on the security of security extensions for ip based knx
play

On the security of security extensions for IP-based KNX networks - PowerPoint PPT Presentation

On the security of security extensions for IP-based KNX networks Aljosha Judmayer ajudmayer@sba-research.org ajudmayer@auto.tuwien.ac.at On the security of security extensions for IP-based KNX networks 1 SBA Research P1.1: Risk Management


  1. On the security of security extensions for IP-based KNX networks Aljosha Judmayer ajudmayer@sba-research.org ajudmayer@auto.tuwien.ac.at On the security of security extensions for IP-based KNX networks 1

  2. SBA Research P1.1: Risk Management and Analysis Area 1 (GRC): P1.2: Secure BP Modeling, Simulation and Verifjcation Governance, Risk P1.3: Computer Security Incident Response T eam and Compliance P1.4: Awareness and E-Learning Area 2 (DSP): P2.1: Privacy Enhancing T echnologies Data Security and P2.2: Enterprise Rights Management P2.3: Digital Preservation Privacy Area 3 (SCA): P3.1: Malware Detection and Botnet Economics Secure Coding and P3.2: Systems and Software Security Code Analysis P3.3: Digital Forensics P4.1: Hardware Security and Difgerential Fault Area 4 (HNS): Analysis Hardware and P4.2: Pervasive Computing Network Security P4.3: Network Security of the Future Internet

  3. TU Vienna ● Thesis @ automation systems group => ● Paper @ 10th IEEE Workshop on Factory Communication Systems (WFCS), 2014 – Lukas Krammer (lkrammer@auto.tuwien.ac.at) – Wolfgang Kastner (k@auto.tuwien.ac.at) On the security of security extensions for IP-based KNX networks 3

  4. What the h3ck is KNX? On the security of security extensions for IP-based KNX networks 4

  5. What the h3ck is KNX? KNX is a standard for home and building automation ● K o N ne X Association pool of companies ● publish KNX Systems specification – Develop the ETS (Engineering Tool Software) – On the security of security extensions for IP-based KNX networks 5

  6. What the h3ck is KNX? KNX is a standard for home and building automation ● K o N ne X Association pool of companies ● publish KNX Systems specification (first version 2002) – Develop the ETS (Engineering Tool Software) – Ensuring the interoperability between products , applications and ● systems Different physical layers e.g. : ● Twisted pair cable (TP1) – Ethernet (IP) – ● called KNXnet/IP On the security of security extensions for IP-based KNX networks 6

  7. Building Automation Systems (BAS) ● Goal: “ intelligent buildings ” ● Old and busted: – heating, ventilation and air conditioning (HVAC) – BUS networks On the security of security extensions for IP-based KNX networks 7

  8. Building Automation Systems (BAS) ● Goal: “ intelligent buildings ” ● Old and busted: – heating, ventilation and air conditioning (HVAC) – BUS networks ● New hotness: – security and safety stuff (e.g. alarm systems, access control systems) – remote management and stuff ... – >> connected to IP based networks << !!!111! What can possibly go wrong? On the security of security extensions for IP-based KNX networks 8

  9. Building Automation Systems (BAS) ● Goal: “ intelligent buildings ” ● Old and busted: – heating, ventilation and air conditioning (HVAC) – BUS networks ● New hotness: – security and safety stuff (e.g. alarm systems, access control systems) – remote management and stuff ... – >> connected to IP based networks << !!!111! What can possibly go wrong? On the security of security extensions for IP-based KNX networks 9 Source: http://laughingsquid.com/wp-content/uploads/tetris1_img6080.jpg

  10. Security features in current/classical KNX ... ● On the security of security extensions for IP-based KNX networks 10

  11. Security features in current/classical KNX ... ● Optional 4 (in words “four”) byte password On the security of security extensions for IP-based KNX networks 11

  12. Security features in current/classical KNX ... ● Optional 4 (in words “four”) byte password .... transmitted in clear text On the security of security extensions for IP-based KNX networks 12

  13. What the spec has to say ... “For KNX, security is a minor concern, as any breach of security requires local access to the network” (KNX Systems Specification) On the security of security extensions for IP-based KNX networks 13

  14. What the spec has to say ... “For KNX, security is a minor concern, as any breach of security requires local access to the network” (KNX Systems Specification) “Filtering KNXnet/IP datagrams from the network requires network analysis tools and expertise. The content of a KNXnet/IP message is not self- descriptive but requires semantic knowledge ...” (KNX Systems Specification) On the security of security extensions for IP-based KNX networks 14

  15. What the spec has to say ... “For KNX, security is a minor concern, as any breach of security requires local access to the network” (KNX Systems Specification) “Filtering KNXnet/IP datagrams from the network requires network analysis tools and expertise. The content of a KNXnet/IP message is not self- descriptive but requires semantic knowledge ...” (KNX Systems Specification) On the security of security extensions for IP-based KNX networks 15

