GLI Regulator Roundtable Feb 2008 Benefits for Regulators with the G2S Communication Protocol GLI Regulator’s Roundtable 2008.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Chapter 19: Network Management Business Data Communications, 5e.
CCNA – Network Fundamentals
Web Plus Overview Division of Cancer Prevention and Control National Center for Chronic Disease Prevention and Health Promotion CDC Registry Plus Training.
Internet Gateway Device (IGD)
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Electronic Monitoring Systems NAGRA 2006 CASINO GAMING John Briney CIO Arizona Department of Gaming.
Russ Ristine – Radical Blue Gaming. Slide 2  What is G2S? (a hopefully non-technical view)  How does it work?  How is G2S different than what you have.
Chapter 19: Network Management Business Data Communications, 4e.
Gaming Standards Association
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Chapter 17 TACACS+.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
GSA UPDATE MAY 21, 2009 – LAS VEGAS GTS 2009.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Chapter 4: Managing LAN Traffic
BOB Tech Demo 2003 G2E – Las Vegas. Agenda  Best of Breed – a layering of standards  Standards, messaging, protocols and why you care  From the bottom.
The Year of Implementation and Value Creation!Global Gaming Expo 2006 Good Things Happen When We All Pull Together Introducing S2S.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Hands-On Microsoft Windows Server 2008
Characteristics of Communication Systems
Copyright © 2002 Legato Systems, Inc. Authentication Version 1 Katrina Illari d1614 Authentication Version 1 Katrina Illari d June 2005 Legato Confidential.
BoD Meeting - Feb 2008 GSA Committee Technical Update For Engineers.
Databases and security continued CMSC 461 Michael Wilson.
Module 7: Fundamentals of Administering Windows Server 2008.
GSA Certification And New Features Marc McDermott, Technical Director.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
CasinoFest3: Download vs. Configuration Download vs. Remote Configuration What’s the difference? Russ Ristine – Radical Blue Gaming.
Jan 31, 2007Operators Forum - The G2S Advantage. Jan 31, 2007Operators Forum - The G2S Advantage Industry Recognition  Jan 5, 2007: Game-to-System (G2S)
Feb 07, 2007GLI Regulators Roundtable. Feb 07, 2007GLI Regulators Roundtable Industry Recognition  Jan 5, 2007: First place for Game-to-System (G2S)
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
The Year of Implementation and Value Creation!Gaming Technology Summit The Power of One Solution.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
CasinoFest3: GSA's S2S Protocol GSA’s System to System Protocol: Making your system connections better! Russ Ristine – Radical Blue Gaming.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
CasinoFest4: Download vs. Configuration Download vs. Remote Configuration What is the difference? Russ Ristine – Radical Blue Gaming.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
IEEE Computer Society Technology Summit 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008.
Gaming Standards Association
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Example security systems n Kerberos n Secure shell.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
How to develop a VoIP softphone in C# by using OZEKI VoIP SIP SDK This presentation demonstrates the first steps concerning to how to develop a fully-functional.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Chapter 19: Network Management
CCNA Routing and Switching Routing and Switching Essentials v6.0
Configuring and Troubleshooting Routing and Remote Access
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Introduction to Networking
NAT , Device Discovery Chapter 9 , chapter 10.
Chapter 10: Device Discovery, Management, and Maintenance
6. Application Software Security
Presentation transcript:

GLI Regulator Roundtable Feb 2008 Benefits for Regulators with the G2S Communication Protocol GLI Regulator’s Roundtable 2008

GLI Regulator Roundtable Feb 2008 Benefits for Regulators This presentation is to introduce you to GSA’s G2S protocol and the benefits for Regulators Big Picture –Not here to bash SAS –G2S is SAS’ Replacement –G2S supports Download –G2S supports Remote Configuration –G2S supports Remote Software Validation

GLI Regulator Roundtable Feb 2008 Benefits for Regulators More Big Picture –G2S provides security –G2S provides better access to regulatory information –G2S provides for controls in regulating download and configuration –G2S provides a means to limit damage resulting from counterfeits

GLI Regulator Roundtable Feb 2008 Information for Regulators G2S supports the flow of information that makes it possible to implement the new features and capabilities GSA does not write software or develop gaming applications. G2S support for a function does not mean that applications exist to take advantage of that function GSA does not force manufacturers to implement the G2S protocol - business requirements and Regulatory requirements force manufacturers to implement G2S

GLI Regulator Roundtable Feb 2008 Security G2S requires SSL encryption –Single session Keys –Ability to change keys on demand or over time G2S secures both ends of the communication link Both ends must have a certificate Manual process for initial certificate ensures identity of each endpoint

GLI Regulator Roundtable Feb 2008 Security The benefit –No ease dropping –No inserted commands –No open port access

GLI Regulator Roundtable Feb 2008 Security More benefits –All nodes on the network are known as they must have a certificate –Allows gaming floor information to be isolated by certificates when physical isolation is not possible –Provides a secure way for a regulator to remotely monitor a casino floor

GLI Regulator Roundtable Feb 2008 Access to Information Current slot floor networks restrict access to information –Proprietary protocols make interfaces difficult –All information comes from a single slot accounting system –No visibility to the actual floor data –Real time access is limited

GLI Regulator Roundtable Feb 2008 Slot Floor Network - Today

GLI Regulator Roundtable Feb 2008 Access to Information G2S provides more access to information for authorized users –Encrypted information restricts information to authorized endpoints –Information is gathered from the EGMs – no intermediary filters –Real time access is no problem –Able to select the information that is sent to your endpoint

GLI Regulator Roundtable Feb 2008 Slot Floor Network - G2S Slot Floor System Code DownloadVouchers Config Server Regulatory

GLI Regulator Roundtable Feb 2008 Access to Info - Guest Host G2S supports a Guest Host function A guest host is a server (or service) that is allowed access to the floor network The guest host must have a certificate –Must be specifically allowed on the network by the system administrator –Manual process to initially install the certificate –Data is encrypted to and from the guest host

GLI Regulator Roundtable Feb 2008 Guest Host Function Each guest host has an IP address –Guest host is registered with the EGM –EGM maintains guest host subscription –EGM send info from event subscriptions to the guest host’s address

GLI Regulator Roundtable Feb 2008 How to Access the Info G2S Guest Host Function –A guest host has read access to information –Provides the ability to subscribe to specific events –Everything that happens on the floor generates events –Events may have associated data or may be just to announce that an event has occurred

GLI Regulator Roundtable Feb 2008 Slot Floor - G2S Each EGM has a separate IP address Each host has its own address Adding an EGM does not allow that EGM to “see” info from other EGMs Adding a host works the same way EGM Switch

GLI Regulator Roundtable Feb 2008 What is the Benefit? Get you own meters Floor status - Determine what doors were opened, what machines are offline, Which machines were RAM cleared Assist with Responsible Gaming Authorize downloads and configuration changes Track Progressives and bonuses Track GAT results

GLI Regulator Roundtable Feb 2008 Provide Regulatory Controls G2S supports the concept of Authorization for Download and Configuration Changes G2S supports one or more authorization hosts All authorization hosts must authorize prior to the change being made –GLI-21 section requires storage of game data prior to download – “Authorization” opportunity –Also requires doors to be closed during download – “event” opportunity

GLI Regulator Roundtable Feb Emergency Response G2S Supports the ability to selectively disable bill acceptance –Bill acceptor capability is exposed through G2S –Disable one bill from the list of supported Bill – counterfeit $50 notes – disable the acceptance –Re-enable when the problem is corrected Also the ability to disable coin acceptors

GLI Regulator Roundtable Feb 2008 More Emergency Measures G2S supports off-line voucher validation –A validation Identifier and an associated Seed are generated and stored in the voucher database –The Validation Identifier and the associated Seed are sent to, and are stored on, the EGM –An MD5 HASH is generated from the EGM identifier, the voucher amount, the validation identifier and the seed.

GLI Regulator Roundtable Feb 2008 Offline Validation Offline validation (cont) –Vouchers have the EGM identifier, the voucher amount, the validation identifier and the MD5 results printed on it – the seed is NOT printed on the voucher –To redeem the offline voucher, the information on the voucher is entered from a cashier station –The seed is retrieved from the voucher database, the MD5 HASH is re-calculated

GLI Regulator Roundtable Feb 2008 Offline Validation Offline Validation (cont) –If the Calculated MD5 answer matches the MD5 answer printed on the ticket, the voucher is valid and may be redeemed Nevada technical standard 3.150(11) was changed to allow offline voucher printing if a technique such as this is used

GLI Regulator Roundtable Feb 2008 Offline Validation-Benefit Allows a secure method of dealing with offline vouchers –Reduces the need for manual methods that are not secure –Provides for better customer satisfaction Offline validation may be custom tuned for your Jurisdiction –Number of Authentication numbers/Seed pairs stored is a settable value –Seed expiration time is a settable value.

GLI Regulator Roundtable Feb 2008 One Comms Protocol Current floor network requires at least two protocols from the EGM to the host G2S floor network only has one protocol G2S reduces errors by reducing the number of protocols. Also, the protocol is published for all to read and test to. EGMSMIBSystem SASProprietary Protocol EGM System G2S

GLI Regulator Roundtable Feb 2008 GAT G2S incorporated GAT into the protocol at the request of a regulatory jurisdiction The GAT implementation in G2S provides for a more secure and more reliable validation application than any other remote verification method available. –GAT is better than the majority of “at the EGM” methods as well

GLI Regulator Roundtable Feb 2008 Why GAT? ALL the software that implements the GAT functions is developed by licensed Manufacturers ALL software that implements GAT and the actual verification is contained on the EGM and is tested and verified by your testing agency – GLI GLI has (or will have) the source code for the GAT implementations as it is in the EGM software that they test.

GLI Regulator Roundtable Feb 2008 Why GAT? GAT in G2S, does not do any verification GAT sends the information to the EGM –Hash type – CRC, MD5, SHA1, SHA256, etc. –Seed/Salt – may be used if supported by the HASHing algorithm. GAT returns the resulting answers from the EGM Again – the G2S protocol does NOT perform the verification – it just moves the information

GLI Regulator Roundtable Feb 2008 GAT Features Regulators can select a starting seed for verification Regulators can select a “salt” –Salt is a set of characters pre-pended to the information to be hashed –Example info to be hashed “ ” –Salt of “abc” instructs the EGM to HASH “abc ”

GLI Regulator Roundtable Feb 2008 GAT Features Allows regulators to select a start and stop offset –Allows for targeted verification of a particular piece of software GAT Special function –Allows custom tuning for particular needs –RAM dump –Event Log

GLI Regulator Roundtable Feb 2008 GAT Features GAT can be run at the EGM or at a host terminal GAT can be run from a host terminal GAT can be run from a Regulator’s office –Needs firewall and VPN to the Casino –Needs a GAT host and remote terminal –Security provided by limited command functions GAT events keep regulators apprised of GAT progress

GLI Regulator Roundtable Feb 2008 GAT Events G2S_GAE005 Device Configuration Changed by Host G2S_GAE006 Device Configuration Changed by Operator G2S_GAE101 Verification Queued G2S_GAE102 Verification Started G2S_GAE103 Verification Complete G2S_GAE104 Verification Error G2S_GAE105 Verification Result Acknowledged and Passed G2S_GAE106 Verification Result Acknowledged and Failed G2S_GAE107 Special Function Executed

GLI Regulator Roundtable Feb 2008 GAT Benefit Using the GAT functions in G2S it is possible to verify an entire casino floor from a regulator’s office –Casino operators can also run GAT –Provides Operators more tools to find revoked software and remove it

GLI Regulator Roundtable Feb 2008 Schema Validation A schema provides a definition of all the commands in G2S Each G2S command may be verified by the schema to have the correct format and values within specified bounds. GLI will be using Schema validation in their testing

GLI Regulator Roundtable Feb 2008 Schema Validation -Benefit Schema validation will catch all misspellings Schema validation will catch all commands missing required values Schema validation provides a sieve that strains out errors in commands The result is that these errors will not reach the field. This means more reliable communication software

GLI Regulator Roundtable Feb 2008 GSA Benefits Regulators can have input into the Protocol –Meter requirements not currently supported –Additional events –Additional HASH algorithms (GAT) –Etc. Regulator advisory committee (RAC) can provide answers about the protocol GSA representatives can visit your jurisdiction to go over specific regulatory concerns

GLI Regulator Roundtable Feb 2008 Questions Questions? Contact Info: Marc McDermott Ph: