Bonum Certa Men Certa

What the Situation in Finland Teaches Us About ISP-Supplied Routers (a Global Problem, Back Doors Increasingly Rampant)

posted by Roy Schestowitz on Oct 30, 2023,
updated Oct 30, 2023

This subject has barely been explored in two years and it was a very hot topic ten years ago [1, 2] (the boon of Edward Snowden's NSA and GCHQ leaks; approximately 99% of them will never be seen [1, 2]):

Report accuses BT of supplying backdoors for GCHQ and NSA

BT modems have NSA back-door, claim researchers

Man Watching Aurora Borealis

THE post we deal with today is a bit long. An old article from YLE (yle.fi, the national broadcaster in Finland), was entitled Supo varoitti reitittimien tietoturvauhasta – tarkista kotona ainakin nämä kuusi asiaa kuntoon (Supo is the spy agency in Finland) and it was brought to our attention today. This post will deal with Finland in general, Telia more specifically (a very large ISP in Finland), and then the international trends, which extend to BT (see screenshots at the top). I know a lot about BT, including from the inside.

"Here," (in Finland) Sompi said in IRC, there are "many Internet connection types where the customer cannot even choose the router model themselves. For example cable internet is usually that way And the ISPs are actively distributing those Huawei-branded shit routers that they don't even control themselves."

"And [a] couple of years ago Telia offered so-called "hybrid connections" which were basically two connections in the same box, the other being 4G and the other being VDSL2+ and the router tried to distribute the load evenly between those two connections. The routers and their firmware were bought cheaply from some company called Sagemcom and they were OK from the start, but then Sagemcom started to push force[d] updates to them and most of their features were removed [...] Telia could not control the updates at all [...] also with these "hybrid connections" the end-user cannot choose the router themselves. I think they are doing everything on purpose to make security actively worse and just hoping that there are more backdoors for CIA than there are for Russia's and China's intelligence agencies."

"If the providers were not selling 'stolen' copies of OpenWRT," another person said, "it would be trivial to update the routers' firmware and keep it secure. The security failure is thus not a technical problem, that has been solved. It is entirely a legal and ethical problem. Furthermore it leads to unnecessary e-waste as people are told the throw out routers and buy new ones rather than simply update the firmware."

This apparently boils down to "theatrics", said this person. "The above [from YLE] is also a smoke screen to distract from the more severe and prevalent security holes on the desktop called Windows."

Sompi checked and looked around for some old references and said that "those hybrid routers had a backdoor for the ISP, and someone wrote an article to the Internet about it but seems that Google does not find it anymore [...] I actually have two of those routers [...] the exact model [is] Fast 5370 Air..." (there's more information in this page)

How did the ISP respond? Here:

Telia tries to threaten the researcher

The report was responsibly disclosed to Telia and a copy sent to CERT LT (NKSC). What happened next was a little bit of a surprise to the team. There were rumours previously about Telia's poor tech level, but we have experienced this in a real case.

First, Telia did not have a PGP key and did not know how to use it, so instead they asked us to ZIP the report with password and send the password over a separate email (private GMail). I hope Telia's engineers will be reading this article, so I would like to explain why the report should be encrypted. This is to protect you as the affected vendor. If there is a man in the middle who can intercept all the researcher's traffic, it will be very easy to get the ZIP file in the first email and then the password in the second email. Instead, PKI like PGP only allows to decrypt the report by the private key owner, ensuring that nobody else can intercept the report and exploit the vulnerabilities before you fix them all.

Second, Telia tried to threaten the reporter for the vulnerability discovery:

Translation:

Thank you for the information Are you sure you did not violate the electronic data protection law?

Original:

Dėkojame už informaciją. Ar tikrai tyrimą atlikote ir neviešus elektroninius duomenis rinkote nepažeidžiant galiojančių įstatymų?

And then they once again mentioned that they will check if this report wasn't a hacking attempt and that they will persecute any reporter that discloses any information about Telia vulnerabilities:

Translation:

Thank you for the information. We will continue to check whether you made your report legally without violating any law. And we will ensure that no fake information will be published that could do any harm to the company's reputation and to the critical part of Lithuanian network infrastructure.

Original:

Dėkojame Jums už pasidalintą informaciją, kurios surinkimo teisėtumo vertinimą toliau atliekame ir tikimės, kad į viešumą nebus paskleista tikrovės neatitinkanti ar neteisėtai gauta informacija, kuri darytų žalą bendrovės reputacijai ir tuo pačiu sėtų nepasitikėjimą kritine Lietuvos ryšių infrastruktūros dalimi.

We will not comment on this and let the IT community to judge. At the same time we will no longer provide any reports in any form to Telia company.

[...]

And finally, we found that the hash was cracked and was available in the old "weakpass" database. You can search for the "old" weakpass database (sometimes named "First version of weakpass") and grep it - password is there. This means that most probably we are not the first who were able to penetrate Telia.

"Google found only this," Sompi added, "but this was not the article I read earlier [...] But that may be connected to the earlier article that cannot be found anymore - there are some mentions about Telia threatening security researchers [...] It may also be that the original article about those backdoors is still somewhere in internet but it has been censored from the major search engines [...] Archive.org probably has it somewhere..."

If people cannot find it, then this can reinforce the idea or the perception that Google and its bottom feeders are not about search, as over time they integrate more censorship and proactive brainwashing.

Anyway...

That's in Finland. Here in the UK I've learned (from the media) and noticed the same with BT. The reports I saw a decade ago are still online and Google does not seem to hide them. As it turns out, BT changes the software on routers upon each reboot (it is essentially like it is remotely controlled from the moment it bootstraps) and a senior BT engineer explained it to me almost a decade ago. He asserted that it cannot be trusted. I wrote about it in my personal blog back then and suffice to say, he does not think the BT routers provide any real security. It's simply not the goal.

Is this an international thing, a NATO member thing, or limited to certain ISPs? It's hard to tell, as those things are shrouded in secrecy for "law enforcement" or "national security" reasons. Definitive confirmations are hard to find and companies can work hard to discredit leakers and other kinds of whistleblowers. The media just "believes" companies and sometimes takes bribes from them in the form of "sponsorship" or "ads".

This is what Telia has in its site ("telia hybrid router fast 5730, portit ja tutkimustyö"). "In that forum thread," Sompi said, "an employee of Telia admits that there is an ISP backdoor in those routers [...] Those routers were very unstable, they crashed and rebooted when the user tried to resolve certain DNS addresses [...] When a factory reset was made, they were ok for 15 minutes and then they loaded and installed all Sagemcom updates that even Telia did not have any control over, and lost all their features. They used to have a proper control panel and IIRC even a telnet prompt. [...] And probably that crashing after certain DNS resolve attempts were because those routers are snooping all DNS traffic and some strings just cause them to crash because the snoop code is crap. For example, trying to resolve randomi.fi always instantly crashed the router..."

There seems to be overlapping agenda across the EU and beyond. From what we can gather, those observations seem like a universal trend. The FSF-EEE did some work related to this (European people choosing what goes in the data socket, with operating systems like LEDE/OpenWRT).

"But I think that SuPo is only worried about those routers having backdoors for China and Russia," Sompi said. "Then they actually want them to have backdoors for CIA and SuPo themselves and don't want people to use any free router firmwares."

As I noted and even ranted here in the past, sometimes the updates create more bugs than they fix. They install new firmware and reboot without even informing the users and then some things "break" (without an explanation or even an apology). You spend hours trying to diagnose everything, sometimes phone up the company, only to realise it is due to some newly-introduced bugs (no workarounds suggested), and then you must wait for the next update, which might take months to come, so this is enshittification exemplified. To be rather sarcastic or cynical about the whole thing, it good that we don't live in Russia... where the government spies on everything at the data/packet/pipe level.

Supo is warning not against those government back doors but about people who avoid those back doors by installing their own routers. "That's why that warning about them backdoors just makes me annoyed," Sompi said. "Also just updating the router firmware to its latest version does not even help anything because the latest version also comes from Huawei, of whoever made the router [...] And SuPo DOES NOT WANT that people would use free router firmwares because then they would also lose control themselves."

Let this be another example where "security" to them means "we control you"; and perhaps that was always it when the said "national security", often a euphemism for universal back doors. Just like with "secure" boot or CAs (the ones controlled primarily by the US). Now we have sigStore, which Red Hat promoted in its official site the other day. For those who aren't aware or haven't been keeping up, sigStore means that GAFAM + IBM are in control of what you can run on your own machine (which programs can be executed). Think of it as Apple and iOS, not Android (but Android too is leaning in this direction, where installing and running a program of one's own choice gets demonised as "sideloading" or a "break-in").

They pretend this is about security, but the exact opposite is true and now Google says Ogg is not secure (when in fact WebM is far riskier). Google is a spying company, not a security firm, and Chrome in general is a massive, gigantic back/bug door. "It is not the fault of the file format itself if something bad happens," Sompi said. "It is always the program that parses it" (Google's WebP monoculture already turned out to be a total catastrophe).

For those who want to know more, see what we said this morning [1, 2, 3] or read today's IRC logs. This past summer in Pisa Richard Stallman cautioned that security no longer means what it used to mean.

Other Recent Techrights' Posts

Microsoft-Connected Sites Trying to Shift Attention Away From Microsoft's Megebreach Only Days Before Important If Not Unprecedented Grilling by the US Government?
Why does the mainstream media not entertain the possibility a lot of these talking points are directed out of Redmond?
[Video] 'Late Stage Capitalism': Microsoft as an Elaborate Ponzi Scheme (Faking 'Demand' While Portraying the Fraud as an Act of Generosity and Demanding Bailouts)
Being able to express or explain the facts isn't easy because of the buzzwords
Microsoft ("a Dying Megacorporation that Does Not Create") and IBM: An Era of Dying Giants With Leadership Deficits and Corporate Bailouts (Subsidies From Taxpayers)
Microsoft seems to be resorting to lots of bribes and chasing of bailouts (i.e. money from taxpayers worldwide)
 
Windows in Lebanon: Down to 12%?
latest from statCounter
Links 18/05/2024: Caledonia Emergency Powers, "UK Prosecutor's Office Went Too Far in the Assange Case"
Links for the day
US Patent and Trademark Office Sends Out a Warning to People Who Do Not Use Microsoft's Proprietary Formats
They're punishing people who wish to use open formats
Links 18/05/2024: Fury in Microsoft Over Studio Shutdowns, More Gaming Layoffs
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, May 17, 2024
IRC logs for Friday, May 17, 2024
Links 18/05/2024: KOReader, Benben v0.5.0 Progress Update, and More
Links for the day
[Meme] UEFI 'Secure' Boot Boiling Frog
UEFI 'Secure' Boot: You can just ignore it. You can just turn it off. You can hack on it as a workaround. Just use Windows dammit!
The Market Wants to Delete Windows and Install GNU/Linux, UEFI 'Secure' Boot Must Go!
To be very clear, this has nothing to do with security and those who insist that it is have absolutely no credentials
In the United States Of America the Estimated Share of Google Search Grew After Microsoft's Chatbot Hype (Which Coincided With Mass Layoffs at Bing)
Microsoft's chatbot hype started in late 2022
Techrights Will Categorically Object to Any Attempts to Deny Its Right to Publish Informative, Factual Material
we'll continue to publish about 20 pages per day while challenging censorship attempts
Links 17/05/2024: Microsoft Masks Layoffs With Return-to-office (RTO) Mandates, More YouTube Censorship
Links for the day
YouTube Progresses to the Next Level
YouTube is a ticking time bomb
Journalists and Human Rights Groups Back Julian Assange Ahead of Monday's Likely Very Final Decision
From the past 24 hours...
[Meme] George Washington and the Bill of Rights
Centuries have passed since the days of George Washington, but the principles are still the same
Daniel Pocock: "I've Gone to Some Lengths to Demonstrate How Corporate Bad Actors Have Used Amateur-hour Codes of Conduct to Push Volunteers Into Modern Slavery"
"As David explains, the Codes of Conduct should work the other way around to regulate the poor behavior of corporations who have been far too close to the Debian Suicide Cluster."
Video of Richard Stallman's Talk From Four Weeks Ago
2-hour video of Richard Stallman speaking less than a month ago
statCounter Says Twitter/X Share in Russia Fell From 23% to 2.3% in 3 Years
it seems like YouTube gained a lot
Journalist Who Won Awards for His Coverage of the Julian Assange Ordeals Excluded and Denied Access to Final Hearing
One can speculate about the true reason/s
Richard Stallman's Talk, Scheduled for Two Days Ago, Was Not Canceled But Really Delayed
American in Paris
3 More Weeks for Daniel Pocock's Campaign to Win a Seat in European Parliament Elections
Friday 3 weeks from now is polling day
Microsoft Should Have Been Fined and Sanctioned Over UEFI 'Lockout' (Locking GNU/Linux Out of New PCs)
Why did that not happen?
Gemini Links 16/05/2024: Microsoft Masks Layoffs With Return-to-office (RTO) Mandates, Cash Issues
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, May 16, 2024
IRC logs for Thursday, May 16, 2024
Ex-Red Hat CEO Paul Cormier Did Not Retire, He Just Left IBM/Red Hat a Month Ago (Ahead of Layoff Speculations)
Rather than retire he took a similar position at another company
Linux.com Made Its First 'Article' in Over and Month, It Was 10 Words in Total, and It's Not About Linux
play some 'webapp' and maybe get some digital 'certificate' for a meme like 'clown computing'
[Meme] Never Appease the Occupiers
Freedom requires truth. Free speech emancipates.
Thorny Issues, Violent Response
They say protests (or strikes) that do not disrupt anything are simply not effective. The same can be said about reporting.
GNU/Linux in Malaysia: From 0.2 Percent to 6+ Percent
That's like 30-fold increase in relative share
Liberty in Liberia? Windows Falls Below 10% and Below iOS
This is clearly a problem for Microsoft
Techrights Congratulates Raspberry Pi (With Caution and Reservations)
Raspberry Pi will "make or break" based on the decisions made in its boardroom
OSI Makes a Killing for Bill Gates and Microsoft (Plagiarism and GPL Violations Whitewashed and Openwashed)
meme and more
The FSF Ought to Protest Against UEFI 'Secure Boot' (Like It Used To)
libreplanet-discuss stuff
People Who Defend Richard Stallman's Right to Deliver Talks About His Work Are Subjected to Online Abuse and Censorship
Stallman video removed
GNU/Linux Grows in Denmark, But Much of That is ChromeOS, Which Means No Freedom
Google never designs operating systems with freedom in mind
Links 16/05/2024: Vehicles Lasting Fewer Years, Habitat Fragmentation Concerns
Links for the day
GNU/Linux Reaches 6.5% in Canada (Including ChromeOS), Based on statCounter
Not many news sites are left to cover this, let alone advocate for GNU/Linux
Links 16/05/2024: Orangutans as Political Props, VMware Calls Proprietary 'Free'
Links for the day
The Only Thing the So-called 'Hey Hi Revolution' Gave Microsoft is More Debt
Microsoft bailouts
TechTarget (and Computer Weekly et al): We Target 'Audiences' to Sell Your Products (Using Fake Articles and Surveillance)
It is a deeply rogue industry that's killing legitimate journalism by drowning out the signal (real journalism) with sponsored fodder
FUD Alert: 2024 is Not 2011 and Ebury is Not "Linux"
We've seen Microsofers (actual Microsoft employees) putting in a lot of effort to shift the heat to Linux
Links 15/05/2024: XBox Trouble, Slovakia PM Shot 5 Times
Links for the day
Windows in Times of Conflict
In pictures
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, May 15, 2024
IRC logs for Wednesday, May 15, 2024