Voting Device Manufacturer Encourages Users To Use (And Re-Use) Easily-Guessed Passwords
from the thanks-for-the-tips,-sparky dept
As Election Day 2K18 rolls on, the good news continues to roll in, he said in his most Professor Farnsworth voice. It's never good news, not if we're talking voting machine security. Kim Zetter, writing for Motherboard, has obtained a manual for devices made by Unisyn Voting Solutions, which provides horrendous security advice for users of its products.
There are federal guidelines for voting systems. The Elections Assistance Committee makes the following recommendations for passwords:
[E]lection officials are encouraged to change passwords after every election. Passwords should also have the following characteristics: they should be at least six characters, preferably eight, and include at least one uppercase letter, a lowercase letter, at least one number and a symbol. It also says, though, that passwords should be easy to remember so that employees won't need to write them down, "yet sufficiently vague that they cannot be easily guessed."
Unisyn has apparently decided minimal security efforts are badly in need of disruption. To begin with, the device manual suggests users should simply use variations of the default password the devices ship with. That password is the company's name with a "1" appended to the end of it. This easily-guessed admin password should then be immediately replaced with… an easily-guessed password.
Once logged into the system the credentials needed to access the tabulation monitor or the system for creating reports of ballots and vote tallies are different. The username is again a simple word to log in. The password is the same word with "1" appended to it. Users are told that to change the password when prompted, they should simply change the number sequentially to 2, 3, 4, etc.
The Unisyn manual takes the EAC guidelines and throws them out. It then makes a minimal nod towards compliance before throwing everything out a second time. Remember the part about not writing down passwords? The sort of thing no one should do because it defeats the purpose of password security? Here's Unisyn's scorching hot take on EAC compliance:
"You will be periodically asked to change your password per EAC regulations," [the manual] notes. But instead of providing customers with sound instructions for changing passwords—such as creating completely new passwords and not re-using them—the manual instructs them to simply alternate between a system administrator and a root password each time they are prompted to change the password. Space is provided below this instruction for election workers to write down which password they are using at any given time.
If there's good news, it's that these machines aren't in use everywhere. Just 3,500+ jurisdictions in ten states. They're also fairly insulated from online attacks, since they're not supposed to be connected to the internet. This means attackers will most likely need physical access to the devices. Good thing these only get touched by non-election personnel every couple of years or so!
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: election security, passwords, voting, voting machines
Companies: unisyn voting solutions
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
the super-secret 31337 p@ssw0rd
password: Росси́я
Have fun! ;)
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Well....
Verizon uses that for new DSL accounts on installation. Most people never change it.
I remember when you could get su access on most mainframes with the password "god" or "sex" as well.
We're creatures of habit.
[ link to this | view in chronology ]
Re: Well....
Well it's also been beaten into our heads for 2 decades to follow bad password policies.
Many of the official recommendations Tim posted encourage bad password hygiene that will make you more vulnerable to getting hacked.
Forcing a mix of upper/lower case letters, a number, and a symbol? Check.
Telling people 8 characters is good enough (even worse, they say 6 is allowed!)
Frequent password changes (yes if someone leaves who was working it this can be necessary, but otherwise no it's not)
This XKCD comic explains a lot of why these those recommendations are bad
[ link to this | view in chronology ]
Re: Re: Well....
Especially the number and symbol usage. Not things most people can type "normally", forcing hand movements easily visible to everyone else in an office.
And usually hunt & pecked, so anyone behind you now knows your password.
The ONE thing that would help generate long, difficult to crack passwords is forbidden in most cases - using SPACES.
Passphrases are much more difficult to crack.
[ link to this | view in chronology ]
Re: Re: Re: Well....
Its hard to read but easy to remember.
[ link to this | view in chronology ]
Re: Re: Re: Re: Well....
[ link to this | view in chronology ]
Re: Re: Re: Re: Well....
If you use "any moose cow word" as your passphrase, you'll find yourself hitting the space bar trying to type anymoosecowword in a non-display box.
Like I said, we're creatures of habit.
[ link to this | view in chronology ]
Can They Manage Confidential Documents?
Surely Government employees have some experience with managing confidential documents and keeping them safe. Lists of passwords would come under that category, would they not?
[ link to this | view in chronology ]
Our first day, we had to go through a "security" tutorial that, among other things, advised that we satisfy the "mixed-case and at least one symbol" requirement by using an initial capital letter and putting an exclamation point at the end.
I e-mailed the security team to explain to them why this is bad advice ("a six-character password that begins with a capital letter and ends with an exclamation point is exactly as secure as a five-character all-lowercase password"). Unsurprisingly, I never heard back.
[ link to this | view in chronology ]
Godad! ODadd! Daddy! ????
[ link to this | view in chronology ]
Hmmmm I wonder...
I heard of a (non-voting) system one time that did that, it really cuts down on service calls arising from "forgotten" passwords.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Passwords
Password: H1N1.... to be replaced by the influenza of the day
Gesundheit
[ link to this | view in chronology ]
Servo motor manufacturers in India
http://www.compageautomation.com/bldc-motors.html BLDC MOTOR READILY AVAILABLE IN INDIA WITH EUROPEAN TECHNOLOGY FOR E-RICKSHAW & E- VEHICLES
[ link to this | view in chronology ]