NEW BOOK SHOWS HOW TO CONTROL YOUR CABLE MODEM
DerEngel, "Underground Prometheus of super-broadband,” opens the box and
explains what’s going on inside
• the history of cable modem hacking
• how a cable modem and DOCSIS work
• the importance of firmware (including ways to install new firmware)
• how to unblock network ports and unlock hidden features
• how to hack and modify a cable modem
• what uncapping is and how it makes cable modems upload and download faster
Table of contents: http://www.nostarch.com/cablemodem_toc.htm
Sample chapter: http://www.nostarch.com/download/cablemodem_ch17.pdf
ABOUT THE AUTHOR: Profiled by Security Focus, Tech TV, and the Register, and the subject
of multiple Slashdottings, DerEngel has been hailed as “the underground Prometheus of superbroadband.”
The book is concise and detailed. There are sections on the physical components and how to get at them without destroying the case or the components. There is probably the most lucid and short description I have read of how buffer overflows work. And there are explicit instructions on how to change speed settings and port controls.
A word about ethics here. DerEngel explicitly states that he does not condone stealing bandwidth from cable providers . His arguments that sysadmins need to know how to configure cable modems to effectively manage their Internet connectivity has some merit. I would suggest that the most valuable contribution DerEngel has made to the world of security is to create a manual that the cable operators and cable modem manufacturers can use to harden their devices against malicious attacks.
OpenCable Platform vs DCR+The FCC is expected to scrutinize both proposals, because the cable and CEA have been unable to find common ground on their own, as they did in late 2002 with the one-way Plug & Play agreement, which the FCC later adopted.
That one-way agreement paved the way for CableCARD-capable TVs that could display digital cable content, including premium networks such as HBO, without a separate set-top box. Those same sets, however, cannot handle interactive, two-way services such as video-on-demand (VOD) without a set-top.
The DCR+ proposal additionally fails to recognize that the majority of cable systems rely on out-of-band communications, rather than DSG, for communication purposes with set-top terminal devices. By proposing to rely exclusively on DSG, DCR+ devices will not be nationally portable.
DOCSIS Set-top Gateway (DSG)
The DCR+ proposal fails to recognize the diversity of network infrastructure in use by cable operators for digital video services. In particular, cable networks today use at least three different solutions for two-way communication between the cable headend and set-top terminal devices. One of these is DSG, a DOCSIS-based protocol that is beginning to be more widely adopted. The other two methods rely on legacy out-of-band (“OOB”) communication.
DSG Security
The use of DSG, either alone or in conjunction with legacy OOB support, has security implications which are addressed in the OpenCable solution, but are not addressed in CEA’s DCR+ proposal. The integrity of the DOCSIS network must be based on the security components of DOCSIS specifications.
The elements of this security include:
o Device certificates for device authentication indicating that the device and its software are compliant with the specifications, including protections for the security of the network.
o Secure Software Download using code signing and validation for verifying the integrity of the software installed in the device. This measure is to deter rogue software entering the DSG modem which could then utilize the reverse path to the cable network.
o Certification of compliance with the device specifications through a hands-on certification testing program, including security testing to prevent harm to the network and the experience of other users.
o Management of the Public Key Infrastructure (PKI) to insure that certificates and the private keys that support them are protected appropriately to prevent theft of service and harm to the network.
o Encryption of customer traffic to help prevent unauthorized snooping of a cable customer’s voice, data, and video traffic. This is especially important in the star and branch “shared” network architecture of cable.
o Configuration file authentication to assure that the cable modem is operating with the correct, purchased, level of service, thus preventing theft of service.
All of the elements are necessary to protect the cable network from theft-of-service, denial-of-service attacks, and harm to the cable network (including harm to other consumers using the same shared network). If one of these elements is weakened, then the overall security of the cable network is reduced, potentially negatively impacting all services delivered by cable – voice, data and video. All CableLabs specifications (DOCSIS, CableHome, PacketCable and OpenCable) make use of DOCSIS cable modem and this same security model.
DCR+ Opens the Cable Network to Software/Internet-Based Attacks
The hardware implementation of DOCSIS based devices is critical to security of the device and of the network. The same is true for the software implementation in those devices since the vast majority of the functionality of these devices is implemented in software. In the case of an embedded DSG modem, the integrity of the software that implements the DSG modem is ensured through the use of DOCSIS BPI+ Secure Software Download (SSD). All of the CableLabs specifications make use of this SSD mechanism to insure the integrity of the device and consequently the network. Only software that has been signed (and optionally cosigned) is permitted to be downloaded via SSD to the device that contains the DSG modem. The use of SSD therefore helps the cable operator to protect the network by protecting the /DSG modem software from tampering.
CEA has made no provision for the integrity of operating software or applications in a DCR+ device, compromising the overall cable security structure, and exposing the cable network to software/Internet-based system-wide attacks. This would weaken the common core security on which cable-delivered video, data, and voice all depend.
Hackers and pirates are already poised to exploit any weakness, but known hacks today
require physical modifications to the modem and cannot be distributed over the Internet. The
TCNISO website (www.tcniso.net) offers downloads of “DreamOS,” promising “Complete control of the device and DOCSIS stack” and “OneStep,” “the software that took cable modem hacking mainstream.” “By making uncapping easier, OneStep introduced cable modem hacking to individuals who may not have been able to accomplish it otherwise (and created many security concerns for service providers in the process).” Uncapping is a theft of service.
DCR+ opens the security gates wide to hackers and pirates: it makes no provision for SSD, a key authentication measure used to assure the end-to-end integrity of cable-delivered video, data, and voice services. Without SSD, the cable modem in DCR+ is unprotected against distribution of undetectable rogue software that can be easily downloaded over the Internet.
Widespread, software-proliferated, modem hacks could also open the network up to denial of service attacks, potentially system wide.
Comments of the National Cable & Telecommunications Association (NCTA) responded to the CEA September 10, 2007