Honeywell Home Controllers Open To Any Hacker Who Can Find Them Online 85
Trailrunner7 writes: Security issues continue to crop up within the so-called "smart home." A pair of vulnerabilities have been reported for the Tuxedo Touch controller made by Honeywell, a device that's designed to allow users to control home systems such as security, climate control, lighting, and others. The controller, of course, is accessible from the Internet. Researcher Maxim Rupp discovered that the vulnerabilities could allow an attacker to take arbitrary actions, including unlocking doors or modifying the climate controls in the house.
Why do you need this stuff on the internet at larg (Score:5, Insightful)
At home, sure, using a tablet to access and program the temperatures on your AC is fine.
But that is your intranet, and securing that should be an obvious practice.
And I can barely guess why you would want your locks handled that way, though in terms of security, a mechanical key is hardly inherently better than a digital one.
Re: (Score:1)
There are other uses too. Clearly they are not a must but if you can control some of the house functions from your pho
Re: (Score:1)
NAT is not security.
Unless you're the odd one who doesn't allow internet access to your intranet.
Or you're the really odd one with real IPs on your intranet, in which case, I hope you trust your firewall!
Re: (Score:3)
No, but it adds an considerable element of security. If you disagree with me then feel free to attack my PC via the internet, it's IP address is 192.168.1.60
Re:Why do you need this stuff on the internet at l (Score:5, Funny)
No, but it adds an considerable element of security. If you disagree with me then feel free to attack my PC via the internet, it's IP address is 192.168.1.60
Hey! How dare you use my printer as your PC. No wonder it takes forever to process and print a PDF file.
Re: (Score:2)
Hey! How dare you use my printer as your PC. No wonder it takes forever to process and print a PDF file.
And here I thought that was just because it was old and only has 2mb RAM in it...
Re: (Score:1)
I bought the domain localhost from a buddy. It works. The good news is that, for an extra $20, he configured it for me.
Re: (Score:2)
I wouldn't go as high as "considerable"... it adds one hop to "push" attack methods - an attacker has to take over your router. I'd put that somewhere between trivial and substantial extra security (non-inclusive).
Re: (Score:2)
Re: (Score:2)
If I decide to go out drinking and I'm out late, I can use my phone to tell my furnace to heat up my house before I get home. Normally it goes to 16C after 10pm, which is when I'm normally in bed. This way, when I get home buzzed / wasted, my house is nice and comfy.
Also the Honeywell controllers require fingerpoking to change outside of a subset of their normal range. I can't use remote to change outside of 4.5C to 32C... uh, okay, that's a little more range than I would have expected. Voice limits me
Re: (Score:2)
though in terms of security, a mechanical key is hardly inherently better than a digital one.
Well, at least random Russians would have to fly over here first, and get through the INS. At least they used to have to ...
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
I'm at work. The plumber shows up at my house at 10 a.m. I verify his identity and arrival with my front of house cameras. I talk to him remotely via the door intercom, disable the security alarm, and unlock the front door for him. I monitor his work and actions with my internal cameras and watch him leave. I remotely lock the door behind him and re-arm the security system. All the video is watched in a small window in the corner of one of my monitors, while I still get real work done. All without ha
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
What, and miss an opportunity to telecommute?
Re: (Score:2)
Re: (Score:1)
Similar to my question. I don't understand how these things are on the internet - what does that mean? I haven't been able to find technical details.
If I have a basic home firewall (e.g. Netgear) - with uPNP disabled - are these things on the "internet?" Are these devices found via portscan?
I went through this when looking at baby monitors. I only want to use them in my house - on the local WiFi. Are these things tunneling out to "the cloud" and are accessible through another channel? Can they be b
Re: (Score:2)
I can imagine a few good reasons *IF* security is tight enough. For example, many people don't know in advance when they will return home. It might be nice to bump the heat up or the AC down when they're on their way. Some people get 'lock anxiety' when they are out (OMG, did I forget to lock the door). Now they can be sure.
The key is to make sure it is secure. My preference would be a firewall rule on the router that allows me to ssh to a designated box that then allows me to control the home systems. Make
Re: (Score:2)
Welcome to the Internet of Things (Score:4, Funny)
Please upgrade (Score:3)
Please upgrade to my patented Honeypot Home Controllers.
