Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Cellphones Privacy Linux

Gaining Root Access On Linux-Based Femtocells 102

viralMeme writes "According to the Register, 'Security researchers have turned their attention to femtocells, and have discovered that gaining root on the tiny mobile base stations isn't as hard as one might hope.' One of the researchers said, 'After hours of sniffing traffic, changing IP address ranges, guessing passwords and investigating hardware pinouts, we had obtained root access on these Linux-based cellular-based devices, which piqued our curiosity [about] the security implications.' Whoever designed these devices should be sent back to computer school. An authentication device that can be bypassed is a contradiction in terms. Or, as some pen-pusher would put it in a report: an unantipicated security excursion.
This discussion has been archived. No new comments can be posted.

Gaining Root Access On Linux-Based Femtocells

Comments Filter:
  • by prgrmr ( 568806 ) on Tuesday February 02, 2010 @01:49PM (#30998338) Journal
    changing IP address ranges, guessing passwords

    Better passwords would have made all the difference in the world. 16 character, mixed case and symbol types would have been enough of a roadblock to prevent them from gaining access. Too many companies are still shipping products that have no intended user access to the command shell with passwords like "Admin", "12345", and the ever-popular "password". It's not like it costs more to have a longer, more complex password.
  • by Nos. ( 179609 ) <andrewNO@SPAMthekerrs.ca> on Tuesday February 02, 2010 @01:58PM (#30998500) Homepage

    The problem is not what the default password is. It could be blank and still not significantly affect the security of the device. Its the admins that don't change the default password that are to blame. Lets face it, even if they ship the next device with a 16 char mixed case, special character, number containing, sufficiently random password, it will still be the default password. A simple google search of "Device model default password" will get you the default password pretty much as soon as its released.

    As an alternative, they could force a password change on first login.

  • Re:So fix it (Score:3, Insightful)

    by Sir_Lewk ( 967686 ) <sirlewkNO@SPAMgmail.com> on Tuesday February 02, 2010 @02:01PM (#30998556)

    He also seems to be assuming that the attacker and the owner are two seperate people.

  • Encrypt everything (Score:2, Insightful)

    by Anonymous Coward on Tuesday February 02, 2010 @02:06PM (#30998626)

    Don't use the regular 3G voicecalls, use only encrypted VoiP. Preferebly with a microSD card filled with one-time pad

      Of course its not actually a bad thign that these are hacked, people just need to realise that their communications are not secure. just like when I use my Nokia's SIP client now I know full well that it would be easy for the person who'se WiFi i'm using to intercept my calls but I take the chance anyway.

    Femtocells rely on 'security against the user' much like DRM does, in fact a large part of the 3G/GSM network relies on people not being able to fuck around with their own equipment too much, so I am actually surprised it took this long since that client-side security model is doomed anyway

  • by blair1q ( 305137 ) on Tuesday February 02, 2010 @02:17PM (#30998766) Journal

    On the other hand, a 20-digit randomized Product Key for registering your purchase is no big deal.

    Print the password on the box and make it mandatory to enter it before use. Users will get the clue and online h4xx0rs won't have a backdoor into 99% of links.

  • by Sir_Lewk ( 967686 ) <sirlewkNO@SPAMgmail.com> on Tuesday February 02, 2010 @02:22PM (#30998840)

    use only encrypted VoiP. Preferebly with a microSD card filled with one-time pad

    Say what? Either you don't know what a one-time pad is and are just pulling cryto terms out your ass, or you have really weird telephone habits. OTPs never make sense, unless you are a spy deep in enemy territory and you need to transmit a handful of words with perfect security to a single receiver. The logistical issues with a system like the one you are proposing are absurd.

  • by jeffmeden ( 135043 ) on Tuesday February 02, 2010 @02:25PM (#30998908) Homepage Journal

    Oh, for the love of documentation!

    I think what you meant to say is there is an inherent cost to being forgetful (forgetting the password before writing it down in a safe place) or lazy (not writing it down in an safe/perpetual place.) Yes, if the alternative is leaving a password susceptible to casual attack, feel free to write the password down and lock it in your desk drawer with the IP of the device on it, and leave that post-it around for the next guy.

    Not that there aren't a ton of secure, effective tools to manage passwords out there.

  • by kiehlster ( 844523 ) on Tuesday February 02, 2010 @02:28PM (#30998950) Homepage
    Their computer schooling isn't the problem, it's that they've probably also gone to business school. Rule #1, always cut corners to finish the product on time.
  • by davester666 ( 731373 ) on Tuesday February 02, 2010 @02:37PM (#30999082) Journal

    The very concept of Femtocell's is bass-ackwards. You pay a carrier for wireless access, then pay again for a device to actually provide you with the wireless access, along with monthly fee's for the device and also pay for internet access so the device can connect to the carrier over the internet.

    It's like "we couldn't be bothered to actually provide you with coverage at your home/office, so would you mind building out our network for us, and pay us extra for the privilege of doing so".

  • by mcrbids ( 148650 ) on Tuesday February 02, 2010 @02:39PM (#30999120) Journal

    Too many companies are still shipping products that have no intended user access to the command shell with passwords like "Admin", "12345", and the ever-popular "password". It's not like it costs more to have a longer, more complex password.

    You think longer, complex setup doesn't cost the company money? I gather that you haven't considered support costs?

    The best solution I've seen so far is to have a strong password printed on a sticker on the outside of the box. That's a pretty good compromise because if the attacker has physical access to the box, he/she could hit the "Reset" button on the device anyway. Thus, putting the password on the bottom of the device on a sticker really isn't any less secure than other solutions, and this can be done fairly cheaply.

    But it still costs - each router has to be given its own unique password, and a process has to be set up to match up the passwords given with the stickers, and there are still more support costs from the clueless dolts who have to be told to look on the bottom of the device for the default password.

    If you assume any intelligence on the part of the end user, your support costs will quickly challenge that assumption!

  • by pr0nbot ( 313417 ) on Tuesday February 02, 2010 @02:45PM (#30999226)

    I'd presume (without having RTFA of course) that what is meant is that they bought a femtocell, looked at its hardware pinouts, and this helped them devise an attack that would work on any instance of that model of femtocell (without physical access).

  • by Anonymous Coward on Tuesday February 02, 2010 @02:53PM (#30999346)

    The very concept of Femtocell's is bass-ackwards.

    The technical concept is fine. Its implementation at the billing level by American companies is not. The same can be said for SMS.

  • by Foolicious ( 895952 ) on Tuesday February 02, 2010 @03:30PM (#30999854)

    Sorry if you got confused.

    Yeah. I was thinking that by me living in an area that is shown as having coverage on their coverage maps meant that I would...wait for it, wait for it...actually have coverage. How silly of me.

  • Re:Seriously? (Score:3, Insightful)

    by owlstead ( 636356 ) on Tuesday February 02, 2010 @04:04PM (#31000320)

    "The real issue here is the fact that security is sometimes not taken as seriously with hardware and firmware design in commodity devices as it is with software."

    I love that last statement. It's not only not taken seriously, it is rarely programmed by someone educated on the subject. And the users of these systems are also to "blame". Even I, when browsing for a new ADSL modem, don't look at the state of the security in a device. I'll look if a router has WPA2 but that's about the extend of it. This is not strange, since it is simply not the prime use of the device. For these kind of Femto cells, no manager will select on security, but rather at cost, signal strength and manageability.

    About 3 years ago I looked at the security of an Enterprise Service Bus and literally on the last page it was stated that the software used AES 168 bit encryption (including screen shot, no less). It's not just commodity devices, it is all products that are not primarily designed with security in mind.

  • by dgatwood ( 11270 ) on Tuesday February 02, 2010 @04:54PM (#31001042) Homepage Journal

    You also pay for the power needed to operate the cell, which presumably their other customers benefit from. If they put a full cell site on your property, they'd typically pay you between $10-25,000 per year to lease the right to do so (even if it is just putting it on top of an existing structure). Why should they get to place a femtocell at your house for free merely because it runs at a lower power? At a minimum, they should give you a discount on your monthly charge and free service on that cell. Anything less is outright taking advantage of you.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...