The New Zealand Herald

Security flaw alleged in Census website

- Juha Saarinen

Despite official assurances that New Zealanders’ sensitive personal informatio­n given to the mandatory Census 2018 is safe and secure, researcher­s say they have found a critical flaw in how Statistics NZ set up its website.

This not a data breach, University of Melbourne IT security researcher­s and cryptograp­hers Drs Vanessa Teague and Chris Culnane told the Herald. There is no suggestion there was unauthoris­ed access to the Census 2018 data, they said.

The issue stems from Stats NZ using a third-party provider, Incapsula, to act as a protective gateway into its network and servers. Incapsula protects other government servers and networks too, such as those belonging to the Government Communicat­ions Security Bureau.

Teague and Culnane say that when NZers filled out the Census online, it looked like they were connected to the Stats NZ servers, when they were not.

Instead, people connected to the Incapsula gateway, which a network trace showed is hosted in a data centre in Albany.

Connection­s to Incapsula are done securely through the open standard Transport Layer Security protocol that identifies the server people’s computers connect to, and sets up encryption of the data transmitte­d over the internet. Incapsula operates a TLS proxy, a network device that terminates the connection before it reaches the Stats NZ server, and decrypts the received traffic.

It is done to inspect the traffic so as to remove malicious content such as bots and denial of service attacks.

Once that’s done, Incapsula passes on the legitimate traffic to Stats NZ’s Census responses collection server.

However, to inspect the traffic, Incapsula decrypts it and the United States-based company is able to see New Zealanders’ Census question responses, Teague and Culnane pointed out. Privacy and lack of transparen­cy are at play here.

“The TLS Proxy sees everything that is sent to Stats NZ, and so it has to be fully trusted to keep the data it sees both secure and private,” they said. “It gives the false impression that data cannot be read whilst being transmitte­d to Stats NZ; that data cannot be decrypted by anyone other than Stats NZ; and that the user can be certain they are communicat­ing with Stats NZ,” they added.

“Any organisati­on like Stats NZ has a responsibi­lity to provide accurate and sufficient informatio­n about their security so the public can make an informed decision about how they want to interact with government online,” Teague and Culnane said.

Stats NZ chief digital officer, Chris Buxton, confirmed the agency uses Incapsula for the Census.

“Given the national scale of the Census and the experience of our colleagues in Australia during their Census in 2016, Stats NZ made the decision to work with an all-ofgovernme­nt approved supplier that could work at a global scale to block DDOS attacks on the census systems,” he said.

Incapsula was not named by Stats NZ, and referred to as “a global web security system” and the provider’s ability to decrypt and read the data is not mentioned either.

Incapsula’s TLS proxy decrypts all the data sent to it for the Census, as it is required to examine and stop any

Google chief executive officer Sundar Pichai is about to have a very big week. Today, an award of 353,939 restricted shares he received before a promotion in 2014 will vest. At the end of last week, the grant was worth about US$380 million ($534m), making it one of the largest single payouts to a public company executive in recent years. Pichai, 45, who has led Alphabet’s Google since 2015, received the shares before his promotion to senior vice president of products a year earlier. The award swelled in value as Alphabet’s stock surged 90 per cent since the grant date, compared with a 39 per cent advance of the S&P 500.

malicious content that an attacker might try to use to compromise Stats NZ systems, Buxton said.

Adding to the researcher­s’ concerns, Stats NZ’s digital key that is required to decrypt the data sent over TLS secured connection­s is now distribute­d across Incapsula’s global network, Teague and Culnane said.

“Our non-exhaustive search found that servers in Australia, the US, as well as New Zealand, all had the Stats NZ key,” they added.

Digital TLS keys are supposed to be protected and should only be kept on the servers that they relate to, the researcher­s said.

If keys are leaked, attackers could use them to impersonat­e Stats NZ servers.

Buxton said that Incapsula can be trusted to hold the digital credential­s to unlock the data.

“Incapsula is a government approved, global security provider, trusted to hold and protect the census private TLS key, and use it for the agreed purpose of ensuring that Census data was protected from malicious attack,” he added. .

As for the keys being stored on servers overseas, Buxton said most of the Census data traffic was contained in New Zealand and Australia.

In some cases, households would use virtual private networking tunnels via other countries, and their data would have been routed to the closest server to them, he added.

“It was important that our security protection worked at global scale, so that we were able to defend attacks at the point where they originated without compromisi­ng our New Zealand internet systems. Having servers in these locations provided this defence,” Buxton said.

The researcher­s labelled the practice of allowing the keys to be stored on servers outside of New Zealand jurisdicti­on as a “clear security flaw”. They warned the credential­s could be used to intercept any encrypted traffic intended for Stats NZ.

Teague and Culnane have reported the flaw to Stats NZ and told the Herald “they acknowledg­ed what we said and appeared to understand the problem.”

Buxton said the system for the Census was set up to mitigate a range of risks, including ransomware, malware and DDOS attacks.

 ?? Picture / Bloomberg ??
Picture / Bloomberg
 ??  ??

Newspapers in English

Newspapers from New Zealand