KNX Secure. KNX Position Paper on Data Security and Privacy

Similar documents
Competence Center Europe Smart Buildings

Operation and installation manual KNX IP Router. Application. Coupler function (KNXnet/IP Routing)

Product and Applications Description

Network Security Policy

Network Encryption 3 4/20/17

KNX TP1 Topology. KNX Association

5 Tips to Fortify your Wireless Network

Application Program Description

Chapter 24 Wireless Network Security

Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Use of the application program. 1. Functional description. instabus EIB Application Program Description. August 2016.

Security SSID Selection: Broadcast SSID:

Wireless Attacks and Countermeasures

Improving Security in Wireless Networks

Standard For IIUM Wireless Networking

Linienkoppler S KNX. Line coupler S KNX. Line coupler S KNX Status: March 16 (Subject to change) Page 1 of 29

Contents 1. Summary

IP806GA/GB Wireless ADSL Router

Application program usage. Functional description. instabus EIB Application Program Description. December IP-Router

Octopus Online Service Safety Guide

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

On the security of security extensions for IP-based KNX networks. Aljosha Judmayer

EU-R VIDEO SECURITY, DATA PROTECTION AND DATA SECURITY

HikCentral V.1.1.x for Windows Hardening Guide

802.11N Wireless Broadband Router

HikCentral V1.3 for Windows Hardening Guide

Best Practices Guide to Electronic Banking

Operation and installation manual KNX IP BAOS 774. KNX IP BAOS 774 as application specific Gateway BAOS SDK. Application. Installation and Connection

Security Policy (EN) v1.3

Operation and installation manual KNX IP BAOS 773. KNX IP BAOS 773 as application specific Gateway BAOS SDK. Application. Installation and Connection

Table of Contents. Page ii

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Industrial Control System Security white paper

Wireless-G Router User s Guide

A5500 Configuration Guide

LevelOne User Manual WBR g Wireless ADSL2+ Router

LP-2396K Outdoor 2.4GHz Wireless AP/CPE/Bridge

... c o n n e c t i n g y o u r b u s i n e s s Addendum LCOS 8.62

Section 3 - Configuration. Enable Auto Channel Scan:

KSR-01IP KNX IP Router Instruction manual

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Lechange App. User s Manual V1.0.0

Application program usage. Functional description. instabus EIB Application Program Description. March IP-Router

Network Security and Cryptography. December Sample Exam Marking Scheme

Security in IEEE Networks

Firewalls, Tunnels, and Network Intrusion Detection

Hik-Connect Mobile Client Software (ios)

Secure Communications on VoIP Networks

Cisco Desktop Collaboration Experience DX650 Security Overview

MTA_98-366_Vindicator930

SonicOS Release Notes

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

Education Network Security

SonicOS Enhanced Release Notes

Privacy and Security in Smart Grids

11N Wall Mount Access Point / WDS AP / Universal Repeater. Features. Fully compatible with IEEE b/g/n devices

Recommendations for Device Provisioning Security

Virtual private networks

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Setting up a secure VPN Connection between SCALANCE S and SSC Using a static IP Address. SCALANCE S, SOFTNET Security Client

Linksys E2000 Advanced Wireless-N Router. User Guide

File Transfer and the GDPR

Wireless technology Principles of Security

DOCUMENTATION UIMip TECHNICAL AND APPLICATION DESCRIPTION. Last modification: 8 September 2017

USER GUIDE. Wireless-G Broadband Router. Model No: WRT54G2 V1

Product Documentation

Lab Configure Basic AP security through GUI

IP819VGA g ADSL VoIP Gateway

CHAPTER 7 ADVANCED ADMINISTRATION PC

Ready Theatre Systems RTS POS

Getting Started with the M30X / M306 Wireless Ethernet Monitor

Wireless LAN Security (RM12/2002)

802.11N Wireless ADSL Router

Web Cash Fraud Prevention Best Practices

Information Security Management Criteria for Our Business Partners

Children s Health System. Remote User Policy

EAE KNX IP Router Product Manual IPR100 (sayfa düzeni ve foto düzenlemesi gerekli)

Chapter 3 LAN Configuration

Wireless Security Security problems in Wireless Networks

VPN Overview. VPN Types

DWR G Integrated Access Device. User Manual

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

Basic rules for protecting remote maintenance accesses

Virtual Dispersive Networking Spread Spectrum IP

Security Setup CHAPTER

E-Commerce. Infrastructure I: Computer Networks

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED

VPN Tracker for Mac OS X

Network Security and Cryptography. 2 September Marking Scheme

ENH200 LONG RANGE WIRELESS 11N OUTDOOR CB/AP PRODUCT OVERVIEW. IEEE802.11/b/g/n 1T+1R 150Mbps 25 km High Performance

BreezeACCESS VL Security

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

Most Common Security Threats (cont.)

instabus KNX / EIB product documentation

Technical Manual MDT IP Router

ECDL / ICDL IT Security. Syllabus Version 2.0

Transcription:

KNX Secure KNX Position Paper on Data Security and Privacy

KNX Secure Position Paper This paper is intended as a guide for both installers as well as KNX manufacturers to learn about the current measures that can be undertaken to increase security of KNX installations. 1. Preventing access to the network to the various KNX physical media 2 NOT RECOMMENDED RECOMMENDED A RECOMMENDED B KNXnet/IP Messages unprotected on Internet KNXnet/IP Messages through VPN connection http access to object data via manufacturer specific solution or via KNX Web Services Multicast @ 224.0.23.12 Port 3671 open VPN Router with VPN functionality or Router + VPN server Manufacturers specific device connected to Internet reflecting status of (some) group objects manufacturer specific security measures Access to KNX networks via Internet 1.1 Introduction A proper security concept is based on ensuring proper prevention against unauthorised access. In case of a KNX installation this implies that only authorised persons (the installer, caretaker, user) shall have physical access to the KNX installation. When designing and installing, for each KNX medium the critical elements shall be protected in the best way possible. 1.2 Installation of cable and devices Generally, applications and devices shall be properly fixed to avoid that they can be easily removed, in this way allowing unauthorised persons access to a KNX installation. Enclosures and distribution boards containing KNX devices shall be properly closed or be mounted in rooms, to which only authorised persons have access. In outside areas devices shall be mounted in sufficient heights (e. g. weather station, wind sensor, movement detector, ). In all public areas that are not sufficiently surveilled, it shall be contemplated to make use of conventional devices in connection with binary inputs mounted in protected areas (e. g. in distribution boards) or push button interfaces, in this way preventing access to the bus. When available, anti-theft measures provided by certain Application Modules should be used (e. g. securing devices by screws, only removable with tools, high pull-off resistance, ). 1.3 Twisted Pair Cable ends should not be visible, hanging outside the wall on the out- or inside of the building. Bus cable in outside areas poses a higher risk. Physical access to KNX Twisted Pair cable shall in this case be made even more difficult than in the home / building itself.

For extra protection, devices installed in areas with limited surveillance (outside, underground parking lot, toilet, etc.) can be connected to an extra line. By activation of the filter table in line couplers according clause 2, it can be prevented that hacker is able to access the entire installation. 1.4 Powerline Electronic filters should be used to filter incoming and outgoing signals. 1.5 Frequency As Radio Frequency is an open medium, physical protection measures cannot be taken to prevent access. For this, other measures need to be taken that are outlined in clauses 2 to 5 (and especially those listed in clause 4). 1.6 IP Building Automation should run over a dedicated LAN and WLAN with own hardware (routers, switches, etc.). Regardless of the type of KNX installation, one shall at any rate observe the usual protection mechanisms for IP networks. These may include: MAC filters Encryption of wireless networks in conjunction with strong passwords (change of the default password WPA2 or higher) and protection of them against unauthorised persons. Change of the default SSID (SSID is the name, under which a wireless access point is visible in the network, mostly manufacturer and product type). Default SSIDs can point to product specific weaknesses of the used access points and are in this way particularly vulnerable to hackers). The access point can moreover be set in such a way that beaconing (periodical transmission of amongst others the SSID) is prevented. For KNX IP multicast another IP address shall be used as the default one (224.0.23.12). A suitable address can be agreed upon with the network administrator. IT network specialists shall be involved in larger size projects with connection to KNXnet/IP: in this way the network configuration can still be optimised (managed switches, virtual LAN, access points with IEEE 802.X, etc.) and further protection mechanisms like E-Mail filtering and anti-virus can be implemented. 1.7 Internet KNXnet/IP Routing and KNXnet/IP Tunnelling are not designed for use over the Internet. Because of that, it is not advisable to open ports of routers towards the internet, in this way making KNX communication visible over the Internet. The (W)LAN installation shall be protected by means of a firewall. In case no external access to the installation is necessary, the default gateway can be set to 0, in this way blocking any communication to the internet. When one wishes to realise access to an installation via internet, this can be realised in the following way: Ensuring access to the KNX installation through VPN connections: this however requires a router that supports VPN server functionality or a server with VPN functionality. Any of the dedicated manufacturer specific solutions available in the market and visualisations (e. g. allowing http access). KNX has specified in an extension to the KNX Standard a KNX standardized solution for accessing to KNX installations over the internet via web services. 3KNX Secure Position Paper 2. Limiting unwanted communication inside the network The Individual Addresses of devices shall be properly assigned according to the topology and the Routers shall be configured not to pass message with inappropriate Source Address. In this way, unwanted communication can be limited to a single line. Point-to-point and possibly broadcast communication across Routers should be blocked. In this way, reconfiguration can again be limited to a single line. The Couplers shall be configured to use the Filter Tables actively and not pass Group Addresses that are not used inside a specific line. If not, communication inserted into a specific line risks spreading uncontrolled over the entire KNX installation.

KNX Secure Position Paper 3. Protecting configuration communication ETS allows defining a project specific password by means of which one can lock devices for unauthorised access. This prevents that the installation configuration can be read out or modified by unauthorised persons. 4 Protecting configuration communication in ETS 4. Protecting runtime communication X Secured communication Unsecured communication Protecting KNX run time communication on an IP network with KNXnet IP Security Next to the before mentioned measures, KNX runtime communication can be protected via the specified KNX Data Secure and KNX IP Secure mechanisms KNX Data Secure ensures that regardless of the KNX medium selected messages sent by KNX devices can be authenticated and / or encrypted. In order to ensure that even in the case where such communication would not be secured and such networks would

be connected to IP, the KNX IP Secure mechanisms were defined on top of this. In this way, it is ensured that KNX IP tunnelling or routing messages cannot be recorded or manipulated on IP. The KNX IP Secure mechanisms ensure that a security wrapper is added around the complete KNXnet/IP data traffic. The KNX Data Secure and KNX IP Secure Mechanisms ensure that devices can establish a Secured Communication Channel thereby ensuring: Data Integrity, i. e. preventing an attacker from gaining control by injecting manipulated frames. In KNX this is ensured by appending an authentication code to every message: this appended code allows verification that the message has not be modified and that it effectively originates from the trusted communication partner. Freshness, i. e. preventing an attacker from recording frames and playing them back at a later time without manipulating the content. In KNX Data Secure this is ensured by a sequence number and in KNX IP Secure by a sequence identifier. Confidentiality, i. e. encrypting network traffic to ensure that an attacker has the lowest possible insight into the data actually transmitted. When allowing encrypting KNX network traffic, the KNX devices ensure at least encryption according to the AES-128 CCM algorithms together with a symmetrical key. A symmetrical key means that the same key is used by the sender to protect an outgoing message (authentication + confidentiality!) as well as by the receiver(s) to verify when receiving this message. 5KNX Secure Position Paper DVC 1 KNX Message DVC 2 OK = not modified + not replayed DVC 1 KNX Message Code DVC 2 Sequence number / identifier OK = trusted source OK = not modified + not replayed + interpretable by me with assigned encryption code DVC 1 KNX Message Encrypted content Sequence number / identifier OK = trusted source Code DVC 2 Secured communication Unsecured communication Overview of the KNX Data Secure Mechanisms KNX Data Secure devices use a longer KNX telegram format when transmitting the authenticated and encrypted data. This does not have any effect on the reaction speed of devices. For KNX Data Secure, the devices are protected in the following way: A device is shipped with a unique Factory Device Set up Key (FDSK). The installer enters this FDSK into the configuration tool ETS (this action is at any rate not done via the bus). The configuration tool creates a device specific tool key. Via the bus, the ETS sends to the device to be configured its tool key, however by encrypting and authenticating this message with the previously entered FDSK. Neither the tool nor the FDSK key are at any time transmitted in plain text on the bus. The device from then onwards only accepts the tool key for further configuration with the ETS. The FDSK is no longer used during subsequent communication, unless the device is reset to factory state, after which all the secure data in the device will be erased. The ETS creates runtime keys (as many as necessary) for the group communication that needs to be secured. Via the bus, ETS sends to the device to be configured these runtime keys, however by encrypting and authenticating these messages with the tool key. The runtime keys are never transmitted in plain text on the bus.

KNX Secure Position Paper 2) ETS creates tool key per device 5) ETS creates runtime keys ETS PROFESSIONAL 3) Send tool key encrypted with FDSK to KNX device on the bus 6) Distribute runtime keys encrypted with tool key via the bus KNX Device 1) Input FDSK into ETS not via bus only visible to installer 4) Save FDSK no longer used 6 Factory Default Setup key Tool key Runtime key Procedure for securing KNX devicees For KNX IP Secure, a secure connection (Tunnelling or Device Management) is established in the following way: Both the client as well as the server creates an individual public / private key pair. This is referred to as an asymmetrical encryption. The client sends its public key to the server as plain text. The server responds with its public key in plain text, appended with the result of the following calculation: it calculates the XOR value of its server public key with the client s public key, encrypts this with the device code to authentify itself to the client and encrypts this a second time with the calculated session key. The device authentication code is either assigned by the ETS during configuration or the tool key. This device authentication code needs to be provided to the operator of the visualisation wishing to establish a secure connection with the relevant server. The client performs the same XOR operation, but authorises itself by encrypting this firstly with one of the passwords of the server and again a second time with the session key. It shall be noted that the encryption algorithm used (Diffie Hellmann) ensures that the session key of the client and the server are identical. The passwords of the server need to be provided to the operator of the visualisation wishing to establish a secure connection with the relevant server. 1) Public key (PK) Private key (PV) 3) Send PK (plain text) 5) Client makes calculation on public key client and public key server + encrypts result with password of server + calculates session key on a number of parameters incl. private key + encrypts result again with session key 2) 6) Secure connection established 4) Send public key (plain text) + calculation on public key client and public server + encrypts result with device code + calculates session key on a number of parameters incl. private key + encrypts result again with session key Setting up a KNX IP Secure Connection

As regards the above described measures to protect runtime communication, it shall be noted that: KNX Data Secure devices can be used without any problem next to classic KNX devices. This implies that KNX data and IP Secure can be implemented as additional security measure. If an installer chooses to use a KNX IP Secure device in an IP backbone, all IP couplers and any KNX IP devices in this backbone need to be of the type KNX IP Secure. If an installer has at the wish of a customer - used for a function a KNX secure device to secure the runtime communication, each communication partner of 5. Coupling KNX to security systems this device needs to also support KNX Secure for the linked function. In other words, a communication object of a KNX Secure Device cannot be linked once to a secured group address and once to a plain group address. Devices, which support KNX Data and IP secure, can be distinguished from classic KNX devices, as on the product label a X sign is shown. KNX IP Secure and KNX Data Secure are supported from ETS 5.5 onwards. The ETS allows to configure new KNX Secure devices and also allows to replace defective KNX Secure devices. When coupling KNX to such applications like burglar / fire protection / door opening systems, this can be ensured through: KNX devices or interfaces with appropriate certification by local loss insurers; potential free contacts (binary inputs, push button interfaces, ); appropriate interfaces (RS232, ) or gateways: in this case it shall be ensured that the KNX communication is unable to trigger security relevant functions in the security part of the installation. 7KNX Secure Position Paper 6. Detecting unauthorised bus access Obviously, the bus could be monitored and unusual traffic could be traced. KNX Secure devices keep track of hacks in security failure logs: in this way, it is at any time possible to check whether the KNX installation was subject to security attacks. Some device types can detect if another device sends Telegrams with their Individual Address. This is not spontaneously announced in the network, but it can be read in PID_DEVICE_CONTROL. Very recent implementation may already exhibit the PID_DOWNLOAD_COUNTER. Comparing the read out value (periodically) with a reference value will signal changes in the device configuration. 7. Compliance to the EU GDPR regulation GDPR is an abbreviation for General Data Protection Regulation (see www.eugdpr.org). The regulation aims to harmonize data protection laws in the whole of Europe. In order to comply with the GDPR regulation, the installer shall hand over the ETS project file to the customer. The installer and the customer shall sign a data protection declaration. Data that are generated by KNX devices may only be used for the purpose of remote control of the device by the customer (via App), for diagnostic purposes and for further product development. They may not be used for personalized publicity. Literature [1] AN 158 KNX Data Security [2] AN 159 KNX IP Secure [3] Volume 3/8/x KNXnet/IP Specifications

www.knx.org v2 18