Who's the guy in the in-flight entertainment system?

A while ago I had the (questionable) pleasure of being on a 11 hour transatlantic flight, heading to LA. Since passengers are getting upset that their water bottles are being thrown away before boarding, they have to be pleased some other way, and what could be better than a nice and shiny in-flight entertainment system?
There are a few different providers of in-flight entertainment systems, and aircrafts and fleets within the same airline often have different ones.
In this case, it really felt like a “new” system compared to the others I’ve seen. It had a touch-screen and quite a few different apps (or programs or software or whichever you prefer, I’ll stick to “app” here).
The usual things were there, like watching movies or TV-shows. One thing though that struck me as weird, were that TV-shows were “aired” and looped. You had to wait until the currently running show was done, before it started again, kinda like having each channel on a TV looping a specific episode of a show. BIG step backwards..
As I guess many do, I started clicking around, checking features and which apps were available.
The in-flight entertainment system featured a few well known games (like Plants vs Zombies), a chat, an image viewer, and a PDF reader.
One of the first things I started to play around with was the communication app. When I clicked for it to start, there was something “flashing by” before the interface opened. Like a graphics glitch or something. I ignored it for a while to check out the actual program. It was a chat app which allowed chat rooms, and had instant messaging between different seats on the flight! Not really sure why someone would want that… Tinder for air travellers? Arranging a mile-high thing? But, as the hours passed, people showed up to tell jokes and riddles, and tell the rest of the passengers about their final destination or favorite restaurants. I didn’t think someone would show up at the beginning, but I guess 11 hours strapped to a (way too tiny) seat brings joy in even simple things.
After a while I wanted to check out what might have caused the glitch in the beginning when the app was started. I exited the app, and started it again, but it went straight to its interface. No glitch, nothing fun, nothing special. Slightly saddened, but intrigued by this, I asked the person sitting in the seat next to me if I could check the app on their screen! After a confused acceptance, I clicked through to the app and started it. There was no glitch or anything weird, but there WAS a load-time of a second or two before its interface started. I exited it, and it started right away again, without delay.
Turning back to the system in front of me, I figured that the app was already in memory, which would explain why it loads so quickly the second time. I wanted the app out of memory, or exit some how, in order to see if the glitch/split-frame thing was still there when it started fresh again. I exited to the main menu, and back again through the menu system to the app, but it still loaded instantly.
I tried starting other apps, and back to it again, but nothing. I gave up for a while and watched an episode of some TV-show. Well, actually it was rather half of it, since the system so poorly tried to reflect a regular TV… “This episode has been running for 9 minutes, and will restart in 12 minutes”… thanks..
I had my hopes up after watching the show, but they were quickly shot down by the app starting instantly.
Looking at other things that was offered by the system, one thing struck me as interesting, or stupid, or something in-between.
Next to the display was a USB-port, and there was an interface for loading PDFs, images, music and movies from your own USB-stick!
It might just be me being overly paranoid, but.. allowing USB access on these things, and loading arbitrary files and filesystems? Doesn’t sound like the highest priority thing, and it’s something that I’m sure many bored people will try to fuzz since they’re stuck there for so many hours. Can you force it to boot from USB? Will it accept a USB keyboard? Probably neither, but.. who knows?
After playing around with the system some more, probably for half an hour or something, I got somewhere. I got an Android-like “App X is not responding. Do you want to close it?”.
Unfortunately, it wasn’t my app, but it triggered my interest. Deeply. After yet some time, I think I got the entertainment system to restart! Well, or something. The screen turned black and unresponsive for a few minutes, before showing the welcome screen again! (Perhaps I’ll write more about this in the future..)
I stared at the welcome screen for a while, then closed it and curiously swiped through the apps to get to the chat app. I clicked it, and… success!
Instead of starting right away, or even the quickly showing glitch, I got a loong 25 second(!) view of what I believe to be the internal app name (“i_communicate”) and a profile-image-like picture of a guy in glasses and a striped shirt!

I’m guessing this is probably the programmer for the app, and he hid some status/easter egg screen somewhere.
When the app was restarted, it loaded instantly again. I recreated “the situation”, waiting a few minutes more before the system showed the welcome screen, and.. there he was again! For just as long!
I don’t know what triggered him to show for that long, and only on my system, or who he is, but.. it sure made the long flight quite a bit more enjoyable!
When I got back, I tried both reverse image search and tineye on the best quality image I could get, but nothing.
Tomorrow, I’m going over the pond once more, and I have to ask myself, will I see the mystery guy again?

Vulnerabilities in automation systems lets you ring bells of Swedish church

A few days ago Swedish national newspaper Dagens Nyheter revealed very disturbing vulnerabilities in the automation systems of Swedish company Kabona. These systems control HVAC systems, climate systems, heating, supermarket freezers and so on, nothing strange there, all these functions you could want to monitor and adjust remotely. The problem is that thousands of installations are accessible via the internet and so jam-packed with bad programming and vulnerabilities that anyone with even very limited skills can get in to the systems and manipulate locked doors, server room temperatures and even ring the bells in the tower of a church in Hedemora.

Hedemora Kyrka
Hedemora Kyrka, image by Britt-Marie Sohlström. CC BY-NC-ND.

I can guarantee that these systems never have gone through any kind of penetration testing or security scrutiny. It took me no more than ten minutes to find a flaw to get into the systems, and two fully working exploits within an hour. When you know what to do, you’ll have full access to all of them in mere seconds. I quickly glanced through some of the vulnerable systems, and there are plenty of supermarket freezers to turn off, and temperature controllers to play around with. I don’t doubt that functions and structures important to society could be threatened by these vulnerabilities. There is a possibility to wreak havoc and create a lot of damage, and of course costs and irritation.

With only a few clicks is possible to manipulate heating, ventilation, fire alarms and to open doors in many sensitive locations in Sweden. We have found at least 733 systems that are connected to Kabona’s web central, completely open to the internet. Among them are police stations, train stations, care centers and large office buildings. DAGENS NYHETER (MY TRANSLATION)

My fingers are itching, but of course I can’t tell you any details about the holes and flaws I found, responsible disclosure you know. People across the globe are probably trying to play around with the systems that can be reached and breached, Shodan recent searches hints that much. I don’t want to make matters worse. Swedish security researcher Leif Nixon was the one who reported this, and he will release an advisory in December, at least giving the company a month to get their act together. I’m sure the exploits I found are at the top of his list, and there are probably many more.. The flaws will make it possible to automatically exploit the systems, and I’d be surprised if we don’t see a mass-scan+infection soon. If a car manufacturer released a new model with security flaws, they would pull it off the market immediately. Unsafe toys, same thing. They follow strict rules and regulations, but it seems that it is just plain OK to release software that is more or less completely open to the billions of internet users across the globe. Should there be requirements of penetration testing, etc, at least for systems purchased by governments? The losers in this game are Kabona’s thousands of clients, but as we all know, this is definintely not the last time we see systems that are this horribly broken.

The troublesome history of the bitcoin exchange MtGox

Most, if not all, of the people interested in the bitcoin phenomenon have heard of MtGox, the Japanese bitcoin exchange. I’ll look in to some of the issues they’ve run into over the handful of years they’ve existed.
From trading cards to real money
MtGox started in 2009 as an exchange for trading cards (MtGox = Magic: The Gathering, Online eXchange), by Jed McCaleb. Before this, Jed was mostly known for creating the P2P-file sharing software eDonkey2000. In July 2010, MtGox switched from being a trading card exchange, to a bitcoin exchange, letting users buy bitcoin for “real money”.
In November 2010, the bitcoin price was USD $0.5, three months later, in February 2011, it was on par with the US dollar at $1/BTC. A month after that, in March 2011, Jed McCaleb sold Mt.Gox to Mark Karpelès, a French developer in Japan, who is also the one behind the VPS service AutoVPS.
The hack and the leak
In June 2011, just three months after Mark took over the site, MtGox was hacked, and over 60.000 usernames and hashed passwords were leaked. They reportedly accessed a MtGox “auditor” account, and issued huge sell orders for non-existing bitcoins, at any ask price, which resulted in a crash from $17.51 down to $0.01 per bitcoin on the MtGox exchange.

“Two months ago we migrated from MD5 hashing to freeBSD MD5 salted hashing. The unsalted user accounts in the wild are ones that haven’t been accessed in over 2 months and are considered idle. Once we are back up we will have implemented SHA-512 multi-iteration salted hashing and all users will be required to update to a new strong password”

They decided to reverse all transactions, and suspended the site for a week while checking and fixing the security. Since password re-use is common, many users got their bitcoin stolen from other exchanges and online wallets due to the leak of hashed passwords from MtGox.
The hack caused delays of withdrawals and transfers, so people started questioning the solvency of MtGox. Are they trying to hide that they lost the bitcoin in the June 2011 hack? Mark decided to prove that they still were in control of the bitcoin by making a huge transfer between two internal wallets, to the size of 424,424.42424242 bitcoins:
The 2013 DDoS and service issues
The following months there are still complaints about slow withdrawals, and frequent issues, but otherwise it is business as usual. The U.S. dollar prices on MtGox are usually higher than on other exchanges, perhaps related to withdrawal issues.
In April 2013, MtGox were hit by a distributed denial-of-service attack, and suffered massive downtime:

Since yesterday, we are continuing to experience a DDoS attack like we have never seen. While we are being protected by companies like Prolexic, the sheer volume of this DDoS left us scrambling to fine-tune the system every few hours to make sure that things don’t go beyond a few 502 error pages and trading lag.

There are however reports that the attack was directed to a single open backend-server, not the CDN-powered/DDoS-protected frontend ones. It was a single open server, running both the webserver and the exchange, and found via a simple scan of MtGox’s assigned IP block.

Believe it or not, there is pretty much nothing that can be done. Large companies are frequently victims of these kinds of attacks. Even though we are using one of the best companies to help us fight against these DDoS attacks, we are still being affected.  There are a few things that we can implement to help fight the attacks, such as disconnecting the trade engine backend from the Internet.

