[EAS] Fallout Over False Alert Continues

David Turnmire eassbelist at cableone.net
Thu Oct 30 21:46:45 CDT 2014


I may be missing something, but doesn't this essentially only provide a 
solution to the recent scenario where the real problem is the box not 
knowing what year the alert was sent for?  Aside from that particular 
issue, the system already knows how to recognize an expired alert.   My 
general view on technical problems is to fix the root problem when 
possible. In this scenario, the root problem is not knowing the year.  
If you are going to do something that requires changing software and 
rules... then fix that core problem.

The other problem we have is validating a deliberately false alert.   
And if I understand Mike's proposal correctly (and... I may very well 
not), all a "bad guy" has to do is intercept that weekly transmission, 
get the code, and use it in the bogus alert. Admittedly, that is harder 
than the scenario we currently have... but not by a lot.  Am I 
misunderstanding the proposal?

IPAWS already uses digital signatures both to accept alerts and in the 
distribution.  So, unless I'm missing something, we are already pretty 
secure in that aspect.  With enough effort, sooner or later someone will 
likely find a vulnerability and exploit it, but you can say the same for 
your bank account.  In my view, the more critical item is seeing if we 
can make the "legacy" part of this system less vulnerable.  Right now it 
takes very little resources (equipment, knowledge) to exploit the 
system.  As others have noted, we have been just lucky so far.

Still, we have, I believe, an opportunity in the fact that the early 
generation EAS equipment won't be with us that much longer. Indeed, some 
will become effectively illegal next June.  Once we have unsupported 
equipment that can only be upgraded by swapping firmware chips, we have 
more options.  For various reasons, it seems we'll likely continue 
having SAME as part of the EAS system for some time.  But that doesn't 
mean we can't find a clever way to "tweak" the protocol that is 
backwards compatible with consumer weather radios, while still providing 
enhanced security where we need it the most... at broadcasters and cable 
companies.

For instance... we have 8 characters devoted to a "callsign". Could we 
get by with using only 4 of those for a callsign and use the rest for 
carrying some extra bytes related to an authentication scheme?  Your 
consumer weather receiver would just ignore the that part, so no problem 
there.  We already have cases where three and even four broadcasters are 
using the same encoder and just pick 2 of those callsigns to include in 
alert.  Not much different to drop that to just using one 4 character 
callsign.  If all the associated stations are in the same building, that 
is likely "close enough" for identification purposes.  If I did my math 
right, and using only alphanumeric characters (upper and lower case), we 
end up with something like 14 million possibilities.

Is there some clever mathematical way that we could change the above 
code automatically in some fashion, that is easily "solved for" in the 
decoder, yet not predictable based upon interception of the broadcast 
code?  That is outside of my expertise, but I suspect so.  Maybe in one 
of the ways Rich mentioned earlier (using the Julian date, or 
whatever).  Or maybe you'd need to combine this with getting a periodic 
updated number such as Mike described via a secure system like IPAWS.  
The key thing in my view is that if the system required a second number, 
you need to get that number far enough in advance to avoid any temporary 
internet outage issues, while not so far in advance that it allows a 
hacker to know which one of those 14 million possibilities above to use 
in his fake alert.

Whatever the solution, IMHO, if we are going to do something that 
requires modifying software AND FCC rules... lets address both the event 
YEAR issue.... AND the sender authentication issue... at the same time.  
In a way that is useable with RF delivered alerts that essentially use 
SAME... with a few tweaks that consumer receivers don't mind.  It 
needn't be the same security system as used with CAP (present or 
future)... but that doesn't mean it can't leverage the fact that the 
same box knows about CAP.

Dave

On 10/30/2014 6:41 PM, Mike McCarthy wrote:
> Since it was my idea, let me elaborate. The authentication code would be
> made available and circulated either as the RWT or a referenced attached
> file to the RWT retrieved by the EAS box each week. The code would then
> be stored in the local unit until updated the following week. Thus when
> there is such an alert, the box need not reach back to the mother ship
> and probably through a very congested internet and server.
>
> A safety would be either a two week overlap where either of two codes
> would work and/or the box "phone home" if it should receive a request it
> doesn't recognize or can confirm.
>
> The key here is to 1) Make the authentication process lightning fast so
> the relaying box can react accordingly. The process could be similar to
> Kerbos to insure the code remains uncompromised. And 2) create something
> in the message header compels the ENDEC to refer to that authentication
> code and cross check to the companion code in the header.
>
...



More information about the EAS mailing list