[EAS] EAS Zombie Attack
David Turnmire
eassbelist at cableone.net
Wed Feb 13 22:08:39 CST 2013
John,
I appreciate the feedback, but respectfully suggest that you aren't
living in the world many of us are living in. We have a small universe
of EAS decoder boxes to chose from and while you can make comments like
"you have described a worthless device that can only be taken outside
and bashed into pieces. ", that isn't very helpful to us. We don't have
the budget to "bash into pieces" every poorly designed product that for
one reason or another we got stuck with. In my experience, broadcast
equipment that complies with "best security practices" known to the IT
community for decades is all too rare. Drives me nuts, but that is what
we have.
As for "most operating systems..."... again, not particularly relevant
in our universe. These boxes weren't built on Windows or OS X. They
were built on Linux or BSD (at least those I've worked with). And the
typical engineer doesn't have that much familiarity with those operating
systems. And it may not matter if they do if the vendor doesn't allow
them access to the OS, but only to the web interface.
To give you an example of how silly it can get... one manufacturer of an
early CAP 'converter boxes' actually sold a box that wouldn't work
without accurate time, but provided NO means for the end user to set the
time! The box supported NTP, but the NTP functionality only worked if
the box was already within 16 minutes of the correct time! Of course,
it ran on BSD and IF the end user had been allowed access to the OS, the
date/time could have been set. But the manufacturer considers that
proprietary information! Words can not adequately express what I think
of that product (now off the market).
And you are seriously telling me it is unrealistic to expect a user to
tolerate a one hour lockout if they miss the password five times in a
row... but that they WILL tolerate a 100 character password? Not in my
universe. To my way of thinking, any form of lockout (even 5 minutes
after failing TEN attempts in a row) will make dictionary attacks
essentially worthless, even with more modest password lengths like 10 or
12 characters. And I didn't suggest sending emails about EVERY failed
login... only enough failed logins to result in a lockout. Just how
many emails do you think that is going to result in? Our banks and
corporate computers lock us out... why should we expect less from our
EAS box?
And note that I didn't suggest "requiring" complex passwords... just
"supporting them". A user shouldn't have to worry about the hassle of
dealing with a system that isn't flexible about what it will tolerate
for choice of characters. If the user wants to use J&*LFeje as their
password, fine. Personally, I'm far more interested in encouraging pass
phrases than complex 8 character passwords. Passwords you can remember
or more secure than ones you can't that are on the sticky note on the
side of your monitor! If my math is correct, a complex 8 character
password gets you somewhere in the neighborhood of 7 x 10E14
combinations. A lower case alpha only password that is 10 characters
long gets you around 1.4 x10E14 and an 11 character gets you to 3.7 x
10E15.
I'll agree with you on the point about how often you change passwords,
but that is a point of some controversy and obviously a significant part
of the IT industry disagrees with us.
I don't have a clue what prompted your comments about IP addresses. As
for port numbers... again you are in a different universe than most of
us here. Our vendor didn't negotiate anything about port numbers with
our IT department. The port numbers used are industry standard
assignments for HTTP (80), HTTPS (443), etc, etc. It is the fact that
they ARE industry standard that makes it easier for hackers. And harder
to accommodate the port forwarding limitations of the typical routers
used by small broadcast stations (think Netgear or Linksys).
Dave
On 2/13/2013 7:25 PM, John Willkie wrote:
> I don't make EAS systems, but I do make remotely accessed PSIP generators. While the above list is well-intentioned, it mostly amounts to "security theater" and not security, or what all vendors should already be doing. Of course, inside the machine, passwords need to be kept not only "hashed" but "salted" so that "rainbow tables" can't be used to easily and quickly reverse-engineer passwords from hashes.
>
> All password systems should start with a default password. However, most operating systems (even Windoze) permit an administrator to set a password to "must change password at first login." If this isn't a security feature, the vendor is being foolish and the customer will pay the bill.
>
> As for password complexity, please, this is a joke from the 1980s and more security theater. Nor is there any reason to EVER routinely change passwords. Change passwords when someone leaves. But, use passwords that are at least 100 characters long. Speaking of complexity, imagine how many combinations of values a script kiddie needs to go through to try 52^99 combinations?
>
> As for "lock out" not in this life buddy, you are telling vendors to make it difficult or impossible to log on to a system when you've forgotten the password. How about sending an email message on each failed login attempt? How quickly would you change the settings if you got such emails?
>
> IP numbers can't easily be changed within a device; this is a function of the router/switch and DHCP. Putting the ability within a device is a non-starter. As for being able to change port numbers, this is a can of worms, since the vendor most likely previously worked out with the corporate IT department what ports are permitted. This is a router/switch/firewall issue and not a device issue. Permitting users to willy-nilly change port numbers is no substitute for having a good firewall.
>
> As for "providing any means to disable protocols not in use." If you have a system that by default enables protocols to communicate with the Internet (or even an Intranet) or exposes ports to either by default, you have described a worthless device that can only be taken outside and bashed into pieces. If a system runs under a computer operating system, the build should only contain the services and features necessary to run the vendor's applications through their entire life-cycle and no other. No user should be exposed to any option that could compromise secirity; that's just asking for the ability to create a customer-service nightmare.
>
> John Willkie
> EtherGuide Systems
>
> __________________________________________________________
> The EAS Forum Discussion List is hosted by the BWWG (Broadcast Warning Working Group). http://eas.radiolists.net
> Please invite your friends to join our Forum! The sign up is at: http://lists.radiolists.net/mailman/listinfo/eas
> ___________________________________________________________
>
More information about the EAS
mailing list