1709
Comments (55)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
1
muslimporn 1 point ago +1 / -0

As a security expert I'd usually say Windows 7 doesn't strictly have to be insecure. All operating systems are potentially insecure and system architects don't operate on the basis that if you use the latest OS all the time staying updated then that keeps you secure.

It's not abnormal to have embedded systems running operating systems ten years old or twenty years old that are still stable and secure.

The big but is having things like Windows file sharing exposed, a notorious attack vector. I would be very sceptical that they have secured that.

3
MakeAmericaLegendary 3 points ago +3 / -0

I'm in infosec as well. With the amount of junk you can do with SMB shares sitting on a network, having them on voting machines is appalling.

1
MAGAAllTheTime 1 point ago +1 / -0

Then wait for these machines to get locked up by a cryptolocker “attack” once forensic investigators from the guvmint show up, hiding all evidence

1
muslimporn 1 point ago +1 / -0

There would be some potential convenience in having it though I would try to achieve that other ways.

It could probably be possible to make SMB secure enough on Linux having it run in a container, virtualised, etc and read only secondary copy (a clone / replicant, not master editable copy) as well as with monitoring (you always assume they manage to find a way in so also have fallbacks).

I doubt you can do anything so easily with windows and I doubt they have so many fallbacks.

It's not just the ability to remote access files (if they make it the master copy to and RW) but also those kind of services are known to be stuffed with exploits. A simpler file transfer mechanism can likely be better audited or controlled.

SMB probably gives far more features than they really need. If you really want it I would have multiple computers on the device. Things get sent to a raspberry PI one way through internal link and that can share all kinds of ways. Still not as simple as it sounds though.

1
MakeAmericaLegendary 1 point ago +1 / -0

In Windows, your best bet is to keep the system patched, disable null sessions, have no anonymous shares, have a strong password policy on the machine, have good lockout policies, and enable SMB signing. But that's an unbelievable amount of risk to adopt on a voting machine.

1
muslimporn 1 point ago +1 / -0

Keeping it patched is useless if you want to keep out anything more than script kiddies.

It workstation or personal computer security policy is very different in certain ways to that for other circumstances and this is one of them.

Patching ritually can introduce problems when your situation is particularly sensitive so you don't just do things in the traditional ticking checkboxes approach or just doing the things that are well known to do but people don't really understand.

However, removing or otherwise disabling anything that's not needed is universally applicable. You would turn off virtually all network services except perhaps basic DHCP, etc.

The biggest problem for things like SMB is that they have a long history of having things like remote execution exploits. It's also a black box and a hard service to trust as it's often more lumbering than you need.

Signing is for local network security which is another problem. Actually it can be quite a big problem if someone is able to plug in something that detects the voting machine then tries to rival its shares and manages to do either MIM or just manufacture the data in the same format.

It's worse if they can alter the master record because you can't just go back then and check again so easily.