[AusNOG] What are we going to do about IoT (in)security?

Alan Maher alanmaher at gmail.com
Mon Jun 12 17:50:58 EST 2017


Have ISP's surveyed the state of ancient & insecure CPE's that they have 
supplied
and which are still operating? This has a bearing on things.

On 12/06/2017 6:51 p.m., Narelle wrote:
>
>
> On Mon, Jun 12, 2017 at 10:31 AM, Mark Delany <g2x at juliet.emu.st 
> <mailto:g2x at juliet.emu.st>> wrote:
> > It seems that this is a disaster just waiting to happen.
> >
> > If network appliance companies can't get security right, the chances of
> > white-goods manufacturers doing so has got to be even less likely. 
> E.g., the
> > latest model of my electric toothbrush has bluetooth connectivity so
> > Internet access is surely just a step away. Does a toothbrush 
> manufacturer
> > attract top-notch security programmers (yet alone think they need 
> them)? I
> > doubt it.
>
>
> The Communications Alliance currently has a Guideline out for comment 
> on the security of IoT. I encourage you all to comment.
> See: 
> http://www.commsalliance.com.au/Documents/newsletter/we-communicate/Latest-Edition 
>
>
> It will be published as Communications Alliance Industry Guideline 
> G654:2017 Internet of Things Security once reviewed.
>
> We at ACCAN have been doing a project on IoT security of smart home 
> devices and expect to release that data more broadly later this year. 
> Basically we funded a group of researchers at UNSW to "examine" the 
> security of a bunch of devices on the market for Australian consumers. 
> We found most were easily exploitable with some improvements noted 
> over the course of the study.
>
> You're right, a lot of mitigation can be done at the home gateway, and 
> on the ISP network, and there are a range of issues today. From not 
> imposing anti-spoofing filters to shipping home gateways with open 
> ports and default/no password it doesn't help the situation. Why is it 
> there are so many people running networks today that can't even spell 
> BCP38??!! Then along come all these devices without the CPU or memory 
> capacity to implement additional security after the fact.
>
> What is likely to cause change are two things: insurers not covering 
> vendors of these devices when they are insecure; and getting sued for 
> not being fit for purpose/being exploitable. This may well apply to 
> network operators as well.
>
> If you don't implement even baseline security and your customers face 
> trouble, their insurers may force them to come after you when the 
> liabilities are sheeted home.
>
> I never thought I'd ever broach this topic on AUSNOG, but what the 
> hey, here goes... there is a classic example of how an insecure device 
> manufacturer can be held liable: 
> http://fortune.com/2017/03/10/sex-toy-maker-settlement-smart-vibrator-lawsuit/ 
> US$3.75 for leaking privacy details in response to a class action 
> being awarded against them. While this was for breach of privacy 
> legislation (which wouldn't apply under Australian rules) it is only 
> inevitable that security issues will also trigger law suits in future. 
> Here as well as elsewhere.
>
> You also see devices with code cut and pasted from other systems 
> without any thought of the actual application the thing is for. The 
> absolute most worst example I've seen is this one: 
> https://www.theregister.co.uk/2017/04/04/intimate_adult_toy_fails_penetration_test/ 
> I truly cannot comprehend what the designers of this were thinking.
>
> Privacy and security by design please people...
>
>
> -- 
>
>
> Narelle
> narellec at gmail.com <mailto:narellec at gmail.com>
>
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog



---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20170612/777f5eb0/attachment.html>


More information about the AusNOG mailing list