Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security IT

Industrial Control Software Easily Hackable 194

jfruh writes "CoDeSys, a piece of software running on industrial control systems from hundreds of vendors, has been revealed to be easily hackable by security researchers, giving rise to a scenario where computer hacking could cross the line into the physical world. Worse, many of these systems are unneccessarily connected to the Internet, which is a terrible, terrible idea."
This discussion has been archived. No new comments can be posted.

Industrial Control Software Easily Hackable

Comments Filter:
  • Enter Kaspersky (Score:1, Informative)

    by Anonymous Coward

    Kaspersky says they'll come up with a new OS specifically designed to protect industrial control systems from hacking and sabotage.

    http://www.pcmag.com/article2/0,2817,2411052,00.asp

    • by Anonymous Coward

      They also said they'd come up with an exploit-proof operating system so their credibility is more than just a little suspect.

      http://it.slashdot.org/story/12/10/19/2254209/kasperskys-exploit-proof-os-leaves-security-experts-skeptical

    • by gweihir ( 88907 )

      Talk is cheap. My guess: They cannot do it, but enough people will believe them. Once the OS is in place, they cannot migrate away anymore.

      • by plover ( 150551 )

        Even if they could do it, very few ICS admins would switch to it. Most people there are responsible for stability as their most important attribute - and that means running a solution that has proven itself over and over and over again. Related to this concern is downtime: often times these plants are running 24x365 schedules, controlling furnaces that keep ovens full of molten iron from freezing solid, which could destroy the oven. Shutting down a production line takes time and planning to prevent damag

        • Re:Enter Kaspersky (Score:4, Insightful)

          by gweihir ( 88907 ) on Sunday October 28, 2012 @11:31AM (#41797081)

          Even if they could do it, very few ICS admins would switch to it. Most people there are responsible for stability as their most important attribute - and that means running a solution that has proven itself over and over and over again. Related to this concern is downtime: often times these plants are running 24x365 schedules, controlling furnaces that keep ovens full of molten iron from freezing solid, which could destroy the oven. Shutting down a production line takes time and planning to prevent damage, and every minute that line is down, they are not making money.

          Indeed. What they actually need to do is to really isolate these control systems in the hard sense. I.e. no ports network, data import only manually, data export via CD-R or the like, clear message to employees that connecting any USB media, Laptops, etc. will result in immediate termination, ...

          It can be done, even if it may require some people to suffer first, as Iran found out. They did execute the people that imported Stuxnet via USB drive. My guess is they will not have that problem again anytime soon.

          When there is a credible threat, they look at addressing the threat on an individual basis. Firewalls between the controller and the LAN. Epoxy in the USB ports. A locking cabinet around the CD-ROM drive. But replacing the core of the factory, on an unproven software package, just "in case" a hacker might target them? Not terribly likely.

          This is not enough. Firewalls are insufficient. They need to implement real isolation, i.e. only an isolated net may be used and that has to be very heavily protected. It will take quite some time for them to find out how to do that, although competent IT security people could tell them today. The problem is that they are asking the wrong questions and are looking for IT experts that understand their business, instead of looking for competent IT security folks.

          • It can be done, even if it may require some people to suffer first, as Iran found out. They did execute the people that imported Stuxnet via USB drive. My guess is they will not have that problem again anytime soon.

            Well it's pretty difficult to insert a USB drive when you've had both hands cut off (in Allah's mercy)...

            • by Meski ( 774546 )
              That's going to have a chilling effect on their 'citizens' volunteering anything happening.
    • Re:Enter Kaspersky (Score:4, Interesting)

      by Interfacer ( 560564 ) on Sunday October 28, 2012 @02:09AM (#41794815)

      Speaking as the system administrator for a large DCS system: the OS will be no good without a complete redesign of the application level software. The problem is not really the OS, but the fact that in order to make everything work together 'automagically', there are hardcoded service accounts, and much of the app executables (which are often executed with system permissions) are writable because the entire installation folder is writable. And of course, the controllers that do perform all control actions use a protocol whose only real claim to security is obscurity.

      And from what I can tell, the system I manage is fundamentally no different in that regard from DCS or SCADA systems from other vendors. While it is true that a secure-by-design would be a good place to start, the main problem atm is that the application architecture is hopelessly insecure.

