Supervision of production computers DCS security Remote access to DCS Peter Chochula 9 th DCS Workshop, March 15, 2004 Geneva.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Remote access to PVSS projects and security issues DCS computing related issues Peter Chochula.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Supervision of Production Computers in ALICE Peter Chochula for the ALICE DCS team.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Web server security Dr Jim Briggs WEBP security1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Course 201 – Administration, Content Inspection and SSL VPN
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Intranet, Extranet, Firewall. Intranet and Extranet.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
CERN’s Computer Security Challenge
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Update on Database Issues Peter Chochula DCS Workshop, June 21, 2004 Colmar.
Peter Chochula ALICE DCS Workshop, October 6,2005 DCS Computing policies and rules.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Lanxin Ma Institute of High Energy physics (IHEP) Chinese Academy of Sciences September 30, 2004 CHEP 2004, Interlaken The Security Protection System at.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Peter Chochula DCS Remote Access and Access Control Peter Chochula.
Naming and Code Conventions for ALICE DCS (1st thoughts)
Firewall Security.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Role Of Network IDS in Network Perimeter Defense.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
TS workshop 2004U. Epting, M.C. Morodo Testa - TS department1 Improving Industrial Process Control Systems Security Uwe Epting (TS/CSE) Maria Carmen Morodo.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Windows Terminal Services for Remote PVSS Access Peter Chochula ALICE DCS Workshop 21 June 2004 Colmar.
Database Issues Peter Chochula 7 th DCS Workshop, June 16, 2003.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Network security Vlasov Illia
Securing Network Servers
CSCE 548 Student Presentation By Manasa Suthram
Working at a Small-to-Medium Business or ISP – Chapter 8
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Security in Networking
Nessus Vulnerability Scanning
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Securing Windows 7 Lesson 10.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Supervision of production computers DCS security Remote access to DCS Peter Chochula 9 th DCS Workshop, March 15, 2004 Geneva

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 2  Acknowledgments Presented information was collected from several sources. Main information source are discussions in FWWG, SUPC WG, CERN Control System Security Day (December and private communication with colleagues from IT (D. Heagerty, L.Cons, A.Pace, J.M.Jouanigot, R.D.G.aparicio …)

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 3 Outline  This talk is an update to the talk given at DCS workshop in Heidelberg (2003)  New information is included on: Supervision on control computers Remote access to DCS systems

DCS Security

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 5 Understanding the risks In general, the DCS should be protected against:  malicious attacks attacks from hackers from outside “attacks” from ambitious users from inside  non-malicious mistakes typing mistakes ambitious system testers

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 6 What should we protect?  Communication between managers inside PVSS is considered to be secure  Open questions: DIM, OPC….  There is very little we can do against malicious attacks inside PVSS environment These topics, together with control computers supervision etc. will be addressed by a new working group (with ALICE participation)  FWWG aims to provide an access control component consisting of program libraries and recommendations (rules)

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 7 Present situation  The risk of attacks on DCS network remains very high despite the fact that CERN security is very well organized: If we do nothing, the probability of an incident is 1.0 (Minutes from CERN Security day)  Both Linux and Windows computers are targeted by hackers  PLC become a “very popular” target in hackers community  There is a lack of resources for central support – experiments will need to act actively

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 8  Damage to DCS system can be very severe – ranging from data loss through damage to equipment up to damage to people.  Connection between ALICE DCS network and CERN campus network will be established – there is a risk of contamination and unauthorized activities  There are several requests to provide remote access to DCS systems mainly for monitoring purposes

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 9 Preventive measures  Deployment of minimal core operating system  Preventive scans (IDS, packet sniffing)  Controlled access to the network (advanced authentication methods, packet filtering)  Deployment of patches  Restrictive computer access rules (more viruses are entering CERN through main gate rather than through network). All users are subject to Operational circular No.5

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 10 Experiment specific topics  We will operate a 24/7 365/365 system which imposes some serious limitations Dangerous to deploy patches during data taking (we cannot interrupt some services) All patches must be tested in advance as the DCS is a non-standard environment Difficult to test patches for all possible interference with DCS system Impossible to force updates during OS bootstrap (system may be recovering from power cut and there is no time to install software updates at this point) Risk of interference with antivirus software

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 11 Additional complications  Some DCS applications are using ports targeted by viruses (e.g. OPC opens ports used by Blaster)  Lack of authentication in PLC protocols  Use of some software (e.g. port scanner) is violating the CERN rules (Oper. Circ. No.5)  Institutes need to deploy software updates We cannot allow laptops to connect to DCS network directly  Risk of contamination with removable media (e.g. memory sticks etc.)  …

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 12 Present strategy  Understanding of user requirements is essential – knowing the activities will help to search for anything suspicious  All remote access should be restricted to maximum possible extent, ports will be opened only if this is the last possibility  There is no ‘democracy” in DCS systems: anything not explicitly allowed is forbidden  A set of rules must be defined and agreed in the collaboration  We need to define and implement mechanisms for fast recovery after an incident (this involves backup policy, system installation, configuration of PVSS-II…)

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 13 Current prototyping  We will participate in working group which will be established soon  In the mean time we are evaluating some solutions: Intrusion detection system (Snort) Security scan software (NeWt, Nessus) Remote deployment of patches and updates (SUS, Windows SMS, Landesk) The tools are evaluated on dedicated network in order to avoid clashes with CERN rules

DCS Access Control (FW developments – credits to S. Schmelling)

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 15  Access control based on Domain User Group  Different levels of privileges: Monitor  the user is allowed to view the object but cannot change any parameters Control  the user is required to have this privilege level to be able to change a restricted range of a particular object’s parameters Debug  the user is required to have this privilege level to be able to change all parameters of a particular object Modify  the user is required to have this privilege level to be able to modify the structure of this particular object

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 16  Each object will be assigned by set of privileges needed to for requested action  Authentication will be guaranteed by Domain Controller Possibility to use NICE login  Inheritance of privileges similar to Windows strategy  Set of framework functions will be available to users Access control will be implemented at the level of HMI (each button will check if the requested operation has been authorized) First release will contain limited functionality (it should help users to start implementing access control to their panels) Full release is pending until new release of PVSS (encrypted libraries)

Remote access to DCS systems

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 18  Remote access should be allowed only for monitoring purposes  Any possibility of remote control presents a very high risk: Interference with running systems Damage to people or equipment (e.g. person setting the HV must be present in control room and make sure the nobody is touching the equipment)

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 19  What kind of remote access do we need to implement? Do we need access to the application or to the machine running the application (remote terminal access) Do we need to access the published data remotely directly talking to servers? (OPC, DIM…)  We need to define, which traffic has to be allowed across CERN firewall

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 20 Solutions from remote access  Control screens and applications can be managed remotely via encrypted tunnels Locally installed applications encrypted inside SSH ( VNC (Virtual Network Computing) encrypted inside SSH ( CERN VPN encrypted connections ( allow remote computers to connect as if running on the CERN Campus Networkhttp://cern.ch/vpn

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 21 Remote Terminal Services  Windows offer a powerful method for remote access to computer – Windows terminal Services  We propose to run a Windows server with enabled remote access. Users can login to this server using their NICE account PVSS remote UI running on this server will provide access to application

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 22 Remote terminal services – licensing issues  DCS prototype server is included in CERNs licensing policy and allows for 255 concurrent sessions  We investigate a possibility to clone CERNs terminal service (cernts) and make one server dedicated for ALICE DCS (PVSS remote UI does not operate on standard cernts)  Client to terminal services exist for Windows, Unix/Linux, and Mac.  On client side a license fee might be required: Windows clients license is already included in the operating system license Other systems must pay ~ 6CHF/year Clarifying situation for users connecting via VPN ( no fee should be required)

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 23 Remote access example Main PVSS-II applicationFED ServerDIM Server Terminal Server Remote UI project Remote client – outside CERN CERN Firewall RDP PVSS-PVSS DIM Sub-detector hardware

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 24 Additional remote access possibilities  Direct connection to machine running master project should be disabled  WEB interface – each project can run a web server allowing for remote access to datapoints User has in fact rewrite its application in HTML Standard web vulnerabilities  Publishing of data across firewall (e.g. DIM ) should be disabled Lack of authentication in protocols (DIM, OPC, PLC…) creates high risk It is very easy to make a non-malicious mistake

Supervision of production computers

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 26 Definition of the problem  All DCS computers will need remote supervision  This includes Monitoring of resources Monitoring of performance Monitoring of processes (presence)  High number of computers require automation  There are several approaches implemented at CERN

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 27 Operating systems and platforms  Mostly PC based computers Windows Linux  Special computers: PLCs Power supplies VME masters Readout controllers (FPGA executing Linux)

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 28  Present efforts in ALICE concentrated on testing of individual system components - no real computer supervision implemented (yet)  Test systems are based on JCOP framework tool PCMON PCMON server executes on every supervised system (Windows or Linux) Gathered data are published via DIM Any DIM client can subscribed to monitored data PVSS is used as a main client platform – published data connected to datapoints

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 29 PCMON-PVSS connection LINUX WXP Dead PCMON connection

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 30 PCMON-PVSS connection

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 31 SUPC working group  Alice DCS relies on common solutions where applicable  Participation in SUPC WG  Aim is to identify solutions which could be implemented for ALICE. This includes all topics included in this talk (which go beyond the mandate of present group)

Peter Chochula 9 th ALICE DCS Workshop, March 15, 2004 Geneva 32 Conclusions  Computer supervision, administration, security and networking open a new field for ALIC DCS  Collaboration with IT has been launched Many problems have not yet been covered at all  ALICE DCS will adopt common solution where applicable  We understand complexity of presented problems, however without your feedback it is almost impossible to find optimal solution