Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Mirai-based DDoS attack highlights benefits of Apple's secure HomeKit platform
Appleinsider ^ | October 21, 2016 | By Mikey Campbell

Posted on 10/22/2016 1:02:41 PM PDT by Swordmaker

A distributed denial of service (DDoS) attack that on Friday severely impacted internet access for many U.S. web denizens was found to be in part enabled by a botnet targeting unprotected "Internet of Things" devices. For Apple, the revelation vindicates a controversial walled garden approach to IoT borne out through the HomeKit protocol.



As detailed yesterday, unknown hackers set their sights on Dyn, an internet management company that provides DNS services to many major web entities.

A series of repeated attacks caused websites including The Verge, Imgur and Reddit, as well as services like HBO Now, and PayPal, to see slowdowns and extended downtimes. Follow-up waves played havoc with The New York Times, CNN, Netflix, Twitter and the PlayStation Network, among many others.

Though Dyn was initially unable to nail down a source, subsequent information published by security research firm Flashpoint revealed the targeted attacks involved a strain of the Mirai malware, reports Brian Krebs. Krebs has firsthand experience with Mirai, as the malware was deployed in a DDoS attack that brought down his website, KrebsOnSecurity, in September.

Mirai searches the web for IoT devices set up with default admin username and password combinations, Krebs says. Once discovered, the malware infiltrates and uses poorly protected hardware to facilitate a DDoS attack on an online entity, in this case Dyn.

Poor security practices are nothing new. Uninitiated or lazy end users have for decades left factory default settings untouched on routers, networked printers and other potential intrusion vectors. But this is different.

DVRs and IP cameras like those made by Chinese company XiongMai Technologies contain a grievous security vulnerability and are in large part responsible for hosting the botnet.According to Krebs, DVRs and IP cameras made by Chinese company XiongMai Technologies, as well as other connected gadgets currently flooding the market, contain a grievous security vulnerability and are in large part responsible for hosting the botnet. As he explains, a portion of these devices can be reached via Telnet and SSH even after a user changes the default username and password.

"The issue with these particular devices is that a user cannot feasibly change this password," said Zach Wikholm, research developer at Flashpoint. "The password is hardcoded into the firmware, and the tools necessary to disable it are not present. Even worse, the web interface is not aware that these credentials even exist."

To prevent another Mirai attack, or a similar assault harnessing IoT hardware, offending devices might require a recall, Krebs says. Short of a that, unplugging an affected product is an effective stopgap.

By contrast, Apple's HomeKit features built-in end-to-end encryption, protected wireless chip standards, remote access obfuscation and other security measures designed to thwart hacks. Needless to say, it would be relatively difficult to turn a HomeKit MFi device into a DDoS zombie.

Announced in 2014 alongside iOS 8, HomeKit debuted as a secure framework onto which manufacturers of smart home products can lattice accessory communications. Specifically, the system uses iOS and iCloud infrastructure to securely synchronize data between host devices and accessories.

Apple details HomeKit protections in a security document posted to its website (PDF link), noting the system's reliance on public-private key pairs.

First, key pairs are generated on an iOS device and assigned to each HomeKit user. The unique HomeKit identity is stored in Keychain and synchronized to other devices via iCloud Keychain. Compatible accessories generate their own key pair for communicating with linked iOS devices. Importantly, accessories will generate new key pairs when restored to factory settings.



Apple uses the Secure Remote Password (3,072-bit) protocol to establish a connection between an iOS device and a HomeKit accessory via Wi-Fi or Bluetooth. Upon first use, keys are exchanged through a procedure that involves entering an 8-digit code provided by the manufacturer into a host iPhone or iPad. Finally, exchanged data is encrypted while the system verifies the accessory's MFi certification.

When an iPhone communicates with a HomeKit accessory, the two devices authenticate each other using the exchanged keys, Station-to-Station protocol and per-session encryption. Further, Apple painstakingly designed a remote control feature called iCloud Remote that allows users to access their accessories when not at home.

Accessories that support iCloud remote access are provisioned during the accessory's setup process. The provisioning process begins with the user signing in to iCloud. Next, the iOS device asks the accessory to sign a challenge using the Apple Authentication Coprocessor that is built into all Built for HomeKit accessories. The accessory also generates prime256v1 elliptic curve keys, and the public key is sent to the iOS device along with the signed challenge and the X.509 certificate of the authentication coprocessor.

Apple's coprocessor is key to HomeKit's high level of security, though the implementation is thought to have delayed the launch of third-party products by months. The security benefits were arguably worth the wait.

In addition to the above, Apple also integrates privacy safeguards that ensure only verified users have access to accessory settings, as well as privacy measures that protect against transmission of user-identifying or home-identifying data.

At its core, HomeKit is a well-planned and well-executed IoT communications backbone. The accessories only work with properly provisioned devices, are difficult to infiltrate, seamlessly integrate with iPhone and, with iOS 10 and the fourth-generation Apple TV (which acts as a hub), feature rich notifications and controls accessible via Apple's dedicated Home app. And they can't indiscriminately broadcast junk data to the web.

The benefits of HomeKit come at cost to manufacturers, mainly in incorporating Apple's coprocessor, but the price is undoubtedly less dear than recalling an unfixable finished product.


TOPICS: Business/Economy; Computers/Internet; Conspiracy
KEYWORDS: applepinglist; homekit; miraiddoshack; security

1 posted on 10/22/2016 1:02:41 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ShadowAce; ThunderSleeps; dayglored; AFreeBird; ~Kim4VRWC's~; 1234; 5thGenTexan; Abundy; ...
The almost world wide Distributed Denial of Service attack that crippled many services yesterday, including Netflix, Amazon, and even the dedicated VOiP phone system at my office which left us with only one incoming phone and no outgoing phones, targeted millions of non-personal computing devices including many in the Internet of Devices category, most of them running a form of Android, that had little to no security either turned on or not even built in.

Apple's iOS based HomeKit is built from the ground up with security in mind, and includes in every device using HomeKit connectivity is a Secure Remote Password (3,072-bit) protocol to establish a connection between an iOS device and a HomeKit accessory via Wi-Fi or Bluetooth. This would make it extremely difficult, if not impossible for such a DDoS botnet to ever be built on HomeKit devices. — PING!


Apple HomeKit not susceptible to BotNets
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

2 posted on 10/22/2016 1:13:22 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AFreeBird

Thanks for the head’s Up. . .


3 posted on 10/22/2016 1:14:07 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

The is that the vast majority of people don’t won’t care enough to wall off their cheap IOT devices unless it affects them individually and directly.

Twitter being unavailable is an abstract problem, my baby monitor being off is a whole other matter.


4 posted on 10/22/2016 1:27:44 PM PDT by glorgau
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker
Very interesting. However, the DDoS attack hit internet services - and could, I imagine, hit a service I use or, Heaven forefend, even FR.

I saw a discussion elsewhere on FR of how to connect to FR when some useful but not essential servers are down. But it seemed to be targeted to Windows users. Any advice you would share about back up procedures for accessing FR under degraded Internet conditions?


5 posted on 10/22/2016 1:31:26 PM PDT by conservatism_IS_compassion ('Liberalism' is a conspiracy against the public by wire-service journalism.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: conservatism_IS_compassion

As I recall there is a Yahoo discussion group for secondary communications when FR is down. I’ve recently let my yahoo emails go, so I don’t know for sure what the addressing is for that.


6 posted on 10/22/2016 1:55:12 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker

A 3,000 bit password ought to do it, that’s like a one in 1 followed by 1,000 zeros odds, making the 1 followed by 9 zeros for the Powerball seem like a sure thing.

But, if manufacturers can place open devices on the net at will, then this stuff will happen more and more.

God I hate regulation, but this is as much about safety as anything. Manufacturers must pass an internet device security safety certification, and those that don’t should be in jail.

In the meantime, IOT: you can GTH.


7 posted on 10/22/2016 2:06:40 PM PDT by cicero2k
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker; Liz

Find out what’s feeding off YOUR modem:

http://www.komando.com/downloads/2251/see-who-is-stealing-your-internet/2

“Each computer has a unique IP address, or Internet Protocol Address. Some computer hardware have addresses, too. They’re known as MACs, or Media Access Control.”

“As soon as you boot up Wireless Network Watcher, you’ll see all the detected devices come up on the list. You should be able to recognize all the devices on it. If you don’t, you know somebody is connected without your permission.”

Download instructions

Click on the blue link below. Scroll down the page until you see in purple, “Download Wireless Network Watcher with full install/uninstall support (wnetwatcher_setup.exe). Wireless Network Watcher will automatically download. Open the executable file and follow the step-by-step installation instructions.

http://www.nirsoft.net/utils/wireless_network_watcher.html


8 posted on 10/22/2016 2:29:46 PM PDT by GOPJ ( "An honest public servant can't become rich in politics" - - President Harry S. Truman)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Tha is for the heads up!

Seems odd, the world we find ourselves in. The most despised computer company is the singular entity that does not track your personal information and will challenge the Govt over privacy rights.

Meanwhile, the “People’s Choice” makes no pretense that they are not spying on your personal email, texts or phone calls. They have been working with the NSA to bypass whatever security protocols are used by industry, and are working side by side with foreign entities who embed DOS attack malware within their products to attack American infrastructure from within.

Yet, these “patriots” cannot hate Apple more than they already do. It’s already at a psychosis level, and any factual information to show that Apple is actually doing “good” only serves to infuriate the psychopaths more.


9 posted on 10/22/2016 3:28:47 PM PDT by Hodar (A man can fail many times, but he isn't a failure until he begins to blame somebody else.- Burroughs)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

No problem.

I’ve been somewhat dubious of IoT devices in my home. Not that I don’t like the convenience of automation. I’ve used X-10 for years but having “things” on the net, I’ve always been wary about.

The only “thing no” on the net in my house is the Nest thermostat. Bought before they sold out to google. And since it was also bought before the HomeKit framework, it doesn’t have the security built in.

I’ll go Honeywell in the future, I believe it is HomeKit compliant.

Phillips Hue is HomeKit, I’ll think about it to replace my X-10 dimmers when the price come down a bit.


10 posted on 10/22/2016 5:16:34 PM PDT by AFreeBird (BEST. ELECTION. EVER!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Hodar

You know, it’s funny; Back in the day I used to despise Apple. I was a PC guy. After my first computer (TRS-80 CoCo) I bought an IBM 5150. Had to take out a damn loan to buy it too. But after the MAC came out, no command line. It wasn’t a real computer.

Was a PC guy up until 2009, although I was getting tired of MS around 1998. Win 2000 was the last MS I used. (Had Vista that came on a ThinkPad for a couple of weeks before wiping it and installing Linux.

Then the iPhone came out. Finally, in 08/09 I bought my first MAC. It fit in my pocket! After many issues getting it to sync properly and consistently with iTunes running on W2K in a VirtualBox on my Linux ThinkPad, I bought an iMac.

Now here I am all these years later with an iMac, 2 Mac Minis, an original iPad, 3rd Gen iPad, IPad Air 2, two Apple TVs (3 & 4) and an iPhone 6.

I still have the iPhone 3GS that started me down this road. My GF lost the iPhone 5 I handed down to her when I upgraded to the 6.

She had to go out and get her own 6s. :-)

I’m happy with Apple. They work. And they do take pains to make them secure. And I think, in addition to all the engineering they put into the devices themselves, that their commitment to keeping things secure and private under the hood speak volumes.

Android is google. I don’t use google anymore. I’m not their damn product.


11 posted on 10/22/2016 5:40:40 PM PDT by AFreeBird (BEST. ELECTION. EVER!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: AFreeBird

My first PC was the Commodore 64k back in 1978. Couldn’t afford a PC in college, so I took my programming and Engineering courses on a big IBM mainframe. Got my “own” PC when I worked for NASA. A 66 MHZ 486DX fully loaded. Back then I was investigating AI and neural network computing. Got some nice toys and advanced training.

From there I went to Austin and Motorola, who made the 68000 processors for Apple. There I designed testers for Motorola to test the 68xxx, RISC and advanced micro controller division. Got my first Mac issued to me there. Did my design (using MacPaint) drawing D sized drawings (yeah, 3 by 3 sheets of paper glued and taped together) with schematics covering the whole mess. No simulation. No emulation. Just draw the circuits on the Mac and hope they work as designed. Then debug the prototype. Did that for 9 years. Got to know the Mac very well. Even was one of the first to bring on the PowerPC Macs online.

Then off to the world of Intel R&D and PC design for 20 years. I bought my first Mac Mini in 2012 after seeing the mess Win8 was. I now manage engineers for the DoD and NASA. The DoD world still does the daily battle trying to make Win10 run the legacy software that they depend upon. Meanwhile, the SMART folks at NASA all use Apple MacBook Pros.

I get a kick of the idiots who “hate” Apple and have no clue as what one even is. They mock Apple users, yet my knowledge of Windows will dwarf what they know, and I use my Mac at home because it is so dependable. I can run, and do run WinXP, Win7 Pro and Win10 on my Mac with Parallels; while also running OSX.

The computer is a tool. It allows my brain accomplish more than it can without a computer. Whether that tool runs OSX, Windows, Linux, Chrome or even Ubuntu - I think I am better equipped to make that decision. Not some anti-Apple hater.


12 posted on 10/22/2016 6:47:31 PM PDT by Hodar (A man can fail many times, but he isn't a failure until he begins to blame somebody else.- Burroughs)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker

Swordmaker, any idea how an out of service iPhone linked as a security camera through an iOS approved app fairs in this regard? Should I dig out my AirPort Extreme to replace my U-verse router? Sounds like this is on a whole other level of authentication for that to make a difference.


13 posted on 10/22/2016 9:54:14 PM PDT by Squeako (None of them can be trusted. Be ready and act accordingly.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Squeako
Swordmaker, any idea how an out of service iPhone linked as a security camera through an iOS approved app fairs in this regard? Should I dig out my AirPort Extreme to replace my U-verse router? Sounds like this is on a whole other level of authentication for that to make a difference.

As to the iPhone, security would depend on the model and how old it is. Anything capable of running iOS 8 and better on an iPhone 5s or above I think would be good. At my office we eschew using the Comcast provided WIFI router except for the free patient use, and use a locked down Apple AirPort Extreme for its security connected via Ethernet to the Comcast router and lock that connection down.

With those caveats, it could work fine.

What screwed up our office phones waltzed right through the Comcast firewall and into the Ethernet connected phone system. It probably would not have made it through our AirPort Extreme firewall and onto its Ethernet network. . . nothing downstream on that LAN was effected.

14 posted on 10/23/2016 2:39:52 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Swordmaker

Interesting, thanks!


15 posted on 10/23/2016 6:09:06 PM PDT by Squeako (None of them can be trusted. Be ready and act accordingly.)
[ Post Reply | Private Reply | To 14 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson