and vulnerabilities that affect all Linux MIPS systems (not just IoT).
Some thoughts and data...
(Thread 1/N)
cyber-itl.org/2018/12/07/a-l…
Something about not being able to see the forrest through the trees ;)
2/
cyber-itl.org/assets/papers/…
It’s true that none of the routers did well in regards to basic software safety hygiene, but thinking there’s nothing consumers can do is security nihilism and misses the actionable information in the paper...
1) Avoid Linux MIPS systems if possible (eg choose AARCH64).
2) Choose a system that did better than their competitors (next tweets in thread)
3) Perform your own simple measurements as tribal knowledge is often wrong.
In fact CITL call graphs showed that out of 18 vendors, 15 still have binaries that call gets().
That’s over 80%. Yikes!
What amazed me was that Linux MIPS Kernels from 2001-2016 lacked *any* Data Execution Prevention and 2016 onward have a universal DEP and ASLR bypass:
NOBODY NOTICED
1) they look for hundreds of features that relate to security/safety hygiene in every binary they analyze.
2) for the vast majority of the software industry this is overkill.
Modern software/systems need to check DEP, ASLR, Stack Guards, etc., the same way automobiles verify they have seatbelts and airbags.
Just looking for basics will show you that the world is often very different from what people think it is. This includes security practitioners and a ‘common tribal knowledge’.
If you can’t/don’t measure it, you will make (incorrect) assumptions.
Product measurements are more helpful when quantitative, to allow comparison, rather than pass/fail or ‘certified’.
Put unit tests in to avoid unintentionally shipping without airbags, seatbelts, etc
All of the Linux MIPS router images that the CITL folk looked at were vulnerable...
Even the vendors who stated that they didn’t think their Linux MIPS systems were affected.
So far there aren’t any unaffected Linux MIPS systems.
:/
In total it was over 6000 images.
And dang it, I meant to tag @m0thran in the first tweet of the thread.
He is behind this (in my opinion) very impressive work over st CITL.