Barbara,

On 04/11/2016 04:00, STARK, BARBARA H wrote:
>>> I could be wrong, but I believe that Dyn was DDoSed by the Mirai
>>> botnet, which propagates by exploiting devices configured with default
>> credentials.
>>> This has nothing to do with outdated firmwares.
>>
>> The problem is that you cannot realistically update those firmwares.
> 
> Many companies provide devices that do automated updates. It's totally 
> realistic to update firmwares.

Not always. My CE can't be updated any more, I think because its flash memory 
is too small
for recent versions. And I had the same experience a few years ago with a 
previous CE. Not to
mention that most vendors simply stop supporting old hardware after a few 
years. Also
as Juliusz pointed out, if the device was shipped with user admin, password 
admin and the
user (being a normal citizen) doesn't change it, any amount of new vendor 
firmware won't
fix it.

Yes, I agree it's possible to do better, but what's the incentive for a 
bottom-feeding vendor
of cheap devices to bother?

Regards
    Brian

> There exist various methods, tools and best practices. The problem is that 
> some manufacturers don't bother to make their
devices upgradable. By not having to maintain the firmware of shipped devices, 
the devices can be sold very inexpensively. So
price-conscious consumers will  buy them, instead of the more expensive, 
well-maintained devices.
> 
>> It is trivial to compile a new firmware for those devices that doesn't 
>> request
>> upnp to open ports to telnet or ssh. But is is impossible to deploy such an
>> update.
> 
> I can't speak for others, but DIRECTV set-top-boxes all do auto update, as do 
> Digital Life IoT devices, and U-verse residential gateways. I think iControl 
> IoT devices do, too. So, no, it's not impossible. It's just cheaper and 
> requires less skill and effort to create devices that can't be updated. The 
> exploited vulnerabilities (in the Dyn attack) have been known for years, and 
> fixes have been available for years. Even after they were known, new units 
> were still shipping with the vulnerability. Secure methods for updating 
> devices and best practices for using these methods have existed for years. If 
> the device manufacturer had built in a mechanism to allow for secure, 
> automated updates (and not hard-coded a default password for access to all 
> devices that couldn't even be changed by firmware update), and had made 
> updates available in a timely manner, there wouldn't have been vast numbers 
> of devices to exploit. 
> 
>> For consumer electronics, we cannot rely on consumers to actually download
>> and install new firmware. So part of the solution to securing those devices
>> has to be that (out of the box) they will update automatically.
> 
> +1
>  
>> For the same reason, having lots of devices on the internet that have been
>> abandoned by the vendor is also a huge security risk. So ideally those 
>> devices
>> should shutdown automatically.
> 
> Which means the vendor would still be responsible for building in a remote 
> "kill switch". Ideally, manufacturers would be required to warn consumers 
> prior to purchase that the device will be bricked (or maybe just have all IP 
> connectivity disabled) if it is ever discovered to have an easily exploitable 
> vulnerability.
>  
>> Note that PCs, browsers, etc. are now somewhat secure because they
>> update automatically. We need to do the same with all other devices
>> connected to the internet.
> 
> +1
> 
> Barbara
> 
> _______________________________________________
> homenet mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/homenet
> 

_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to