  16. How does a KNX BAS look like? On the security of security extensions for IP-based KNX networks 16

  17. How does a KNX BAS look like? GAMMA Training Kit (GTK2) ● Source:https://www.auto.tuwien.ac.at/images/practicals/siemens_gamma_img_0515.jpg On the security of security extensions for IP-based KNX networks 17

  18. How does a KNX BAS look like? Backbone lv. Field lv. On the security of security extensions for IP-based KNX networks 18

  19. How does a KNX BAS look like? M anagement d evices (ETS) WAN MD MD SAC IP Backbone ICD Backbone lv. I nter c onnection d evices ICD ICD Field lv. SAC SAC TP / Bus TP / Bus SAC SAC SAC SAC S ensors, A ctuators, and C ontroller devices On the security of security extensions for IP-based KNX networks 19

  20. How does a KNX BAS look like? M anagement d evices (ETS) KNX IP WAN MD MD KNXnet/IP SAC IP Backbone ICD Backbone lv. I nter c onnection d evices ICD ICD Field lv. SAC SAC TP / Bus TP / Bus SAC SAC SAC SAC S ensors, A ctuators, and C ontroller devices On the security of security extensions for IP-based KNX networks 20

  21. How does a KNX BAS look like? M anagement d evices (ETS) WAN MD MD C SAC IP Backbone ICD Backbone lv. I nter c onnection d evices ICD ICD Field lv. SAC USB SAC USB interface N 148/11 * USB interface to KNX bus TP / Bus TP / Bus * Connected to wiring by SAC SAC pressure contacts * eibd open source software SAC SAC S ensors, A ctuators, and C ontroller devices On the security of security extensions for IP-based KNX networks 21

  22. How does a KNX BAS look like? M anagement d evices (ETS) WAN MD MD C SAC IP Backbone ICD Backbone lv. I nter c onnection d evices ICD ICD Field lv. SAC USB SAC USB interface N 148/11 * USB interface to KNX bus TP / Bus TP / Bus * Connected to wiring by SAC SAC pressure contacts * eibd open source software SAC SAC * Eavesdrop S ensors, A ctuators, * DoS and C ontroller devices * Inject * Identify (2^16 addresses) On the security of security extensions for IP-based KNX networks 22

  23. Example ● Record all traffic on bus $ eibd --listen-local=/tmp/eibhandle -t1023 usb:2:4:1:0:0 $ vbusmonitor1 local:/tmp/eibhandle ● Send message “on” to group addr. $ groupswrite local:/tmp/eibhandle 1/1/5 1 ● Read configuration of device $ mread local:/tmp/eibhandle AA04 116 100 09 AA 04 09 00 09 01 09 02 09 03 09 04 09 05 0B 00 0B 02 FE 20 01 00 FE 01 FE 02 FE 03 02 04 FE 05 FE 06 FE 07 03 08 FE 09 FE 0A FE 0B 04 0C FE 0D FE On the security of security extensions for IP-based KNX networks 23

  24. Example ● Record all traffic on bus $ eibd --listen-local=/tmp/eibhandle -t1023 usb:2:4:1:0:0 $ vbusmonitor1 local:/tmp/eibhandle ● Send message “on” to group addr. $ groupswrite local:/tmp/eibhandle 1/1/5 1 ● Read configuration of device $ mread local:/tmp/eibhandle AA04 116 100 09 AA 04 09 00 09 01 09 02 09 03 09 04 09 05 0B 00 0B 02 FE 20 01 00 FE 01 FE 02 FE 03 02 04 FE 05 FE 06 FE 07 03 08 FE 09 FE 0A FE 0B 04 0C FE 0D FE On the security of security extensions for IP-based KNX networks 24

  25. Example ● Record all traffic on bus $ eibd --listen-local=/tmp/eibhandle -t1023 usb:2:4:1:0:0 $ vbusmonitor1 local:/tmp/eibhandle ● Send message “on” to group addr. $ groupswrite local:/tmp/eibhandle 1/1/5 1 Group addr. 1/1/0 ● Read configuration of device $ mread local:/tmp/eibhandle AA04 116 100 09 AA 04 09 00 09 01 09 02 09 03 09 04 09 05 0B 00 0B 02 FE 20 01 00 FE 01 FE 02 FE 03 02 04 FE 05 FE 06 FE 07 03 08 FE 09 FE 0A FE 0B 04 0C FE 0D FE On the security of security extensions for IP-based KNX networks 25

  26. How does a KNX BAS look like? M anagement d evices (ETS) WAN MD MD SAC IP Backbone ICD Backbone lv. I nter c onnection d evices ICD ICD Field lv. SAC USB SAC USB interface N 148/11 * tcpdump * USB interface to KNX bus TP / Bus TP / Bus * tcpreplay * Connected to wiring by * IGMP SAC SAC pressure contacts * eibd open source software SAC SAC * Eavesdrop S ensors, A ctuators, * Identify (2^16 addresses) and C ontroller devices * Inject * DoS On the security of security extensions for IP-based KNX networks 26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend