"Security" systems that run on windows are amazingly bad. It's as if
they're coded by the same people who write embedded industrial
control/automation software. No I don't want to install a 3 year old Sun
JRE to run your software. Here's a great writeup on "why we have stuxnet":

http://www.metzdowd.com/pipermail/cryptography/2016-March/028762.html

I usually do embedded cross-development under Linux, typically with some
hacked-up ancient version of gcc and obtuse command-line utilities that fail
with cryptic error messages until you've spent several hours hacking around
with them.  This time though I had to use Windows because getting the drivers
going under Linux just wasn't working.  So I go to the web site of the $20B
global hardware vendor that makes this stuff and download their SDK tools.

  "We've detected that you've got A/V running.  You should disable this in
  order to run our tools.  Are you sure you want to continue?".

Yeah, I'm not doing that, so I click continue.

  "I said, WE'VE DETECTED THAT YOU'VE GOT A/V RUNNING AND YOU REALLY NEED TO
  DISABLE IT.  Waiting for A/V to be disabled".

OK, so I'll disable A/V.  At which point Windows goes to about Defcon 2 and
starts screaming about the imminent collapse of civilisation, but I don't have
any choice.

So the install starts, except it won't install in $Program_Files because that
has, you know, security applied to it.  It wants to create its own public
directory off $SystemRoot and install to that.

OK, so I'll allow it to do that.

Now Windows Firewall is throwing up warnings about tclsh groping around on the
Internet (they install a complete Cygwin environment, presumably because their
Windows SDK is all scripted in Tcl).  So I allow that, and various other
things that I get warnings about.

It then proceeds to download and install a 2-year-old version of Java, which
apparently is needed by their SDK.

After that, it reaches out to about a hundred-odd HTTP URLs, downloads binary
blobs from them, and installs them.  I tried setting up a tunnel to an HTTPS
equivalent but it only does HTTP.

Finally, it's finished.  The app starts up and requests elevation to
Administrator.  Then it starts grabbing more binary blobs from HTTP URLs and
installing them.

All that was just from watching what was happening, I didn't do any further
checking to see what other horrors lurked beneath the surface, but given what
I'd seen so far it was bound to be pretty bad.

I think we need to treat any embedded device developed via this vendor as pre-
compromised.  And that includes the aerospace and military ones.

Peter.





On Mon, Mar 28, 2016 at 3:52 PM, Josh Reynolds <j...@kyneticwifi.com> wrote:

> I'm dying here. Every single system I can find is shit or costs an arm
> and a leg, to the point where I'm considering starting a company to
> make a better system. I just need an embedded, web based, IP access
> control system. It needs to be able to control the individual door
> access controllers to electronic striker or maglock to the keypad. POE
> here is best. If it requires software running on a windows PC then I
> don't want anything to do with it, even for those of you who are like
> "put it in a vm"... no. Those resources are reserved for properly
> functioning operation systems (and LXC containers!).
>
> I've got 3 doors at one location, then 2 more doors at 2 other locations.
>
> If it has a mobile app, that's even better.
>
> I've installed a couple of HID Global and DoorKing systems in the past
> and nothing about this is hard, but the chinese systems are only made
> for a single location.
>
> Any suggestions?
>

Reply via email to