[93attendees] Timely article in Wired - Hackers Remotely Kill a Jeep on the Highway—With Me in It
Dan York <york@isoc.org> Tue, 21 July 2015 14:18 UTC
Return-Path: <york@isoc.org>
X-Original-To: 93attendees@ietfa.amsl.com
Delivered-To: 93attendees@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 274C41A8852
for <93attendees@ietfa.amsl.com>; Tue, 21 Jul 2015 07:18:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.298
X-Spam-Level:
X-Spam-Status: No, score=0.298 tagged_above=-999 required=5
tests=[BAYES_40=-0.001, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3,
RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001]
autolearn=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 8yElYRTcePzw for <93attendees@ietfa.amsl.com>;
Tue, 21 Jul 2015 07:17:57 -0700 (PDT)
Received: from na01-bl2-obe.outbound.protection.outlook.com
(mail-bl2on0090.outbound.protection.outlook.com [65.55.169.90])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 8F3E31A1A8D
for <93attendees@ietf.org>; Tue, 21 Jul 2015 07:17:56 -0700 (PDT)
Received: from CY1PR0601MB1657.namprd06.prod.outlook.com (10.163.232.19) by
CY1PR0601MB1657.namprd06.prod.outlook.com (10.163.232.19) with Microsoft SMTP
Server (TLS) id 15.1.219.17; Tue, 21 Jul 2015 14:17:54 +0000
Received: from CY1PR0601MB1657.namprd06.prod.outlook.com ([10.163.232.19]) by
CY1PR0601MB1657.namprd06.prod.outlook.com ([10.163.232.19]) with
mapi id 15.01.0219.018; Tue, 21 Jul 2015 14:17:54 +0000
From: Dan York <york@isoc.org>
To: "93attendees@ietf.org" <93attendees@ietf.org>
Thread-Topic: =?utf-8?B?VGltZWx5IGFydGljbGUgaW4gV2lyZWQgLSBIYWNrZXJzIFJlbW90ZWx5IEtp?=
=?utf-8?B?bGwgYSBKZWVwIG9uIHRoZSBIaWdod2F54oCUV2l0aCBNZSBpbiBJdA==?=
Thread-Index: AQHQw8AI6N0CyghWJEGW2/hiEdf+Kw==
Date: Tue, 21 Jul 2015 14:17:54 +0000
Message-ID: <75C7581F-A7A6-4B97-B2D9-F3AFFF1BE701@isoc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [31.133.169.84]
x-microsoft-exchange-diagnostics: 1; CY1PR0601MB1657;
5:Ll9fVl1ZTNHLVwt2Nrmy4JRGB+ugsjX91o4kWyU8/e5/u2b5Szfvi4wTyxqZStf6kikTFbx4OS0m0PAJQNLMgqP110IZkwp6U5PeS1U3mN15RKY8biiyFl8C/VVH68qhuLneUNc0k5Ll3l20NccD5w==;
24:GQzHOQLXEm3CTa+tSAwTcP3JDEgOraJTgUTzFPshz8DWsO1mYR+O6hlKaKMOWAXuk8cp2LDzFTSLYvEnw7zP7JK4xr7cWqwMdPK3ryr9deM=;
20:nI2+4T1b5QZ9mM11GgQnOfOMT9dFNxU0V2cDqvcd1B5o/ylqGyj3OHsMD+f23JAiT1yVPUJp5ezf9BZJU+s1hg==
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR0601MB1657;
cy1pr0601mb1657: X-MS-Exchange-Organization-RulesExecuted
x-microsoft-antispam-prvs: <CY1PR0601MB1657BEDD612C6EE074FE4088B7840@CY1PR0601MB1657.namprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0;
RULEID:(601004)(5005006)(3002001); SRVR:CY1PR0601MB1657; BCL:0; PCL:0; RULEID:;
SRVR:CY1PR0601MB1657;
x-forefront-prvs: 0644578634
x-forefront-antispam-report: SFV:NSPM;
SFS:(10009020)(23363002)(106116001)(99286002)(229853001)(66066001)(82746002)(5002640100001)(36756003)(83716003)(19617315012)(33656002)(87936001)(50986999)(54356999)(86362001)(2656002)(2351001)(189998001)(46102003)(62966003)(77156002)(92566002)(110136002)(122556002)(107886002)(450100001)(40100003)(102836002)(2501003)(77096005)(2900100001)(15975445007)(16236675004)(19580395003)(5001960100002)(104396002);
DIR:OUT; SFP:1101; SCL:1; SRVR:CY1PR0601MB1657;
H:CY1PR0601MB1657.namprd06.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
Content-Type: multipart/alternative;
boundary="_000_75C7581FA7A64B97B2D9F3AFFF1BE701isocorg_"
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Jul 2015 14:17:54.1537 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 89f84dfb-7285-4810-bc4d-8b9b5794554f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0601MB1657
Archived-At: <http://mailarchive.ietf.org/arch/msg/93attendees/P8FZHQjjtVcdUtAx7ORwzU0TuWA>
Subject: [93attendees] =?utf-8?q?Timely_article_in_Wired_-_Hackers_Remotel?=
=?utf-8?q?y_Kill_a_Jeep_on_the_Highway=E2=80=94With_Me_in_It?=
X-BeenThere: 93attendees@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Mailing list of IETF 93 attendees that have opted in on this list. "
<93attendees.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/93attendees>,
<mailto:93attendees-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/93attendees/>
List-Post: <mailto:93attendees@ietf.org>
List-Help: <mailto:93attendees-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/93attendees>,
<mailto:93attendees-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jul 2015 14:18:03 -0000
Given the topic of this morning's technical plenary, I thought it was an interesting bit of synchronicity that this article appeared on Wired today: Hackers Remotely Kill a Jeep on the Highway—With Me in It http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ ... and the article references legislation that will apparently be introduced in the US Congress today: "WIRED has learned that senators Ed Markey and Richard Blumenthal plan to introduce an automotive security bill today to set new digital security standards for cars and trucks". The security researchers are apparently going to be releasing more information about their work and the vulnerabilities they found at Black Hat in Las Vegas next month. The article indicates they have been working with Chrysler for some months to get fixes available, although it sounds like getting the fix applied to vehicles involves a manual step and so many may remain unpatched. The attackers were able to access and manipulate the Jeep over the cellular network from their home by virtue of knowing the car's IP address. (Exact mechanism of the attack to be disclosed next month.) Once connected they were able to rewrite firmware and make various modifications to the vehicle's actions. As our speakers discussed this morning in the plenary, there are a wide range of security issues that need to be addressed, particularly as these wired-up cars are connected to the global Internet. Dan P.S. Threads are naturally active on HN and Reddit: https://news.ycombinator.com/item?id=9921557 https://www.reddit.com/r/technology/comments/3e23ge/hackers_remotely_kill_a_jeep_on_the_highway/
- [93attendees] Timely article in Wired - Hackers R… Dan York
- Re: [93attendees] Timely article in Wired - Hacke… Chris Morrow
- Re: [93attendees] Timely article in Wired - Hacke… Alexandre PETRESCU