)
I want to know what is leaving my systems and I should have total control over that as owner of my devices.
Roll your own ( software)
Re: (Score:2)
When possible I surely would, but it still should not be possible for software and device owners to hide communications even from the device it is leaving (and thus its owner).
Tivoization (Score:2)
Roll your own ( software)
That's sort of difficult when makers of networking appliances Tivoize their hardware in order to comply with national radio regulators' requirements for robustness of the radio against user modification to use frequencies or power levels not authorized in a particular country, and hardware makers aren't eager to advertise how locked down a networking appliance is against user-made software. See the TP-Link case [arstechnica.com].
Re: (Score:2)
So they can track everything, seriously. Most of these devices have no real need of an internet connection.
Anyway, that said, even my routers are using HTTPS, with a key and certificate pair generated by me for my own CA, it is possible, and not all that hard. I just added a HP printer to my network, again I uploaded my own certificate to it, it even had a nice wizard that generated the CSR which I then signed, run the wizard again and choose to upload the certificate.
Re: (Score:2)
So they can track everything, seriously. Most of these devices have no real need of an internet connection.
What? You mean my 'Flashlight Extreme 2.0' app doesn't need an internet connection or access to my microphone, camera, and contact list?
Re: (Score:2)
Well, it probably needs camera, but that's because the LED it turns on is the "camera flash". Past that, no it doesn't!
Re: (Score:2)
even my routers are using HTTPS, with a key and certificate pair generated by me for my own CA
Do you allow friends and family visiting your home onto your home network? Does your router have a web server that can serve files to internal users? If so, how do friends and family install the root certificate for your CA if they want to view the files that you've chosen to share with them?
Re: (Score:2)
I have a file server (CentOS running samba) they could connect to
An iPhone, Android phone, iPad, or Android tablet is more likely to come with an HTTPS client than to come with a Samba client. If you want to run an HTTPS server on your CentOS NAS, you'd still need to either A. buy a domain on a "real" TLD and get a cert for it, or B. run a private CA, issue a cert to the NAS, and somehow push your CA's root to these devices.
Re: (Score:2)
I wouldn't (for the sake of this argument) care if my router was all http because it doesn't answer on the WAN port. Same for everything on the LAN side, since I only open specific ports I care about.
How are these things being configured that they can be attacked on the net?
The problem is "I only open specific ports I care about" does not mean "I only open specific ports I take care about".
Too often, those ports will be ssh or web server instances, and if those are hacked, you have an intruder on the inside, who now has the ability to attack the router because she's now on the LAN side.
It may be tempting to allow sftp access to a NAS box on your lan, setting it up with really strong passwords.
But if the NAS box has an SSH private key from the vendor that's not unique to the bo
Re: (Score:2)
The thing is, if it doesn't exist, OpenSSH generates a brand new key to use on first run. So there is absolutely no need for it having vendor keys.
Re: (Score:2)
The thing is, if it doesn't exist, OpenSSH generates a brand new key to use on first run. So there is absolutely no need for it having vendor keys.
Except vendor backdoors, which they often graciously provide. Even if they don't lead to a normal account but something simple like dumping the serial number, they still tend to be exploitable for redirects.
And in some cases there are pre-generated keys identical for each device, the manufacturers duplicating a machine that has already been booted without deleting the keys first.
Secure Contexts require HTTPS even on home LAN (Score:2)
I wouldn't (for the sake of this argument) care if my router was all http because it doesn't answer on the WAN port.
The web interface presented by a cleartext HTTP server cannot use any APIs that are restricted to secure contexts [github.io]. (A secure context contains only scripts from potentially trustworthy origins, particularly hosts that resolve to 127.0.0.1, the file: scheme, and the https: scheme.) The spec lists several web APIs [github.io] that it encourages browser makers to restrict to secure contexts. Examples of such APIs that a web server inside an appliance on a home LAN might want to use include Service Workers, Geolocation, Med
Free and Easy. (Score:5, Insightful)
The biggest problem I see is the following.
1. Certificates are expensive
2. They are hard to Setup.
I am mostly an Application developer type of guy. I may setup a Secure site once every few years. However this process for Apache, and IIS seems to be overly complex. I am sure if I did it every day it would be second nature, but for the guy who does it every once in awhile, it takes a while and some trial and error.
There hasn't been much of a thought on making this process easy to understand for the non-Administrator/Security personnel to setup.
Now many of these devices that we use are made by companies whose main concerns are the following.
* Getting the product out fast
* Having the customer like the product
* Saving money in making the product
Security is one of those long term features if they can find "good enough" level they will not have many problems. For the most part "Good Enough" is to make sure the data is encrypted not necessarily encrypted well.
Re: (Score:3)
Because of rate limiting [letsencrypt.org], Let's Encrypt works only if you buy your own domain and dynamic DNS hosting. So if you sell a million appliances, you end up with a million users who each have to buy and renew a domain and buy and renew a dynamic DNS hosting plan.
Re: (Score:2)
If you want a real certificate with browser ubiquity, you can get them for USD $4.99
Plus the cost of a domain in a real TLD. Certificate authorities in the CAB Forum tend not to issue certs for dynamic IP addresses, for .local, or for made-up TLDs such as .onion (Tor) or .bit (Namecoin). Plus the cost of renewing all those every year.
Re: (Score:2)
Certificates are free.
Good certificates are cheap.
Better certificates are far from prohibitive for a one-off cost for a major commercial product.
And certificates for such things are NOT REQUIRED to be signed by a well-known CA. Almost all routers, switches, etc. have admin interfaces that aren't when you first get them.
And if my £50 home router can let me generate certificates, including roots, for SSL, IPSEC, RADIUS, SSH, etc. etc. etc. then there's really no excuse.
It's LITERALLY two lines of
Installing root CA to browse shared files on NAS (Score:2)
And certificates for such things are NOT REQUIRED to be signed by a well-known CA.
True for a router's administration interface, not so much if you want to allow friends and family to browse the files on your home NAS. Most are unlikely to be technical enough to install your private CA's root certificate.
Generate a CSR
Against what domain?
Re: (Score:2)
It doesn't matter, no domain required.
Your home NAS doesn't need to be signed at all. It just needs a cert.
Your family will get a warning, you just tell them to press okay.
If you're smart enough to activate a NAS on a DNS entry that resolves to it, with port-forwards into your local network, you're smart enough to sign a cert on that domain if you really want to.
Hell, Let's Encrypt makes it a matter of downloading a program on Windows, Linux or Mac and running it. You could do that for a subdomain.dyndns.
Re: (Score:2)
Hell, Let's Encrypt makes it a matter of downloading a program on Windows, Linux or Mac and running it. You could do that for a subdomain.dyndns.org if you could really be bothered.
As described in this post on Let's Encrypt forums [letsencrypt.org], trying that would produce the following error:
Only five customers of a particular dynamic DNS provider can obtain certificates from Let's Encrypt in any 7-day window unless the provider applies to join the Public Suffix List, which can take weeks and can be refused.
IoT developers are in a race. (Score:2)
Most IoT developer are in races to get their product through their particular niche's window of opportunity. First gadget-X through the window gets the bulk of the market share, and the biggest chance of being the 900-pound-gorilla after the niche's evcentual shakeout.
Doing security right is extra effort and time consuming. So the Invisible Hand is giving a back-pat to those who get to market earlier by ignoring it or doing a slap-dash job and spanking those who take time to do it well up front.
Later, whe
Doesn't matter (Score:1)
Re: (Score:2)
Is it? Really?
Please describe how you intend to fake a certificate that signs Facebook, say, from a CA that my browser will recognise without warning?
Although there have been instances of that, the CAs in question have basically hate their roots REVOKED from major browsers for doing such things, and with certificate pinning and modern browsers, there's no way to fake your way around HTTPS even if you can sniff and interfere with every single packet.
Those "MITM" things that workplaces and schools use to see
Re: (Score:2)
HTTPS is fine. Just use a modern browser and make sure the sites you're using are pinning their certificates. If you're paranoidly worried, remove all the trusted certs from your OS before your start and only trust the individual website's after you've checked it's the real cert from another machine.
That sounds like a lot of work just to check my email.
This ad brought to you by SEC Consult (Score:2, Interesting)
I've never heard of SEC Consult, but they're mentioned 3x in the summary.
Ha Ha Ha Ha (Score:2)
Ha Ha Ha Ha, err, I mean, that's terrible!!
Signed,
Hackers Everywhere
Needs to be easier (Score:2)
I've seen this across numerous companies and network device vendors.
Too many operators who manage these things don't even have a basic grasp of PKI.
Device vendors don't bother providing even basic operations to manage certificates - generating key pairs and CSRs. They expect the operators to handle it themselves OOB.
The result is "test" and "demo" certs the engineers who created them know full well are worthless get put into production because device vendor support doesn't want to deal with the support hea
Re: (Score:2)
Usable trust already exists in the form of username/password... why not just use it? All that is really necessary is for browser vendors to get off their collective asses and apply the TLS-SRP patches wasting away in their ticketing systems
You appear to refer to Bug 405155 in bugzilla.mozilla.org, which hasn't had significant activity in the past five years. The biggest issue they found is that TLS-SRP still sends the username in the clear where the MITM can snoop it, and if username is an email address, that could leak personally identifying information.
Re: (Score:2)
You appear to refer to Bug 405155 in bugzilla.mozilla.org, which hasn't had significant activity in the past five years. The biggest issue they found is that TLS-SRP still sends the username in the clear where the MITM can snoop it, and if username is an email address, that could leak personally identifying information.
This is as unavoidable as clients belching SNI and servers belching subject name in the clear when you connect to a secure site. And lets not forget each and every time I connect anywhere on the Internet the same old IP address I've had for years gets tagged right along with my communications.
This seems like quite an arbitrary excuse for inaction because the alternative is (what exists right now) is in fact much worse.
You can provision pseudonyms if leaking "admin" is a big deal. I don't see why it would
How do you generate different keys? (Score:2)
Re: (Score:2)
Re: (Score:2)
As others have mentioned if the OpenSSH daemon notices that there are no host keys it will automatically generate them when it's started so all you have to do really is to make sure that you do a
rm /etc/ssh/ssh_host_*
Before you create the image that you flash, and if you upgrade your embedded systems by flashing your image then you have to either move these keys to a location where they are not overwritten (i.e deleted) by your upgrade image or move them out before upgrade and then move them back after ot
IDIOT == Insecurely Designed Internet Of Things (Score:2)
Spread the meme.