Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Just in case someone from American Lease is reading this, I’d be willing to migrate their servers for less than a million.

Jokes aside, after reading the comments here, I doubt anyone with technical knowledge would believe this. Even with certificate pinning, you can simply dump the firmware as a raw binary, replace the certificate with your own, and upload it back to the car.

And even if the source code is lost, you can still sniff the traffic and implement an API. I did this for my previous employer, who had a collection of expensive, locked devices. It took me about a week, without any prior knowledge or experience. Imagine what someone with more experience could do...



> Even with certificate pinning, you can simply dump the firmware as a raw binary, replace the certificate with your own, and upload it back to the car.

That's assuming they have access to the private key used to sign the firmware though...


Most implementations of this sort of thing in practice don't verify as hard you might think.

A lot of it seems to do with wanting to be able to replace certs and have reasonable expiration times, but not really understanding how to do that (I don't mean it's not possible, i mean the manufacturers seem to not really understand how to do it effectively)

As an example, the siemens CNC controller on my metal mill is totally signed. It has an FPGA with a secure element producing verification signatures to double check cert sigs haven't been modified, Every single file system with binaries is a read-only signed cramfs file signed with a secp521 ecc key. All read-write fsen are mounted noexec, nosuid, etc etc etc.

The initial CA key is baked into secure hardware.

However, in the end, they only verify the CA and signing certs have the right names and properties (various oem specific fields, etc), because the certs have 3-5 year expiration dates and these things are not connected to the internet or even updated often. So they accept expired certs for the signatures, and they also accept any root cert + signing cert that looks the same as the current ones.

So you can replace the CA key and signing keys with something that looks exactly the same as their current one and resign everything, and it works fine.

A whole lot of effort that can be defeated pretty quickly.

I would be surprised if the cars were not similar - they look really secure, but in the end they made tradeoffs that defeat the system.


Exactly. This could be as simple as "we stopped paying for the AWS HSM instance and now it's been deleted, the keys are lost"


I suspect this has less to do with the ability to...put the software on another VM and more to do with licensing issues.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: