Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Darchangel
Feb 12, 2009

Tell him about the blower!


Safety Dance posted:

Every now and then I think about it too hard and get freaked out because all automobiles are susceptible to this kind of attack whenever they're outside.


I also got to thinking about secure / encrypted CANBUS one day, but it would drive a lot of right-to-repair people crazy when every wiper motor came with a relearn procedure.

You only need the secure CANBUS on the access and engine controls. Just run two separate busses, or like with traditional networking VLANS. You can even have the two busses talk to each other, but only able to pass data that makes sense to pass. It's not that hard (says the relative layman...), but carmakers don't want to put effort into anything that doesn't *directly* translate into "more truck sales". People might say they care about tech or security, but they won't pay more for the latter.
The primary ECU and door control modules don't need to know what the damned headlights are doing.

edit:

tater_salad posted:

Why does my wiper need to connect to an encrypted in car network.. they've been on a manual switch for 100 years and that has worked just fine


I know the real reason is luxury and wanting rain sensor to talk to the car and says that it's raining so you don't need to be bothered with moving your hand on

That, too, really.
Though CANBUS is handy for reducing the number and complexity of the actual wiring, with the caveat of increasing the complexity of the components.

Adbot
ADBOT LOVES YOU

cursedshitbox
May 20, 2012

Your rear-end wont survive my hammering.



Fun Shoe

Darchangel posted:

You only need the secure CANBUS on the access and engine controls. Just run two separate busses, or like with traditional networking VLANS. You can even have the two busses talk to each other, but only able to pass data that makes sense to pass. It's not that hard (says the relative layman...), but carmakers don't want to put effort into anything that doesn't *directly* translate into "more truck sales". People might say they care about tech or security, but they won't pay more for the latter.
The primary ECU and door control modules don't need to know what the damned headlights are doing.

edit:

That, too, really.
Though CANBUS is handy for reducing the number and complexity of the actual wiring, with the caveat of increasing the complexity of the components.


Encryption can be cracked with physical access. Very easily with the resources available now. There has to be a layer somewhere that crosses from encrypted to not. That'll be a physical entry point. These things are cost analyzed to be just secure enough that a average passer by can't have a day out on the town. If someone ultimately wants it, they're going to get it. The only thing that can be done is to discourage or slow them down. This will add cost and complexity that will be palmed off to the buyer.

Oh but the door modules do need relevant lighting information. Not just puddle lamps but also backlit buttons and mood lighting.
Complexity of the component is on the house. most MCUs support can bus out of the box and need a dusting of passives and maybe a transceiver. It's a lot less involved than say, running 14awg wire everywhere sans relays like cars were 30 years ago.

Safety Dance
Sep 10, 2007

Five degrees to starboard!

cursedshitbox posted:

Encryption can be cracked with physical access. Very easily with the resources available now. There has to be a layer somewhere that crosses from encrypted to not. That'll be a physical entry point. These things are cost analyzed to be just secure enough that a average passer by can't have a day out on the town. If someone ultimately wants it, they're going to get it. The only thing that can be done is to discourage or slow them down. This will add cost and complexity that will be palmed off to the buyer.

The article makes a good point though: the headlight is a very attractive target because you can pop the bumper cover clips and get to the CAN network without significant tooling or doing much lasting damage. If the smart key CAN message was cryptographically signed, you'd have to get to the smart key controller. If that was tucked up behind, say, the heater core, the attacker would have to smash the window and disassemble the whole dash to get to it. That would shift the cost/benefit calculation for many thieves.

wolrah
May 8, 2006
what?

Safety Dance posted:

I also got to thinking about secure / encrypted CANBUS one day, but it would drive a lot of right-to-repair people crazy when every wiper motor came with a relearn procedure.
I don't see what the issue would be from a right to repair standpoint as long as the process was documented and didn't unnecessarily lock things down. It's not like the world lacks well known, secure, and easy to implement methods for key exchange. For stuff like wiper motors or whatever the "push a physical button on both modules at roughly the same time" method used on billions of devices of all sorts would be perfectly reasonable as long as one of those modules was located somewhere requiring the vehicle be unlocked and maybe slightly disassembled to access the button. For components that interface with the anti-theft systems we've already had for years the sorts of processes where you use two different keys and a "cheat code" entered through various vehicle controls to enable pairing additional keys or whatever. These are problems with simple and cheap solutions widely implemented already. If a vendor actually cares about doing it right it doesn't take much actual effort.

