


Schneier: We Need a New Agency For IoT Security (onthewire.io) 165
Reader Trailrunner7 writes: The recent DDoS attacks by the Mirai botnet against various targets, including DNS provider Dyn, have drawn the attention of congressional leaders, who say there may be a need for regulation of IoT device security in order to address the problem of vulnerable embedded devices. In a joint hearing on Wednesday, the House Subcommittee on Communications and Technology and the Subcommittee on Commerce, Manufacturing, and Trade delved into the issue of IoT security and several lawmakers said that they were reluctant to get the government involved in regulating this problem, but it may be inevitable. The problem, of course, is that many of the embedded devices that make up the IoT aren't manufactured in the United States, so regulation would have no effect on their security. Another piece of the puzzle is the fact that there's no one federal agency or independent organization that oversees security standards for IoT devices. There are embedded computers in cars, appliances, medical devices, and hundreds of other kinds of devices. That cuts across many different industries and regulatory fields, a problem that the federal government is not set up to handle. "I actually think we need a new agency. We can't have different rules if a computer makes calls, or a computer has wheels, or is in your body," said cryptographer Bruce Schneier, another witness during the hearing. "The government is getting involved here regardless, because the stakes are too high. The choice isn't between government involvement and no government involvement. It's between good government involvement and stupid government involvement. I'm not a regulatory fan but this is a world of dangerous things."
It all boils down to IPv6 security (Score:4, Informative)
Say what you will about IoT, bottom line is that it would be impossible on the scale being discussed w/o IPv6. That's not something that works fluently w/ NAT, especially given that for a lot of these things, auto-configuration would be required.
So far from any 'agency', what is required is expertise in IPv6 security. Especially how to keep IPv6 nodes either secure, and/or undetectable to anything but approved agents. This would have to work in tandem w/ access controls as well as IPv6 address management mechanisms
Re: (Score:2)
What we need are ISPs willing to shut down participants in botnets.
The other thing we need is a mesh network to permit the internet to actually route around censorship.
And then we're probably going to need yet another new protocol to handle that kind of chaos.
Re: (Score:2)
Re: (Score:2)
What we need are ISPs willing to shut down participants in botnets.
And how do we do that? Was my smoke detector DoSing the ABS website when the Australian census was last due? Or was I at my computer trying to access the damn website?
This is not a problem that is easily solved. It's difficult to tell this traffic apart from legitimate traffic. If you can route around the problem, so can the attack rendering the new node useless. A new protocol sounds like it may be able to incorporate something in this. I look forward to implementing it in 2045.
Re: (Score:2)
Re: (Score:1)
Yeah that was a dumb thing to say (Score:2)
Agreed, that was a stupid comment. Of course an autonomous car, which os hurling toward me at 75 MPH, should have different standards than an IoT refrigerator, and biomedical devices implanted in my body should another set of standards. Perhaps the standards for biomedical implants could include also the standards for consumer electronics by reference - "In addition to the 60 points listed below, medical devices must also meet consumer electronics standard #1235 ".
DSS? (Score:2)
Re: (Score:3)
They should be manufactured in the United States! (Score:2)
They should be manufactured in the United States!
TRUMP TRUMP TRUMP!
Re: (Score:1)
Trump: "It'll be a Yuuuuuge agency, and we'll make the Internets pay for it!"
Re: (Score:1)
Rats, I forgot the word "beautiful". My Trumpology slipped
Or, you know, we can just not (Score:5, Insightful)
use this technology.
Let's be honest. Right now, this stuff doesn't give us anything of real benefit. We don't need an internet connected thermostat. Or lights. Or fridges. Or toaster oven. Or whatever next comes up. Our skateboards reporting how many meters they've covered to some site or another. Useless! The utility of such things are near zero.
Nifty? Yes. Neat? Yes. Useful? Not in the least. And certainly not outside the developed world.
It's a distraction. A bad one. And if the recent mega-botnet attacks are any indication it's not good for the health of the internet either. So let's get rid of them before someone in a position of abusable power decides that they're evil and gets rid of them for us. With us doing it, it at least leaves the door open for getting it right next time. Not so certain that others would give the tinkerers a second chance on something like this. I've already had to deal with parents panicking over their children's laptop cameras.
