secrets of crypto technology unleashed for enhanced · pdf filesecrets of crypto technology...

18
Secrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity Chris Guo Principal Engineer Ultra Electronics, 3eTI

Upload: hathuy

Post on 13-Mar-2018

218 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

Secrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity

Chris Guo Principal Engineer Ultra Electronics, 3eTI

Page 2: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 2

© 2017 Ultra Electronics

• Overview of Cryptographic Technologies

• Crypto gaining acceptance at rapid speed

• ROI become beneficial

• Applying Crypto to ICS Networks

• ICS Crypto Protocols

• Crypto in ICS Product Designs

• Q & A

Agenda & Background Raise awareness and prompt adoption

Ultra Electronics, 3eT – 20 years of history in

secured software/hardware R&D, provider of secured wireless products for government agencies.

– Provide cyber security solutions, including ICS cyber security to DoD customers

Page 3: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 3

© 2017 Ultra Electronics

• Confidentiality (Privacy)

• Integrity (Replay)

• Availability (DoS Attacks)

• Authentication (Identity)

• Authorization (Privileges)

• Non-repudiation (Undeniable Action)

Key Crypto Security Concepts

Page 4: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 4

© 2017 Ultra Electronics

Cryptographic Technologies Algorithms are the building blocks of meeting security requirements

• Block Ciphers (Symmetric ciphers, AES) – Mode: CCM/CMAC, GCM/GMAC, XTS-AES, KW/KWP

– CCM, GCM offers both privacy and integrity

– CMAC/GMAC integrity only

– KW/KWP for key wrap

• Digital Signatures (Asymmetric ciphers, RSA, ECDSA, DSA) – >=112 bits of security strength

• Secure Hashing (SHA1, SHA2, SHA3) – SHA1 should NOT be used in signature generation, time stamp generation after 2015

– SHA-256 at minimum should be used.

• Message Authentication

• Random Number Generation (Entropy source)

• Other Important Components (Key Gen, Key Derivation, Key Establishment)

Page 5: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 5

© 2017 Ultra Electronics

WHAT’S NEXT?

Disgruntled ex-employee hacks into the water system and floods the community of sewage.

INSIDER ATTACK Maroochy Water System - 2010

The Conficker worm infected the control network causing an instability in the communications.

ENTERPRISE INFECTION “Unnamed” Steel Mill - 2011

The attackers backed their way into network by compromising a 3rd-party vendor to steal data.

BACKDOOR ATTACK Target Retail Stores - 2013

Stuxnet infected the air-gapped control network bypassing causing damage to centrifuge.

.

SCADA MALWARE Natanz Nuclear Facility - 2010

Networks infected with the Shamoon virus erased information causing enterprise network outages.

ENTERPRISE ATTACK Saudi Aramco & RasGas - 2012

A team used a penetration test on PLCs to realize how badly vulnerable their SCADA/ICS were .

PLC ATTACK Project Basecamp - 2012

Hackers disrupted networks to access automation equipment resulted in massive damage.

INSIDER ATTACK “Unnamed” Steel Mill, Germany - 2014

SHODAN discovered over 21,000 miss-configured building automation systems.

MISS-CONFIGURE Google HQ, Wharf - 2013

Iranian hackers tried to open flood gates. Was this a dress rehearsal for something bigger?

BACKDOOR ATTACK New York Dam - 2015

Left 225,000 customers in the dark. 1st successful cyber attack to knock a power grid offline.

.

SCADA ATTACK Ukraine Utilities - 2015

Hack accessed hundreds of PLCs used to manipulate control applications altering chemicals.

PLC ATTACK Kemuri Water Company - 2016

Current State of Industrial Cyber Attacks They are getting worse

Page 6: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 6

© 2017 Ultra Electronics

Application Whitelisting (AWL)

Ensure Proper Configuration Mgt

Reducing Your Attack Surface Area

Build A Defendable Environment

Manage Authentication

Secure Remote Access

Monitor and Respond

1 2 3 4 5 6 7

In 2017, 2700+ incidents were reported to ICS-CERT… many more went unreported or undetected

98% of incidents reported would have

been prevented if they follow strategies outlined in this report

DHS’s Seven ICS Security Strategies Recommendations that go beyond the firewall

Page 7: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 7

© 2017 Ultra Electronics

How Crypto Could Have Helped Prevent the Ukraine Electric Network Grid Attack

Enterprise PC OT Workstation

Control gained through email phishing

Shut down & damage

IT OT

Imagine if crypto technology were applied, will it foil the attack? Assume OT is breached.

Control

Page 8: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 8

© 2017 Ultra Electronics

What Is Needed and How To Apply Cryptographic Technologies • Security for non-repudiation critical operation messages

– Authentication & Authorization

– #5 from DHS strategy

• Apply cryptographic digital signatures (Asymmetric Key) – Proper implementation is important o Use multiple factors, use physical smart card to perform the signing

o Do not use hard coded signing key in the control software

o Design the message to be replay-proof

• Consider message authentication (HMAC) – A symmetric key is used (Can the key be compromised on the other end?)

– Where is the key store implemented? o Inside the application? (Hard code?) It won’t work here since hacker has total control

o Operator input on demand? Still vulnerable since hacker can log key strokes

o Stored on separate hardware such as USB drive? How about those copies in memory?

Page 9: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 9

© 2017 Ultra Electronics

Enterprise Networks

External Networks

Remote Access

Authentication Server

Mirrored Data Servers

Report/Alarm Server

HMI

Application Server

SCADA Server

Support Networks

Process Control Networks

Engineering Terminal

Wireless

PLC

PLC

PLC

Data/Historian Server

PCs, IT Networks

Embedded Devices (PLCs, etc.) & Serial Buses

Control Network

Facility Network

Office Network

Industrial Process

Infrastructure Automation

Facility Monitoring

Applying Crypto to ICS Networks Typical ICS Architecture

Page 10: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 10

© 2017 Ultra Electronics

Protect the LAN

• IEEE 802.11ae – Media Access Control Security (MACsec)

– Point-to-point security on Ethernet links between directly connected nodes o AES_GCM provide both data frame privacy and integrity

o Secure session rekey

– Encrypt all frames such as LLDP, ARP, LCAP and DHCP

– Prevent most Layer 2 threats o ARP Snooping/spoofing

o passive wiretapping (Network reconnaissance)

o man-in-the-middle, masquerading, reply

o Denial of service

o Intrusion

• Reduce attack surface (DHS Strategy #3)

• Wire-speed encryption on switches

Network without MACsec

Network with MACsec

Page 11: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 11

© 2017 Ultra Electronics

Protect the IP Network Use secure remote access (DHS Strategy #6)

• VPN widely used

• TLS (Transport Layer Security) – Prefer version 1.1 and 1.2

– Tighten up TLS cipher suite configuration o Use Forward Secrecy (FS), it’s also called PFS

o DH group with at least 1024 bits. 2048 bits and higher is preferred. (LogJam, FREAK Attack)

o Use ECDHE if possible

o FS is deployed by Google, Twitter web services, whatsapp, Facebook

o Disable weak cipher, weak DH groups to counter “Downgrade” attacks

– Watch for TLS CVEs

• IPsec – ESP cipher shall provide both privacy & integrity (AES_GCM)

– Use IKEv2 if possible

– Choose strong cipher list for both IKE-SA and ESP phase

Page 12: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 12

© 2017 Ultra Electronics

Crypto in ICS Protocol Case Study: Siemens S7Comm, S7 Commplus

• S7Comm – Clear text, no security protection

– Malware, live worm implemented on S7-300, S7-400 PLCs in 2011 & 2015

• S7Commplus – Designed to address trust between PLC & TIA (HMI)

– S7-1200v3 is the first release

– Use 2-bytes session ID from PLC and expect 2-bytes Object ID from TIA for secret handshake

– Quickly hacked: Object ID=session ID+ 0x80

– S7-1200v4 uses more “encryptions”: total of 3 o 1st “encryption” is Object ID= XOR (session ID+80)

o 2nd and 3rd “encryption” is private

o But they are packed in a Windows DLL so anyone can access them.

o Hacked in 2017

Source: Cheng Lei “The spear to break the security wall of S7CommPlus” DefCom 25

Page 13: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 13

© 2017 Ultra Electronics

ICS Protocol Security Design Lessons learned

• Clearly define the security goal – In S7, if the security objective is setup trust PLC—TIA

– Then asymmetric cipher could be the best fit

• Use open standard cryptographic technology – They are heavily scrutinized, tested and readily available

• Protect the whole protocol packet frame

Page 14: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 14

© 2017 Ultra Electronics

Crypto in ICS Product Designs

•Need to address crypto in both software and hardware • ICS/IoT devices are all hackable, due to poor to no security design

Page 15: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 15

© 2017 Ultra Electronics

• Firmware analysis – Use disassembler

– Attack string manipulation functions

– Modify binary then download it to IoT ( Not digitally signed, no integrity)

• Defense – Firmware compression

– Obfuscation

– Encryption

– Digital signature

– Address space randomization

– Stack cookie

– Better hardware design to protect the firmware o UART trace leftover?

o Bootloader with console?

o JTAG pin left over?

o FLASH read?

How a Hacker Attacks ICS Devices

Example: Cisco’s Catalyst 3000 switch takes Kaspersky research scientist 3 month to gain total control with known CVE telnet vulnerability. Reason: Slightly “obfuscated” firmware and stack cookie

Page 16: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 16

© 2017 Ultra Electronics

Hardware Security TPM (Trusted Platform Module)

• TPM is the corner stone for hardware security – International standard for secure cryptoprocessor

– Integrate keys into hardware

– Secure key storage, generation

– Enable trust anchor

– This is why Apple iPhone latest can’t be jailbroken

• Fit need of ICS – Example: setup a trust chain

PLC made by Foreign

Manufacture PLC Vendor

Certified Solution Provider

PLC Owner PLC Owner

Onsite Engineer

Page 17: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

3eTI SLIDE 17

© 2017 Ultra Electronics

Summary Cryptographic technologies enhance ICS cybersecurity • Seriously consider implementing crypto technology

– Hackers are sophisticated crypto power users (Ransom-ware)

– As a defender, ICS needs cryptographic technology

• Adopt CoT technology – IEEE 802.1ae

– VPN

• Strategically build a software & hardware security capabilities framework – Even if partially

• Use open standard cryptographic technology – Software module/library

– Hardware TPM

– Don’t roll your own crypto

Page 18: Secrets of Crypto Technology Unleashed for Enhanced · PDF fileSecrets of Crypto Technology Unleashed for Enhanced ICS Cybersecurity ... DSA) – >=112 bits of ... outlined in this

Chris Guo Principal Engineer Ultra Electronics, 3eTI Direct: +1 301.944.1294 Email: [email protected] www.ultra-3eti.com [email protected]

Questions