<div dir="ltr">Hi Mark,<div><br></div><div>I think you (and many others on the list) are conflating IP connected devices and the IoT, which is a mistake. Sure there's market-speak out there that calls IP connected (especially Wi-Fi connected) devices "IoT". </div><div><br></div><div>When you talk about durable goods, what appliance manufacturer really wants to field support calls because someone's home Wi-Fi isn't working, if they can spend $5 per year for an IoT SIM to avoid that swamp. And think about (increasingly connected) cars. Can you imagine a car manufacturer wanting to think about residential gateways? I hope not - they would fail. They're all using cellular networks already. Airplane engines? Satellite networks. Smart meters? Anything <b>but</b> Wi-Fi.<br><br></div><div><b>If you take anything away from this, please let it be: The IoT revolution will not be Wi-Fi enabled.</b></div><div><br></div><div>1.) Narrow-band IoT (nbIoT), the cellular operator's answer to GPRS (an evolution of the Weightless protocol), is inherently secure. I know, I read the Weightless spec years ago and they did it right. PKI all over the place. nbIoT is already running on many cellular base stations around the world now, and I expect within two years every major cellular carrier in the world will be running nbIoT in sub-GHz spectrum alongside their 3g/4g services. They'll do this without adding new hardware anywhere on their network - it's just a software load & it will replace a GSM or GPRS carrier padding out their 3g services now.</div><div><br></div><div>2.) LTE-MTC, the cellular operator's answer to machines that are currently connected via 3G, is inherently secure. It's LTE. Let me know when someone compromises LTE (without taking advantage of a fallback attack). It won't be soon.</div><div><br></div><div>3.) SigFox, an international IoT network running in the ISM space that's meant to replace automated meter reading, is inherently secure. (authentication, integrity, encryption, anti-replay, anti-jamming, etc, etc.)</div><div><br></div><div>4.) LoRaWAN, in my eyes the "Wi-Fi" of IoT networks (as you don't need to be a carrier to deploy), is inherently secure. It's got everything that SigFox has and more. I operate a LoRaWAN network covering most New Zealanders. All the features you see in SigFox are there, plus mandatory application-level encryption. As a network operator I cannot ever see a customer/end user data payload. It's not possible. This isn't my choice, it's how LoRaWAN works.</div><div><br></div><div>Sure there are plenty of people out there hacking stuff together with Wi-Fi. Plenty of Kickstarters, plenty of press. It's an echo chamber. If you're still backing Kickstarters you don't know who the patsy is.</div><div><b><br></b></div><div><b>The IoT revolution will not be Wi-Fi enabled. </b>Best thing you can do is understand the options & steer your customers & peers in the right direction.</div><div><br></div><div>-JB</div><div><br></div><div><br></div><div><br></div><div><div class="gmail_extra"><br><div class="gmail_quote">On 12 June 2017 at 12:31, Mark Delany <span dir="ltr"><<a href="mailto:g2x@juliet.emu.st" target="_blank">g2x@juliet.emu.st</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">It seems that this is a disaster just waiting to happen.<br>
<br>
If network appliance companies can't get security right, the chances of<br>
white-goods manufacturers doing so has got to be even less likely. E.g., the<br>
latest model of my electric toothbrush has bluetooth connectivity so<br>
Internet access is surely just a step away. Does a toothbrush manufacturer<br>
attract top-notch security programmers (yet alone think they need them)? I<br>
doubt it.<br>
<br>
A natural choke point is the residential router/modem. Has any work been<br>
done to define the capabilities or profile of such a choke point that might<br>
inherently protect IOT devices?<br>
<br>
Without thinking too hard, I envision a residential router might create a<br>
number of local networks that are constrained in certain ways such as no<br>
inbound connections, no outbound connections, no cross-device connections,<br>
filtered list of external destinations, that sort of thing.<br>
<br>
Such constraints might be implemented as separate VLANs or wifi networks or<br>
both, managed in a user-friendly manner. Something that most modern<br>
residential routers could implement today.<br>
<br>
When a new device is added to the network, the router portal could be used<br>
to allow it access and place it in the appropriate VLAN. Address-space<br>
management might also work - such as link-local address allocation. Heck, an<br>
IoT device might identify itself in some way and the router could<br>
automatically spin up the appropriate VLAN and firewall rules without any<br>
human intervention.<br>
<br>
<br>
Beyond constraints, there are also service needs. My new AV receiver likes<br>
to contact their manufacturer's HQ for an NTP service. That could readily be<br>
offered locally rather than opening up wider access. One imagines some sort<br>
of local service discovery might work here, such as Bonjour. Again something<br>
that most modern routers could implement today with ease.<br>
<br>
Serendipitously, NBNCo has a list of approved VDSL modems. One wonders<br>
whether that could be extended to a list of modems that support an IoT<br>
security profile?<br>
<br>
Sorry about the ramble, but improving IoT security seems like a<br>
multi-faceted problem that we can't afford to ignore. Does anyone disagree?<br>
<br>
<br>
Mark.<br>
______________________________<wbr>_________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" rel="noreferrer" target="_blank">http://lists.ausnog.net/<wbr>mailman/listinfo/ausnog</a><br>
</blockquote></div><br></div></div></div>