[LINK] What's Behind the Huawei Fracas

Kim Holburn kim at holburn.net
Wed Mar 28 22:03:30 AEDT 2012


On 2012/Mar/28, at 8:55 PM, Richard Chirgwin wrote:

> On 28/03/12 8:24 PM, Richard Archer wrote:
>> On 28/03/12 5:56 PM, Richard Chirgwin wrote:
>> 
>>> Consider - to snoop on the NBN the Ethernet-over-fibre kit needs to
>>> accomplish the following without detection by the operator:
>>> 
>>> 1. Extract the data from the Ethernet frames,
>>> 2. Decide what's interesting and what's not, and
>>> 3. Send interesting stuff back to China.
>> I think that might be a bit naive.
>> 
>> If I was designing such a beast, I'd have it watch for control commands
>> passing through the device as normal traffic.
>> 
>> So all you would need to control the device is an IP or even digital
>> voice connection which passes through it. Such commands could be used to
>> instruct the device to do whatever you've designed into it.
> Except that the NBN switch won't have an "IP" or "voice" connection; by 
> the time it reaches the NBN, it will be Ethernet frames.

I can think of a number of ways the underlying switches could get messages out, most of them out of band.  An ISP might use huawei routers or anyone had a device that could relay, even a powned windows box.  

But hey, most of our computing and networking equipment is made in China.

> In-band management of an Ethernet switch exists, but if you're outside 
> of the network, you need to find a way to get a router to turn an IP 
> packet into a suitable Ethernet frame - and, since the routers will be 
> out of NBN Co's control, you have to create some kind of "poison 
> packet", which, when turned into an Ethernet frame, is interpreted as 
> the Ethernet management frame.
> 
> Then, the switch has to return the information as a frame which the 
> router will interpret as "This is a Phone Home packet" and route 
> accordingly.
> 
> I don't say "impossible". What I do think is "unlikely to be 
> unobservable to the owner of the kit, when those owners are trained 
> network engineers, not home punters".
>> 
>> The device would then act on these commands and inject the responses
>> into the control stream.
>> 
>> Your machine on the end of the link could then store/analyse the
>> collected data. It would be this machine which would send the collected
>> data "home".
>> 
>> I doubt there'd be any way to easily tell the device was doing anything
>> untoward. You would have to checksum all data streams into and out of
>> the device and make sure they hadn't been modified in transit.
>> 
>> As for deciding what's interesting and what's not... I expect this is
>> something the experts in this field would have no trouble with.
>> Especially if the code running on the device was upgradeable on the fly.
> Here, I suspect that what I call "spook PR" outruns what's "easy" or 
> even "doable".
> 
> You have to bury this code without arousing suspicions:
> - "Why does this device have a processor twice the size of all its 
> competitors, for no extra performance?"
> - "How come it's got so much more memory, for no extra performance?"
> - "Why are you overloading processing power and memory, but still 
> delivering cheaper, even though both products come from the same Foxconn 
> factory?"
> 
> All of this also presumes that no amount of reverse-engineering would 
> reveal any anomolous behaviour.
> 
> If someone said "we don't like the NBN's commercial status being 
> beholden to Chinese state decisions", I can believe and understand it. 
> But the more I think about it, the more the "secret hacker backdoor" 
> theory sounds like a smokescreen.
> 
> RC
>> 
>> ...Richard.
>> 
>> 
>> _______________________________________________
>> Link mailing list
>> Link at mailman.anu.edu.au
>> http://mailman.anu.edu.au/mailman/listinfo/link
>> 
> 
> _______________________________________________
> Link mailing list
> Link at mailman.anu.edu.au
> http://mailman.anu.edu.au/mailman/listinfo/link

-- 
Kim Holburn
IT Network & Security Consultant
T: +61 2 61402408  M: +61 404072753
mailto:kim at holburn.net  aim://kimholburn
skype://kholburn - PGP Public Key on request 







More information about the Link mailing list