The Internet of Unpatched Things



Similar documents
Veracode White Paper The Internet of Things: Security Research Study. The Internet of Things: Security Research Study

Chapter 11 Cloud Application Development

POPP Hub Gateway. Manual

Computer Networking. Definitions. Introduction

WISE-4000 Series. WISE IoT Wireless I/O Modules

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Getting Started with PRTG Network Monitor 2012 Paessler AG

Famly ApS: Overview of Security Processes

Multi-Homing Dual WAN Firewall Router

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

SYSTEM COMPONENTS. Gateway. Sensors. Repeater Figure 1

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

CARRIOTS TECHNICAL PRESENTATION

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

ZODIANET API (ZAPI2)

Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)

Configuration Guide BES12. Version 12.2

emerge 50P emerge 5000P

Tk20 Network Infrastructure

Ranch Networks for Hosted Data Centers

How to Configure an Initial Installation of the VMware ESXi Hypervisor

Barracuda Load Balancer Online Demo Guide

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Home Internet Filter User Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Configuration Guide. BES12 Cloud

Hills Professional Series NVRs and Cameras

KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE

CumuLogic Load Balancer Overview Guide. March CumuLogic Load Balancer Overview Guide 1

CTS2134 Introduction to Networking. Module Network Security

Configuration Guide BES12. Version 12.1

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

7 6.2 Windows Vista / Windows IP Address Syntax Mobile Port Windows Vista / Windows Apply Rules To Your Device

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

GV-iView HD V1 for ipad

GS1 Trade Sync Connectivity guide

UC Office for Smart Phone - iphone Edition

Qsync Install Qsync utility Login the NAS The address is :8080 bfsteelinc.info:8080

Tronico Technology Company Limited. First step of IOT - DIY smart home

Active Management Services

Quick Installation Guide

1. Introduction What is Axis Camera Station? What is Viewer for Axis Camera Station? AXIS Camera Station Service Control 5

Basic Network Configuration

Configuration Guide BES12. Version 12.3

Protocols. Packets. What's in an IP packet

Web Application Firewall

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

White Paper How to Remotely Access Ethernet I/O Over the Internet

In the pursuit of becoming smart

Multi-Homing Security Gateway

Network setup and troubleshooting

Access the GV-IP Camera through a broadband modem

Network Configuration Settings

White paper. SIP An introduction

Legal Disclaimers. For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian Electrical Code.

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

April 11, (Revision 2)

Application Note. Onsight TeamLink And Firewall Detect v6.3

Skype Connect Requirements Guide

Chapter 6 Virtual Private Networking Using SSL Connections

A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router

INSTRUCTION MANUAL Neo Coolcam IP Camera

Network Security: Workshop

ENTRYCONTROL. Version Administrator manual for use with ALPHATECH TECHNOLOGIES IP BOLD DoorPhone intercom. For Administrators only

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

Thingsquare Technology

DMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1

Introduction Chapter 1. Uses of Computer Networks

How To Create A Virtual Private Cloud On Amazon.Com

Release Notes for NeoGate TE X

Notification messages

API documentation - 1 -

Prepare your IP network for HD video conferencing

December P Xerox App Studio 3.0 Information Assurance Disclosure

Mobile Device Manual for 3G DVRs

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Zorp and KZorp: Integrating Packet Filtering and Userspace proxying

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

IOS EYE4 APP User Manual

EXPLORER. TFT Filter CONFIGURATION

Preparing for GO!Enterprise MDM On-Demand Service

Policy and Profile Reference Guide

Using SonicWALL NetExtender to Access FTP Servers

How to set up popular firewalls to work with Web CEO

A Scalable Network Monitoring System as a Public Service on Cloud

Creating a DUO MFA Service in AWS

Integrating the F5 BigIP with Blackboard

Savvius Insight Initial Configuration

UPnP Internet of Things Dec 2014

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

LifeSize Video Communications Systems Administrator Guide

Internet Technology Voice over IP

Enabling Smart Data on M2M Gateways and Aggregators

Network Security CS 192

McAfee Web Gateway 7.4.1

ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

Wireless G Broadband quick install

Transcription:

The Internet of Unpatched Things Sarthak Grover and Nick Feamster Princeton University PrivacyCon 16

Current State of Consumer Smart Devices Many different manufacturers, small startups, novice programmers Low capability hardware, not enough for security protocols Most data goes to an online server on the cloud Even devices in the same home communicate via the cloud forgerock.com 2