  • by account_deleted ( 4530225 ) on Saturday October 27, 2012 @07:13PM (#41793041)
    Comment removed based on user account deletion
    • Re: (Score:2, Funny)

      by Anonymous Coward

      Way ahead of you.

      -Colosus

    • I have better idea. Why don't we just make not better, but NORMAL software, with NORMAL developers, not the bunch of idiots that are thinking they have anything common with "developing" anything at all???
    • Instead, you should develop an artificially intelligent system to defeat would-be attackers and malicious software.

      Yes, you should. [redlambda.com]

      (Disclaimer: I work for Skynet.)

  • Yup (Score:5, Informative)

    by 50000BTU_barbecue ( 588132 ) on Saturday October 27, 2012 @07:13PM (#41793043) Journal
    Having recently switched fields from high-end telecom gear to industrial machinery, I can confirm this. The industry works with what hardware they know. I last worked in the field two decades ago, and now I see the same Cutler-Hammer contacts, the same Schadow switches, the same Schroff and Rittal metal works, the same Panduit wire ducts, the same Oriental motor drives, the same Allen Bradley PLCs... Oops, that PLC now has an ethernet port? The PLC looks the same as before, a grey box covered in screw terminals, but apparently it must have changed from a 6809 running GRAFCET to some sort of modern porous monstrosity needlessly running a 64 bit OS with so much unverifiable code.

    It's not necessary.

    • Re:Yup (Score:5, Interesting)

      by hjf ( 703092 ) on Saturday October 27, 2012 @09:01PM (#41793713) Homepage

      I like to compare the problem in this industry to Powerpoint presentations. If you ever attend a university lecture, you'll see the professor, who is an engineer, doctor, master's, Ph.D or whatever. He has 5 degrees, hundreds of certifications, and thousands of hours of experience in the field or in front of a class. Yet, he cannot be bothered to invest a few hours of his time in learning *GOOD* powerpoint skills. And don't even get me started on "getting your computer hooked up to the projector".

      In the automation industry it's the same thing. A very clever engineer, real genius sometimes, comes up with mechanisms you wouldn't even dream of, and designs a machine as big as a building, that works perfectly. The problem is, it's the same guy who programs the PLC, and he likes to do it in Ladder diagram (which has its advantages. I do ladder and i admit it has the benefit that you can "see" the program, and not get losts in semicolons and braces). But, like a rookie programmer, he disables security, releases in debug mode, uses default passwords, and many other "bad practices" that could be easily solvable if he bothered to spend a few hours to learn to think as a software guy. Sure, disabling your firewall isn't harmful if you're testing for a few minutes. But "i can't find the problem so the only workaround i found was to disable the firewall" is pretty much what happens with these guys.

      • by Anonymous Coward

        It's insanity to build 1000 identical machines with different passwords. Customers expect to get similar machines, and having different passwords only invites utter chaos.

        Customers also expect electricians to be able to look at PLC logic, and know passwords on machines that they might look at once every two years. To expect different passwords is idiotic at best.

        What needs improved are network level firewalls, which the IT department needs to do. Instead, IT people ask things like, "Can't you migrate tha

        • by hjf ( 703092 )

          So why do they have passwords if the password is always 1234 and even the janitor knows it?

          • The same reason they put locks on the glass doors of convenience stores. To keep out inquisitive idiots.

        • by tibit ( 1762298 )

          All this password brouhaha is silly. If you have physical access, you can always do whatever the heck you want -- for all we know, you can unplug the control wiring from the PLC and run the machine from a pushbutton panel. That has always been the case. All one needs is a button on the PLC that you have to press, perhaps twice, to indicate that you're local and want to let a connection from your laptop access the PLC's administrative functions. Otherwise, if you're doing it from a cental office of some sort

          • by RobinH ( 124750 )
            That same PLC has to work in tiny little job shops where the only support is a local electrician, and they're perfectly capable of going online with said PLC, adding a new sensor they need to stop the machine when the new hopper they installed is full, and going on their merry way. In that kind of situation it's likely the PLC isn't hooked up to a network anyway. Besides, you underestimate the ability of an "electrician" who needs to get a job done. Trust me, there are much more serious ways for an elect
            • by tibit ( 1762298 )

              Again, if you have physical access, all it takes is a little button to temporarily allow unlimited, password-less connection. I'm sure there's plenty of simple PLCs that are programmable with ladder logic only and any electrician will understand them, the stuff I deal with is used for motion control and you need to know your shit to do anything much with them. Like, for example, knowing a bit about a couple of different industrial communications protocols, knowing a bit about TCP/IP networking, knowing a bi

          • by hjf ( 703092 )

            TFA was about SCADA hacks. SCADA systems are networks with (usually) remote screens. The point is that you can hack these systems easily with no physical access.

      • by Anonymous Coward

        I work in this industry too, and I assure you I've never met another person in my field who knew anythimg about computer security, let alone thought it was important. When I point out obvious security precautions like putting a firewall between the industrial network and the corporate network, it's like I'm speaking Greek. Nobody knows or cares. I once worked with a contractor PLC programmer that brought a home wireless router and plugged it into the customer's industrial network with no password just for t

        • Re:Yup (Score:4, Insightful)

          by inasity_rules ( 1110095 ) on Sunday October 28, 2012 @03:03AM (#41794941) Journal

          On the other hand when the SI password protects the PLC so another SI can't get in and fix the system(because the first SI is now out of business), now we can get in and do it without re-engineering the whole system. Sometimes low security has benefits.

          90% of the security we implement is air gap. Once someone has physical access to the control panel, you've lost anyway, they could start swapping wires and pulling relays if they wanted. If the system must be on a network, we put it on physically separate network, with at most one SCADA PC on both(because the client demanded it). Still, you can set up a nice secure(ish) system, and two weeks later the client's IT department has screwed it up completely.

          The major catastrophe you're waiting for is actually surprisingly unlikely. Sure a malicious person could cause a lot of damage, but from what I have seen people are more interested in stealing stuff than blowing it up. Why go to all the effort of destroying the mill on the goldmine when you could go to all the effort of smuggling gold out? They'd rather get on the internet to check their facebook, and once they realise the control PC is not on the internet they don't care anymore.

          • It can also prevent people named Terry Childs from taking your network hostage.

            The most important security, is watching the watchers. Can the top boss still get into the system?

            • The top boss normally demands access to the SCADA in a monitoring mode. Or the SQL based reporting system at least, which should have a blame trail logged in it... Normally you don't want anyone but a qualified engineer messing around in a PLC.

          • by RobinH ( 124750 )

            Certainly the GP isn't talking about physical security, or even trying to use cybersecurity as a replacement for physical security. If there's a malicious guy standing beside your control panel, good luck. However, the fact is more and more industrial control systems, are connected directly to the corporate network. Even if they're not on the same network, you almost certainly need some kind of MES system with access to both networks, so you have a single point of failure there. Even without that you ha

            • Well, ultimately the customer is going to care more about downtime than about security. Even if security has a nebulous risk (that they have not run into yet) of causing downtime. Where I work, we also remote into systems, sometimes directly over a 3G modem. It is a massive security issue, but the convenience sometimes trumps it. Admittedly you'd have to hack a private APN to get into the system, and then bypass the passwords. It is doable, I am sure, but it would be a lot of effort to go to to get into, sa

            • So your machines run all night, banging out 100,000 promotional cake tins for True Love Waits.

              And they all have penisbird embossed on them.

              I bet it was that bastard in Accounts Receivable.

          • by gtall ( 79522 )

            That's fine when you enemy is a crook who needs a financial incentive to get off. However, if your enemy is, I don't know...pick any of the global actors, someone or organization who gets off on causing mayhem, then the calculus changes.

            • Well, which is a better target? A nuclear power plant or a water recovery plant for a mine in the middle of nowhere. Set up your security accordingly - lock down the nuclear plant tightly. The water recovery plant can go down for weeks until someone bothers to go fix it and plug any minor issues. Seriously whats with all the paranoia on /. today?

          • by tibit ( 1762298 )

            Yeah, because you can't have a fucking button on the PLC itself to enable direct passwordless access when you already have physical access and can screw things as you please... For everything else, you don't need passwords, just loading up the set of public keys of entities that are allowed to make changes in the PLC. That's all there's to it. No passwords.

            • That is actually a very good idea. Sort of what OPC UA is trying to achieve. It is a great pity nobody has implemented it that I can see.

      • If you ever attend a university lecture, you'll see the professor, who is an engineer, doctor, master's, Ph.D or whatever. He has 5 degrees, hundreds of certifications, and thousands of hours of experience in the field or in front of a class. Yet, he cannot be bothered to invest a few hours of his time in learning *GOOD* powerpoint skills. And don't even get me started on "getting your computer hooked up to the projector".

        Not in mathematics. Almost everyone uses Latex (often, the beamer package for slide

        • by gtall ( 79522 )

          I recently went to a logic conference in Poland, only one presentation used ppt, the rest were Beamer and Latex. That's more or less the way it is done through theoretical computer science and among logicians. The reason has to do with typesetting mathematics. MS seems to have worked overtime to make that as painful as possible in ppt. Apple's Keynote makes it easy so it isn't impossible on something like ppt. Frankly, I won't touch ppt unless it is the last step in a process of producing slides and the sli

    • The industry works with what hardware they know.

      No. The industry works with what hardware they TRUST. The problem is that trust is built up on a per company basis. After many years of experience with one vendor that vendor ends up on a list of preferred suppliers for any product they manufacture.

      This is really good and really bad. By finding the good vendors you end up with a reliable and consistent equipment base which all your techs can be trained to work on and the next new project won't introduce uncertainty in the way of equipment requiring new tra

  • by Anonymous Coward

    ...that they'll come up with something, the REAL solution has NOTHING to do with what they're talking to.

    The OS isn't just the problem. It's the SCADA applications themselves as well. Something I've pointed out on several occasions to industry and even to people at NIST on the subject- in fact, quite a few researcher's have pointed this out over the last decade now. (And, all of a sudden, it's a "problem" now...sigh...)

    Kaspersky's solution WON'T fix things like they're claiming- it's just more snake oil

  • by Anonymous Coward

    Make the first episode of BSG Season 1 [amazon.com] required viewing for "intro to computers" class.

    This is a mouse, this is a keyboard, this is why you don't jack your global defense grid into a wifi hotspot.

  • by Anonymous Coward

    At what point will software engineering be professionalized like the other branches of engineering?

    Surely there are well established guidelines for securing software at this point.

    1) Create a professional society for software engineers (the SPSE, let's say) with the power to grant and revoke certificates. Assemble a blue-ribbon committee and give them 6 months to come up with membership requirements
    2) Have the SPSE adopt existing standards regarding security, stability, and whatever other categories are nee

    • Re: (Score:2, Interesting)

      by Opportunist ( 166417 )

      A nice idea in theory, but you're dealing with security. A field that reinvents itself every 3-6 months.

      Judging from the average "standardized" guideline, the moment the final draft is getting its last changes it will be outdated by about 2 generations. So you now have the choice, either be accurate and give attention to detail and be about 3-4 years behind the attackers, or be vague and spotty and have everything pass because they can somehow fudge it.

      We're not talking about approving technology where your

      • Sadly no one will listen until something bad happens.

        If you told someone pre-2009 about the need for financial regulations and the upcoming collapse people would call you a communist and a liberal! Peter Schiff did jsut that and was laughed at before he earned fame when the Great Financial Collapse hit.

        Same is true with nuclear powerplants after fukashima, airport security after 9-11, and same after the space shuttle Challenger exploded, IE 6 security after code red. Money talks and shit walks. Only when de

        • by Opportunist ( 166417 ) on Sunday October 28, 2012 @02:20AM (#41794843)

          Necessity is the mother of invention. That, or an article in the business newspaper your boss reads.

          My solution to that problem was simply to subscribe to the same magazines my boss reads, peruse them for articles supporting my case and getting him to read it. Not only will he listen to them more than to you, he'll also think that you read "relevant" magazines and start listening to you, at least from time to time.

          I know it's silly. hey, it's management!

          • My solution to that problem was simply to subscribe to the same magazines my boss reads, peruse them for articles supporting my case and getting him to read it.

            Or start your own magazine.

            I did consider bringing out "Management Fad Monthly" but I was worried that some silly bugger might try to implement an obvious spoof like TQM, stand-up meetings or employing Indian programmers, and then where would we be?

    • may need unions as well so the coders can stand up to the PHB's and say that...

      That time table is to tight

      We need more staff and the 80 hour weeks are just makeing us make more errors.

      We can't cut QA

      You can't hire people who can't pass the certified test but have BA/BS while passing over people who have passed the test but don't have a BA/BS.

      No I will not add this new stuff to the code this late in the roll out hell we still have some big bugs in the code base to work out.

      No will not use that POS best buy s

    • by RobinH ( 124750 )

      I'm a P.Eng. I work in the control system industry. Most of the people who work in this industry are P.Eng.'s or certainly have an Engineering degree. Most of the ones I've met know *nothing* about computer security. These Engineers are the ones plugging PLCs directly into office networks because they're EE's. They have little to no training in computer networks (short of setting up their home routers). They have no idea what a VLAN is. They have heard the term firewall but don't really know what one

  • ...you have physical access and hand tools. The ease of access in-place isn't a problem.

    Controlling access itself is the problem.

    • tell that to the PHB who said we can save by remoteing control to some offsite place.
       

    • by fatphil ( 181876 )
      Exactly. "Worse, many of these systems are unneccessarily connected to the Internet" is mostly bollocks. That's not the "worse", that's the whole problem. But they put MS windows on cash machines, so they'll basically do anything that seems quick and easy. I have no sympathy for any industries which invest in such hackable devices and have connected to (a network connected to) the internet. Open season - hack away!
  • What we have here is a TCP port that let you have an unauthenticated shell access. In other words, this an easy to find backdoor. It is so easily exploitable that I am not sure it even deserve the term "hack".
  • With the emergence of 3D Printers, rapid prototyping and the domestication/democratization of manufacturing, I don't think it's going to do so much harm. Manufacturing is undergoing a revolution. Many parts (and even burritos... Google that up to see what I mean) will be "printed out" at home. People won't give toys and dishes for Christmas, they'll gift the blueprints and some resins instead. Heavy Duty Industrial will remain somewhat the same, but not manufacturing as we think of it now.
    • Using Slashdot's mobile app (which is excellent btw) but I wasn't aware I needed HTML for simple paragraph breaks.
      You'll just have to imagine them ;-)
  • by Anonymous Coward on Saturday October 27, 2012 @09:10PM (#41793745)

    I was doing some electrical work at an oil refinery up north in Canada about 5 years ago. I wasn't specifically attached to their control systems or PLCs, though since the electrical was intertwined with a bunch of the automation I naturally knew all the guys who were taking care of that portion of the project since we were required to collaborate together.

    On one particular day, I entered the facility as usual and was heading to an unfinished section to check out some conduit. On my way there I noticed a CAT5 cable stretched across a walkway, disappearing into a stairwell. This was so incredibly absurd and suspicious that I just had to see what the hell was going on, even though something in my head told me I didn't want to know. I traced the cable back to the management office where it was plugged into one of the network switches. Okay, weird- follow it back in the opposite direction, all away across the plant- after about 80 meters there was a hub/repeater dangling over a walkway rail plugged into the wall and another CAT5 cable stretching off into the oblivion. Following the second extension cable led me to a set of PLCs and a group of the control guys throwing vulgar insults at an Allen Bradley PLC unit.

    Turns out the PLC was a "new" model. Instead of handling the licensing through a floppy disk (!) like all the old units did, this one used some sort of a proprietary activation scheme that had to run over the friggin' internet before the PLC would actually do anything. The CAT5 cable I'd traced about 180 meters across the plant going back into the office internet connection was setup to allow this process to complete, since they had apparently failed to do it earlier when the system was OOTB but not yet hooked up.

    They eventually got it all working, but it took them about 5 hours of fiddling to get the damned thing working properly.

    Shit like that is the reason why things are hooked up to the internet, sometimes improperly. I know there's certain requirements for remote monitoring and such, and that should all be done over an isolated, encrypted VPN- but then you've got licensing bullshit like this that expects to phone home to a random server on the internet with little or no fire walling in-between. There's no reason for it otherwise- apart from the PLC guys wanting to make sure you're licensed and all paid up, god forbid anyone should buy a second hand PLC and reprogram it to do something useful again.

    -AC

    • That seams like a good way and they can be hard to copy as well.

      • Because God forbid someone would sell them used and deny megacorp profits!

        This way everyone is forced to buy new only as if you used a dongle then someone could sell them. Can you imagine how much the car companies would love to make buying used cars illegal?

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      The only 1-time internet activation required on Allen Bradley equipment is the computer software (RSLogix 500/5000) to program the PLCs, AB PLCs don't need to be activated ever. (new or old).

      As a PLC/PAC guy I am a HUGE fan of Ethernet/IP. It is the best fucking thing ever and people on this thread have no clue about the security of this technology. Try difficult (servos) programing with DeviceNET, Its a fucking joke and a waste of time, old technology. We have to have access to 100's of PLCs on our networ

      • I have found DeviceNET a pleasure to work with. Omron do it extremely well, and it is very easy to use. It is also sufficiently fast for most applications. My biggest hassle was connecting a Toshiba PLC to an Omron SliceIO system. Once it was working though, it worked exceptionally well. I'd much rather work with DeviceNET than ethercat or any of the other systems.

    • by WebCowboy ( 196209 ) on Sunday October 28, 2012 @01:43AM (#41794733)

      The CAT5 cable I'd traced about 180 meters across the plant going back into the office internet connection was setup to allow this process to complete, since they had apparently failed to do it earlier when the system was OOTB but not yet hooked up.

      Assuming it was all Rockwell/Allen+Bradley gear then it was undoubtedly the FactoryTalk Activation system they were struggling with, and they were undoubtedly unqualified to be doing the work they were assigned to do (disclosure: I am a former Rockwell Automation employee so I have familiarity with the subject, but apart from that I do not speak on behalf of any employer past or present here).

      First and foremost, Allen+Bradley(AB) PLCs don't need activations, so the licensing really isn't relevant to this story. AB makes a crap-pile of profit on that hardware the moment they've sold you the box--activation makes no sense. What DOES need to be activated (and is what creates profit for the Rockwell Software division) is the RSLogix programming software, without which the PLC is as useful as a doorstop. So unless they were completely clueless they'd have just taken their laptop into the office and activated their software then come back, rather than break all sorts of IT, security and safety rules stringing out 180m of CAT5 and a spare switch to get internet. The same goes for their drives--the drive units don't need activating but DriveTools software on the programming laptop may have.

      That said, there may have been an industrial PC like a VersaView or third-party unit running the Rockwell HMI software and was bolted into the cabinet with un-activated software for some reason, but Rockwell/AB have thought of that...

      The legacy licensing system used utility software called "EVMove" and relied on "master disks" (towards the end you could set up a USB flash drive) and in the field this was a royal pain in the ass--floppies and their drives are far too sensitive for such an environment, and USB memory sticks are terrible to manage and secure. Thus the development of the FactoryTalk Activation internet service-based scheme. Though it requires the internet the end system does not need to be connected to activate. The easy "wizard" way sends a "host ID" (the ethernet MAC address or some such number) from the end device to Rockwell via the internet. However, you can actually write down the mac address, or generate the hostID file on the target machine, then go to an internet-connected computer and type the hostID into a secure web form or upload the hostID file. The website then generates a license file that you can save to removable media or a laptop/portable machine to take over to the target machine physically, thus preserving the air gap (and making the method more similar to the old EVMove floppy method).

      I do agree that licensing/DRM/activation is a big problem that costs end users millions of dollars globally (above and beyond the actual purchase cost of the products). It adds complication and downtime and confusion and contributes exactly zero value to its users. One might argue about its value to the vendor as well--FactoryTalk activation and many other similar schemes are just as trivial to circumvent as CoDeSys' ladder logic runtime for hackers, and adds the burden of extra support costs from the honest users it keeps honest. But the problem in industrial automation is bigger than that. The problem is that the world in general moves faster than industrial control systems can keep up, and the people who have "experience" honed their skills in the mid 1990s or earlier and haven't kept up. In the meantime, PHBs of the world in management and government demand of them far more than they are capable of delivering.

      It used to be that refineries/factories/etc were content with paper chart recorders where operators and plant managers could peruse them if something came up to troubleshoot. Then came data recorders where you could plug in a serial cable or transfer via floppy to a computer for more deta

      • You are correct sir. We have never had to connect any PLC to the internet, and we deal with almost all manufacturers. Rockwell's horrible licensing scheme is why we don't use them so much. Other PLC manufacturers give SIs their software cheaply because that sells lots of hardware that way. Not Rockwell. I suppose it is better than Toshiba's "free" software (which I think was last updated in the 90s), but come on, don't Rockwell want to sell hardware? Even the evil Siemens practically fell over themselves tr

  • I've said it before, and I'll say it again: What possible reason could industry have to put controls networks on the internet? I can understand putting some type of reporting on the internet, so the bigwigs can keep track of up to the minute production. *disclaimer: I am an industrial electrician. I work on industrial controls in a sawmill. The day a production foreman asks us to give him control of machinery over the internet is the day I find a new industry.
    • This is very common in the HVAC industry. Customers want to be able to check on their building on their smart phone at home over the weekend. Even without that requirement, the systems get put on the local intranet with everything else because the customer will not provide a separate network nor allow us to add our own. Very few of our customers put HVAC controls on separate VLANs with no access to the Internet.

      • Yah well I have solution... make them (the managers) utterly aware of the situation and risks in writing so they can't disavow any knowledge when it goes haywire. As an aside the engineer in me says if you want to monitor the state of a HVAC or any control system, keep the control and internet connected networks separate and using a data diode (http://en.wikipedia.org/wiki/Unidirectional_network) spit out some self contained UDP data with system state information but not allowing any control signals of any
        • They want to be able to change setpoints to make people happy...without going in to work. I agree, data diode is a great idea...when you don't need to interact with the system.

    • by gman003 ( 1693318 ) on Sunday October 28, 2012 @12:36AM (#41794547)

      My father works in an industry that uses a lot of PLCs and such. This is what he's told me:

      Quite often, even though the PLCs run on their own locked-down OS, the console to manage it is just a standard Windows desktop. Kind of logical - it's just to display what's going on, maybe issue manual commands, but it doesn't "run" the system. And they're *designed* to be connected only to the LAN, not have any physical connection to the Internet. But quite often, he comes into an installation site and sees that they've plugged that desktop into the Internet, just because it had a port for it (or so the techs monitoring it 24/7 can relieve the boredom, against all procedure). So they end up connected to the internet just because the off-the-shelf desktop the blinking-lights-display runs on has an Ethernet port.

      He's also told me pretty much everyone keeps the default password. Three fucking characters.

      Would it terrify you to know that many of the sites he works at are power plants, both coal and nuclear? He doesn't touch the "functional" parts, but it still says bad things about their approach to security.

      • Ask him about the horror of OPC and DCOM. As a result of those two abominations most people just disable all security and add "Everyone" to all the lists in order to just get the damn thing working in a reasonable amount of time.

      • He is unfortunately right, but it's skirting around the larger issue.

        Humans are absolute geniuses when they act like fools. You can't regulate away boredom and idiocy. It's one thing to say, don't plug in USB sticks here it's against company rules, and it's quite another to leave a person alone unsupervised on nightshift with the piece of equipment. I kid you not we had one operator show us triumphantly how he managed to play a movie on the monitor screen of a gas chromatograph analyser, which happened to r

    • Preaching that automation systems be kept off the internet is like preaching abstinance until marriage to teens. It sounds like the lgical solution to all the problems but it is unreasonalbe to ever expect it to happen, so the best course of action is to educate on how to do it safely and responsibly.

      Ther are many valid reasons that automation systems are connected to the internet in some fashion (though they never need direct internet access). Some of those reasons relate to not braking the law.

      In indust

  • We've been saying this for years, but then again - our company makes data diodes.

    • Try this on for size.....

      3rd party logging vendor is given permission to run their logging servers on the secure network.
      They require 5 open ports (7777, 25xxx) open both ways in the firewall.
      They use ping to verify redundancy of hosts (derp...) so pinging through the firewall for all hosts has to be enabled/accepted.
      Their logging software can be fully configured and modified from outside the firewall. They use simple tcp sockets with no encryption to send their management commands... like starting and stop

  • ...concern anyone?

    "We software Automation." is prominently put up on their website...a German company's TYPICALLY better at English than that.

  • "Worse, many of these systems are unneccessarily connected to the Internet,"

    Instead of spending the oodles of money for those worthless airport scanners, department of defense boondoggles, and useless shit, flame, etc...

    we could have spent the money to develop an ultra secure replacement for hardware controllers, and manditory audits of mission critical systems, and unplugged needlessly internet connected components from the internet.

    Instead we spent our money foolishly on shit we don't need.

    I am calling fo

Don't tell me how hard you work. Tell me how much you get done. -- James J. Ling

Working...