Re: Comcast storing WiFi passwords in cleartext?

2019-04-26 Thread Töma Gavrichenkov
On Fri, Apr 26, 2019, 9:31 PM Rich Kulawiec  wrote:

> Also, given that this is a public mailing list, lots of people who didn't
> know the target existed last week could certainly know it now.
>

Yup, the dependency on an obscurity was inadvertently broken here. Sorry
for that.

Hope no one was really relying on it though.

--
Töma

>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-26 Thread Saku Ytti
On Thu, 25 Apr 2019 at 20:17, Doug Barton  wrote:

> There are two mindsets that desperately need changing in the tech world:
>
> 1. Do not store data that you don't have a legitimate requirement to store
> 2. Do not store anything even remotely sensitive in the clear

#2 might be quite complex

There might be all kind of instrumentation built by people who don't
realise or have no easy ability to discriminate what is sensitive
data. Like someone might build really great JVM/Beam/GraalVM
instrumentation to monitor for performance regressions and deep
analytics, some of the analytic data collected potentially could be
sensitive. Or you might have some database where you store all
exception traces and core dumps and machine analyse them, those could
contain sensitive data. Or you could have analytics on UX, how people
interact with the software. Or you could have internal network
tap/sflow with decryption to better understand where network I/O
bottlenecks are or something else that can't even think of now, but
will be obvious after I read about it.
Looking at the late Facebook 'clear text PW', it doesn't read to me
like they had user auth data in database in plain text, it reads to me
like they had some debugging on for one specific application, and
people using that application to authenticate to facebook had their PW
with other debugging data stored somewhere.

I don't think it's tenable to hope that your sensitive data is being
handle as sensitive data or assume it is outlier when it is not. I
assume every sufficiently large and old company has my password stored
somewhere in clear text right now without them realising it and they
might come public when they realise it in few years time.
We're particularly vulnerable when we think it as simple problem as
hash in database and we would never do something so stupid as store
cleartext in DB.

-- 
  ++ytti


Re: Comcast storing WiFi passwords in cleartext?

2019-04-26 Thread Rich Kulawiec
On Fri, Apr 26, 2019 at 07:06:40PM +0300, T??ma Gavrichenkov wrote:
> Also, I've seen people who use the same password (sometimes with few easily
> reversible modifications) for virtually all the purposes, from the WiFi
> router up to their e-mail and banking accounts.

This is one of the many risks incurred here: password re-use is
amazingly common (sometimes, as you note, with a few easily reversible
modifications).  Accruing a database full of these means building a
target, and the bigger it is, the more valuable target it will become.
Also, given that this is a public mailing list, lots of people who didn't
know the target existed last week could certainly know it now.

I hear all the arguments in favor of convenience but it's worth noting
that making things convenient for support ops in this fashion has the
unpleasant side effect of making them convenient for attackers.

---rsk



Re: Comcast storing WiFi passwords in cleartext?

2019-04-26 Thread Töma Gavrichenkov
Peace,

On Thu, Apr 25, 2019, 4:53 PM Stephen Satchell  wrote:

> > not only does someone have to 'hack' the database,
> > they also need to drive up to your house and sit in your driveway to get
> > free Internet.
>
> Sounds like you live in a single-family home, in a low-density
> neighborhood.  I live in an apartment complex, and WiFi Analyzer shows
> more than 20 beacons visible from my kitchen.


Also, I've seen people who use the same password (sometimes with few easily
reversible modifications) for virtually all the purposes, from the WiFi
router up to their e-mail and banking accounts.

Which is why today, if you store nearly anything close in a sense to a
passphrase in your database in cleartext, then you might be at risk just
because of that.

--
Töma

>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-26 Thread Töma Gavrichenkov
On Thu, Apr 25, 2019, 9:51 PM Valdis Klētnieks 
wrote:

> This assumes that the customer has a spare CAT-5 cable and knows how to
> use it.
>

This is assuming that no customer's device has an access to the same
network, in which case you just happily reset the password or even the
device as a whole, either remotely or by telling the customer to push and
hold a button on the device.

Though I understand that this could be less convenient in certain scenarios.

Most of the time though[citation needed], at least a couple of devices with
the wireless network access are there.

--
Töma

>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread Brandon Jackson via NANOG
That is not related to the Gateway at all, nor done on the local network
are missing with the local network as I was describing. That is further
Upstream.



Brandon Jackson

On Thu, Apr 25, 2019, 14:50 Mel Pilgrim  wrote:

> On 2019-04-23 18:32, Brandon Jackson via NANOG wrote:
> > I'm not saying they are doing anything nefarious or packet capping the
> > local network or anything of that nature that is a little on the tin
> > foil hat side for me personally,
> Except they (Comcast) are doing literally that.  When you get close to
> your data cap for the month, they inject a warning popup into
> unencrypted webpages.  They also modify DNS replies in flight even when
> you don't use their resolvers.
>
> Source: direct observation
>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread Valdis Klētnieks
On Thu, 25 Apr 2019 21:42:25 +0300, T�ma Gavrichenkov said:
> Isn't it just better to have it always displayed, in a 40pt sized font, on
> some LAN-accessible Web page, reachable without authentication by default,

This assumes that the customer has a spare CAT-5 cable and knows how to use it.

And somebody will manage to not understand that an RJ45 and an RJ11 are 
different,
causing all sorts of hilarity.


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread Töma Gavrichenkov
On Thu, Apr 25, 2019, 3:57 PM Mike Bolitho  wrote:

> Grandma Smith calls in because she changed her WPA2 password two years
> ago. Her grandson just bought her a new iPad and she can't connect. Tier I
> support says "I have your 'WiFi password' right here. It's hunter22." The
> call take 45 seconds and you're off to solve the next question.
>

Isn't it just better to have it always displayed, in a 40pt sized font, on
some LAN-accessible Web page, reachable without authentication by default,
so that the call center folk won't have to spend 2 more minutes telling
Mrs. Smith that "yes, two is a number and hunter is in lowercase" but would
rather simply point her to an URL?

--
Töma.

>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread K. Scott Helms
Tom,

No, and I would hope that they were storing it in an encrypted format and
then decrypting it on the fly for display in the customer portal.

Scott Helms



On Thu, Apr 25, 2019 at 1:55 PM Tom Beecher  wrote:

> As much as it pains me to Devil's Advocate for Comcast... Has anyone
> proven that they are storing this PSK in cleartext? From the original
> StackExchange post :
>
> " When I went to the account web page, it showed me my password. I
> changed the password and it instantly showed the new password on the
> account web page (after refresh). "
>
> The SNMP response is essentially cleartext , sure. But perhaps they are
> performing the query from a modem management network only accessible from
> the RF side, the transmission back to the CS backend is encrypted in
> flight, and the data is also encrypted at rest until retrieved and
> decrypted by a agent or the end user via the web portal. Nothing has been
> shown that I can recall reading that proves or disproves any of that.
>
>
>
> On Thu, Apr 25, 2019 at 1:17 PM Doug Barton  wrote:
>
>> On 4/25/19 8:04 AM, K. Scott Helms wrote:
>> > Just so you know, if you have an embedded router from a service
>> provider
>> > all of that data is _already_ being transmitted and has been for a long
>> > long time.
>>
>> Responding to a pseudo-random message ...
>>
>> If you are an average consumer and purchase a managed solution (in this
>> case a WAP that comes as part of your package) I think it's perfectly
>> reasonable for the vendor to manage it accordingly, even if said
>> consumer doesn't fully understand the implications of that decision.
>>
>> In my mind, the problem here is not that the vendor has access to this
>> data, it's that they are STORING it in the first place, and storing it
>> in the clear to boot. In the hypothetical service call that we've
>> speculated is the driver for this, the extra 15 or 20 seconds that it
>> would take to pull the data via SNMP is in the noise.
>>
>> There are two mindsets that desperately need changing in the tech world:
>>
>> 1. Do not store data that you don't have a legitimate requirement to store
>> 2. Do not store anything even remotely sensitive in the clear
>>
>> We live in a world of all breaches, all of the time. So we need to start
>> thinking not in terms of just protecting said data from the outside, but
>> rather in terms of limiting the attack surface to start with, and
>> protecting the data at rest. So that WHEN there is a breach, whether
>> from within or without, the damage will be minimal.
>>
>> As many have pointed out, this information is freely available via SNMP,
>> so it's a classic example of something that didn't need to be stored in
>> the first place.
>>
>> Doug
>>
>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread Tom Beecher
As much as it pains me to Devil's Advocate for Comcast... Has anyone proven
that they are storing this PSK in cleartext? From the original
StackExchange post :

" When I went to the account web page, it showed me my password. I changed
the password and it instantly showed the new password on the account web
page (after refresh). "

The SNMP response is essentially cleartext , sure. But perhaps they are
performing the query from a modem management network only accessible from
the RF side, the transmission back to the CS backend is encrypted in
flight, and the data is also encrypted at rest until retrieved and
decrypted by a agent or the end user via the web portal. Nothing has been
shown that I can recall reading that proves or disproves any of that.



On Thu, Apr 25, 2019 at 1:17 PM Doug Barton  wrote:

> On 4/25/19 8:04 AM, K. Scott Helms wrote:
> > Just so you know, if you have an embedded router from a service provider
> > all of that data is _already_ being transmitted and has been for a long
> > long time.
>
> Responding to a pseudo-random message ...
>
> If you are an average consumer and purchase a managed solution (in this
> case a WAP that comes as part of your package) I think it's perfectly
> reasonable for the vendor to manage it accordingly, even if said
> consumer doesn't fully understand the implications of that decision.
>
> In my mind, the problem here is not that the vendor has access to this
> data, it's that they are STORING it in the first place, and storing it
> in the clear to boot. In the hypothetical service call that we've
> speculated is the driver for this, the extra 15 or 20 seconds that it
> would take to pull the data via SNMP is in the noise.
>
> There are two mindsets that desperately need changing in the tech world:
>
> 1. Do not store data that you don't have a legitimate requirement to store
> 2. Do not store anything even remotely sensitive in the clear
>
> We live in a world of all breaches, all of the time. So we need to start
> thinking not in terms of just protecting said data from the outside, but
> rather in terms of limiting the attack surface to start with, and
> protecting the data at rest. So that WHEN there is a breach, whether
> from within or without, the damage will be minimal.
>
> As many have pointed out, this information is freely available via SNMP,
> so it's a classic example of something that didn't need to be stored in
> the first place.
>
> Doug
>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread K. Scott Helms
Doug,

I don't disagree, but things are pretty complicated, much more so than they
might seem from the outside.  First, if the configuration isn't stored
there's literally no way to have a backup for most of the CPE vendors so
there's definitely reason to have it duplicated in the service providers'
systems.  Very few allow for end users to download their router
configuration via the admin page and I know of none that encrypt that
configuration before it is delivered to the end user's computer.  (It's
also relevant that the usage for those vendors that do allow end users to
backup the config is vanishingly low.)  If we're looking at a TR-069 based
system for managing the WiFi and router components it's not really feasible
to do a real time grab of that data since that process can take up to ~5
minutes depending on your periodic inform settings in your ACS.  That's
because TR-069 is inherently a push technology (from the CPE to the ACS)
rather than a pull like SNMP.

The next piece is that a DOCSIS configuration file itself, which in some
cases contains these parameters, is by the standard required to be
delivered via insecure protocols, namely TFTP.  Newer devices have options
to allow for TLS secured HTTP, but that's very rare today in production
provisioning systems, and in case the secured protocols are all still
optional in the spec.  In general the config file itself is stored in it's
text format on the provisioning systems or if the file is dynamically
generated the user specific parameters are held in a database with the
general ones coming from a template for that class of service.

Again, I'm not disagreeing with your premise but the service providers
directly control a small piece of the overall process and we're still
working with standards from earlier times.  Most cable operators have
gotten rid of their DOCSIS 2.0 (1.0 and 1.1 as well) but it's not uncommon
to find a handful of users with (mostly customer owned) D2 devices that the
provisioning and OSS systems still have to deal with.  DOCSIS 3.0 devices
are the majority and 3.1 devices are just now being rolled out in large
numbers.

In short, not everything is quickly retrievable, much of the configuration
is in fact generated by the service provider and must be maintained because
the modem needs to download its configuration every time it reboots, and
the vendors and associations in the provisioning and OSS space have more
input than the operators themselves.

Scott Helms



On Thu, Apr 25, 2019 at 1:16 PM Doug Barton  wrote:

> On 4/25/19 8:04 AM, K. Scott Helms wrote:
> > Just so you know, if you have an embedded router from a service provider
> > all of that data is _already_ being transmitted and has been for a long
> > long time.
>
> Responding to a pseudo-random message ...
>
> If you are an average consumer and purchase a managed solution (in this
> case a WAP that comes as part of your package) I think it's perfectly
> reasonable for the vendor to manage it accordingly, even if said
> consumer doesn't fully understand the implications of that decision.
>
> In my mind, the problem here is not that the vendor has access to this
> data, it's that they are STORING it in the first place, and storing it
> in the clear to boot. In the hypothetical service call that we've
> speculated is the driver for this, the extra 15 or 20 seconds that it
> would take to pull the data via SNMP is in the noise.
>
> There are two mindsets that desperately need changing in the tech world:
>
> 1. Do not store data that you don't have a legitimate requirement to store
> 2. Do not store anything even remotely sensitive in the clear
>
> We live in a world of all breaches, all of the time. So we need to start
> thinking not in terms of just protecting said data from the outside, but
> rather in terms of limiting the attack surface to start with, and
> protecting the data at rest. So that WHEN there is a breach, whether
> from within or without, the damage will be minimal.
>
> As many have pointed out, this information is freely available via SNMP,
> so it's a classic example of something that didn't need to be stored in
> the first place.
>
> Doug
>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread Doug Barton

On 4/25/19 8:04 AM, K. Scott Helms wrote:
Just so you know, if you have an embedded router from a service provider 
all of that data is _already_ being transmitted and has been for a long 
long time.


Responding to a pseudo-random message ...

If you are an average consumer and purchase a managed solution (in this 
case a WAP that comes as part of your package) I think it's perfectly 
reasonable for the vendor to manage it accordingly, even if said 
consumer doesn't fully understand the implications of that decision.


In my mind, the problem here is not that the vendor has access to this 
data, it's that they are STORING it in the first place, and storing it 
in the clear to boot. In the hypothetical service call that we've 
speculated is the driver for this, the extra 15 or 20 seconds that it 
would take to pull the data via SNMP is in the noise.


There are two mindsets that desperately need changing in the tech world:

1. Do not store data that you don't have a legitimate requirement to store
2. Do not store anything even remotely sensitive in the clear

We live in a world of all breaches, all of the time. So we need to start 
thinking not in terms of just protecting said data from the outside, but 
rather in terms of limiting the attack surface to start with, and 
protecting the data at rest. So that WHEN there is a breach, whether 
from within or without, the damage will be minimal.


As many have pointed out, this information is freely available via SNMP, 
so it's a classic example of something that didn't need to be stored in 
the first place.


Doug


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread K. Scott Helms
Just so you know, if you have an embedded router from a service provider
all of that data is _already_ being transmitted and has been for a long
long time.  If it's being collected via SNMPv2c it is being transmitted in
the clear (though hopefully encrypted via BPI+ between the modem and the
CMTS).  If it's being collected via TR-069 it _may_ (should be) encrypted
in transit but in my experience that isn't guaranteed and when its being
sent over TLS there's often a self signed cert in the chain.

Scott Helms



On Thu, Apr 25, 2019 at 10:45 AM Benjamin Sisco 
wrote:

> On 4/24/ 2019 10:34 AM, Seth Mattinen wrote:
>
> > That's looking at it from a technical perspective when it isn't a
> technical problem. People that buy "includes wifi" from their ISP often
> need extreme amounts of help with it, and thus the wifi credentials are
> stored and transmitted in plain text for tech support reasons.
>
> While I agree that the underlying need is to provide fast and effective
> customer service - it is ultimately a technical problem.  As it's been
> pointed out in subsequent posts WiFi is the leading cause of customer calls
> to an ISP offering the service.  Security and "ease of use" are often at
> odds with each other, and implementing the former with the latter is the
> challenge many of us wake up to each and every day.  The information should
> be encrypted at rest and in transit and could easily be decrypted by the
> CSP platform for use by customer support staff at the time of need when
> cusetomers call in - which would address the concern.
>
> In my experience, bad practice is easily replicated.  What else is
> transmitted in cleartext?  Today it's the WiFi password, tomorrow it's your
> login, port forwarding, DMZ, and other details that are far more useful to
> a remote attacker than your WiFi password.
>
>
>
>
> -Original Message-
> From: NANOG  On Behalf Of Seth Mattinen
> Sent: Wednesday, April 24, 2019 10:34 AM
> To: nanog@nanog.org
> Subject: Re: Comcast storing WiFi passwords in cleartext?
>
> Notice: This message originated outside of Just Associates. Verify the
> source & exercise caution with links and attachments.
>
> On 4/24/19 8:13 AM, Benjamin Sisco wrote:
> > The bigger concern should be the cleartext portion of the subject.
> There’s ZERO reason to store or transmit any credentials (login, service,
> keys, etc.), in any location, in an unencrypted fashion regardless of their
> perceived value or purpose.  Unless you like risk.
>
>
> That's looking at it from a technical perspective when it isn't a
> technical problem. People that buy "includes wifi" from their ISP often
> need extreme amounts of help with it, and thus the wifi credentials are
> stored and transmitted in plain text for tech support reasons.
>
> ~Seth
> Confidentiality Notice: This e-mail communication and any attachments may
> contain confidential and privi­leged information for the use of the
> designated recipients named above. If you are not the intended recipient,
> you are hereby notified that you have received this communication in error
> and that any review, disclosure, dissemination, distribution or copying of
> it or its contents is prohibited. If you have received this communica­tion
> in error, please notify me immediately by replying to this message and
> deleting it from your computer. Thank you.
>


RE: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread Benjamin Sisco
On 4/24/ 2019 10:34 AM, Seth Mattinen wrote:

> That's looking at it from a technical perspective when it isn't a technical 
> problem. People that buy "includes wifi" from their ISP often need extreme 
> amounts of help with it, and thus the wifi credentials are stored and 
> transmitted in plain text for tech support reasons.

While I agree that the underlying need is to provide fast and effective 
customer service - it is ultimately a technical problem.  As it's been pointed 
out in subsequent posts WiFi is the leading cause of customer calls to an ISP 
offering the service.  Security and "ease of use" are often at odds with each 
other, and implementing the former with the latter is the challenge many of us 
wake up to each and every day.  The information should be encrypted at rest and 
in transit and could easily be decrypted by the CSP platform for use by 
customer support staff at the time of need when cusetomers call in - which 
would address the concern.

In my experience, bad practice is easily replicated.  What else is transmitted 
in cleartext?  Today it's the WiFi password, tomorrow it's your login, port 
forwarding, DMZ, and other details that are far more useful to a remote 
attacker than your WiFi password.




-Original Message-
From: NANOG  On Behalf Of Seth Mattinen
Sent: Wednesday, April 24, 2019 10:34 AM
To: nanog@nanog.org
Subject: Re: Comcast storing WiFi passwords in cleartext?

Notice: This message originated outside of Just Associates. Verify the source & 
exercise caution with links and attachments.

On 4/24/19 8:13 AM, Benjamin Sisco wrote:
> The bigger concern should be the cleartext portion of the subject.  There’s 
> ZERO reason to store or transmit any credentials (login, service, keys, 
> etc.), in any location, in an unencrypted fashion regardless of their 
> perceived value or purpose.  Unless you like risk.


That's looking at it from a technical perspective when it isn't a technical 
problem. People that buy "includes wifi" from their ISP often need extreme 
amounts of help with it, and thus the wifi credentials are stored and 
transmitted in plain text for tech support reasons.

~Seth
Confidentiality Notice: This e-mail communication and any attachments may 
contain confidential and privi­leged information for the use of the designated 
recipients named above. If you are not the intended recipient, you are hereby 
notified that you have received this communication in error and that any 
review, disclosure, dissemination, distribution or copying of it or its 
contents is prohibited. If you have received this communica­tion in error, 
please notify me immediately by replying to this message and deleting it from 
your computer. Thank you.


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread Stephen Satchell
On 4/24/19 9:32 PM, Mike Bolitho wrote:
>>
>> "than the relatively low risk of a database compromise leading to a
>> miscreant getting ahold of their wireless password and using their access
>> point as free wifi."
>>
> 
> And this is the thing, not only does someone have to 'hack' the database,
> they also need to drive up to your house and sit in your driveway to get
> free Internet. Of all the things to worry about, this is way down on my
> list.

Sounds like you live in a single-family home, in a low-density
neighborhood.  I live in an apartment complex, and WiFi Analyzer shows
more than 20 beacons visible from my kitchen.  Before I implemented MAC
filtering, my DHCP server logs showed connections by rogue equipment.
(And before you ask, my password is not a simple one.)

When I leave town for an extended period, I pull the plug on the wireless.

In an industrial park, I see the same dense tangle of beacons.  Let
alone those wireless systems that have disabled beacons.

If that database of wireless passwords also has the physical location of
the device, then the risks go up.

So the simple solution is to use your own AP, block SNMP access from the
worlds at your edge router, and the risk falls to zero.



Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread K. Scott Helms
James,

By the DOCSIS standard and every North American MSO's ToS I've seen (I've
worked with or for about 200 different cable operators over the last 20
years) your cable modem is always managed and the cable operator _always_
has access to its configuration and settings via SNMP.  The configuration
file for a DOCSIS cable modem is nothing more than a list of SNMP OIDs with
their values set the way the operator wants them.  This has been true since
DOCSIS 1.0 (which doesn't make it correct, just common).  Now, DOCSIS is
primarily deployed with SNMP version 2c though more and more operators,
especially the larger ones, are moving or have to SNMPv3.  I mention this
because every cable modem on a given CMTS that's deployed in SNMPv2c mode
will (should for proper functioning) have the same SNMP READ and WRITE
strings.  SNMPv2c traffic is clear text UDP with no standardized methods of
encryption available to the industry.  To mitigate this to an extent part
of the cable modem's configuration will (best practice anyway) have
filtering rules to only accept SNMP traffic from a given IP address or
subnet and traffic between the CMTS and the modem should be encrypted via
BPI+ for some minimal security.  (A minor note, the router interface for a
combo unit by CableLabs OSS standards will not respond to SNMP traffic on
its public address by default and almost all of the SNMP traffic will be to
the modem's RFC1918 address.)  What I'm getting at is that the for DOCSIS
(and FTTH and most DSL flavors as well) the service provider has and has
had access to all the settings for a very long time.  What's changed is
that customers wanted to WiFi to be provided by the operator and
importantly supported by the operator.

" I have yet to hear any discussion of the business value of access to WiFi
network password, especially as compared to billing and identity data.
Also, remote management of local networks by definition requires
credentials stored off site from the customer. To the typical customer,
loss of connectivity is much worse than a small chance of sharing the WiFi."

Let me provide something in this regard.  The most common support call
category, by a large number, is the WiFi category.  In excess of 55% of all
support calls (regardless of how the customer describes them) end up being
WiFi issues.  The most common specific call in that category is some
variation of, "I've forgotten my WiFi password and I need to get my new
iPad online."  As a service provider your choices are to say I can reset
your WiFi PSK, which allows the new device to come online but breaks
everything else that was connected, or to allow the support rep and/or
customer to recover the passphrase.  In short, the ability to recover the
passphrase is strongly preferred by end users over resetting it and frankly
is much less expensive for the operator.

I've helped supply this functionality to a large number of operators and in
general the implementations _should_ at a minimum be able to capture the
agent who recovered the passphrase, the time/date, who the agent was on the
phone with, whether the agent correctly verified the identity of the
caller, and if the agent followed all other procedures laid by the service
provider.

Scott Helms



On Thu, Apr 25, 2019 at 8:38 AM James R Cutler 
wrote:

> On Apr 25, 2019, at 8:26 AM, K. Scott Helms 
> wrote:
>
> People are missing the point here.  This is _not_ a Comcast "issue" this
> same data is available to every single cable operator in the US who deploys
> bundled modem/router/APs that follow the CableLabs standard.  They may or
> may not expose the data to their end customers, but it's stored in their
> systems and is often available to their support teams.
>
> http://mibs.cablelabs.com/MIBs/wireless/CLAB-WIFI-MIB-2017-09-07.txt
>
> The same thing applies to most FTTH and xDSL deployments.  They use TR-069
> to collect the data instead of SNMP but the object model is the same.  The
> WiFi MIB above is explicitly built to mimic TR-181 functionality.
>
> Scott Helms
>
>
>
> On Wed, Apr 24, 2019 at 5:48 PM Rich Kulawiec  wrote:
>
>> On Wed, Apr 24, 2019 at 03:13:33PM +, Benjamin Sisco wrote:
>> > The bigger concern should be the cleartext portion of the subject.
>>
>> Yes, and the availability of all this to anyone who hacks Comcast
>> customer support.
>>
>> —rsk
>
>
> I have yet to hear any discussion of the business value of access to WiFi
> network password, especially as compared to billing and identity data.
> Also, remote management of local networks by definition requires
> credentials stored off site from the customer. To the typical customer,
> loss of connectivity is much worse than a small chance of sharing the WiFi.
>
> Narrowing the discussion back to Comcast, credentials for “guest” WiFi
> seem to be more used than purloined SNMP MIB data.
>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread James R Cutler
> On Apr 25, 2019, at 8:26 AM, K. Scott Helms  wrote:
> 
> People are missing the point here.  This is _not_ a Comcast "issue" this same 
> data is available to every single cable operator in the US who deploys 
> bundled modem/router/APs that follow the CableLabs standard.  They may or may 
> not expose the data to their end customers, but it's stored in their systems 
> and is often available to their support teams.
> 
> http://mibs.cablelabs.com/MIBs/wireless/CLAB-WIFI-MIB-2017-09-07.txt 
>   
> 
> The same thing applies to most FTTH and xDSL deployments.  They use TR-069 to 
> collect the data instead of SNMP but the object model is the same.  The WiFi 
> MIB above is explicitly built to mimic TR-181 functionality.
> 
> Scott Helms
> 
> 
> 
> On Wed, Apr 24, 2019 at 5:48 PM Rich Kulawiec  > wrote:
> On Wed, Apr 24, 2019 at 03:13:33PM +, Benjamin Sisco wrote:
> > The bigger concern should be the cleartext portion of the subject.
> 
> Yes, and the availability of all this to anyone who hacks Comcast
> customer support.
> 
> —rsk

I have yet to hear any discussion of the business value of access to WiFi 
network password, especially as compared to billing and identity data. Also, 
remote management of local networks by definition requires credentials stored 
off site from the customer. To the typical customer, loss of connectivity is 
much worse than a small chance of sharing the WiFi.

Narrowing the discussion back to Comcast, credentials for “guest” WiFi seem to 
be more used than purloined SNMP MIB data.

Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread K. Scott Helms
People are missing the point here.  This is _not_ a Comcast "issue" this
same data is available to every single cable operator in the US who deploys
bundled modem/router/APs that follow the CableLabs standard.  They may or
may not expose the data to their end customers, but it's stored in their
systems and is often available to their support teams.

http://mibs.cablelabs.com/MIBs/wireless/CLAB-WIFI-MIB-2017-09-07.txt

The same thing applies to most FTTH and xDSL deployments.  They use TR-069
to collect the data instead of SNMP but the object model is the same.  The
WiFi MIB above is explicitly built to mimic TR-181 functionality.

Scott Helms



On Wed, Apr 24, 2019 at 5:48 PM Rich Kulawiec  wrote:

> On Wed, Apr 24, 2019 at 03:13:33PM +, Benjamin Sisco wrote:
> > The bigger concern should be the cleartext portion of the subject.
>
> Yes, and the availability of all this to anyone who hacks Comcast
> customer support.
>
> ---rsk
>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-25 Thread Töma Gavrichenkov
On Thu, Apr 25, 2019, 3:06 AM William Herrin  wrote:

> Risk is threat times vulnerability times impact. No impact, no risk. For
> example, if the credentials for my grocery store loyalty card are
> compromised, I do not actually care. It has no impact.
>

A fun fact: my employer has a product which basically does brute force
protection for web forms. One of, if not the, biggest customers for that
product is a grocery store chain, and exactly with their loyalty card
portal.

Sometimes, the impact or the absence thereof is a matter of perception.

--
Töma

>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Royce Williams
On Wed, Apr 24, 2019 at 8:33 PM Mike Bolitho  wrote:

> "than the relatively low risk of a database compromise leading to a
>> miscreant getting ahold of their wireless password and using their access
>> point as free wifi."
>>
>
> And this is the thing, not only does someone have to 'hack' the database,
> they also need to drive up to your house and sit in your driveway to get
> free Internet. Of all the things to worry about, this is way down on my
> list.
>

They could also remotely compromise *any* device that's currently (or about
to be) in range of your access point, as a stepping-stone to gaining access
to your network - without having to be physically anywhere near your
driveway.

Perhaps, for example, to make it look as though what they're doing is
coming from your house.

Royce


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Mike Bolitho
>
> "than the relatively low risk of a database compromise leading to a
> miscreant getting ahold of their wireless password and using their access
> point as free wifi."
>

And this is the thing, not only does someone have to 'hack' the database,
they also need to drive up to your house and sit in your driveway to get
free Internet. Of all the things to worry about, this is way down on my
list.

>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Valdis Klētnieks
On Wed, 24 Apr 2019 17:04:22 -0700, William Herrin said:

> I take no position on what risk the comcast wifi passwords issue carries.
> I'm posting only to point out that an absolutist model which says, "stuff
> of type X must always be encrypted," is probably not well tuned to the
> customer's actual security needs.

I'm willing to bet that for a significant percentage of people who do at least
some of their work at home, but aren't router-savvy, the risks of a borked
router preventing them from working from home are a bigger issue than the
relatively low risk of a database compromise leading to a miscreant getting
hold of their wireless password and using their access point as free wifi.

Security decisions that are "obvious" when only security-minded and technically
clued people are involved become a lot less obvious when 95% of the people
involved are named Joe Q. Sixpack.



Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread William Herrin
On Wed, Apr 24, 2019 at 9:10 AM Benjamin Sisco 
wrote:
>  There’s ZERO reason to store or transmit any credentials (login,
service, keys, etc.),
>  in any location, in an unencrypted fashion regardless of their perceived
value or
>  purpose.  Unless you like risk.

Risk is threat times vulnerability times impact. No impact, no risk. For
example, if the credentials for my grocery store loyalty card are
compromised, I do not actually care. It has no impact. Hence failing to
encrypt the card number as it transits the store network or sits in their
database carries no risk.

There can be, on the other hand, substantial costs associated with using
encryption. Key management infrastructure. Manpower. Business risk: loss of
the keys becomes loss of the data. Mistakes yield service outages that
impair business operations. Forgot to renew that key? Gotta close the store
until the IT guy gets here because the cash registers don't work. These
costs tie to the use of encryption regardless of the risk it mitigates.

I take no position on what risk the comcast wifi passwords issue carries.
I'm posting only to point out that an absolutist model which says, "stuff
of type X must always be encrypted," is probably not well tuned to the
customer's actual security needs. The generally accepted principle is that
if you spend more money mitigating the risk than the attributable cost of
the risk then you're doing it wrong.

Regards,
Bill Herrin

-- 
William Herrin  her...@dirtside.com  b...@herrin.us
Dirtside Systems . Web: 


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Mark Foster



On 25/04/2019 3:13 AM, Benjamin Sisco wrote:

I think we all understand the value of using one’s own equipment and keeping 
the firmware up to date if one is in any way concerned about security.  We all 
should also understand that in a managed environment such as an ISP there 
should be no reasonable expectation of privacy regarding the configuration of 
the equipment attached to the ISP's network (rented or customer owned).


Accepting i'm not a North American...
The reasonable expectation of privacy should be that the customer knows 
precisely what is private, and what is not.  If the ISP makes it very 
clear that every configuration item on the edge device is known to, or 
accessible by, the ISP for support purposes, then there's no problem. At 
which point everyone's "reasonable expectations" are the same, and 
there's no issue.


(Those for whom the support provided by the ISP is key, will enjoy this 
service. Those who don't, have the option of doing their own thing.  
Even better.. provide the user the means to disable the sharing of this 
information by choice?? Would save buying and running additional 
hardware for those who don't feel the need to have their creds shared, 
for example).
First thing i've done with all ISP-provided CPE is disable all the 
remote-login stuff that's enabled by default for tech support purposes. 
Full knowledge and disclosure is all that's needed!





The bigger concern should be the cleartext portion of the subject.  There’s 
ZERO reason to store or transmit any credentials (login, service, keys, etc.), 
in any location, in an unencrypted fashion regardless of their perceived value 
or purpose.  Unless you like risk.



As someone else said, the problem is the level of trust you're placing 
in your ISP and in their own security... a large aggregate of private 
information is just waiting to be pwned.


Mark.



Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Rich Kulawiec
On Wed, Apr 24, 2019 at 03:13:33PM +, Benjamin Sisco wrote:
> The bigger concern should be the cleartext portion of the subject.

Yes, and the availability of all this to anyone who hacks Comcast
customer support.

---rsk


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Seth Mattinen

On 4/24/19 8:13 AM, Benjamin Sisco wrote:

The bigger concern should be the cleartext portion of the subject.  There’s 
ZERO reason to store or transmit any credentials (login, service, keys, etc.), 
in any location, in an unencrypted fashion regardless of their perceived value 
or purpose.  Unless you like risk.



That's looking at it from a technical perspective when it isn't a 
technical problem. People that buy "includes wifi" from their ISP often 
need extreme amounts of help with it, and thus the wifi credentials are 
stored and transmitted in plain text for tech support reasons.


~Seth


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Aaron C. de Bruyn via NANOG
On Wed, Apr 24, 2019 at 9:05 AM Brandon Jackson via NANOG 
wrote:

> I'm not saying they are doing anything nefarious or packet capping the
> local network or anything of that nature that is a little on the tin foil
> hat side for me personally, but you should always consider that any
> information available to a cable modem Gateway or plain cable modem is
> available to the ISP.
>

I'd wager at least 95% of Comcast's users aren't network engineers,
security bros, or in some technically competent field.
If you were building a system to support hundreds of thousands or millions
of users who couldn't distinguish between a DVD drive and a cup holder, how
would you make it easy for your front-line support staff to help them use
the service they paid for?  Want to walk them through factory resetting an
old WTR54, hardwire a computer/laptop to it (if they have one), sign in
with default creds and then properly configure wireless?

I'd rather say "What do you want your wireless network name to be?"  "Ok,
and what do you want your password to be?"  "Done.  Try connecting now."

In any sort of business environment you should be briding the modem and
putting your own firewall in.

-A


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Benjamin Sisco
I think we all understand the value of using one’s own equipment and keeping 
the firmware up to date if one is in any way concerned about security.  We all 
should also understand that in a managed environment such as an ISP there 
should be no reasonable expectation of privacy regarding the configuration of 
the equipment attached to the ISP's network (rented or customer owned).

The bigger concern should be the cleartext portion of the subject.  There’s 
ZERO reason to store or transmit any credentials (login, service, keys, etc.), 
in any location, in an unencrypted fashion regardless of their perceived value 
or purpose.  Unless you like risk.


-- Ben
Confidentiality Notice: This e-mail communication and any attachments may 
contain confidential and privi­leged information for the use of the designated 
recipients named above. If you are not the intended recipient, you are hereby 
notified that you have received this communication in error and that any 
review, disclosure, dissemination, distribution or copying of it or its 
contents is prohibited. If you have received this communica­tion in error, 
please notify me immediately by replying to this message and deleting it from 
your computer. Thank you.


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Sean Figgins

On 4/23/19 8:35 PM, Peter Beckman wrote:
Get your own router if you're worried about your Wifi Password being 
known

by Comcast. Or change to WPA2 Enterprise, but I'm guessing that isn't
supported on the router... 


Original post seems to be someone that bought a used modem/router 
combo.  Since the combo is part cable model, and needs to be provisioned 
by the MSP, it is going to have access to parts of the config, including 
the wireless password.  It is unknown if the password is stored in 
plaintext in Comcast's database, and I doubt that someone from Comcast 
is going to validate that.  It is being displayed to the account owner 
for their benefit.  I honestly see nothing wrong with this in and of itself.



At the same time, I refuse to use one of these combo modem/router/WAP.  
I don't want Comcast to steal my Internet for their roaming wireless, 
and also don't trust their security.  I do all that myself on my own 
hardware, and prefer to be responsible for my own security.  I suspect 
most people to be lazy.


 -Sean



Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Brandon Jackson via NANOG
This has been a thing for quite a while with Comcast. It is also available
to a customer service rep. It is retrieved from the Gateway via SNMP if I'm
not mistaken. Customer service reps can also reset your wireless
password either to a default or a specific one of yours or their choosing
if necessary.

This is something to remember with cable modems and especially gateways. As
long as it is connected to their Network it is practically thiers from a
configurations standpoint, they are in complete control of the device and
can get any information they need or want from said device.

I'm not saying they are doing anything nefarious or packet capping the
local network or anything of that nature that is a little on the tin foil
hat side for me personally, but you should always consider that any
information available to a cable modem Gateway or plain cable modem is
available to the ISP.

As many have recommended in the past always get a separate router and a
plane modem.



Brandon Jackson

On Tue, Apr 23, 2019, 19:47 Töma Gavrichenkov  wrote:

> Hi NANOG,
>
> Here's an issue raised today:
>
> https://security.stackexchange.com/questions/207895/how-does-comcast-know-my-wifi-password
>
> Apparently there's a concern with customers that their seemingly
> private passphrases, entered in their own boxes, are being shared with
> the upstream ISP without an explicit customer consent, and are kept in
> the ISP database for an unspecified period of time. Is it there by
> design?
>
> if so, then maybe some tweaks are necessary?
>
> --
> Töma
>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Stephen Satchell
On 4/24/19 7:24 AM, Tom Beecher wrote:
> This is why, in my opinion, people should avoid modem/router combo units
> whenever possible. Any information/configuration entered into such a device
> could be accessible to the MSO (intentionally or otherwise) , as is
> happening here. I'm sure they would come back and say this is necessary to
> provide support for customers who pay them for WiFi service, but it clearly
> shows they don't turn off that functionality for customers who don't.
> 
> Treat you cable modems as foreign network elements. Cause that's what they
> are.

+1.  Encountered this with an AT install.  AT provided router/wifi
combo.  After the installer was done, first thing I did was to turn the
combo's wifi off, and hook up the access point the customer has been
using for years.  Verified that the MAC filtering was still correct
during the post-install.  Customer is happy.

The next step is to build a Protectli firewall to go between the AT
modem and the access point.  Block any chance of AT using SNMP to
sniff the access point.  (Moved the Access Point's IP address for
management and gateway, too.)


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Randy Bush
> you've seen TR-069 right?

that was 2004, security had not been invented yet.  oh wait.


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Tom Beecher
The Stackexchange post does NOT say that they got their own AP. It says
they got their own DOCSIS Modem / Router / Wifi combo device. That's an
important distinction.

When I worked at Adelphia many years ago, the only distinction between
customer owned CPE and company owned CPE was billing. All modems received
the same DOCSIS config file when they booted up. While I have not worked in
that industry for many years now, from what I am aware of the same behavior
still applies. The modem management and configuration is 100% in the hands
of the MSO.

This is why, in my opinion, people should avoid modem/router combo units
whenever possible. Any information/configuration entered into such a device
could be accessible to the MSO (intentionally or otherwise) , as is
happening here. I'm sure they would come back and say this is necessary to
provide support for customers who pay them for WiFi service, but it clearly
shows they don't turn off that functionality for customers who don't.

Treat you cable modems as foreign network elements. Cause that's what they
are.

On Wed, Apr 24, 2019 at 9:28 AM Töma Gavrichenkov  wrote:

> On Wed, Apr 24, 2019 at 3:27 PM Matt Hoppes
>  wrote:
> > If you’re really running something that requires that kind
> > of security you may want to get your own wireless access point.
>
> Like I said: the OP claims that's what s/he did.
>
> --
> Töma
>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Töma Gavrichenkov
On Wed, Apr 24, 2019 at 3:27 PM Matt Hoppes
 wrote:
> If you’re really running something that requires that kind
> of security you may want to get your own wireless access point.

Like I said: the OP claims that's what s/he did.

--
Töma


RE: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Luke Guillory
Matt,

I believe the thought process is that if I'm not renting the device from the 
MSO, why would they log said info. As Scott said, there can be many reasons as 
to why they would grab it and add to the users account.

Same as making sure modems, whether that's MSO owned or customer owned are on 
the latest firmware.



Luke



Ns






-Original Message-
From: Matt Hoppes [mailto:mattli...@rivervalleyinternet.net]
Sent: Wednesday, April 24, 2019 7:27 AM
To: K. Scott Helms
Cc: Luke Guillory; NANOG
Subject: Re: Comcast storing WiFi passwords in cleartext?

I don’t really see the issue here. What was the concern of the O. P. ?

That a Comcast tech will know your Wifi password?  If you’re really running 
something that requires that kind of security you may want to get your own 
wireless access point.

Otherwise, that’s just how it works for a multitude of reasons.


Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread Matt Hoppes
I don’t really see the issue here. What was the concern of the O. P. ?

That a Comcast tech will know your Wifi password?  If you’re really running 
something that requires that kind of security you may want to get your own 
wireless access point. 

Otherwise, that’s just how it works for a multitude of reasons. 

Re: Comcast storing WiFi passwords in cleartext?

2019-04-24 Thread K. Scott Helms
While it's correct that it's stored in the vendor proprietary MIB this
information is commonly retrieved from the CableLabs standard MIB and via
TR-181 in DSL and FTTH gear.

I wrote up an answer on the security forum originally refereneced, but for
convenience here is the same text.


The PSK passphrase is (by design) stored in a retrievable format by the
Modem vendor, in this case Arris, but the same standard is supported by
many other modem vendors. In DOCSIS cable modems this is most commonly done
via SNMP against this specific OID:

clabWIFIAccessPointSecurityKeyPassphrase OBJECT-TYPE SYNTAX SnmpAdminString
(SIZE(0..63))
MAX-ACCESS read-create STATUS current DESCRIPTION "This object is defined
in TR-181 Device.WiFi.AccessPoint{i}.Security.KeyPassphrase." REFERENCE
"TR-181 Device Data Model for TR-069." ::=
{clabWIFIAccessPointSecurityEntry 5

This is part of the CableLabs WiFi MIB:

http://mibs.cablelabs.com/MIBs/wireless/CLAB-WIFI-MIB-2017-09-07.txt

Which is is in turn based on the TR-069 sub-standard of TR-181:

https://cwmp-data-models.broadband-forum.org/tr-181-2-11-0.html#D.Device:2.Device.WiFi.AccessPoint
.{i}.Security.KeyPassphrase

http://www.broadband-forum.org/download/TR-181_Issue-2_Amendment-2.pdf

Not only does this apply to cable modems, but many DSL and FTTH endpoints
will also allow the service provider to retrieve your PSK passphrases and a
litany of other settings.

This allows for end users to have their settings backed up in case of a
device having to be replaced or much more commonly for call centers to be
able to retrieve some of the settings, like the pass phrase, when a
customer calls in because they can't remember it.
Scott Helms



On Tue, Apr 23, 2019 at 11:34 PM Luke Guillory 
wrote:

> Yes it's in the router, accessed via the following MIB.
>
>
>
> Name arrisRouterWPAPreSharedKey
> OID  .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2
> MIB  ARRIS-ROUTER-DEVICE-MIB
> Syntax   OCTET STRING (SIZE (8..64))
> Access   read-write
> Status   current
>
> Descri   Sets the WPA Pre-Shared Key (PSK) used by this service set.  This
>value MUST be either a 64 byte hexadecimal number, OR an 8
> to 63
>character ASCII string.
>
>
> Which returns the following.
>
>
> OID: .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2.10004
> Value: F2414322EE3D9263
> Type: OctetString
>
> OID: .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2.10003
> Value: F2414322EE3D9263
> Type: OctetString
>
> OID: .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2.10002
> Value: F2414322EE3D9263
> Type: OctetString
>
> OID: .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2.10001
> Value: F2414322EE3D9263
> Type: OctetString
>
>
>
>
>
> Ns
>
>
>
>
>
>
>
> -Original Message-
> From: Peter Beckman [mailto:beck...@angryox.com]
> Sent: Tuesday, April 23, 2019 9:35 PM
> To: Luke Guillory
> Cc: Laurent Dumont; NANOG
> Subject: Re: Comcast storing WiFi passwords in cleartext?
>
> On Tue, 23 Apr 2019, Peter Beckman wrote:
>
> > On Wed, 24 Apr 2019, Luke Guillory wrote:
> >
> >> OP said they logged into their account and went to the security
> >> portion of the portal. So one can assume they're the ISP or I don’t
> >> see the point in asking how Comcast would know the info.
> >
> > It is entirely possible that an account separate and hidden from the
> > customer account would be able to access the administrative controls
> > of the router. It is also plausible that the access does not use a
> > username/password to authenticate but another, hopefully secure method.
> >
> > One could make this access secure by:
> >
> >1. Ensuring any connection originated from Company-controlled IP space
> >2. Username/Password are not provided to the CS agent but is merely a
> >button they press, after properly authenticating themselves as
> well
> >as authenticating the customer, that would pass a one-time use
> >token to access the device
> >3. Every token use was logged and regularly audited
> >4. Keys were regularly and in an automated fashion rotated, maybe even
> >   daily
> >
> > If such precautions are taken, it is their router and it is their
> > service, seems reasonable that Comcast should be able to log into
> > their router and change configs.
>
> ... such that the access of the Wifi Password which is likely stored in
> plain text on the router is accessed by Comcast in a secure manner and not
> stored in plain text in their internal databases.
>
> But I'm guessing probably it's just cached in plain text in their internal
> DBs.
>
> Get your own router if you're worried about your Wifi Password being known
> by Comcast. Or change to WPA2 Enterprise, but I'm guessing that isn't
> supported on the router...
>
> ---
> Peter Beckman  Internet Guy
> beck...@angryox.com
> http://www.angryox.com/
> ---
>


RE: Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Luke Guillory
Yes it's in the router, accessed via the following MIB.



Name arrisRouterWPAPreSharedKey
OID  .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2
MIB  ARRIS-ROUTER-DEVICE-MIB
Syntax   OCTET STRING (SIZE (8..64))
Access   read-write
Status   current

Descri   Sets the WPA Pre-Shared Key (PSK) used by this service set.  This
   value MUST be either a 64 byte hexadecimal number, OR an 8 to 63
   character ASCII string.


Which returns the following.


OID: .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2.10004
Value: F2414322EE3D9263
Type: OctetString

OID: .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2.10003
Value: F2414322EE3D9263
Type: OctetString

OID: .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2.10002
Value: F2414322EE3D9263
Type: OctetString

OID: .1.3.6.1.4.1.4115.1.20.1.1.3.26.1.2.10001
Value: F2414322EE3D9263
Type: OctetString





Ns







-Original Message-
From: Peter Beckman [mailto:beck...@angryox.com]
Sent: Tuesday, April 23, 2019 9:35 PM
To: Luke Guillory
Cc: Laurent Dumont; NANOG
Subject: Re: Comcast storing WiFi passwords in cleartext?

On Tue, 23 Apr 2019, Peter Beckman wrote:

> On Wed, 24 Apr 2019, Luke Guillory wrote:
>
>> OP said they logged into their account and went to the security
>> portion of the portal. So one can assume they're the ISP or I don’t
>> see the point in asking how Comcast would know the info.
>
> It is entirely possible that an account separate and hidden from the
> customer account would be able to access the administrative controls
> of the router. It is also plausible that the access does not use a
> username/password to authenticate but another, hopefully secure method.
>
> One could make this access secure by:
>
>1. Ensuring any connection originated from Company-controlled IP space
>2. Username/Password are not provided to the CS agent but is merely a
>button they press, after properly authenticating themselves as well
>as authenticating the customer, that would pass a one-time use
>token to access the device
>3. Every token use was logged and regularly audited
>4. Keys were regularly and in an automated fashion rotated, maybe even
>   daily
>
> If such precautions are taken, it is their router and it is their
> service, seems reasonable that Comcast should be able to log into
> their router and change configs.

... such that the access of the Wifi Password which is likely stored in plain 
text on the router is accessed by Comcast in a secure manner and not stored in 
plain text in their internal databases.

But I'm guessing probably it's just cached in plain text in their internal DBs.

Get your own router if you're worried about your Wifi Password being known by 
Comcast. Or change to WPA2 Enterprise, but I'm guessing that isn't supported on 
the router...

---
Peter Beckman  Internet Guy
beck...@angryox.com http://www.angryox.com/
---


Re: Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Christopher Morrow
On Tue, Apr 23, 2019 at 10:35 PM Peter Beckman  wrote:

> ... such that the access of the Wifi Password which is likely stored in
> plain text on the router is accessed by Comcast in a secure manner and not

you've seen TR-069 right?

:( 


Re: Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Yang Yu
On Tue, Apr 23, 2019 at 4:48 PM Töma Gavrichenkov  wrote:

> Apparently there's a concern with customers that their seemingly
> private passphrases, entered in their own boxes, are being shared with
> the upstream ISP without an explicit customer consent, and are kept in
> the ISP database for an unspecified period of time. Is it there by
> design?

Not sure what the concern is here. Cable model with builtin WiFi
(managed WiFi) is part of the service you signed up for and you are
free to use your own WiFi solutions. Chances are the CPE is rented
from ISP... Are you expecting the passphrase to get stored as a one
way hash?

Arris Touchstone has TR-069 connecting to ACS for configuration/management.

This platform is ridiculously insecure and the web interface
essentially does SNMP read/write over HTTP.
https://w00tsec.blogspot.com/2015/11/arris-cable-modem-has-backdoor-in.html


Re: Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Peter Beckman

On Tue, 23 Apr 2019, Peter Beckman wrote:


On Wed, 24 Apr 2019, Luke Guillory wrote:


OP said they logged into their account and went to the security portion
of the portal. So one can assume they're the ISP or I don’t see the point
in asking how Comcast would know the info.


It is entirely possible that an account separate and hidden from the
customer account would be able to access the administrative controls of the
router. It is also plausible that the access does not use a
username/password to authenticate but another, hopefully secure method.

One could make this access secure by:

   1. Ensuring any connection originated from Company-controlled IP space
   2. Username/Password are not provided to the CS agent but is merely a
   button they press, after properly authenticating themselves as well
   as authenticating the customer, that would pass a one-time use
   token to access the device
   3. Every token use was logged and regularly audited
   4. Keys were regularly and in an automated fashion rotated, maybe even
  daily

If such precautions are taken, it is their router and it is their service,
seems reasonable that Comcast should be able to log into their router and
change configs.


... such that the access of the Wifi Password which is likely stored in
plain text on the router is accessed by Comcast in a secure manner and not
stored in plain text in their internal databases.

But I'm guessing probably it's just cached in plain text in their internal
DBs.

Get your own router if you're worried about your Wifi Password being known
by Comcast. Or change to WPA2 Enterprise, but I'm guessing that isn't
supported on the router...

---
Peter Beckman  Internet Guy
beck...@angryox.com http://www.angryox.com/
---


Re: Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Peter Beckman

On Wed, 24 Apr 2019, Luke Guillory wrote:


OP said they logged into their account and went to the security portion
of the portal. So one can assume they're the ISP or I don’t see the point
in asking how Comcast would know the info.


It is entirely possible that an account separate and hidden from the
customer account would be able to access the administrative controls of the
router. It is also plausible that the access does not use a
username/password to authenticate but another, hopefully secure method.

One could make this access secure by:

1. Ensuring any connection originated from Company-controlled IP space
2. Username/Password are not provided to the CS agent but is merely a
button they press, after properly authenticating themselves as well
as authenticating the customer, that would pass a one-time use
token to access the device
3. Every token use was logged and regularly audited
4. Keys were regularly and in an automated fashion rotated, maybe even
   daily

If such precautions are taken, it is their router and it is their service,
seems reasonable that Comcast should be able to log into their router and
change configs.

Beckman
---
Peter Beckman  Internet Guy
beck...@angryox.com http://www.angryox.com/
---


Re: Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Luke Guillory
OP said they logged into their account and went to the security portion of the 
portal. So one can assume they're the ISP or I don’t see the point in asking 
how Comcast would know the info.


Luke
Ns



Sent from my iPad

On Apr 23, 2019, at 8:05 PM, Laurent Dumont 
mailto:laurentfdum...@gmail.com>> wrote:


It's not exactly clear from the StackExchange post but if the end-user is also 
using Comcast as an ISP, then I guess the modem simply re-registered under the 
new customer and is happily providing the visibility to Comcast?




On Tue, Apr 23, 2019 at 8:34 PM Töma Gavrichenkov 
mailto:xima...@gmail.com>> wrote:
On Wed, Apr 24, 2019 at 3:07 AM Seth Mattinen 
mailto:se...@rollernet.us>> wrote:
> Don't use the built in wifi AP on a cable modem combo would be my first
> reaction.

Totally correct, but that's what s/he claims to have already taken care of!

--
Töma


Re: Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Laurent Dumont
It's not exactly clear from the StackExchange post but if the end-user is
also using Comcast as an ISP, then I guess the modem simply re-registered
under the new customer and is happily providing the visibility to Comcast?

On Tue, Apr 23, 2019 at 8:34 PM Töma Gavrichenkov  wrote:

> On Wed, Apr 24, 2019 at 3:07 AM Seth Mattinen  wrote:
> > Don't use the built in wifi AP on a cable modem combo would be my first
> > reaction.
>
> Totally correct, but that's what s/he claims to have already taken care of!
>
> --
> Töma
>


Re: Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Töma Gavrichenkov
On Wed, Apr 24, 2019 at 3:07 AM Seth Mattinen  wrote:
> Don't use the built in wifi AP on a cable modem combo would be my first
> reaction.

Totally correct, but that's what s/he claims to have already taken care of!

--
Töma


Re: Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Seth Mattinen

On 4/23/19 16:46, Töma Gavrichenkov wrote:

Apparently there's a concern with customers that their seemingly
private passphrases, entered in their own boxes, are being shared with
the upstream ISP without an explicit customer consent, and are kept in
the ISP database for an unspecified period of time. Is it there by
design?

if so, then maybe some tweaks are necessary?



Don't use the built in wifi AP on a cable modem combo would be my first 
reaction.


~Seth


Comcast storing WiFi passwords in cleartext?

2019-04-23 Thread Töma Gavrichenkov
Hi NANOG,

Here's an issue raised today:
https://security.stackexchange.com/questions/207895/how-does-comcast-know-my-wifi-password

Apparently there's a concern with customers that their seemingly
private passphrases, entered in their own boxes, are being shared with
the upstream ISP without an explicit customer consent, and are kept in
the ISP database for an unspecified period of time. Is it there by
design?

if so, then maybe some tweaks are necessary?

--
Töma