[personal profile] mjg59
I'm in London for Kubecon right now, and the hotel I'm staying at has decided that light switches are unfashionable and replaced them with a series of Android tablets.
A tablet displaying the text UK_bathroom isn't responding. Do you want to close it?
One was embedded in the wall, but the two next to the bed had convenient looking ethernet cables plugged into the wall. So.

I managed to borrow a couple of USB ethernet adapters, set up a transparent bridge (brctl addbr br0; brctl addif br0 enp0s20f0u1; brctl addif br0 enp0s20f0u2; ifconfig br0 up) and then stuck my laptop between the tablet and the wall. tcpdump -i br0 showed traffic, and wireshark revealed that it was Modbus over TCP. Modbus is a pretty trivial protocol, and notably has no authentication whatsoever. tcpdump showed that traffic was being sent to 172.16.207.14, and pymodbus let me start controlling my lights, turning the TV on and off and even making my curtains open and close. What fun!

And then I noticed something. My room number is 714. The IP address I was communicating with was 172.16.207.14. They wouldn't, would they?

I mean yes obviously they would.

It's basically as bad as it could be - once I'd figured out the gateway, I could access the control systems on every floor and query other rooms to figure out whether the lights were on or not, which strongly implies that I could control them as well. Jesus Molina talked about doing this kind of thing a couple of years ago, so it's not some kind of one-off - instead, hotels are happily deploying systems with no meaningful security, and the outcome of sending a constant stream of "Set room lights to full" and "Open curtain" commands at 3AM seems fairly predictable.

We're doomed.

(edited: this previously claimed I could only access systems on my own floor, but it turns out that each floor is a separate broadcast domain and I just needed to set a gateway to access the others)

(further edit: I'm deliberately not naming the hotel. They were receptive to my feedback and promised to do something about the issue.)
Page 1 of 3 << [1] [2] [3] >>

Date: 2016-03-11 02:55 pm (UTC)
From: (Anonymous)
My coworker asks whether you can control the channels. Can you set all of your neighbours' TVs to pay-per-view while they're out?

Modbus?

Date: 2016-03-11 03:05 pm (UTC)
From: (Anonymous)
I worked on Modbus networking software in the 1980's at Modicon. Why would anyone use that for controlling IoT in 2016? It is baffling.

Re: Modbus?

Date: 2016-03-11 03:10 pm (UTC)
From: (Anonymous)
Maybe because their setup is a bit older than 2016 ? ;)

Re: Modbus?

Date: 2016-03-11 03:22 pm (UTC)
From: (Anonymous)
More likely because Modbus is an industry standard protocol for controlling machinery and its implementations are widely available for PLCs and such.

There is nothing intrinsically wrong with using Modbus - but they should have layered some authentication on top of it.

Or simply used normal switches so that the guest doesn't have to pee their bed while fumbling with a crashed tablet in the middle of the night trying to turn the toilet lights on!

Hotel name?

Date: 2016-03-11 03:35 pm (UTC)
From: (Anonymous)
This practice will never improve if hotels that do it remain anonymous. They have absolutely no incentive to fix their security.

Re: Modbus?

Date: 2016-03-11 03:40 pm (UTC)
From: (Anonymous)
Is this how the Israelis and the CIA bollixed up the Iranian centrifuges for enriching uranium?

Hotel wifi?

Date: 2016-03-11 03:46 pm (UTC)
From: (Anonymous)
Did you check to see if that range was visible from the hotel wifi?

Even worse?

Date: 2016-03-11 04:02 pm (UTC)
From: (Anonymous)
I swear this is just me "thinking like an attacker", but: what a really nasty attacker would do would be to send the "open curtains" command to all rooms, wait 30 seconds, and then send the "set room lights to full" command, all the time training one or more high-resolution video cameras at the hotel from the outside or a building opposite.

I wonder what percentage of hotel guests sleep naked?

I wonder how much business such a hotel would get in the ensuing 12 months?

Re: Even worse?

Date: 2016-03-11 04:12 pm (UTC)
From: (Anonymous)
That's more thinking like a voyeur.

Re: Even worse?

Date: 2016-03-11 04:13 pm (UTC)
From: (Anonymous)
I guess there's an opportunity for retrofitting the Hotel with a blinkenlights installation, too.

Just needs a conspirator on each floor.

Re: Modbus?

Date: 2016-03-11 04:26 pm (UTC)
From: (Anonymous)
IIRC they infected specific versions windows machines connected to specific siemens controllers, and the network/auth breach was in that those machines were hooked up to some network not in the control protocol itself

Re: Hotel wifi?

Date: 2016-03-11 04:54 pm (UTC)
From: (Anonymous)
For extra fun, try reaching the hotel's gateway on the wifi and checking if it's using the default login credentials.

One hotel I worked at did that. Some one could take over the entire building's primary network connection and guest wifi.

You know what to do

Date: 2016-03-11 05:12 pm (UTC)
From: (Anonymous)
Lightswitch rave!

Could be worse

Date: 2016-03-11 05:44 pm (UTC)
From: (Anonymous)
At least I hope the fire control wasn't on the same modbus ....

Leaking Behavior

Date: 2016-03-11 05:50 pm (UTC)
From: (Anonymous)
Your post seems to imply that being able to control another room's lights is the greatest security threat. It isn't: reading other room's settings is.

While it would be annoying to have the lights turn on in the middle of the night, it would only be that (annoying). On the other hand, being able to read the current state of another room's lights leaks information about human behavior. It would be pretty trivial to get a statistical profile of the rooms to determine which rooms have occupants that have either departed or are asleep. These rooms then become targets for theft, vandalism or worse.

Re: Modbus?

Date: 2016-03-11 06:15 pm (UTC)
From: (Anonymous)
That was Scada not Modbus

Re: Modbus?

Date: 2016-03-11 06:42 pm (UTC)
From: (Anonymous)
Modbus is one protocol used on SCADA systems. SCADA is not a protocol.

Re: Even worse?

Date: 2016-03-11 06:45 pm (UTC)
From: [personal profile] justjanne
We just implemented Blinkenlights at our university ( https://www.youtube.com/watch?v=3DpOlQndi6k ), and it’s amazingly impressive.

I wonder how awesome it would be to

Re: Leaking Behavior

Date: 2016-03-11 07:26 pm (UTC)
From: (Anonymous)
You could also do this by watching from across the road for any length of time, the old fashioned way. You could get every floor too if you were high enough.

Re: Modbus?

Date: 2016-03-11 09:16 pm (UTC)
From: (Anonymous)
Modbus is probably the most common protocol used in SCADA applications, especially in industrial settings

Re: Leaking Behavior

Date: 2016-03-11 09:31 pm (UTC)
From: (Anonymous)
What he's implying, I believe, is that you could sit in a building opposite with telephoto camera, open the blinds and turn on the lights, and blackmail any occupants you found in compromising positions.

Probably a worse threat for many people than having their stuff stolen.
From: (Anonymous)
Installed in multiple places in every room, conveniently indexed by room number. I really doubt they run up to date software. Chances are they can be pwned and turned into bugs.

Date: 2016-03-12 03:21 am (UTC)
From: (Anonymous)
If this is the hotel I believe it is, there is no pay per view. Everything is free, even the porn.

Re: Even worse?

Date: 2016-03-12 05:17 am (UTC)
From: (Anonymous)
i would imagine a company this negligent could have its netmasking busted with only slightly more effort, though it might require more professional tools than just a packet sniffer.
Page 1 of 3 << [1] [2] [3] >>

Profile

Matthew Garrett

About Matthew

Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. [personal profile] mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.

Page Summary

Expand Cut Tags

No cut tags