Amateur level fail (Score:5, Interesting)
"The Honeywell Tuxedo Touch Controller web interface uses JavaScript to check for client authentication and redirect unauthorized users to a login page."
You'd think that a company like Honeywell would know better about security, especially as they have a whole cyber security division...
This is like the pages that had a crappy javascript password which you could read by seeing view source, if you knew the keyboard shortcut (right click would be blocked on javascript).
Mistakes an amateur would make.
Re:Amateur level fail (Score:4, Interesting)
"The Honeywell Tuxedo Touch Controller web interface uses JavaScript to check for client authentication and redirect unauthorized users to a login page."
You'd think that a company like Honeywell would know better about security, especially as they have a whole cyber security division...
I'm sure they don't see any reason to expend such resources on the consumer space.
That expertise is reserved for getting government contracts.
Re: (Score:1)
Re: (Score:1)
Need to start including USB keys (Score:5, Interesting)
When you get the device, plug the USB into the device and press a button. It would randomly generate a key and save it to that USB drive.
Now to connect anything to that device you have to plug the USB drive into it, transferring the password key,
Re: (Score:3)
How about adding a button on the device? To modify anything, you need to hold the button. And it's a momentary push button, not a switch, so the user can't leave it enabled.
Re: (Score:2)
How about adding a button on the device? To modify anything, you need to hold the button. And it's a momentary push button, not a switch, so the user can't leave it enabled.
That sounds too much like WPS. And we know how that came out.
Re: (Score:3)
Re: (Score:3)
And it's a momentary push button, not a switch, so the user can't leave it enabled.
Yeah, Scotch has a fix for that.
this Internet of Things is getting old (Score:4, Insightful)
New meaning (Score:5, Funny)
This brings a new meaning to "Honey, I'm home".
As in, the hacker is in your home via the Honeywell Home Contr... yeah ok never mind.
Re:New meaning (Score:4, Funny)
Also a new meaning to Homeowners :D
Re: (Score:2)
It's actually "Hello, thermostat." "I'm home."
"Okay"
IoT? (Score:4, Funny)
More like Internet of Trash.
We've now advanced enough to consider X10 to be better than the new technology.
unlocking doors or modifying the climate controls (Score:1)
Does it feel warm in here? [ew.com]
Does this surprise anyone!? (Score:2)
I still don't get why people do not assume this is the case by default. While being far from a networking guru, this is what pushed me into learning about how to configure VLANs and OpenVPN so I could put these things into appropriate jails. While I don't doubt I have made errors in configuring the firewall for outbound traffic, it is at least better than nothing, and what testing I can think to do seems to work.
Ubiquity might be able to make some money with a security appliance that automates and simplifi
Re: (Score:1)
Common problem across industry (Score:5, Interesting)
As someone "in charge" (Systems Architect) of how many of our product lines are secured on the network (obviously not Honeywell), most people in the field would not believe how much time I waste explaining to people over and over and over again that I will not "simplify" the authentication protocols by getting rid of (strong security practices) just because we use SSL. Its an ongoing fight to keep things strong against a thousand little pushbacks from developers, product management, marketing, sales, and legal. Posting anon as its still in progress, comes up at least once a week.
Regulation needed? (Score:2)
I think that security in the consumer sphere is worth having (for our society as a whole) even if nobody (in the market) wants to do it.
So I was wondering if this (security for electronic equipment that co
Re:Common problem across industry (Score:4, Interesting)
It's sad but I fight the same battle almost every day regarding safety systems in factory automation. There are specific regulations and best practices that we have to follow in order to determine that a machine is safe for an operator to use, and it falls under the heading of "big E" Engineering, as in the type you need to have a license to certify. We put a lot of effort into making the machine both provably safe, but we also have to make it recover nicely from an abrupt shutdown if someone opens a guard door, etc. Everyone from management, to the engineering staff, to the operators themselves who use the equipment constantly gripe about how much effort we have to put into the safety systems, even when it's their own life that's at risk. Almost every discussion involves someone saying, "why can't we just tell people not to stick their hand in the machine?" The answer, of course, is that the rules are different for a machine that starts and stops automatically, than it would be, e.g., for a table saw or a drill press with an on/off switch. The rules are different precisely because people do stick their hands into machines that are stopped. Engineers are professionals who accept people as they are, not as we wish they could be.
