Last month the F.B.I. issued an urgent warning: Everyone with home internet routers should reboot them to shed them of malware from “foreign cyberactors.”Below the fold, some details and a critique of Zittrain’s proposals for improving the IoT.
Bruce Schneier (a 2014 Wired article) and my friend Jim Gettys (a 2014 Berkman Center talk) have been running around with their hair on fire about the problem of vulnerable home routers and other Things in the Internet for at least four years. Here is Schneier:
Typically, these systems are powered by specialized computer chips made by companies such as Broadcom, Qualcomm, and Marvell. These chips are cheap, and the profit margins slim. Aside from price, the way the manufacturers differentiate themselves from each other is by features and bandwidth. They typically put a version of the Linux operating system onto the chips, as well as a bunch of other open-source and proprietary components and drivers. They do as little engineering as possible before shipping, and there’s little incentive to update their “board support package” until absolutely necessary.Zittrain has three suggestions. The first tries to address the costs of abandoned software:
The system manufacturers – usually original device manufacturers (ODMs) who often don't get their brand name on the finished product – choose a chip based on price and features, and then build a router, server, or whatever. They don't do a lot of engineering, either. The brand-name company on the box may add a user interface and maybe some new features, make sure everything works, and they're done, too.
The problem with this process is that no one entity has any incentive, expertise, or even ability to patch the software once it's shipped.
Companies making a critical mass of internet-enabled products should be required to post a “networked safety bond” to be cashed in if they abandon maintenance for a product, or fold entirely. Insurers can price bonds according to companies’ security practices. There’s an example of such a system for coal mining, to provide for reclamation and cleanup should the mining company leave behind a wasteland.The second addresses what happens if the Thing can no longer talk to the Internet:
For internet-connected appliances, “reclamation” can entail work by nonprofit foundations to maintain the code for abandoned products, creating an “island of misfit toys,” in the parlance of the famed 1964 Rankin/Bass stop-motion Christmas special. Proceeds from redeemed bonds would go to these foundations to maintain the products, like the way the Mozilla Foundation has transformed the 1998 Netscape browser long after its originators left the scene.
A second intervention would require networked products modeled after analog counterparts to work even without connectivity. A smart coffee maker shouldn’t be so clever that it can’t make coffee without internet access. Switchover to non-connectivity mode will not merely help prevent things from becoming useless when the internet goes down, or if the original vendor disappears or jacks up service prices. It can also provide a soft landing for appliances that reach the end of their supported life cycles while still beloved by owners.A third addresses the problems of vendor lock-in:
Finally, networked devices made by different vendors need to be able to communicate with one another — the way that, say, Mac and PC users seamlessly exchange email. That prevents a household from becoming locked into a single vendor for all its appliances. It also prevents us from flocking to one or two vendors whose compromise could cause widespread consequences.
|$15.99 home router|
- There's no room in a $15.99 home router's bill of materials for a "network safety bond" that bears any relation to the cost of reclamation after TRENDnet abandons it.
- There's no way any home router, let alone a $15.99 one, can work without connectivity.
- The whole function of a home router is interconnection.
Yes, it is possible that the FCC could force routers sold in the US to be bonded. But the idea that consumers in the rest of the world would pay significantly more for bonded routers to solve a problem that they never see is equally implausible. And the router-based botnet that takes down Facebook doesn't need US routers, there are plenty of vulnerable routers elsewhere. This is a global problem, not one that can be fixed by US regulators alone.
Many other Things in the Internet are currently less of a problem than routers, because they typically retain at least some functionality if they are disconnected, and they likely cost more than $15.99. But this advantage is rapidly disappearing. One major trend in cost reduction is to dispense with switches, lights, displays and other user interface components and outsource the device's UI to the consumer's smartphone. A cheap drone and a cheap endoscope are the two most recent products I purchased of this kind.
Both are non-functional without their "app", and part of the reason they're so cheap is likely to be that the flow of privacy-violating information back to the manufacturer is a big part of their profit margin. It is, for example, for cellphone manufacturers, as reported by Gabriel J.X. Dance, Nicholas Confessore and Michael LaForgia in the New York Times:
Facebook has reached data-sharing partnerships with at least 60 device makers — including Apple, Amazon, BlackBerry, Microsoft and Samsung — over the last decade, starting before Facebook apps were widely available on smartphones, company officials said. The deals allowed Facebook to expand its reach and let device makers offer customers popular features of the social network, such as messaging, “like” buttons and address books.So, yes, Zittrain's ideas are positive. They're just inadequate to the scale of the problem. As competition drives down the price of the Things, the mis-match between their margins and their potential externalities will continue to increase.
But the partnerships, whose scope has not previously been reported, raise concerns about the company’s privacy protections and compliance with a 2011 consent decree with the Federal Trade Commission. Facebook allowed the device companies access to the data of users’ friends without their explicit consent, even after declaring that it would no longer share such information with outsiders. Some device makers could retrieve personal information even from users’ friends who believed they had barred any sharing, The New York Times found.
PostscriptThe router malware the FBI is warning about is a professional job. Open source botnet software like Mirai has made it possible for amateurs to amass large zombie armies of routers, web-cams, and other Things in the Internet. Sometimes the amateurs make amateur mistakes which hamper their efforts, such as the buffoons behind the Owari derivative of Mirai:
Ankit Anubhav, of Newsky Security, said researchers with the company were able to take over the MySQL server used to control the Owari botnet – thanks to its creator leaving port 3306 open and the username and password as root.At other times the amateur mistakes might have devastating consequences, as Robert Morris' mistake did.