F-Type ( X152 ) 2014 - Onwards
Sponsored by:
Sponsored by:

Security issue with InControl Remote?

Thread Tools
 
Search this Thread
 
  #1  
Old 02-15-2017, 10:47 PM
Misujerr's Avatar
Senior Member
Thread Starter
Join Date: Feb 2017
Location: SF Bay Area, CA
Posts: 915
Received 100 Likes on 78 Posts
Default Security issue with InControl Remote?

Hey,
Just thinking here... What if someone were able to gain access to a phone with the InContol Remote app (mine does have a passcode lock, but let just say...) Conceivably they could unlock, then start using the remote climate, and then... drive off??
 
  #2  
Old 02-15-2017, 11:55 PM
WhiteTardis's Avatar
Senior Member
Join Date: Feb 2015
Posts: 979
Received 400 Likes on 211 Posts
Default

To activate remote start you would need a PIN. Car will also shutoff if the smart key is not detected once inside the vehicle as well.
 
The following users liked this post:
Misujerr (02-16-2017)
  #3  
Old 02-16-2017, 02:21 AM
Misujerr's Avatar
Senior Member
Thread Starter
Join Date: Feb 2017
Location: SF Bay Area, CA
Posts: 915
Received 100 Likes on 78 Posts
Default

Great, thanks!
 
  #4  
Old 02-16-2017, 08:27 AM
jbajor's Avatar
Senior Member
Join Date: Sep 2016
Location: Palo Alto, CA
Posts: 199
Received 45 Likes on 35 Posts
Default

It also will not let you start it with the remote unless it is locked
 
  #5  
Old 02-16-2017, 08:45 AM
LobsterClaws's Avatar
Senior Member
Join Date: Feb 2015
Location: Atlanta
Posts: 928
Received 218 Likes on 160 Posts
Default

In most cases it's also far easier to steal someone's keys than it is to steal their phone and unlock it. While there are exploits that exist for all of the various phone OS, the need to unlock the phone provides a (limited) degree of 2-factor authentication.

Assuming you use a good passcode of course.

When you add in the need for a special PIN that's certainly a reasonable level of security.
 
  #6  
Old 02-16-2017, 10:26 AM
SinF's Avatar
Veteran Member
Join Date: Mar 2016
Location: Canada, eh
Posts: 6,987
Received 2,141 Likes on 1,461 Posts
Default

I would argue that InControl Remote is insecure "at any speed" and would recommend people concerned with security and privacy to not activate this service.

There are many potential ways to attack (often referred as attack surfaces) InControl Remote aside from ones resulting from a compromise or theft of a smartphone. To better explain this, I will outline below how it is likely operates.

Your app sends requests over public internet to a remote JLR server. JLR server authenticates your request and transmits unlock codes over public internet to your car. These connections must incorporate both strong encryption, replay counter-measures, and robust authentication of all end points. It is possible that an implementation flaw would allow replay attacks (your unlock message stored and used later), tampering and substitution attacks (someone else's unlock message redirected to your car), or impersonation (someone pretending to be JLR server sending your car unlock codes or someone pretending to be you sending JLR server a request to unlock). It is possible that a smartphone, JLR server, or even your car will get compromised directly, where attackers could subvert protection and checking mechanisms. This could be data containing necessary credentials to impersonate, or data containing cryptographic secrets allowing attackers to decode and tamper with messages, including past messages that were recorded and stored.

InfoSec is what I do for living, well enough to afford an F-type. In my opinion, without analyzing (thanks DMCA!) actual application in question, an automotive company has a snowball chance in hell to get all of this right. There are just so many nuances and pitfalls that even IT companies often fail. JLR, without core competencies in IT security, would not, could not, will not be able to design a secure system. This is just like asking a roofer to also do plumbing in your house.

You probably heard of Chrysler fiasco, where security researchers managed to remotely take over a Jeep, including climate controls, emergency braking, gear selection, throttle application and so on. There is no reason to expect JLR to do any better. There is no reason to expect that unlocking your car is the only possible remotely activated feature.

If you are using InControl, the only reason you are still in control is because nobody bothered to hack it or subpoena JLR.
 

Last edited by SinF; 02-16-2017 at 10:59 AM.
  #7  
Old 02-16-2017, 11:29 AM
lsbrodsky's Avatar
Senior Member
Join Date: Jan 2016
Location: New Bern, NC
Posts: 586
Received 106 Likes on 81 Posts
Default

So what? People could steal your car before technology and they can still steal your car. If you are really worried about it, you should just leave your car in a very securely locked garage.

Larry
 
  #8  
Old 02-16-2017, 12:17 PM
LobsterClaws's Avatar
Senior Member
Join Date: Feb 2015
Location: Atlanta
Posts: 928
Received 218 Likes on 160 Posts
Default

Originally Posted by SinF
I would argue that InControl Remote is insecure "at any speed" and would recommend people concerned with security and privacy to not activate this service.

There are many potential ways to attack (often referred as attack surfaces) InControl Remote aside from ones resulting from a compromise or theft of a smartphone. To better explain this, I will outline below how it is likely operates.

Your app sends requests over public internet to a remote JLR server. JLR server authenticates your request and transmits unlock codes over public internet to your car. These connections must incorporate both strong encryption, replay counter-measures, and robust authentication of all end points. It is possible that an implementation flaw would allow replay attacks (your unlock message stored and used later), tampering and substitution attacks (someone else's unlock message redirected to your car), or impersonation (someone pretending to be JLR server sending your car unlock codes or someone pretending to be you sending JLR server a request to unlock). It is possible that a smartphone, JLR server, or even your car will get compromised directly, where attackers could subvert protection and checking mechanisms. This could be data containing necessary credentials to impersonate, or data containing cryptographic secrets allowing attackers to decode and tamper with messages, including past messages that were recorded and stored.

InfoSec is what I do for living, well enough to afford an F-type. In my opinion, without analyzing (thanks DMCA!) actual application in question, an automotive company has a snowball chance in hell to get all of this right. There are just so many nuances and pitfalls that even IT companies often fail. JLR, without core competencies in IT security, would not, could not, will not be able to design a secure system. This is just like asking a roofer to also do plumbing in your house.

You probably heard of Chrysler fiasco, where security researchers managed to remotely take over a Jeep, including climate controls, emergency braking, gear selection, throttle application and so on. There is no reason to expect JLR to do any better. There is no reason to expect that unlocking your car is the only possible remotely activated feature.

If you are using InControl, the only reason you are still in control is because nobody bothered to hack it or subpoena JLR.
SinF, everything you said is correct. The question is one of threat model. I don't think anyone is going to bother hacking this system, even if it were trivial (which I agree it likely is at some juncture). The effort:reward ratio isn't there.

If this system were to say.. unlock my office.. hell no. To unlock my car *shrug*.
 
The following users liked this post:
Misujerr (02-16-2017)
  #9  
Old 02-16-2017, 12:34 PM
SinF's Avatar
Veteran Member
Join Date: Mar 2016
Location: Canada, eh
Posts: 6,987
Received 2,141 Likes on 1,461 Posts
Default

LobsterClaws, here are couple threat models to stimulate your imagination:

A. Pay 10BC to this address to stop continuous door lock cycling

B. Pay us 100BC or we will mail your wife google earth picture corresponding to GPS coordinates of where your car was parked every Thursday night when you were supposedly working late.

C. Exhibit A: Your honor, the unlock request sent to LobsterClaw's F-type parked 0.5 miles from the crime scene from his phone, as corroborated by cell tower triangulation place him at the crime scene at the exact time of the event.

D. Screw 1%s! $ sh ~/JLRpwnscript.sh
 
  #10  
Old 02-16-2017, 12:59 PM
LobsterClaws's Avatar
Senior Member
Join Date: Feb 2015
Location: Atlanta
Posts: 928
Received 218 Likes on 160 Posts
Default

Originally Posted by SinF
LobsterClaws, here are couple threat models to stimulate your imagination:

A. Pay 10BC to this address to stop continuous door lock cycling

B. Pay us 100BC or we will mail your wife google earth picture corresponding to GPS coordinates of where your car was parked every Thursday night when you were supposedly working late.

C. Exhibit A: Your honor, the unlock request sent to LobsterClaw's F-type parked 0.5 miles from the crime scene from his phone, as corroborated by cell tower triangulation place him at the crime scene at the exact time of the event.

D. Screw 1%s! $ sh ~/JLRpwnscript.sh
B and C imply that I'm a LOT more interesting than I am.

A and D I'll grant you seem like reasonable concerns. As with many things it's a tradeoff between convenience and security. I think a reasonable person could look at those threats and choose to proceed anyway.
 
  #11  
Old 02-16-2017, 02:10 PM
malbec's Avatar
Senior Member
Join Date: Dec 2009
Location: SW England
Posts: 809
Received 297 Likes on 165 Posts
Default

Presumably, whether you as an owner use Remote or not, someone ( at Jaguar?) can use it and track the car anyway. The car has the equivalent of a phone SIM card installed and can be contacted at anytime. At least it does in the UK for the first 3 years.
Edit
And who knows? After the 3 year warranty, if you don't renew Remote it's not to say that it's still active to Jaguar.
 

Last edited by malbec; 02-16-2017 at 02:26 PM.
  #12  
Old 02-16-2017, 03:41 PM
Tel's Avatar
Tel
Tel is offline
Senior Member
Join Date: Oct 2014
Location: South Coast - UK
Posts: 876
Received 233 Likes on 143 Posts
Default

Originally Posted by SinF

....or we will mail your wife google earth picture corresponding to GPS coordinates of where your car was parked every Thursday night when you were supposedly working late.

Holy crap SinF, youhave hacked my system log!



I am still trying to locate the SIM card on the car, so that I can drive anonymously! No one 'apparently' knows of its whereabouts?
 

Last edited by Tel; 02-16-2017 at 03:56 PM.
  #13  
Old 02-16-2017, 08:06 PM
Misujerr's Avatar
Senior Member
Thread Starter
Join Date: Feb 2017
Location: SF Bay Area, CA
Posts: 915
Received 100 Likes on 78 Posts
Default

Yikes, SinF, now I'm reeeally freeked out
And you also touched on something else too, in that once that barn door is open, ain't no closing it again. i.e. once we have signed up & logged in, even if we pull the plug, they still have that data and still track us down, right? Even if you don't sign up for Remote, if you sign up for roadside assistance & SOS, they can still track you down, it's what they do...
What can be done to protect ourselves? I'm not worried about my car showing up at an "indiscreet" place, I'm more worried about the "black box" aspect, where they could tell how fast you were going, if you were on a racetrack and your insurance didn't cover it, etc..

Thanks for your input, I appreciate it.
 
  #14  
Old 02-16-2017, 09:38 PM
SinF's Avatar
Veteran Member
Join Date: Mar 2016
Location: Canada, eh
Posts: 6,987
Received 2,141 Likes on 1,461 Posts
Default

Local logging is done via something called EDR (event data recorder). Remote connection is done via cell modem + sim card (just like your smartphone). You need to find hardware for both and disconnect/disable it. Chances are, EDR couldn't be practically disabled, however if you find cell modem you could disconnect antenna to 'soft' disable it.
 

Last edited by SinF; 02-16-2017 at 09:43 PM.
The following users liked this post:
Misujerr (02-17-2017)
  #15  
Old 02-16-2017, 10:40 PM
stmcknig's Avatar
Veteran Member
Join Date: Mar 2013
Location: Austin TX
Posts: 1,219
Received 283 Likes on 214 Posts
Default

As some have said, it's a risk vs. reward call. I like the functionality - it came in particularly useful to tell my dealer that I noticed my car had been locked alarmed and idle for three days waiting to get worked on...
 
The following users liked this post:
Misujerr (02-17-2017)
  #16  
Old 02-17-2017, 09:22 AM
Unhingd's Avatar
Veteran Member
Join Date: Dec 2014
Location: Maryland, US
Posts: 16,939
Received 4,664 Likes on 3,369 Posts
Default

Face it! 1984 arrived 33 years ago. Get over it!
 
  #17  
Old 02-17-2017, 07:37 PM
SinF's Avatar
Veteran Member
Join Date: Mar 2016
Location: Canada, eh
Posts: 6,987
Received 2,141 Likes on 1,461 Posts
The following users liked this post:
Misujerr (02-19-2017)
  #18  
Old 02-17-2017, 08:06 PM
lizzardo's Avatar
Veteran Member
Join Date: May 2015
Location: Northern California
Posts: 3,440
Received 992 Likes on 742 Posts
Default

Originally Posted by SinF

C. Exhibit A: Your honor, the unlock request sent to LobsterClaw's F-type parked 0.5 miles from the crime scene from his phone, as corroborated by cell tower triangulation place him at the crime scene at the exact time of the event.
Geolocation isn't quite that simple, and there would need to be some extra shenanigans to spoof the cell carriers. Not saying it's not possible, but when cell carriers get spoofed it costs them money. They don't like that.

Nit-picking aside, your contention that we should be really aware of security vulnerabilities is spot on.
 
The following users liked this post:
Misujerr (02-21-2017)
  #19  
Old 04-25-2017, 03:14 PM
SinF's Avatar
Veteran Member
Join Date: Mar 2016
Location: Canada, eh
Posts: 6,987
Received 2,141 Likes on 1,461 Posts
Default

Hyundai app hacked. Allows remote start and unlock. There is no reason to expect JLR InControl to be any more secure than this.
 
  #20  
Old 04-25-2017, 03:48 PM
lizzardo's Avatar
Veteran Member
Join Date: May 2015
Location: Northern California
Posts: 3,440
Received 992 Likes on 742 Posts
Default

Originally Posted by SinF
Hyundai app hacked. Allows remote start and unlock. There is no reason to expect JLR InControl to be any more secure than this.
It notes that the vulnerability in question requires the hacker to be near the vehicle while the owner accesses the app via unsecured wifi. If you're not even bothering to secure your wifi, maybe you need a little wake up call.
 



All times are GMT -5. The time now is 10:11 AM.