Really we could solve the security problems in "IoT" devices by applying the same strict Engineering principles that we do to safety systems in factory automation. You would do this by functionally separating the part of the system responsible for security from the rest of the system, having certified parts that you can purchase that are rated to various industry best practice security standards, and then having a licensed professional engineer review and sign off on the design. Guess what though... it would cost more money. However, I believe there are certain products, where there's a risk to the public, that should be legislated to require this kind of certification.
BSG had it right: Safe Network = No Network (Score:3, Insightful)
I have a hard time thinking of anything more obvious than the fact that "smart " are technology security disasters waiting to happen. With the current architecture of the internet and networking from the top down there is nothing truly safe. Especially consumer grade at home tech built with technology plebeians in mind.
Call me old fashioned but I see enough at work and stories online every day to commit to keeping my home, appliances, vehicles, and anything else possible off the internet.
Re: (Score:1)
Re: (Score:1)
You are confusing nerds with geeks. Nerds may not watch television at all. Geeks watch BSG, pretend to be nerds, and bite the heads off chickens.
Re: (Score:2)
As long as you are not storing all the security clearance info for the united states in your smart thermostat, I think it will be fine. The chinese will be able to mess with your temperature and turn on and off your lights with impunity. They can probably also try to unlock my doors during the brief periods of time when my wife hasn't already left them unlocked.
I would love to see these devices be better secured, but I think the reason they aren't is *because* of the lack of potential harm that is possibl
No shit ... (Score:3)
Wow, you mean commercial products designed to connect to the internet have absolutely crap security?
Well, color me fucking surprised and shocked.
No, wait, the other one .. where I point out these companies are either incompetent or indifferent to security, have no penalties or liability, and have products rushed out the door by asshole CEOs and marketing people who don't give a damn about security.
This is precisely why I look at pretty much every damned product which wants to connect to the internet, or has an app for your smartphone and think "oh hell no".
Trusting this shit is idiotic, and quite frankly, I'm beyond the point of sympathy for people who buy this shit. It's insecure so that it can be convenient. Pretty much at least weekly we see an entire class of products has pretty much zero security. And we're a long way away from being able to trust them.
Just stop buying this crap.
Re: (Score:2)
I'm beyond the point of sympathy for people who buy this shit.
You have rather high expectations of the average consumer. They see, say, an IoT light bulb. The box says they can control it with their smartphone, and that it's "secure". Just like their car claims to be safe, that the milk they drink says its safe, like the anti-tamper seals on bottles are supposed to be secure.
People can't be experts on everything. They probably had to have their ISP set up their router or them, and have no idea that they even have a home network. It's not their fault, it's our fault. W
Re: (Score:2)
You know what, I don't ... I have exceedingly low expectations of them. I simply don't give a crap any more if people buy this stuff and get hacked.
I tell people I know about the risks, the rest I stopped caring about.
And for that, I lay the blame squarely at the feet of corporations for not giving a damn, and lawmakers for not holding them accountable.
Yes, I k
Re: (Score:1)
Nothing is hack proof if it has a connection. Nothing... Not one thing ever.
Well... (Score:2)
Hack or feature? (Score:4, Interesting)
The thing has an entire API unauthenticated to whoever is able to connect to it (https:///system_http_api/).
It's well documented that the point is not to have these things port-forwarded on your router but to be controlled through their proprietary gateway which comes with a monthly fee. Sure you can surf to it on your local network but that's more of a convenience and a lot of features the API exposes are not in the GUI.
The controller accessible from the Internet (Score:2)
So, yet another demonstration of the dangers of putting an embedded web server on the device. All so as they can be advertised as easily configurable through a browser and the end user won't have to read an instruction booklet.
It is easy to identify (Score:2)
Honeywell (Score:2)
Honeywell, never again be afraid not to find somebody who will open the door for the contractor when you at work.
With our system, anybody with access to Google can open your front door.
Also not only you will be able to see the babysitter masturbating, the other 7 billion people will be able to watch too.
but ... but ... (Score:2)
already patched (Score:1)
This initial vulnerability was identified by Honeywell over 6 months ago and a patch was available and distributed shortly after. The recently reported vulnerability is also patched. http://www.tuxedotouchtoolkit.... [tuxedotouchtoolkit.com]
It does call into serious question about the reasonable approach of making every aspect (security, appliances, climate control, entertainment, etc...) accessible, controlled, and vulnerable to network attacks. It is no longer just a concern of having a wireless access point in your home - it i