That wasn't a fun conversation in the least.
Re: (Score:2, Flamebait)
Re: (Score:2)
You are only seeing the consumer side. On the infrastructure and business side, IoT is huge. From asset tracking, to remote metering (why send people round to read every meter in the country when they can just self report once a month?) to monitoring applications (how much stress is that bridge under, are all my street light bulbs working?) there are many very useful, practical applications for IoT devices.
And that's where the real risk is. Fridge botnets are one thing, taking out infrastructure is another.
Re: (Score:2)
We don't need an 'agency', I'll TELL what we need: (Score:3)
Re: (Score:2)
Short answer is we need to hold people accountable. This is a case where there absolutely should be not quite a strict liability situation but maybe negligence level where you are responsible for shit that a computer you own does unless you can show you took appropriate and reasonable precautions.
Once that is True people will install patches, they will learn to install and configure firewalls, or they will turn the shit off and unplug the Ethernet wire from the smart tv because its to much hassle to deal w
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
The router/gateway has a part to play too. However regardless of whether the user accessing the system is legitimate, buffers should not overflow, sql should not get injected, etc. Defense in depth.
Wrong (Score:5, Insightful)
We totally don't. Just fuck off already.
Re: (Score:1)
You know which answer is nearly always wrong? (Score:2)
I really like Schneier's work in general, but if there's one answer that has to be nearly always wrong it's "We need a new government agency."
It's also patently false that because a thing isn't manufactured here, we can't regulate it. We can (and do) regulate the import of things that aren't manufactured here. If he's talking about regulating things that are manufactured, sold, and used elsewhere but also happen to be on the internet, then we just shouldn't be doing that at all anyway.
Another way (Score:5, Insightful)
Most electronics in the United States are (Underwriters Laboratory) UL approved. That is because there are various non-governmental rules that strongly influence people into buying UL approved products. One is that vendors often refuse to stock products that are not approved by some standards body, because otherwise they may face liability for the product. Another is that homeowners insurance will not cover you if a non-UL approved device started the fire. Hospitals and laboratories will not buy medical devices that are not UL approved.
We need something like UL for security.
It would be great to have a system like that in place, rather than to have the government directly involved. The toughest part is that so much electronics is purchased online, from overseas manufacturers, that this free-market solution may not work. Really, the free market is optimizing around it. It would be awesome to see Amazon and Newegg refuse to sell products unless they had some kind of security approval.
UL is a great model, created by insurance companie (Score:2)
Something like UL, but focused on security, would be great.
Insurance companies established Underwriters Laboratories and the National Fire Protection Association in order to reduce their costs stemming from fires, injuries, and death. I don't see an obviously similar group for information security. Google, Amazon, and Comcast would all benefit from reducing attacks, so perhaps they could found an organition similar to Underwriters Laboratories.
Re: (Score:1)
Seed money, not day-to-day operations. Openstack e (Score:2)
If there were an organization similar to UL, but testing for safety and security of IT products, it's value would depend on what the group DID, not who provided the initial funding.
Note again I didn't say these companies would test and approve products. Rather, they have an interest in having the internet secure for everyone, so they might put up some cash to seed an independent testing organization. (Example: IoT ddos attacks flow through Comcast's network, costing them money.
History shows that they can
Re: (Score:1)
Re: (Score:2)
So the next step is that every device that connects to Comcasts network must be approved by this "organization similar to the UL", or they won't allow it on
Almost. We are proposing something similar to how it works with electrical devices and telecommunications devices. In those cases, it isn't the power company or the phone company that gets a say, it is the insurance companies and retailers. So no: Comcast would not be able to approve things. They simply have no way to enforce this even if they wanted to.
And you can't make any unapproved changes to that device, because any change might make it insecure. It is only logical after all.
No, that is not logical, and it is not how the industry we are comparing it to works.
At some point you will be only allowed to use a locked down computer running pre-approved software running in the cloud. Don't think it will happen? That is the logical conclusion to this madness.
If that is the logical conclusion, then why has it not happened alr
Re: (Score:2)
Corporate networks already do this.
No they don't. They wish they could, and they try. Here's how they try:
First of all, corporate IT has physical access to everything in the building. Comcast has no access to the devices in my house. That's an important difference. Second, corporate IT achieves most of their security by demanding that all devices on the network be Windows boxes that are on their domain. Comcast can't require this either.
Ultimately though, even corporate IT can'achieve this because they have to allow non-Windows devices
Re: (Score:1)
And these days UL requirements (generally needed in the U.S.A.) and CE requirements (definitely needed in Europe) mostly line up!
This highlights another potential pitfall, but also goes to show that both the government and private-industry routes have been pretty successful.
I'd lean towards a government approach in this case though (and we have examples of this like Energy Star certification) because there's not the same private incentive. You don't want an insurance claim denied because a non-UL device ca
Re: (Score:2)
So getting some kind of incentive to have devices certified seems like it will be difficult.
Agreed! So to make this work, we need liability.
So how about this: if your device is part of a botnet, or infects another computer - you are liable unless the device was certified by the testing agency. Hmmmm...no, that won't work. The problem there is finding out the source. If there is a DDOS from 5 million devices, nobody is going to sue 5 million people.
So how about this: Hold manufacturer liable. We've been asking for companies (banks, etc.) to be liable for security breaches, and for software com
Re: (Score:2)
So Dell is liable because your Dell computer got infected and is part of a botnet?
If Dell installed an insecure piece of software on it, then yes, they can be.
It only makes sense to you because you are an idiot.
LOL, nice burn dawg.
There is no difference between an "IOT device" and a Linux or Windows computer you install software on.
One key difference is: who installed the vulnerable software and firmware onto the device? With a Dell Laptop, the owner can install whatever they want on it, so *maybe* it was the owner's fault not the manufacturer's. With a Frigidaire refrigerator, or a Honeywell thermostat, or an XBOX 360, or a Shenzhen-Guowei security camera, the owner probably can't install software on it. That's a crucial difference. W
Re: (Score:2)
"this free-market solution may not work"
If not, then it's not that important, really.
I admit, I'd pay extra for devices I KNEW had been tested; the problem is what is a "successful test"? I mean, obviously the mfg are going to game around it. Besides that, what about devices that legitimately need to phone home? For example that stupid IoT thermostat that was connected to some Google server. Stupid design, yes. "Failure" (assuming it's not sending personal data) ?
Clippy: "Oh, I see you're on a test ben
Re: (Score:2)
the problem is what is a "successful test"?
That is what the 3rd-party testing lab determines. It's not up to the manufacturer to test it.
what about devices that legitimately need to phone home
The testing agency should not have a problem with a device that needed to phone home. That's a legitimate feature. The testing agency would make sure that the data was encrypted, that failed pasword attempts are limited, that there isn't a single shared password on each device, etc.
For example that stupid IoT thermostat
Yes!!! That's what we are trying to prevent! It had no encryption, send the user's personal information (email account, password,
I warned you (Score:1)
Does Not Have to be Government (Score:3)
Government involvement is not needed and will be counterproductive. Something like UL (https://en.wikipedia.org/wiki/UL_(safety_organization) ) will be appropriate. There are a number of analogous examples that work well, like the ANSI, API, ICANN, IMO.
Re: (Score:2)
Re: (Score:2)
Something like UL (https://en.wikipedia.org/wiki/UL_(safety_organization) ) will be appropriate.
I've heard this a few times. I'm not convinced.
UL is "Underwriters' Laboratories." One of the things they do is look at electric devices and make sure that they won't catch fire in most conditions. This is a good thing and they have the backing of insurance companies. So if you plug in that extension cord that your brother made and it causes an electrical fire which burns down your house, when you go to your insurance company, they'll say, "Nope! We're not paying out because the extension cord wasn't U
Re: (Score:2)
In a liability situation, why would UL help? Suppose you used UL-certified light bulbs, and they were used in a major DDoS attack. You get named in the suit, and when you try to pass the liability on back the company has disappeared or gone bankrupt or is out of the country or something. The UL isn't going to indemnify me. Lots of people will have some IoT-type devices without insurance, since (at least in the US) renter's insurance wasn't all that common when I still rented. Unless people have some s
Re: (Score:2)
You miss the point. I suppose I got a bit wordy.
Why do you buy UL-certified electric devices? Because if you use them and one of them causes your house to burn down, your fire insurance will cover you. If you use a non-UL-certified electric device and it causes your house to burn down, your fire insurance won't pay.
Thus, I have an incentive to buy UL-certified devices. Uncle Sam does not need to get involved. This is, arguably, a good thing.
Many people are saying that IoT devices need something akin to
Operational allocation isn't a new thing (Score:1)
Just like electronic devices must be certified to operate within FCC or CRTC guidelines, these kinds of products should pass through a similar system to ensure compliance. All IoT devices should also conform to some network management scheme for enumeration and auditing. This just a new twist on an old system that has worked well for some forty plus years.
current govt = fail (Score:2)
Don't Hook Crap to The Internet Unless You Need To (Score:2)
Duh.
Re: (Score:2)
The problem is this though. The people that are attaching these devices are largely unaffected by this. They got some cheap device of some sort that at least somewhat does what the purchaser wants, and their own device isn't attacking their own machines.
And the manufacturers don't care either. And even if they did, what are the chances that they would have any amount of success getting people to upgrade firmware?
And this is why we can't have nice things (Score:2)
We do NOT need a 'new agency'. Indeed, perhaps, maybe, we can use legislation to establish FTC or other regulations that require Internet-connected devices be minimally secure, as in requiring a nontrivial admin password be set, that they not be susceptible to 'trivial' attacks, and that they be manageable by owners to reestablish control.
All of this is, sadly, patchwork, and will not solve the real problems, and establishing financial penalties will just drive manufacturers offshore where we can't reach t
Re: (Score:1)
So everyone who creates software would now need to be able to prove that to a governmental agency? Or you wouldn't allow software to be installed on Internet-connected devices unless it was pre-approved? So you couldn't attach your Linux computer (or Windows or Mac) or phone or whatever to the Internet unless it was running this pre-approved s
Re: And this is why we can't have nice things (Score:2)
I was focused on the device. The software makes this possible...
How to fix this without big gov (Score:2)
Report that to the user and tell them to replace or update the device until it is safe on any network facing the internet.
2. Ban the branded control software from cell phone and all app stores. If your device can be used as part of a swarm, its app gets banned and the world told why a brand cant be trusted.
3. Work with isp. A IoT device b
Go 1 step further; BOFH mode (Score:2)
> 1. Get anti virus software, free and subscription to scan a users networks by default.
> Find every device and test them with common pw/usernames and see what fails.
Go one step further. Have a government body scan the net and try to pwn and *BRICK* internet-connected everything (IOT/smartphones/tablets/desktop-PCs/servers). If it withstands the break-in attempts, it's secure. If it doesn't withstand the break-in attempts, it had no business being on the net in the first place.
Before anybody starts ye
Re: (Score:2)
"CIA Chief: We’ll Spy on You Through Your Dishwasher" (03.15.12)
https://www.wired.com/2012/03/... [wired.com]
"All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community."
All global AV brands have to do is scan with every common pw/usernames and see what fails. Get users to create their own long pw and unique usernames.
Or make the gateway to the internet hide or mask what the user is running.
Re:The course is clear (Score:5, Insightful)
The choice isn't between government involvement and no government involvement. It's between good government involvement and stupid government involvement.
The people have spoken. The desire for stupid government is strong. Stupid government involvement is the only allowable course.
The right answer here is a non-governmental agency like UL. That can have greater reach (and, frankly, more credibility) than anything US government-specific. This would have to be coupled with a firm stance from the sever side of IOT (like AWS) requiring the certification.
Re:The course is clear (Score:4, Interesting)
When Government agency fails, or is wasteful, what happens? "Hey, lets toss more money at the problem"
When Private entity fails, it goes away, and is either replaced or is no longer needed. Waste is generally frowned upon.
Re:The course is clear (Score:5, Insightful)
Not if it's a bank.
Re: The course is clear (Score:2)
Or a major auto manufacturer.
Re: (Score:1)
Re: (Score:1)
Sounds like a job the Dept of Homeland Security could handle.
What could go wrong?
Re: (Score:2)
Here's a list of 547 banks that have failed since 2000. [fdic.gov]
Maybe it's just the ones that didn't donate enough to those in political power. You know... the ones that weren't too big to fail [forbes.com].
Re: (Score:3)
Well, IMHO (being a Libertarian) I would have let the banks fail. Additionally, I would have locked up the CxO of banks that were practicing fraud, or otherwise weren't doing their do diligence in protecting the assets under their leadership. Heck, I would also go after the Board of Directors.
Re: (Score:3, Insightful)
Re: (Score:3)
Citations that will be requested, although I'm sure they will be disregarded:
http://www.npr.org/2015/05/14/... [npr.org]
http://www.thedailybeast.com/articles/2014/03/13/how-we-built-the-ghettos.html
http://www.theatlantic.com/business/archive/2014/05/the-racist-housing-policy-that-made-your-neighborhood/371439/
Conservatard sources (sorry, my
Re: (Score:2)
Well, in a perfect world the, the government would not have created ghettos in American cities. Since the did,
Right. Sure.
Citations that will be requested, although I'm sure they will be disregarded:
You managed to make only two of those links into actual links, but the three I reviewed were all based on the opinions of one man. "According to one historian" in the last link was a dead giveaway.
Somehow, I don't think forcing banks to make loans to people who cannot pay them back is a good way of solving the problem you claim the government created. In fact, it is more than "I think". The economic crisis that it created was the obvious result. That obviousness makes it very hard to attribute
Re: (Score:2)
Likewise, your "forcing people to make loans" has been disproved multiple times. The problem was really too much money without clear investment opportunities. The money, basically thought it found somewhere safe to grow, but it was lies, and not government lies, free market lies.
Anyway, I'm wasting my time with you.
Re: (Score:2)
When a public service fails, and there are private alternatives, it is compared to them and eventually de-funded.
When a private oligopoly fails, or is wasteful, what happens? "We'll just raise prices" ...
Hello PSTN & Cable Co's. I
Re: (Score:1)
Re: (Score:3)
More like everything you want to sell to the general public should be approved.
Anything you want to build yourself, you build it yourself as usual.
Re: (Score:1)
Re: (Score:3)
I don't see how viperidaenz's statement leads from your question to your answer. "if you're selling it get it approved; if you're not don't" doesn't read to me "keep it off the internet". How would that be enforced? It seems like it would be difficult for the rest of the internet to tell whether your device is certified...
Re: (Score:1)
Re: (Score:2)
Let's be a little more precise: Every computer/device for sale in the United States.
The more obvious result is that it does next to nothing to curb the issues related to security while greatly increasing the barrier to entry, plus costing the taxpayers a whole bunch of money.
Re: (Score:1)
Re: (Score:1)
You wish.
All hardware is required to be NRTL approved before it can be sold *commercially*. The buyer or builder accepts all liability
Here's a good read on it.
http://electronics.stackexchan... [stackexchange.com]
The problem isn't the software so much as the purchaser that rarely bothers to change default passwords or settings. Manufacturers are somewhat to blame for trying to make things as simple as possible and people are lazy.
The bottom line here is the consumer generally has no concept of the risk and everyone operates on
Re: (Score:1)
Wrong. The problem IS THE SOFTWARE. That is what is insecure. Think about it. If you needed to prove that a system is secure you would need to certify the SOFTWARE AND HARDWARE. And you wouldn't allow new software would be installed, unless THAT was approved as well. Otherwise the system wouldn't be secure. It is really sad people are ready to trade "safety" for a walled garden. But I guess that why Apple is the richest corporation in history.
Re: (Score:1)
Not sure what kind of Axe you have to grind, but the weakest link is *always* the meat-Popsicle.
Technology is easy. It can be automated and made ubiquitous. It's the person that has to be able to understand and use it with about an 8th grade education.
I never mentioned Apple, but they do a fantastic job of catering to the least educated and most educated denominator equally. Really impressive actually even if I do hate and refuse to use their products. Mostly because I refuse to accept vendor lock-in.
Good l
Re: (Score:1)
Re: (Score:2)
Read your Verizon/Comcast/ATT terms of service and acceptable use policies. This is already in place.
I see no such terms of service in my Comcast agreement. Can you provide a citation that supports your claim? I am not sure how Comcast could detect unapproved equipment I connect to the network anyway. Once it hits the router/modem and gets NAT, it's all the same MAC and IP address.
Re: (Score:2)
It seems my quote above wasn't entirely applicable as it seems to be about cable modems.
Since the cable modem is the gateway from the home network onto the cable side, I think it's relevant that Comcast needs to approve any devices that attach to THEIR network. Wouldn't it be wonderful if someone was selling cable modems that corrupted the network data for everyone else on that branch? I wouldn't mind a cable modem that I can put into promiscuous mode on the WAN so I can sniff all my neighbor's traffic, but I'd hate to have that same thing accessible to them. This isn't limitation on what dev
Re: (Score:2)
Re: (Score:1)
Lets hear those stories.
If it increases understanding of the issue, lets have it!
Re: (Score:2)
Re: (Score:2)
No...
It's like mains powered electrical appliances.
I'm allowed to build my own appliance and plug it in to the mains. I can do what ever I want to stuff I've bought.
I'm not allowed to sell it to the public unless it passes all relevant safety codes.
Re: The course is clear (Score:2)
Precisely. You don't get to operate an unapproved motor vehicle on public roads. Why should the internet be any different?
Re: (Score:2)
The bar is very low for a car you build yourself though.
Pwnt IoT devices are a problem because of scale. I'm not sure there will ever be enough hand-built "things" to matter.
Re: (Score:1)
Re: (Score:2)
It all depends on where it's enforced. My suggestion was for the IoT cloud backends to enforce this. IoT-specific that way.
Re: (Score:2)
Yes, there really are. https://aws.amazon.com/iot/ [amazon.com] https://www.microsoft.com/en-u... [microsoft.com]
Just throwing some servers up doesn't scale to a billion devices. A secure connection is a very difficult process on a low-end "thing". There's lots of specialist problems still being solved.
Re: (Score:2)
They will pretty soon. What do you think the big names will need as a back end? How many Android phones are there? How many smart TVs are there? There will be 10x as many "things" in a few years, given it's a much cheaper market. Heck, Amazons goofy "dash button" is moving like crazy just for the novelty value.
AWS and Azure are building out at massive scale now, trying to land contracts with the big names already. And security is definitely part of the pitch - the future liability risk is being taken s
Re: (Score:1)
Re: (Score:2)
What is more probable, is some sort of safe haven that allows ISP's to terminate connections with certain traffic, maybe a clearinghouse for requests, like the DMCA. Maybe some sort of fines.
It's certainly subject to abuse, but not as worrisome as what your concerned about.
Re: (Score:2)
Re:The course is clear, mostly (Score:3)
Governments are predominantly good at policing things: regulation is someting of a misnomer (regulators keep voltages stable: police arrest people).
The UL-like body need to be backed up by real police powers, like the power to have the local police seize dangerous goods, and be financially independant of the people who make the products being certified as safe to import and use.
Ontario famously tried to get the crooks (waterworks operators) pay for the police (drinking-water inspectors). That promptly k
Re: (Score:2)
Why? UL isn't, and fire is a more serious problem than the IoT running amok. Liability for manufacturers would sort this out, just as it did for fire safety.
Re: (Score:2)
Re: (Score:2)
Speaking of non-sequiturs.
Re: (Score:2)
Fire is local, and the source can usually be determined. IoT problems are global (literally), and it's going to be more difficult to assign liability. Moreover, appliances are judged on not starting fires during normal use. IoTs would need to be secure from attacks, including attacks nobody's thought of yet.
Re: (Score:2)
UL? I'm glad they stopped the endless stem of fake products which can provide fatal shocks with shoddy engineering and construction. I mean they have the UL logo on them so it must be good right?
Government regulation, or agencies such as UL won't do anything about a global problem that is caused by a race to the bottom.
Re: (Score:2)
Re: (Score:2)
Brawndo has got what IoT needs.