Spinning CPEs Collaborative work on CPE IoT protection 1

Slides:



Advertisements
Similar presentations
Gateway Agent Product & Architecture
Advertisements

Internet Gateway Device (IGD)
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
UPnP Device Management Andre Bottaro France Telecom Group UPnP DM co-chairman End User Device Management panel Sunday, January 11th, 2009 CCNC'09.
Introduction to Broadband HamNet
Broadband Forum Machine-to-Machine (M2M) Solutions Robin Mersh, CEO The information in this presentation is public.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
University of Murcia 8 June 2011 IPv6 in Europe Jacques Babot European Commission - DG INFSO Directorate, Emerging Technologies and Infrastructures.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Protecting Students on the School Computer Network Enfield High School.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Your Systems Don't Work With Ubuntu (and this is one way we can help you fix that) Jeffrey Lane Hardware Certification Engineer Platform Services Team,
Eric Peirano, Ph.D., TECHNOFI, COO
DATEX Activity 6 Enhanced Usability
Tago Tago IoT DAY GRAIN BIN LEVEL? The epicenter of middleware
Seminar on 4G wireless technology
Deployment Planning Services
Securing Network Servers
Stress Free Deployments with Octopus Deploy
Eric Peirano, Ph.D., TECHNOFI, COO
ETSI Software Reconfiguration Overview
Valibox: Bringing DNSSEC Validation to the Home
ETS Inside Product Launch
Configuring ALSMS Remote Navigation
Web Application Development
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Instructor Materials Chapter 9: Testing and Troubleshooting
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
SteelHead 9.2 New Feature & Updates
Filtering Spoofed Packets
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Firewalls.
UNIT 15 Webpage Creator.
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
The Internet of Things (IoT)
IS4550 Security Policies and Implementation
Packet Sniffing.
Information Security Session October 24, 2005
Intro to Ethical Hacking
NETWORK RESILIENCE WORKGROUP
Nettest An implementation of BEREC’s recommendations
IS4680 Security Auditing for Compliance
Shifting from “Incident” to “Continuous” Response
Building an Internet of Things Device
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
draft-ipdvb-sec-01.txt ULE Security Requirements
Sr. Developer Cloud System - Architecture
NETWORK SECURITY LAB Lab 8. Firewall and VPN.
Introducing Metro style device apps
Topic 5: Communication and the Internet
Crimson® 3.1 Updates January 2019.
Open Automation Software
Intel Active Management Technology
ESO response to EU RFID Mandate M/436
ESO response to EU RFID Mandate M/436
Marcial Quinones-Cardona
A Firmware Update Architecture for Internet of Things Devices
Presentation transcript:

Spinning CPEs Collaborative work on CPE IoT protection 1 Peter Steinhäuser – Embedd Jelte Jansen – SIDN Labs RIPE 78 - May 23, 2019 1

So, about that IoT 2

Ways to add some ‘s’ to IoT Better practices for manufacturers? Better (free) standard software libraries? International policy, regulation, and certification? Generate market demand for secure products? Quarantine bad actors at ISP level? Educate users? Empower users? 3

“Yes” Ways to add some ‘s’ to IoT Better practices for manufacturers? Better (free) standard software libraries? International policy, regulation, and certification? Generate market demand for secure products? Quarantine bad actors at ISP level? Educate users? Empower users? “Yes” 4

Ongoing work around IoT (security) in IETF Manufacturer Usage Description (MUD) Specification – RFC8520 Limit the Internet destinations of Things in networks. Thing tells the location (URL) of it’s communication profile Communication profile is enforced (MUD file) Enforcement of communication profile is also usefull for other applications https://datatracker.ietf.org/doc/rfc8520/ Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home - Drafts With the DOTS initiative, information on DDoS attacks is shared and analysed A major part of the DDoS sources are IoT devices. With the DOTS .. Call Home initiative, IoT devices can selectively be quarantined Based on 5-tuple (IP addresses, portnumbers & time stamp) Service providers can use this feature without knowledge about the Thing (Privacy!) https://datatracker.ietf.org/doc/draft-reddy-dots-home-network/

Formal standardization in ISO/IEC and CEN/CENELEC Formal standardization is country – region – worldwide organized; CEN & CENELEC European, ISO & IEC worldwide CEN/CLC/JTC 13 aims at Cybersecurity and Data Protection including IoT WG 6: Security of products including related services and environments In the Netherlands there is an initiative to focus om IoT Security & Privacy standardisation A similar initiative might be happening in your country Formal standardization often takes place in alignment with regulators. There are already government initiatives to improve IoT security: Code of Practice for consumer IoT Security (UK) Baseline Security Recommendations for IoT (EU ENISA) Radio Equipment Directive (RED) (there are ~12 European directives / recommendations / regulations that could improve IoT security) Could end up in certifications

Ways to add some ‘s’ to IoT Better practices for manufacturers? Better (free) standard software libraries? International policy, regulation, and certification? Generate market demand for secure products? Quarantine bad actors at ISP level? Educate users? Empower users: SPIN 7

IoT at SIDN / SPIN goals Protect home networks from rogue/insecure IoT devices Protect the Internet from home networks 8

The SPIN project at SIDN Labs Security and Privacy for In-home Networks Research into ways of SPIN functionality: Empower home users Protect home network Protect from home networks Software prototype(s) Traffic monitor Traffic analysis (local!) Traffic control

Running prototype: visualiser Shows DNS queries Shows data traffic User can block traffic based on source or destination In latest release: Select device and download (live) pcap for selected device 10

Core components, changes after talks with CPE people Since last presentation here, lots of talks and collaboration 11

Other changes after talking to random people (tm) Valibox release images now available for other systems Raspberry Pi v3 VirtualBox Adding prototype ‘spin-off’ tools in releases Pcap-reader Peak-detection Fancier custom interface Pre-dots-signal-home (‘incident reporter’) PoC Some of this in current release, some will be in next 12

Core components, changes after talks with CPE people Use standard kernel modules for traffic capture (custom kernel module too scary) Add UCI (and soon luci) configuration (easier integration with configuration tools) Add RPC with optional UBUS support (easier integration with control tools) Better packaging (easier deployment) Some of this in current release, some will be in next 13

Why CPE? Previous SPIN setups required a separate device Moving SPIN and related services into the CPE reduces home network complexity Putting SPIN to the home network’s “border” simplifies Automatic actions like firewalling malicious devices Reporting unusual activities to the ISP to initiate further analysis/actions Could significantly improve the coverage and adoption of SPIN

Why OpenWRT? Quasi-standard SDK for open source CPE firmware development Wide hardware support (QCA / BRCM / MTK / Marvell…) Gaining more and more industry support, even adopted by some chipset makers (i.e. QCA QSDK) Simple integration as an opkg; information here: https://github.com/SIDN/spin/blob/master/doc/install_package.md Hassle-free install work in progress

Related initiatives Broadband Forum Collaboration CPE management standards are set in the Broadband Forum Best known for TR-069 (to be replaced by USP), which is behind the over 1 Billion broadband connections. IoT and security are hot topics; next meeting will have a Security BoF. “Fixing” UPnP on CPE’s When UPnP is enabled on a CPE (~75%), all traffic measures can be overruled be devices on the local network. Source: https://blog.trendmicro.com/trendlabs-security-intelligence/upnp-enabled-connected-devices-in- home-unpatched-known-vulnerabilities/ No improvement / standardization effort is identified to address this issue.

Demo 17

Discussion/questions/cheers/tomatoes Jelte Jansen jelte.jansen@sidn.nl https://sidnlabs.nl Peter Steinhäuser ps@embedd.com https://embedd.com Go try it out! (and send us feedback) ((or any other suggestions)) 18