Unpatched IoT Devices Put Our Privacy at Risk IoT device network traffic: Leaks user information Identifies the device being used May also identify current user activity and behavior! email:xxx@y.com URI: smart-light json:{ activity : switch_on } 3

Case Study of Some Common Home IoTs PixStar Digital Photoframe SmartSense Multi-sensor Sharx Security IP Camera Smartthings Hub WiFi Z-Wave Laptop Gateway (Passive Monitor) Belkin WeMo Switch Nest Thermostat Ubi Smart Speaker 4

Digital Photoframe: Traffic Analysis All traffic and feeds (RSS) cleartext over HTTP port 80 All actions sent to server in HTTP GET packet Downloads radio streams in cleartext over different ports DNS queries: api.pix-star.com, iptime.pix-star.com 5

Photoframe: Privacy Issues User email ID is in clear text when syncing account Current user activity in clear text in HTTP GET DNS queries and HTTP traffic identifies a pix-star photoframe email current activity 6

IP Camera: Traffic Analysis All traffic over cleartext HTTP port 80, even though viewing the stream requires login password Actions are sent as HTTP GET URI strings Videos are sent as image/jpeg and image/gif in the clear FTP requests also sent in clear over port 21, and FTP data is sent in clear text over many ports above 30,000 DNS query: www.sharxsecurity.com 7

IP Camera: Privacy Issues Video can be recovered from FTP data traffic by network eavesdropper DNS query, HTTP headers, and ports identify a Sharx security camera private user data 8

Ubi: Traffic Analysis All voice-to-text traffic sent in clear over port 80 Activities sent in clear, and radio streamed over port 80 Sensor readings are synced with server in the background over port 80 Only communication with google API used HTTPS on port 443 and port 5228 (google talk) DNS query: portal.theubi.com, www.google.com, mtalk.google.com, api. grooveshark.com 9

Although HTTPS is clearly available, Ubi still uses HTTP to communicate to its portal. Eavesdropper can intercept all voice chats and sensor readings to Ubi s main portal Sensor values such as sound, temperature, light, humidity can identify if the user is home and currently active Email in the clear can identify the user DNS query, HTTP header (UA, Host) clearly identifies Ubi device current state Ubi: Privacy Issues current activity 10

Nest Thermostat: Traffic Analysis All traffic to nest is HTTPS on port 443 and 9543 Uses TLSv1.2 and TLSv1.0 for all traffic We found some incoming weather updates containing location information of the home and weather station in the clear. Nest has fixed this bug after our report. DNS query: time.nestlabs.com, frontdoor.nest.com, logrts01-iad01.devices.nest.net. transport01-rts04-iad01. transport.home.nest.com 11

Nest: Privacy Issues Fairly secure device: all outgoing personal traffic, including configuration settings and updates to the server, use HTTPS *User zip code bug has been fixed DNS query as well as the use of the unique port 9543 clearly identifies a Nest device. user zip code* 12

Smartthings Hub: Traffic Analysis All traffic over HTTPS on port 443 using TLS v1.2 No clear text port 80 traffic Flows to an Amazon AWS instance running smartthings server 3-5 packets update every 10 sec in the background DNS query: dc.connect.smartthings.com 13

Smartthings: Privacy Issues Very secure: No information about IoT devices attached to hub is leaked Background updates every 10 seconds (over HTTPS) fingerprint the hub DNS query identifies Smartthings hub, but not individual devices fingerprintable background traffic packets/sec Smartthings Traffic 14

Conclusion: Be Afraid! Very difficult to enforce security standards Multiple manufacturers Low capability devices Use of non-standard protocols and ports Difficult to maintain and patch due to low workforce and/or expertise Who is responsible? (ISPs? Consumers? Manufacturers?) Who is liable? Who should pay? 15

Conclusion: Be Afraid! Very difficult to enforce security standards Multiple manufacturers Low capability devices Use of non-standard protocols and ports Difficult to maintain and patch due to low workforce and/or expertise Who is responsible? (ISPs? Consumers? Manufacturers?) Who is liable? Who should pay? Can we solve this on the network? If so, how? How much information about user behavior do devices leak to the network? Can we offload device security to the home gateway or the cloud? 16

Thanks! 17

Smartthings: outlet and door sensor t=0 to t=100: Switch outlet ON and OFF repeatedly using mobile app >t=100: Background activity y-axis: Bytes per 10s 18

Smartthings hub (Work in progress) Difference in activity pattern for door sensor and smart outlet May identify type of user activity and device category (if not the exact device) from this limited list: http://www.smartthings.com/compatible-products Associate network pattern with activity Eavesdrop to predict user behavior 19