That said, not everything on the network needs to be encrypted either. It's possible to secure the keyless entry system without locking down modules for which the worst case scenario would be inconvenience if signals were spoofed. I'm not sure what realistic concerns there would actually be about a wiper motor being spoofed, where obviously a keyless entry receiver should be carefully authenticated.

Darchangel posted:

You only need the secure CANBUS on the access and engine controls. Just run two separate busses, or like with traditional networking VLANS. You can even have the two busses talk to each other, but only able to pass data that makes sense to pass. It's not that hard (says the relative layman...), but carmakers don't want to put effort into anything that doesn't *directly* translate into "more truck sales". People might say they care about tech or security, but they won't pay more for the latter.
Exactly this, and at least the diagram presented in the article indicates there were already multiple networks in the vehicle, just for whatever stupid reason the keyless entry system was on the same network as the headlights, which meant there had to be a path through the gateway for messages from it to reach other networks.

I mean my cheap little 2015 Fiesta has three separate CAN networks, of which only two are easily accessible. One has most of the comfort systems (infotainment, HVAC, etc.), the second has most of the vehicle systems, and the third is just ABS, ECU, and airbags IIRC.

Salami Surgeon
Jan 21, 2001

Don't close. Don't close.


Nap Ghost

wolrah posted:

just for whatever stupid reason the keyless entry system was on the same network as the headlights

They are on the same network because they both need to talk to the body control ECU. At some point you need to reconcile the fact that many ECUs need to talk to many other ECUs and you can't create a new network for every function.

wolrah
May 8, 2006
what?

Salami Surgeon posted:

They are on the same network because they both need to talk to the body control ECU. At some point you need to reconcile the fact that many ECUs need to talk to many other ECUs and you can't create a new network for every function.
Gateways between the networks already exist. As described that's already happening in this very attack, the spoofed messages are being received by the gateway and forwarded through to the engine controls through a gateway. It could just as easily work the other way around, where the keyless entry system is on a less exposed network and the gateway is used to reach the body control module instead.

Allowing traffic from a high security network to a low security network is usually better than the other way around, assuming you're not dealing with confidential/classified data.

Darchangel
Feb 12, 2009

Tell him about the blower!


Allowing, for example, the "vehicle unlock" packet to come from anything other than the keyless module is just dumb, though.

BlackMK4
Aug 23, 2006

wat.
Megamarm

Darchangel posted:

Allowing, for example, the "vehicle unlock" packet to come from anything other than the keyless module is just dumb, though.

I'd also expect it to come from like the SRS module. In either case, I'd think no one is spending money on more security development than is required, but then again ECU and ABS modules are locked down tight so

wolrah
May 8, 2006
what?

Darchangel posted:

Allowing, for example, the "vehicle unlock" packet to come from anything other than the keyless module is just dumb, though.
As described the attack device is spoofing the ID of the keyless module, while at the same time jamming the network so conflicting messages from the real keyless module don't get through.

The network itself is just a pair of wires, there's no intelligence outside the devices and thus no filtering anywhere other than gateways. Any device on a given network can send messages with any ID it wants to. It's like open WiFi or an old school non-switched ethernet network. The spoofer device sends messages with the expected ID and they are not authenticated beyond that. As far as anything else on the network is concerned those messages DID come from the keyless module.

Computer viking
May 30, 2011
Now with less breakage.

wolrah posted:

As described the attack device is spoofing the ID of the keyless module, while at the same time jamming the network so conflicting messages from the real keyless module don't get through.

The network itself is just a pair of wires, there's no intelligence outside the devices and thus no filtering anywhere other than gateways. Any device on a given network can send messages with any ID it wants to. It's like open WiFi or an old school non-switched ethernet network. The spoofer device sends messages with the expected ID and they are not authenticated beyond that. As far as anything else on the network is concerned those messages DID come from the keyless module.

Oh right, that makes sense. I guess the obvious countermove is that the key validation module has a separate direct connection to at least one critical system?

Kafouille
Nov 5, 2004

Think Fast !

Computer viking posted:

Oh right, that makes sense. I guess the obvious countermove is that the key validation module has a separate direct connection to at least one critical system?

You could do that but it's not really any more secure than the old 12v to ignition module, the real way to do it is have a proper cryptographic handshake between the key module and the ECU/doorlock, you can still do that on the bus without compromising any real security. It's not all that hard, and the hardware systems in most current cars are capable of it as the article points out, they just didn't bother because as it is in all computer systems, security is a cost center.

evil_bunnY
Apr 2, 2003

Safety Dance posted:

The article makes a good point though: the headlight is a very attractive target because you can pop the bumper cover clips and get to the CAN network without significant tooling or doing much lasting damage. If the smart key CAN message was cryptographically signed, you'd have to get to the smart key controller. If that was tucked up behind, say, the heater core, the attacker would have to smash the window and disassemble the whole dash to get to it. That would shift the cost/benefit calculation for many thieves.
People who say there's no security against physical access are never interested in the nuances. There's no 100% against physical attacks, but you can implement many countermeasures against physical compromise, it just costs money.
Most houses can be broken into easily. You still lock the loving door.

Blue Footed Booby
Oct 4, 2006

got those happy feet

evil_bunnY posted:

People who say there's no security against physical access are never interested in the nuances. There's no 100% against physical attacks, but you can implement many countermeasures against physical compromise, it just costs money.
Most houses can be broken into easily. You still lock the loving door.

Lol, like locksport nerds talking about how locks just keep honest people honest and any lock can be picked when the topic of conversation is a townhouse in the rich part of town. Guys, if the CIA is after me I'm just gonna loving die.

But whomst etc

Blue Footed Booby fucked around with this message at 00:20 on Apr 7, 2023

taqueso
Mar 8, 2004


:911:
:wookie: :thermidor: :wookie:
:dehumanize:

:pirate::hf::tinfoil:

Darchangel posted:

Allowing, for example, the "vehicle unlock" packet to come from anything other than the keyless module is just dumb, though.

CAN has no concept of node addresses or anything like that. It's old and designed for simplicity and reliability. A message has a single identifier that is used to determine what it is. Any device can send a message with any ID and you can't tell who sent it.

efb

randomidiot
May 12, 2006

by Fluffdaddy

(and can't post for 11 years!)

So is this when I point out Teslas have had a BLE transceiver on the rear exterior of the car for years now? :v: (it's behind the rear bumper cover.. also the very first thing to get crushed when one gets even a light love tap since there's nothing between it and the cover, and a replacement requires pairing with the car...)

https://electrek.co/2022/05/17/tesla-singled-out-bluetooth-hack-unlock-cars/

randomidiot fucked around with this message at 02:08 on Apr 7, 2023

Computer viking
May 30, 2011
Now with less breakage.

Kafouille posted:

You could do that but it's not really any more secure than the old 12v to ignition module, the real way to do it is have a proper cryptographic handshake between the key module and the ECU/doorlock, you can still do that on the bus without compromising any real security. It's not all that hard, and the hardware systems in most current cars are capable of it as the article points out, they just didn't bother because as it is in all computer systems, security is a cost center.

You could bury the entire thing somewhere deep in the dash, though - if you have to do a full "replacing AC parts" style teardown to get to the relevant wire, that's at least better. Proper pubkey auth would be nice and all, but as you say that doesn't seem as likely to happen.

New Zealand can eat me
Aug 29, 2008

:matters:


Safety Dance posted:

The article makes a good point though: the headlight is a very attractive target because you can pop the bumper cover clips and get to the CAN network without significant tooling or doing much lasting damage. If the smart key CAN message was cryptographically signed, you'd have to get to the smart key controller. If that was tucked up behind, say, the heater core, the attacker would have to smash the window and disassemble the whole dash to get to it. That would shift the cost/benefit calculation for many thieves.

It's likely that it already is signed and the device they purchased contains a legitimate certificate stolen from either corporate or a dealership diagnostic tool. IMHO it is not as challenging to recover the contents of the chip as they make it out to be, it looks more impressive if they present it like this instead of "we can unlock your locked door with the key and flip some nearby switches". They do not have access to an actual RAV4 or the dealership tools with the certs that have diagnostic authority to confirm that no signing is happening. They've also admitted that Toyota's design is competent enough that doing something like attempting to fuzz the devices with garbage would render the car inoperable until it was reset at a dealership, essentially tipping them off every time an attempt is made.

I do not know much about Toyota ECUs but virtually everyone else has been using provisioned ECUs for a while now. Hell, we're at the point now where Blackfin DSPs are becoming more widespread in poo poo like synthesizers and samplers because their security provisioning/firmware toolchain is airtight. Stealing one certificate only gets you communication. There's a nesting doll of additional certificates for things like reading/writing editable files on storage and then various parts of the firmware. With the innermost poo poo signed by a key the vendor never has access to.

I think they were wise to use the door unlocking as an example, do you see what else they could get to on that side of the gateway? That's right. The loving parking brake. As in, if it wasn't in gear they could then roll it away, or they could attempt to engage it while the vehicle is moving. It's been a long time but when whoever demonstrated the attack on the BMW brake controllers that was a whole shitstorm.

E: Also, automotive security has some really stupid rules. They have a lot more leeway than other industries to point at random poo poo and say "trade secret" and slap you down hard.

Double Edit: If you're wondering "what next" in terms of securing things, I would look to how Apple is absorbing everything into their SOC. Even the trackpads on Apple Silicon Macbooks are 'stupid' now, the microcontrollers do little more than pass the input values along via SPI. So, if you were to look at the graph of the CAN network from their post, imagine if the gateway was a giant box around everything else. The most an attack like this could try and do would be sending very inconsequential messages like "unlock attempt", all of the decision making happens behind the curtain (where it would be checking other factors)

New Zealand can eat me fucked around with this message at 04:37 on Apr 7, 2023

LifeSunDeath
Jan 4, 2007

still gay rights and smoke weed every day
https://i.imgur.com/ptSaSpW.mp4
i've also spun out my infiniti but luckily no cops around and didn't curb it. don't try and drift when you're not good at driving.

`Nemesis
Dec 30, 2000

railroad graffiti
that was a state trooper as well, he's gonna get all the tickets.

evil_bunnY
Apr 2, 2003

Blue Footed Booby posted:

Guys, if the CIA is after me I'm just gonna loving die.

But whomst etc
I mean this is the mossad/not-mossad threat model analysis. 99% of people just want to not be the place that gets broken into.

Having a lock requiring nontrivial effort to pick/bypass is still a good loving idea :/ There's a reason no one uses vulnerable tubular locks on poo poo they care the least bit about.

evil_bunnY fucked around with this message at 13:13 on Apr 7, 2023

OBAMNA PHONE
Aug 7, 2002

LifeSunDeath posted:

https://i.imgur.com/ptSaSpW.mp4
i've also spun out my infiniti but luckily no cops around and didn't curb it. don't try and drift when you're not good at driving.

i get the impression this guy was already running from the cops and was struggling with "driving" not specifically trying to drift

bull3964
Nov 18, 2000

DO YOU HEAR THAT? THAT'S THE SOUND OF ME PATTING MYSELF ON THE BACK.


OBAMNA PHONE posted:

i get the impression this guy was already running from the cops and was struggling with "driving" not specifically trying to drift

Yeah, I don't think the first reaction to loving up like that is hands ready to be handcuffed. He was being chased and cocked it up and then became resigned to his fate.

randomidiot
May 12, 2006

by Fluffdaddy

(and can't post for 11 years!)

LifeSunDeath posted:

https://i.imgur.com/ptSaSpW.mp4
i've also spun out my infiniti but luckily no cops around and didn't curb it. don't try and drift when you're not good at driving.

OBAMNA PHONE posted:

i get the impression this guy was already running from the cops and was struggling with "driving" not specifically trying to drift

He was. Watch it with sound on (right click, copy video address, paste it into a new tab) - sirens were going from the start of the video. He was ordered out of the car almost immediately.

Sagebrush
Feb 26, 2012

cursedshitbox posted:

Repeat after me
There is no security against physical access.

if somebody wants your car bad enough they can just show up with a flatbed.

kastein
Aug 31, 2011

Moderator at http://www.ridgelineownersclub.com/forums/and soon to be mod of AI. MAKE AI GREAT AGAIN. Motronic for VP.
On canbus only one module is *supposed* to send a given message ID on a given bus. Doing otherwise breaks the collision detection and priority sorting built into the protocol.

The end result is a lot of people developing for these systems think that way naturally and don't consider that someone absolutely could use spoof their message, and the people designing the hardware for each module, the harness and routing and canbus connection choices (on vehicles with more than one) and the firmware for each module may not even be in the same company let alone on the same team. A lot of those modules get outsourced. For example Teves, Allied Signal, and Bosch make a huge number of the ABS/ETC modules, Bosch makes a substantial number of the ACUs in the world, Motorola/Siemens/Bosch make a large percentage of the ECUs and PCMs, etc.

It's extremely likely that literally no one ever looked at all 3 of the facts necessary at once simply because no one had all that info at once. The headlight control EEs spec was "I need a PCB that fits in this enclosure and has a can bus and these physical interfaces", the harness guy just knew he needed to route these wires and this canbus here and there, the 3 different software people only knew what they needed to for their particular module.

You can't just put a button on everything because of dirt and dust ingress concerns as well as the ever present cost concerns.

Manufacturers don't give a gently caress because like everyone already said, security is a cost center. If it works well enough to ship and sell and not immediately get sued by the feds they're going to ship and sell.

Dodge has been shipping hellcats that you can steal if you talk nicely to them for loving years now, and that doesn't even require connecting to the physical wires. KIAs can be stolen with a USB cord and a pair of pliers. I'm just glad they don't have to damage the bodywork to steal these things via the headlight, paint is expensive.

Also, while security is nice and all, every single suggestion made here will make using any car that follows those suggestions harder to use aftermarket tuning software on and harder to use as engine swap donors. So consider your choices carefully.

Sagebrush
Feb 26, 2012

Combustion engines' days are numbered (in passenger cars) anyway. EV "tuning" will be fully done in software.

Deteriorata
Feb 6, 2005

Sagebrush posted:

Combustion engines' days are numbered (in passenger cars) anyway. EV "tuning" will be fully done in software.

There will always be room for gold-plated connectors and special oxygen-free copper wires for improved presence high-end torque.

Everything that applies to audiophiles will eventually apply to EV owners.

shame on an IGA
Apr 8, 2005

Deteriorata posted:

There will always be room for gold-plated connectors and special oxygen-free copper wires for improved presence high-end torque.

Everything that applies to audiophiles will eventually apply to EV owners.

holy poo poo and that space is still wide open now we can get in on the ground floor

sharkytm
Oct 9, 2003

Ba

By

Sharkytm doot doo do doot do doo


Fallen Rib

shame on an IGA posted:

holy poo poo and that space is still wide open now we can get in on the ground floor

Battery crystal realignment services?

Rigged Death Trap
Feb 13, 2012

BEEP BEEP BEEP BEEP

Dilithium battery add ons

shame on an IGA
Apr 8, 2005

oxygen-free 4/0 AWG silver litz wire HV conductors run through custom carved cocobolo conduits. Client must visit the office several times prior to fabrication for testing and interviews so we can determine the specific strand weaving that best aligns to their chakras.

shame on an IGA fucked around with this message at 15:18 on Apr 8, 2023

SlowBloke
Aug 14, 2017

shame on an IGA posted:

holy poo poo and that space is still wide open now we can get in on the ground floor

Given how expensive 22kw type 2 cables are, audiophile prices are already here

Platystemon
Feb 13, 2012

BREADS
We’ll take apart your battery and replace all the spot welds with silver solder. 😈

Elviscat
Jan 1, 2008

Well don't you know I'm caught in a trap?

shame on an IGA posted:

oxygen-free 4/0 AWG silver litz wire HV conductors run through custom carved cocobolo conduits. Client must visit the office several times prior to fabrication for testing and interviews so we can determine the specific strand weaving that best aligns to their chakras.

Isolated ground conductors with mesh jacket coiled through EM isolating magnets to remove harmful interference that slows motor response.

Computer viking
May 30, 2011
Now with less breakage.

If you take that corner of the market, can I go for the Sick Gaming Mods? Ultra low latency pedal transducers with optical sensing, high refresh rate HUD, yellow window tint that improves your response time, water cooling for both the batteries and onboard computing, programmable RGB lighting on every surface? Cool paint jobs and viewing windows for the HV system?

I feel like there's a large market for "gaming nerds who want to style their car like their PC". Far lower profit margins, but probably higher volume.

DJ Commie
Feb 29, 2004

Stupid drivers always breaking car, Gronk fix car...
Throttle controllers are a big thing in the ICE world, especially on diesels. Seems they mostly just are intercept devices connected to the throttle pedal connector directly.

kastein
Aug 31, 2011

Moderator at http://www.ridgelineownersclub.com/forums/and soon to be mod of AI. MAKE AI GREAT AGAIN. Motronic for VP.

Deteriorata posted:

There will always be room for gold-plated connectors and special oxygen-free copper wires for improved presence high-end torque.

Everything that applies to audiophiles will eventually apply to EV owners.

Unlike audiophiles though, we have dynamometers and tracks.

Not that that stops idiots who think that 12 hole counterfeit injectors intended for a 2 valve configuration are a huge power upgrade from factory injectors, mind you.

Sagebrush
Feb 26, 2012

kastein posted:

Unlike audiophiles though, we have dynamometers and tracks.

i mean audiophiles have oscilloscopes and frequency analyzers, too.

kastein posted:

Not that that stops idiots

Powershift
Nov 23, 2009


The acceleration just *feels* warmer, you know, just a little fuller and more rich.

Adbot
ADBOT LOVES YOU

Armacham
Mar 3, 2007

Then brothers in war, to the skirmish must we hence! Shall we hence?
I prefer an analog oil

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply