Take the IoT security challenge - am I vulnerable?

Secure & Configurable
Connectivity
Take the IoT security challenge –
am I vulnerable?
Take the IoT security challenge - am I vulnerable?
Table of Contents
1
Overview ................................................................................................................................. 1
Accountability .................................................................................................................. 1
The price of poorly implemented IoT security................................................................. 2
IoT traffic, a two-way street ............................................................................................. 3
2
The challenge – attack your own IoT deployment! ................................................................. 4
Validate your things and server’s presence on the internet .............................................. 4
Analysing IoT device visibility ........................................................................................ 6
3
Enabling basic IoT security ..................................................................................................... 8
Make the hacker work for their lunch .............................................................................. 8
4
Implementing robust IoT security ........................................................................................... 9
Introduction to Asavie IoT Connect ................................................................................. 9
Password Protection – put a lock on the door ................................................................ 10
5
4.2.1
Put your things behind a vault door .................................................................................. 10
4.2.2
Cloud/on-premise security ................................................................................................ 11
Security for the lifetime of an IoT deployment ..................................................................... 12
Managed secure SDN platforms .................................................................................... 12
Securing for the unknown .............................................................................................. 12
5.2.1
Scale hurts – take IoT to a private network ....................................................................... 13
Protect against what you know....................................................................................... 13
5.3.1
6
Protect your cellular IoT deployment from overages ........................................................ 13
Conclusion ............................................................................................................................. 14
2
1 Overview
The aim of this technical solution note is to challenge everyone, from makers to enterprises who
are embarking on a path of digital transformation to take an in-depth look at their security. In the
solution note, we will look to uncover the potential security threat exposure associated with
deploying IoT projects unprotected on to the public internet. A secondary objective is to suggest
some quick fixes to assist you in becoming less vulnerable to hacking exploits.
There are many well documented news stories; too many to want to highlight, which emphasize
that the security threatscape has landed and expanded into IoT, seeking out all sorts of
vulnerabilities to exploit.
Accountability
IoT and security is not an easy task, in some instances best practises and advice originate from
different sources. For example, in the enterprise guidance can originate from those who are not
security and/or networking experts. However, as the owner of an IoT project, are you the person
who will be held accountable, if something goes wrong?
How well do you know your IoT hardware, operating systems and running application software?
Are you confident that you can keep your IoT deployment safe? Especially against the next yet
unknown attack vector? How risk-adverse are you, would you gamble with your livelihood - by
telling your management and/or customers that the IoT devices are - on the public internet and
are 100% safe?
It’s clear for many that the answer is a resounding no, but what’s the alternative?
A core focus of this application note, is to highlight the problem of using the public internet for
IoT backhaul and to offer an alternative.
If you are reading this and you have deployed your project over cellular IoT, please do read on as
the question or challenge for you now becomes two parts; where is the mobile network operator
(MNO) / mobile virtual network operator (MVNO) landing your data? Which then raises the
secondary question - do you have the granular control of the IP network to manage your security
posture effectively?
“Through 2018, over 50% of IoT device manufacturers will not be able to
address threats from weak authentication practices.”
source Gartner
1
The price of poorly implemented IoT security
For many the idea of going to a MNO or a MVNO and buying a data plan is easy, but without
the proper IP networking and policy controls this can quickly become a costly problem. Let us
try and put this into context.
Imagine the unfortunate event of an attacker taking control of your device, the price of the
exploit can mean more than egg on your face but a nasty bill from your MNO/MVNO for data
overages.
For example, in the following table, we show a summary of just how costly a security failure is,
but worse still - this is just for a single connected mobile enabled IoT end-point:
Vendor
Potential Exploit
Cost ($)
EU carrier (M2M tariff)
SD video stream
3,500
Global carrier (100MB tariff)
HD video stream
7,000
Instant Message call
475
IoT MVNO
Table 1 The price of poor IoT security
To paraphrase a leading enterprise’s tagline - Knowing that your IoT subscriber identity modules
(SIM) can only talk to your application; Priceless.
Another interesting observation, is that the potential lifetime of the IoT deployment is not weeks
or months but years. Correct device management is a step in the right direction - as in to keeping
the device safe, but is it enough?
Let us not forget that the hacking community is not sitting still, new threats are always in
development and emerging. At a human level - is it right to be constantly worrying about our IoT
deployments and working in a reactive mode as each new threat appears?
A core part of this solution note is to offer an alternative solution, one in which takes the IoT
deployment off the public internet and away from harm.
2
IoT traffic, a two-way street
The basic concept of IoT is the sensing of data and the transmission of the data to an end-point
for analytic/storage purposes. Sadly, from a security standpoint that implies that there is at
minimum two end-points in which a hacker can target.
If your data is traversing the public internet, you should not only concentrate on the potential
exposure of the IoT sensors/gateways but also the host machine aggregating and analysing your
data or the application server.
Another interesting take-away is that the security threatscape is multi-dimensional and can have
multiple layers to it. For example, the table below is a basic overview of the common software
stack layers in which potential vulnerabilities have been exposed by our nemesis “The Hacker”.
Attack Surface
IoT sensor
IoT gateway
IoT application server
Hardware
Yes
Yes
Yes
BIOS Settings
Yes
Yes
Yes
Operating System
Yes
Yes
Yes
Network Service
Yes
Yes
Yes
Application Service
Yes
Yes
Yes
Table 2 Sample of proven attack surfaces for a typical IT deployment
In the table above, we have not even considered the multitude of operating systems that can be
used. Unfortunately for many, to truly assess IoT exposure will dictate multiple iterations of
unique test methodologies to ensure at minimum there is no backdoor vulnerabilities open.
Test and measurement is resource and cost expensive - maintaining and supporting that for the
lifetime of the IoT project can end up being to the tune of hundreds of thousands of dollars. Is
this money well spent over the multiple years of the IoT deployment? It’s a reasonable question
to ask at this stage, but we will discuss later the idea of the unknown attack vector, which puts us
always on the back foot.
A significant part of the solution note, is the IoT security challenge or a way to identify a base
level of exposure. We will suggest some quick fixes, but more importantly offer an alternative
solution which will truly secure your IoT deployment and put your mind at ease.
At most we hope from reading this solution note that you learn something new and perhaps that
you profit by saving yourself a bundle of cash!
3
2 The challenge – attack your own IoT deployment!
Yes, you have read the title correctly, in this section we will look at a few sample test
methodologies to benchmark the level of exposure that your IoT project has. So, let’s begin by
offering some guidance on some of the tools we have seen our customers use over the last few
months.
Our disclaimer is as follows - this is not an exhaustive test list and is intended for informational
purposes only. Asavie accepts no responsibility if you break something, but we are delighted to
acknowledge that we helped you to find any potential vulnerability before the hackers do!
Validate your things and server’s presence on the internet
The key test is to assess the level of visibility of the IoT deployment to the real world. It’s
advisable to run the test against both the things and the server aggregating your data.
To do this, there is an open-source tool for network exploration and security audit is called
NMAP - https://nmap.org/, which is freely available to use, check out their site for more details.
Step 1: Assess the exposure of the connected thing –
a)
b)
c)
d)
e)
Point the machine running NMAP at the IoT device.
In the NMAP target window enter the IP address of the Thing to scan.
Assign a scan profile, in the figure below the scan is set to “Intense scan, all TCP ports”
Grab yourself a coffee!
Save the results
“The great complexity of the infrastructure makes web application servers a
target for attackers.”
source Verizon 2016 Data Breach Investigations Report
4
Figure 1 Intense port scan on the connected things using Wi-Fi
Step 2: Assess the server side for exposure
a) Now point the machine running NMAP at the application server.
b) In the target window enter the IP address of the server to scan.
c) Assign a scan profile, again we use the “Intense scan, all TCP ports”
d) Grab some more coffee!
e) Save the results
Figure 2 Server side scan, as per seen from a public Wi-Fi network
5
Analysing IoT device visibility
Hopefully you have had no surprises and everything is as how you expected, but is worth taking
some to review the scan results.
Firstly, it is worth taking a moment to reflect on how easy it was to run a port scanning tool,
which then makes you wonder who else is doing exactly what you have just done? This is a core
problem of why the public internet is not the place for IoT!
Beginning with the server side the test exposed that there is a remote desktop port open and
listening. Again, without any knowledge the initials highlighted in the service name are “ms”,
perhaps gives a clue as to what OS is in use.
For the hacker, the next steps are easy attack the port with a brute force password attack or seek
out a remote desktop exploit!
Figure 3 Server side open and listening ports
Now, let’s look at the Thing side of our network. This is perhaps the most interesting finding. In
the figure below we can see that there are 3 x open ports. Without any hesitation, the curious
among us would attempt to open a secure session shell (SSH) to the device.
With no hesitation at all, a hacker will turn up an automated script to cycle through the usual
username and password suspects - root:root, admin:admin, admin:password, etc.
In one word – Mirai!
Here lies the problem for IoT, devices are being placed into public networks, with no security
posture and are being exploited at ease, as the original manufacturer user credentials were never
changed!
6
Figure 4 Open ports on the IoT device, note port 22!
As per the opening quote from Gartner, their research suggests this problem is not going to go
away anytime soon!
OK, so what next? What can we do, how can we prove to the leading industry analysts that they
got it wrong?
7
3 Enabling basic IoT security
If you have not done so by now, please ensure that the username and passwords are not those
that were assigned from the manufacturer!
Make the hacker work for their lunch
In the event, that there are open ports, close them quickly! In theory, the only ports open should
be the ports that are sending data to the application server. For example, IoT deployments using
MQTT – the only ports open should be 1883 or 8883.
However as just demonstrated – it is way too easy to find open ports, so a security best practice
is to change your services to run on non-standard ports e.g. MQTT - 1883 could become 51792.
The obfuscation of the port makes it more difficult to identify. Why make it easy to be a target!
A further best practice is to ensure that all unwanted ports are disabled before deploying to the
field. i.e. should an IoT device have a port 80 open?
The following are simple steps that can be used to disable any unwanted open ports Windows OS:
1. Log into the machine and open a command line
2. List the listening ports by typing: netstat -ano
3. Identify the service name associated to the port: tasklist /SVC /FI “PID eq xxx”
4. To stop unwanted services, simply type: net stop <service_name>
5. Make sure the service does not restart on boot: sc config "<service_name>"
start=disabled
Linux OS (Debian):
Note: similar syntaxes exist for other initscript standards used in distributions that are not based
on Debian, therefore, it is advised that you consult your distribution’s documentation first.
1. Log into and open a terminal session (some commands will need root access)
2. Identify the service associated to the port number: netstat -tulpn | grep ":xxx"
3. Stop the running daemon: service <service_name> stop or /etc/init.d /<service_name>
stop.
4. If that fails try: pkill - INT <service_name>
5. Make sure the service cannot start on boot up by removing the service script from the
/etc/init.d directory: rm /etc/rc3.d/<service_name>
Later in the solution note, we will assess how feasible it is to close all ports, especially if routine
maintenance is required.
8
4 Implementing robust IoT security
With some basic security now in place, our aim is to look at how security can be implemented
well, in doing so we will also introduce Asavie IoT Connect. However, as highlighted in the
introduction – we want to save you money!
If at this time, you are not interested in spending a nominal amount for a managed service for
secure IoT deployments, hopefully the basic principles highlighted in this section will serve you
to implementing a more secure IoT project.
Introduction to Asavie IoT Connect
As already indicated in the “Overview” and something that is widely acknowledged in the
telecoms industry is that many people responsible for IoT deployments are not experts in
networking and security.
In many cases, it ends up being information from disparate sources. As the adage goes – “too
many chefs, spoil the broth” and for IoT the outcome tends to be poorly secured deployments.
At Asavie we believe connectivity should be simple, we recognised that there is a need to
abstract network and security complexity and in doing so created Asavie IoT Connect. Asavie
IoT Connect is a self-service web application, which enables users who have basic network and
security knowledge to provision robust, secure, and private IP networks end-to-end, which can
also be provisioned over cellular communications.
This is a subtle and often underestimated feature i.e. the ability to quickly provision, activate and
manage both network and security from a single interface with minimal experience.
Once the user declares the network topology and security posture the instruction is pushed down
to a software defined network (SDN) platform, known as PassBridge. This is the bit that takes
our customers off the public internet and away from cyberattacks.
9
Secure end-to-end IoT connectivity
Figure 5 Asavie IoT Connect user workflow
Password Protection – put a lock on the door
Many of the recent IoT botnet attacks, have at the heart of them poorly implemented password
schemes. From the earlier scan tests, you can see how easy it is to find the right door to push.
Let’s take a moment to reflect on the Mirai attack - imagine deploying a Linux based sensor
gateway which has the standard port 22 open and the username and password defaulted as
root/root. This would be akin to locking your smartphone with “0000”. Not the greatest security,
so why do this in IoT?
4.2.1
Put your things behind a vault door
The problem could relate to the sheer volume of devices being connected i.e. no easy way to
update all devices before deployment. In this case Asavie IoT Connect is the ideal solution as
users can deploy one to many devices.
The idea is simple, connect the devices over a private access point network (APN), for the user it
provides the first layer of security – it forces the use of strong authentication of the devices on
the network before enabling access to the network.
10
On the Asavie platform each device attempting to connect to the network are challenged as
follows Challenge 1: Is your name on the list?
Asavie uses the carrier’s subscriber identity module (SIM), to request from the carrier the right to allow the
device on the network. The carrier acts as a trust authority. The carrier’s subscriber database is core to its
business, which is probably the most protected system on the cellular network. For us this is akin to the
bank vault door.
Challenge 2: Have you ID?
An additional part of the authorization process is a challenge for username and password, using the
Password Authentication Protocol (PAP).
An advantage of Asavie IoT Connect is that the initial security posture is in place for the lifetime
of the IoT deployment, which will scale from the first connected device. An additional
observation is that there is no need for expensive security applications or physical infrastructure
to manage identity throughout the IoT deployment lifetime.
Over the lifetime of the IoT deployment it is expected that hardware will be retired and replaced,
with Asavie IoT Connect you have flexibility to migrate the connectivity to the new device, but
retain the original security posture at no additional cost.
4.2.2 Cloud/on-premise security
Asavie IoT Connect is essentially a connectivity as a service, which means there is no
unnecessary spend on physical network infrastructure, which holds true for the cloud/on-premise
side or IoT application server.
Asavie protects the application servers via a proprietary software client. The installation process
ensures that only a designated server can attach to the private network. On installation Asavie
issues unique credentials to associate the server to the private network.
The Asavie client connects over the port 443 (aka https) to the managed service platform,
however the port 443 is not in listening mode! Therefore, if you repeat the scan test your port
will not respond, which means the attack software will simply move on.
Unfortunately, this is one security zone you cannot ignore i.e. protecting your application data
and we strongly recommend that you spend the money.
If you don’t wish to use Asavie’s connectivity as a service, the alternative is to purchase a next
generation security system and support package. Remember IoT longevity is years, so make sure
to ask for a discount!
11
5 Security for the lifetime of an IoT deployment
Managed secure SDN platforms
At the core of the Asavie IoT Connect architecture, is a proprietary platform developed and
managed by Asavie, called PassBridge. The PassBridge infrastructure is used to provision and
manage elastic IP networks. PassBridge is agnostic to the access network type, meaning users
can federate data from a range of network types e.g. Zigbee, Low power wide area networks
(LPWAN) – LoRa, Mobile - 3G/4G/5G NB-IoT and/or satellite.
PassBridge is designed for high global availability and is distributed across several unique global
datacentres. Using PassBridge’s north-bound application interface (API) aka Asavie IoT
Connect, users have the capability to define IP networks and manage security at the network
layer.
Network layer security manages every data flow in the private network. Based on a user defined
policies unwanted data flows are filtered and dropped. This essentially means that in the event of
a malware compromised device being added to the network, it can never call home.
Securing for the unknown
Hackers are using malware/distributed denial of services to try to compromise our networks and
services. The minute we attach something to the public internet it becomes an instant target for
attack.
The most worrying attack type for an IoT service is Distributed Denial of Service (DDoS), these
attack types can be of any size/ferocity, can happen at any time and last for an undetermined
amount of time. It is the sheer unpredictability of these attacks, that is most concerning.
Ultimately DDoS attacks can cripple a service, potentially knocking it out for days! Clearly this
is not an ideal situation to be in. A key defence mechanism is to become invisible to the attacker
and their ways. Which is the core value proposition of Asavie’s managed platform PassBridge all IoT things and servers are off the public internet.
Ultimately, if you do choose to use public internet networks ensure to –
• Close all listening ports (not as straight forward as it sounds, how do you run updates?)
• Disable all ICMP (Internet Control Message Protocol) responses, essentially eliminating
the threat of the most common DDoS attack the PING of Death.
• Close or alter the common login ports of SSH and Telnet.
12
5.2.1 Scale hurts – take IoT to a private network
However, all the practices listed above are at best designed to be implemented on the assumption
that an individual end-point is being deployed. IoT is by definition - the deployment of large
quantities of connected things.
So how do owners of the IoT deployment a) ensure that the basic security posture is
implemented and that b) every device deployed thereafter adheres to the same security posture?
You can from the outset implement a rigid process of pre-deployment testing, which has an
associated cost OR you could from the beginning look to implement a private IP network. One in
which you have complete control over!
Asavie IoT Connect only allows authenticated devices on the network, from the get-go only your
authenticated things data flows can traverse the network. If an intruder did get into the network
the attack traffic is automatically dropped.
Protect against what you know
Clearly there will be the need to open the IoT network to periodic maintenance traffic flows,
managing these known flows are equally as important. The idea of allowing things and/or servers
to automatically run auto-updates is a potential attack target.
What can we do? Regular and scheduled maintenance is key, but how do you update potentially
thousands of devices in a safe manner? Do you remember or know what was deployed e.g. an
inventory list, which could easily be several years old?
If you are lucky to have architected your IoT deployment on a private IP network using Asavie
IoT Connect, the process is straight forward:
1. Upload the approved software update to a centralized node on the private IP network
2. Dynamically alter the security posture of the network per device or device groups
3. Run the update for individual devices or device groups
4. Assess that all updates are completed, revert to the original security posture
5.3.1 Protect your cellular IoT deployment from overages
If your deployment is through a basic IoT cellular package from a MNO/MVNO, you will not
experience the same level of control. The problem is that the devices are most likely connecting
through the public internet and are most likely running updates in a semi-controlled fashion.
Aside from the security exposure, there is a cost that is going unmanaged!
With thousands of devices all running updates, some of which may be non-essential software
packages - you will quickly notice how the costs rack up! The MNO/MVNO job is not to restrict
your data, in the end that is what they get paid for!
If you have no control of the IP network for your IoT deployment, it’s clear that the cost in terms
of security and dollars quickly adds up!
13
6 Conclusion
The aim of the solution note is to make everyone aware of how vulnerable IoT deployments are,
if they remain connected directly/indirectly to the public internet.
It is important to recall the potential damage and costs associated to a compromised IoT
deployment. An observation in relation to the Table 1 The price of poor IoT security, is that it
only highlights the cost associated with a single exploited cellular IoT device i.e. potential for
thousands of dollars of cost per month, imagine the cost - if tens or even hundreds of similar
devices are exposed!
In an effort, to show how easy it is to exploit IoT devices with weak security credentials, the
simple exercise of using open-source software demonstrated that there is a lot more device
details given away than most would like to believe and that this makes it extremely easy for the
hacker to determine the correct exploit to open the door. Unfortunately for all of us this software
is freely available to everyone including the hacking community!
A fundamental problem will persist for many months to come and that is - that the manufacturer
credentials for many devices are freely available and go unchanged when users deploy them live
on to the internet. Ultimately, making IoT devices the likely targets for recruitment into global
botnet armies, as was seen in the recent IoT attacks.
Essentially, there is no hiding on the public internet and even with basic security best practices
implemented, there is no guarantee of staying safe forever. Ultimately, if you have no control
over the IP network layer in IoT deployments, the IoT deployment will remain vulnerable and
that IoT devices will continue to have the capability to communicate at will, to anywhere on the
internet.
The ability to implement private and secure IP networks as per Asavie IoT Connect, delivers
significant security advantages, but more importantly a managed service helps to significantly
reduce the total cost of ownership of protection over the lifetime of the IOT deployments – by
reducing the need for expensive next generation firewalls, test equipment, software, and
maintenance contracts, etc.
IoT deployments will be in active service for tens of years, Asavie with a long history in
delivering innovative networking solutions, will be here to ensure that connectivity remains
simple and secure for the future of your IoT deployments.
14
TO LEARN MORE, VISIT:
https://www.asavie.com/products/asavie-iot-connect/
Asavie is the leading provider of next-generation enterprise mobility management and Internet of Things (IoT) connectivity
solutions. At Asavie we remove the guesswork from the connectivity conundrum. Asavie allows you to focus on building
your business without the hassle or worry of having to create and manage reliable, resilient and robust networks. Revision (1.0)