There are repeated rumors about problems on MtGox, in correlation with price drops on bitcoin. Users often experience lag or connection problems when trying to panic sell/transfer their bitcoins, and MtGox also chose to suspend the site at times:
However, since MtGox was the largest exchange, with 70% of all trades worldwide, it was not too strange to experience lag or issues during busy market times (quick changes in bitcoin value).
This graph shows the daily trading volume of bitcoin, and which exchanges were involved:
Enter Homeland Security
MtGox was by far the largest trading site, but something happened in May, 2013. The Department of Homeland Security issued a seizure warrant for MtGox’s account at Dwolla, their payment provider, since they hadn’t registered as a money transmitter with FinCEN in the US. They reportedly seized $2.9 million from MtGox’s Dwolla accounts, and another $2.1 million from MtGox’s Wells Fargo accounts, totaling in $5 million seized.
No more $ withdrawals
In June 2013, they temporarily suspended U.S. Dollar withdrawals, but later reinstated it. The last few months were troublesome for MtGox. Very few people have were able to successfully sell their bitcoin for money, and the few orders that went through took weeks or even months.
Btw, not bitcoin either
Fast-forward to February 2014. After several months of withdrawal problems, and an increasing backlog of failed bitcoin transfers, they decided to disable bitcoin transfers also.
With delays and issues in exchanging bitcoin for fiat money (regular currencies), and the halt of bitcoin transfers to other exchanges, or users own wallets, they have effectively cut of people’s access to their money. It may be a harsh thing to do, but the reason for this is simple enough: MtGox currently has no control over or knowledge of what bitcoins they have, and how much belongs to whom!
The client is the culprit
There are several different bitcoin applications to use, however, the most common one, the reference client, is the one the bitcoin core developers are creating and updating. Other versions usually use the changes in this one as a reference to changes that need to be implemented, or at least should.
MtGox doesn’t use the standard client, but instead they are using either an older version, or, more likely, a custom version of the software. This is where the problem arise.
First, lets look at how the bitcoin network and a transaction works.
The bitcoin block chain and transactions
All bitcoin transactions, from the single first one, to the ones being made right now, are stored in the bitcoin block chain. This is a big public ledger of every single transaction ever made over the years. This is the reason a new bitcoin client needs to download several gigabytes of data before it’s up-to-date and knows the current state of itself and the whole network. There are clients that only rely on smaller bits of the data, assuming that the previous ones are correct, but the block chain data is a feature of bitcoin which is necessary to prove that a certain address/person actually has access to certain funds. All of this is managed via a peer-to-peer network, where clients relay transactions to each other.
When a bitcoin transaction is made (assuming it’s actually a funds transfer), it contains information of where the funds come from (the inputs), where they are going (the outputs), and the amounts transferred. Since every single previous transaction is known, the bitcoin software can follow-the-trail and know the inputs actually has access to the funds.
Each transaction on the network also contains a transaction id. The transaction id is a hash of the contents of the transaction, so that every transaction will have (should have) a unique transaction id.
Since bitcoin clients generally talk to each other via a P2P-network, this means that transactions are sent through different clients and added to the big public ledger. When a client sees a new transaction, it can check the public ledger to see if the sender should have access to those coins, or check if they have been spent already. However, since it’s a P2P-network, perhaps they were spent already, but the local client hasn’t seen that transaction yet?
This is where “confirmations” come in. A new transaction will have zero confirmations, meaning that there is nothing actually proving that the sender had access to the fees. The local client can check the public ledger, and verify that it should have access, but, it does not know if it has “missed a packet” that says that they were already spent.
When a new bitcoin block is mined, it “confirms” a bunch of transactions. The miners get transaction fees, and newly mined bitcoin as a reward to their confirmations of the transactions. With zero confirmations, you can’t actually be sure that the transaction is valid. When it has received a single confirmation, it should be trusted, but for transactions with larger value, most exchanges and bitcoin services usually wait for more confirmations (~6) before allowing the coins to be exchanged for goods or services.
The “transaction malleability” flaw
Within the bitcoin transaction, there is also a digital signature (ECDSA), to make sure you have access to the wallet doing the transaction, and OpenSSL is very “kind” to allow and accept signatures with an invalid encoding. The digital signature consists of two large integers, and in general, any leading zeros should be dropped. However, even if they aren’t, OpenSSL happily validates the signature anyways.
However, the signature is part of the hash that creates the transaction id. This means that leading zeros can be prepended to those integers, making the signature still valid, but gives it another transaction id (hash)!
Since the signature isn’t “altered”, just prepended with zeros, “anyone” could alter the transaction, and give it a new transaction id (since the hash of the transaction changes, even though the signature isn’t altered). The actual sender, recipient and amounts can’t be changed, since that would invalidate the digital signature.
The problem is that someone in the bitcoin network could maliciously alter the transaction by keeping the signature valid, but giving it a new transaction id (hash). The transactions would only differ by the hash, not which bitcoin is being spent. The miners could confirm either of the transactions, which validates that the sender had access to the coins. The second transaction would never be validated, since the coins will already have been spent by the first transaction.
Here’s a (very simplified) mockup:
Both transactions are valid, and they contain the same data, but they have different hashes (transaction ids). Only one of them will be validated by the bitcoin network.
With version 0.8 of the bitcoin reference client, it would no longer relay transactions with leading zeros to the rest of the network, preventing troublesome transactions from propagating. The bitcoin network also does not allow newly mined coins to be spent, before they have 101 confirmations.
In September 2013, MtGox used freshly mined coins for transactions (which was denied by the network). Users started seeing failed transactions when transferring bitcoin from the exchange. MtGox didn’t know what was causing the issues, so they tried raising the transaction fees, to no avail. MtGox fixed this by changing their software to use the oldest coins first.
But, the problems continued. More and more transactions were failing for users. And, MtGox has a nice page showing the currently failing transactions! They just recently started redacting information in them…
Now, the reason was that their software was sending transactions with padded signatures, which were denied by other bitcoin software, to prevent the so-called transaction malleability flaw.
Since the transactions were visible, and people wanted their own transactions to succeed, they would try to “help out” the exchange, by retransmitting the transaction, but with a fixed digital signature. They didn’t need access to the wallets, they just removed the zero-padding, which allowed the transaction to go through, but with a different transaction id.
But, MtGox’s software didn’t like this at all. They sent a transaction, which failed, but someone fixed it, but on MtGox’s end, they didn’t know about the new transaction. The public ledger has the information that MtGox tried to send money from wallet A, to user B, and it is confirmed. MtGox should be able to see that “hey, these three BTC that I tried to send, but haven’t been confirmed in transaction id 123… HAVE been confirmed, but in transaction id 456 instead!”. They are either trusting transaction ids only, or ignoring the public ledger of the coins.
And… this causes chaos.
MtGox thinks that several (SEVERAL) transactions have failed, when in reality, they have succeeded. Transaction 1 is sent, trying to send 2 bitcoins, but fails due to the padded digital signature. Someone fixes the signature, so the transaction succeeds. Those 2 bitcoins are now spent, and arrived to their destination (often outside of MtGox’s control). But, MtGox still believes they have them, and are trying to use them in future transactions, causing the transaction to fail, because the money has already been spent.
And this continued for months, before MtGox shut down all bitcoin transfers a few days ago. They have no idea which of their coins they still have, which are spent, which are sent where.
They have a whole lot of cleaning up to do. Matching transactions in the public ledger with their software (and finance books).
It’s fully possible that there has been no malicious theft done, but it’s also possible that someone has abused this ability to steal money from MtGox. How? User A tries to withdraw 10 bitcoin from MtGox. MtGox sends an invalid transaction (with padded zeroes). The transaction fails, but User A fixes the transaction. MtGox believes the transaction failed, when in actually succeeded. User A gets the withdrawal, but MtGox thinks it failed. User A can now re-try that withdrawal, getting another transaction, fixes that. Rinse and repeat. It’s fully possible to completely drain their wallets.
And, other withdrawals will fail, because it tries to spend money that has already been spent. Increasing the backlog of transactions, customer complaints and problems.
MtGox decided to blame their issues on the bitcoin protocol itself, claiming this was a newly discovered issue, when it has in fact been known for a while. It’s a horrible problem to have though, and it shouldn’t have been possible from the beginning.

The problem we have identified is not limited to MtGox, and affects all transactions where Bitcoins are being sent to a third party. We believe that the changes required for addressing this issue will be positive over the long term for the whole community. As a result we took the necessary action of suspending bitcoin withdrawals until this technical issue has been resolved.

Bitstamp in the same boat
Bitstamp, another bitcoin exchange, currently the largest one, has also shut down their withdrawals, due to the same issue. And, I’m sure there are other implementations out there suffering from the same issues. There are also some reports of repeated floods of “duplicate” transactions on the network, just to cause havoc, or see who’s vulnerable.
This is where we are today. MtGox have millions of dollars in seized assets, and an unknown amount of bitcoin lost or stolen due to their problematic bitcoin client. Will they survive at all? Will they make another internal transfer to prove they actually hold their users bitcoins? Or, should the tongue-in-cheek remark often heard that they should go back to trading cards instead perhaps be taken as a pretty good career advice?

Awesome Magic: The Gathering image by: Isma – http://www.imonfort.com/

Analyzing #ASUSGATE

So, I guess you backup all your important information regularly. Automatically and with heavy encryption. On several mirrored locations. That’s great, because not many people do.
My following question would be, ‘Which files do you backup?’ The most important ones, of course.
This is why the so-called Asusgate is a problem. (I wrote a post about ASUS routers that shared LOADS of private information on the internet without their owners’ knowledge.) Your goal is to keep the data safe, but Asusgate points out that many people have no idea of how to keep data safe.
The short version of the story, is that people plug in a USB drive into their ASUS router, in order to store backups, and allow for local file sharing. Little do they know, if they just click next-next during the setup, they also allow full access to all their files via anonymous FTP from the Internet.
Recently, someone released a pack called “ASUSGATE: A story about thousands of crimeless victims” containing “6536 complete and 3605 partial lists of files shared from these ASUS routers”. There are also a bunch of usernames and passwords (3131) for AiCloud, ASUS file sharing service, since there’s also an exploit to get those in plain text.
In the data, there are a bunch of zero-sized files (774 of them), and some marked as “partial” (3605) meaning they have no, or not all, data. This could happen because the user has disabled the fully-open FTP access, the IP address got changed, or because the FTP server was overloaded.
When TechWorld and PCWorld Norway broke the news the first time, I got hold of some other file lists. I started by cleaning up all empty files, and then merged the old list with these new lists. This means that I will treat partial lists as if they are complete, for simplicity. This made me end up with a total of 8774 open routers, occupying a nice 15 gigabytes of just file names(!) from peoples NAS drives.
First, lets look at the most obvious data.. where are these routers located?

There’s a huge number of publicly accessible drives in the United States. At least 3617 of them. Four times the number of the runner-up Russia with 910 shared drives. Since all this data is based on Shodan and the like, and manual scanning, many devices will also be missed. But all these were open, and had files on them, during scanning.
Now, what else is interesting? These drives are almost exclusively used for local file sharing, and backups, so of course the file types are interesting!
In total, there are nearly 165 million files (164,838,345) that people have, presumably unknowingly, made available to everyone.

There’s almost 75 million images (45.40% of all files) shared. This might not be too weird since people are storing their backups on their NAS drives.
But, what other “important” files are there?
“Private” images
These kinds of files were the first I saw being distributed in a few forums. Horrible.
Bitcoin wallets
I assume that they are either emptied already, or someone running password-cracking on them if they were protected.
Stored passwords
Browsers, FTP-clients, etc allow you to remember usernames and passwords. Easy way to access account information by just downloading the files the credentials are stored in.
Remote desktop connection files
Same here. There are a big bunch of them, containing at least server information, and some probably contain stored passwords also.
Password storage software
Software like KeePass, PasswordSafe, 1Password, etc allows the user to safely store multiple passwords, protected by a single password. There are a bunch of these files also. People still need to have a secure password, otherwise they can be easily brute-forced, giving access to all other passwords.
Oh, and just for fun, I decided to see what folders people hide their porn in…
I ran this rather cryptic command (bonus points if you understand it…):

curl -s http://www.pornmd.com/most-popular |
sed -nr 's/.+straight\/([[:alnum:]]+)\+([[:alnum:]]+).+/\1 \2/p' |
grep -v 'know\|dad\|old\|first\|do\|and\|my\|full\|money\|cze\|gone\|bang' |
grep -f - *.dirlist | grep '\.avi\|\.mp[gv4]\|\.wmv' |
sed -nr 's/^[^\\/]+\/[^\\/]+\/(.+)\/.+\/.+/\1/p' |
grep -v 'torrent\|porn\|porr\|video\|film\|download' |
grep -e '.\{4,\}'

… which gave me (among others) these funny/creative folder names where people have hidden their porn:

/1997 tax return/
/entertainment/everybody loves raymond/
/hdd software/system files/run.exe/
/ljudbok/douglas adams - liftarens guide till galaxen/liftaren/
/movies/a good day to die hard (2013)/die well/
/seagate system files/internal/
/system operating memory/system memory/system memory/11211223633/sistema/
/visual aids/
/warrick's folder/carport project/
/wd utilities/wd smartware for mac/drafts/

Tens of thousands unknowingly share their NAS with the Internet

Here are some unnerving news for owners of ASUS routers. The Swedish publication TechWorld has revealed that USB hard drives connected to ASUS routers are easily reached through the Internet unless they are properly configured.
The following ASUS routers seem to have this “feature” available: RT-N66U, RT-N56U, RT-N15U, RT-N65U, RT-AC66U, DSL-N55U and RT-N16.
As far as I can tell these settings aren’t default when you just plug an external drive in the router, however, mis-configurations are very common and are to be expected, and this really needs to be addressed. A user just clicking next-next when installing a USB drive in the router, would enable “limitless access rights”.



ASUS has stated in the manual and on the box that this configuration is supposed to enable completely open access to the user’s files, but checking Shodan for matches, one easily finds tens of thousands of users worldwide who have, probably unknowingly, published material such as private photo folders and pirated movies for all to see.
As usual, shady people are flocking to this, in a scavenger hunt for anything interesting. There seems to be a good deal of vacation pictures, games, school reports, CVs, music and so on. They are doing this in hope of finding some raunchy pictures, wallet.dat’s or other things they can use to further intimidate/fool/hack the user.
Users do not only unknowingly share private information, they may in theory also open up to criminal charges for piracy, since there are thousands of pirated blockbuster movies available to anyone. I guess a common use-case for a NAS is to access it on your TV/HTPC/media box…
Many people are using the NAS as a backup, and now sharing their files (with write-access) to the world. I really don’t understand why a setting to enable full access to the NAS drive via anonymous external FTP is even available in a home-segment router in 2014.
Another interesting thing is that some of the shared drives contain files that state things like “You were hacked because you are stupid. Password protect your router!”. People trying to be friendly(?) so the owner hopefully notices they have enabled access to the drive. This could also, but it is a long stretch, mean that the people doing this are providing some users with a kind of alibi – “I was hacked and all those movies were put there by someone else!”. This was actually quite common more than a decade ago, where FTP servers with upload access where often abused to store copyright protected material.
Problems with default configurations, and things being “too easy” to open up is nothing new, but a quick check of Shodan shows that there are close to 20.000 FTP servers worldwide with anonymous access available, presenting themselves as “ASUS”.


This is not an exploit or vulnerability in the ASUS router, it’s more of a rather stupid combination of settings. The problematic feature of the routers in this case is the possibility to connect a drive to the router and then use it both as a NAS and as an FTP server. For many users this is just great, but it is also easy to make a possibly fatal error in the setup process, since the standard setting, according to TechWorld, is a small radio button called “limitless access rights”. I really think this is a horrible setting in general, and there needs to be some big warnings if the user should choose to enable it.
ASUS’ communications marketing manager told TechWorld that they from now on will deliver the routers with a limited access default setting, since so many users miss this feature, and they intend to release an update to warn users with this setting activated. However, since that warning would only be shown to the people actually updating, and are logged in to the router interface, I suspect not many will see it…
tl;dr: Some ASUS routers make it too easy to share your USB-drive/NAS with the world.

Setting up another blog

Hey! Since I had a blog post to put up (regarding stupid routers, or the users using them), I might as well overcome that huge procrastination dragon and… actually set up the blog. I still have my Swedish work-related blog up at: http://blog.eset.se/
If you have any questions or comments, don’t hesitate to contact me. Twitter is easiest: @nilssonanders