Settings

Theme

Interoperable Telesurgery Protocol Plaintext Unauthenticated MitM Hijacking

osvdb.org

55 points by CRidge 11 years ago · 32 comments

Reader

andrewstuart2 11 years ago

So, run it over a VPN.

I'm not saying that they shouldn't add security to their protocol, but I can think of several ways off the top of my head to stay secure. The application-layer protocol doesn't have to be the one to implement it, network-level encapsulation can help you there.

I'm not sure how old the protocol is, but perhaps it was more important to get it working and wrap it in a VPN and then iterate on that design.

  • maffydub 11 years ago

    Agreed.

    It looks as though the researchers saw that as a possibility too:

    "It is possible to temporarily mitigate the flaw by implementing the following workaround: Researchers have demonstrated that ITP can be operated over TLS/DTLS, using certificate-based authentication to ensure the security and integrity of the protocol."

    I don't really understand why this is only a "temporary mitigation", though, rather than a reasonable long-term solution. Can anyone enlighten me?

    Maybe the extra technical complexity of setting up these certificates is deemed too great, and the likelihood of people getting it wrong too high?

    • tptacek 11 years ago

      Why is that a "temporary" fix? Segregating insecure protocols to VPNs, encrypted tunnels, and backchannel networks is one of the oldest most time-honored tools in the security design toolbox. Not only is it a real fix, but it's probably the right fix.

      • toomuchtodo 11 years ago

        If systems are life critical, you go so far as to use leased lines or other physical layer segregations. Treat it like a refinery, transformer substation, or natural gas pipeline terminal SCADA system.

        EDIT: Easy on the downvotes folks. If you disagree, engage me in discourse. As an infrastructure/network/devops/it generalist role, I have seen terrible things happen when you don't properly segregate critical systems from public networks.

        http://scadastrangelove.blogspot.com/

      • jarman 11 years ago

        Especially considering that protocol will be bound to expensive, long-living and heavily certified hardware, so it will stay there for decades.

      • thirsteh 11 years ago

        You must not have gotten the memo: Google exposed some of their corporate systems to everyone, therefore VPNs are now useless and have always been useless.

        :)

        • jasonjei 11 years ago

          Agreed. Trusting VPNs to be totally secure, especially on a big organization like a hospital, seems insane. At the surgery level, you want to make sure the malware infected laptop or some open wireless access point doesn't come up with more creative surgeries.

    • jasonjei 11 years ago

      I guess my confidence in the telerobot is lowered by the fact that the protocol doesn't ensure authenticity of surgery instructions. It leads me to believe what other flaws (including those outside the scope of security) exist.

      Hopefully, we're still testing these surgeries on mice and not men.

      • andrewstuart2 11 years ago

        A VPN with only two valid certificates means that the guy holding the other cert (assuming you have one of them) is definitely who he says he is.

        • jasonjei 11 years ago

          You are right, but I'm alluding to the intrinsic security flaw of the robot. What other flaws could exist? They need not be security related.

          • pavel_lishin 11 years ago

            Yeah, I sure would hate for a cosmic ray to flip a bit while an instruction is en route, and instead of gently cutting out my appendix, having the robot suddenly deprive me of a kidney.

            • tedunangst 11 years ago

              How likely is that, versus the possibility that the surgeon operator has an aneurysm or seizure mid procedure. Or the nurse hands the surgeon the wrong chart?

              • jasonjei 11 years ago

                I think the point is that no additional software/hardware error is added on top of the human error. Human error + software/hardware error should come as close as possible to an operation using human hands (only human error). Ideally, the benefit of a hardware/software product should produce lower human error too.

                Without knowing anything about the hardware/software and transport messaging layer, it could be very likely or unlikely depending on how well or poorly the product is implemented.

      • tedunangst 11 years ago

        Are you confident that telesurgery developers are better at encryption and authentication than VPN developers?

        • jasonjei 11 years ago

          No, did I imply so? Just saying that I have very little confidence in the bot. I'm saying the intrinsic security flaw of the robot allows me to believe there are more serious defects. These do not need to be security related. The test cases not passing could lead to death.

          I've made no commentary on VPN. Just commenting the communication protocol without augmentations (VPN, TLS, certificate, or otherwise) instills little confidence in the rest of the product. I wouldn't want to be operated under the bot.

          • tedunangst 11 years ago

            I'm afraid I don't see the connection between the decision not to implement encryption and the presence of death causing defects.

            • jasonjei 11 years ago

              > I'm afraid I don't see the connection between the decision not to implement encryption and the presence of death causing defects.

              That's fine. Everyone is entitled to his/her opinion. I view the failure to implement encryption as a fatal error and an indication the code audit hasn't been thorough. Given that this is a telesurgery product, I'm quite confident encryption, trust, and authenticity are central to safe medical procedures carried over network. Otherwise, why would we bother with TLS when we access our online banking?

              I'm just not confident I would want to undergo a surgery with a telesurgery robot with the "decision not to implement encryption."

              • jauer 11 years ago

                We bother with TLS for accessing online banking because we don't manually build site-to-site VPNs between our house and our bank, unlike hospitals which have dedicated IT staff, a ton of security appliances of all types and, if they are in the same metro, often have dedicated waves or dark fiber between them.

                • jasonjei 11 years ago

                  The very problems that plague the unprotected networks to the site-to-site VPNs are the same: all it takes is one piece of malware. In fact, the complacency is the alarm. Just because you are in a "protected" network doesn't mean there aren't bad actors. The bad actors can get in, all they need is to find where your walls have a crack. There's a reason we call it Computer Insecurity.

  • athenot 11 years ago

    VPN may sound archaic to those outside of health, but there are quite a few intra- and inter-hospital links that rely on VPN. Even with hospital SaaS vendors, it's not uncommon.

    It's not like surgery robots move around the network and come online at unexpected locations. Those installations are planned ahead and the IT considerations are part of that deployment. Also, encryption is important but so is available bandwidth and bandwidth quality: a jittery link could be as dangerous as a compromised one.

  • higherpurpose 11 years ago

    The same VPNs that use weak DHE crypto?

    https://weakdh.org/

virgil_disgr4ce 11 years ago

Did some digging on this. Basically: 1) Some researchers wrote a paper called "Preliminary protocol for interoperable telesurgery" in 2009. (http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.160...) 2) At the end of the paper, they write: "Also, security is an obvious requirement for real world adoption of this kind of service." 3) Last month, some other people showed that you could hax0r this unprotected protocol: http://www.technologyreview.com/view/537001/security-experts...

So in other words, somebody demonstrated that a preliminary protocol that admitted it didn't have any security was insecure. Woo!

  • tedunangst 11 years ago

    > And video encryption probably isn’t practical over the kind of network links envisaged for remote surgery in extreme locations. That may not be a security concern but it does raise important issues of privacy.

    That's a curious statement. How does encrypting video increase its bandwidth requirements?

    • gliese1337 11 years ago

      Typical block ciphers generally require adding padding, which increases the number of bytes that need to be transmitted. But that's negligible for any significant amount of data. I don't think it would ever noticeably increase bandwidth requirements.

      • zAy0LfpBZLC8mAC 11 years ago

        Well, counter mode is probably a better idea anyhow--but neither 16 bytes of padding per frame nor the same amount of MAC will be an actual bandwidth problem.

DyslexicAtheist 11 years ago

I access the site and get:

Checking your browser before accessing osvdb.org.

This process is automatic. Your browser will redirect to your requested content shortly.

Please allow up to 5 seconds… DDoS protection by CloudFlare Ray ID: 1eaaa26e86870920

have I gone back in time to 1995?

lotsofcows 11 years ago

Authentication and encryption are hard problems. They're also solved problems (for some definition of solved). Like any other protocol, it should concentrate on solving its own problem well and leave unrelated problems to others.

araes 11 years ago

Make a great major news story. I can think of almost nothing more terrifying than being naked on a table with some random haxxor operating a rogue telesugery robot over me. Makes even normal surgery sound good.

frozenport 11 years ago

There is nothibg wrong with text, some of the intended uses of the protocol are over rs232.

jameskozart 11 years ago

wow, too lame

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection