Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Wednesday December 18 2019, @03:23AM   Printer-friendly
from the random-error dept.

Submitted via IRC for SoyCow4408

A preponderance of weak keys is leaving IoT devices at risk of being hacked, and the problem won't be an easy one to solve.

This was the conclusion reached by the team at security house Keyfactor, which analyzed a collection of 75 million RSA certificates gathered from the open internet and determined that number combinations were being repeated at a far greater rate than they should, meaning encrypted connections could possibly be broken by attackers who correctly guess a key.

Comparing the millions of keys on an Azure cloud instance, the team found common factors were used to generate keys at a rate of 1 in 172 (435,000 in total). By comparison, the team also analyzed 100 million certificates collected from the Certificate Transparency logs on desktops, where they found common factors in just five certificates, or a rate of 1 in 20 million.

The team believes that the reason for this poor entropy is down to IoT devices. Because the embedded gear is often based on very low-power hardware, the devices are unable to properly generate random numbers.

The result is keys that could be easier for an attacker to break, leaving the device and all of its users vulnerable.

Source: https://www.theregister.co.uk/2019/12/16/internet_of_crap_encryption/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1, Informative) by Anonymous Coward on Wednesday December 18 2019, @09:44AM (2 children)

    by Anonymous Coward on Wednesday December 18 2019, @09:44AM (#933671)

    Well, Linux is pretty good about estimating entropy. But it doesn't magically create it where none is available. Embedded devices often don't have *any* good source of entropy available.

    The thing that has to happen is IoT vendors need to use good-quality hardware RNGs. Even cheap $5 microcontrollers have these, and if for some reason yours doesn't, there are cheap $3 crypto ASICs that have those, plus AES encryption, key storage, and a variety of other features of varying usefulness. But for that, the vendors have to actually care about security. User security isn't worth $0.30 to most of them, much less $3.

    Starting Score:    0  points
    Moderation   +1  
       Informative=1, Total=1
    Extra 'Informative' Modifier   0  

    Total Score:   1  
  • (Score: 2) by driverless on Wednesday December 18 2019, @12:40PM (1 child)

    by driverless (4770) on Wednesday December 18 2019, @12:40PM (#933712)

    You're thinking about this like a security person, not a hardware vendor. Adding a "cheap $3 crypto ASIC" can double the BOM for something that adds no value to the buyer, as well as requiring a hardware redesign to fit it, maybe changing the form factor and certainly changing the power budget. Getting good randomness costs close to zero, with no change to the hardware, if you just care about security enough to load a random seed as part of the provisioning process. That's what we do with every embedded device we ship, whether it claims to have a proper entropy source or not.

    The problem is that vendors of IoS don't care about security much (see the near-infinite other security holes in their crap), not whether they have a hardware RNG or not.

    • (Score: 3, Interesting) by DannyB on Wednesday December 18 2019, @04:49PM

      by DannyB (5839) Subscriber Badge on Wednesday December 18 2019, @04:49PM (#933779) Journal

      for something that adds no value to the buyer,

      Security HAS value to the buyer. It's just that buyers assume it is already included in the package.

      The problem is that vendors of IoS don't care about security much

      This is why those vendors need to have direct liability for all damages. Make them care. They could make these IoT devices be the Security Hardened Internet of Things. (SHIoT)

      --
      To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.