Home

SCADAPack E Security Technical Reference

image

Contents

1. lt 32000 Insert request in queue Authentication Key Status lt 32000 Application Header Authentication Response FIR 1 FIN 1 CON DI UNS 0 SEQ 1 gt 32000 Application Header Authentication Request FIR 1 FIN 1 CON DI UNS 0 SEQ 2 Rx Object 120 Authentication variation 6 qualifier 0x5b 16 Bit Free Format xx 32000 Secure Authentication Session Key failure length 152 expected 81 Rx Authentication Key Change Request User 1 Key Length 0 Sequence 1 Expected 1 FAILURE lt 32000 Build DNP3 Message Authentication Key Status SCADAPack E Security Technical Reference Tx Object 120 Authentication variation 5 qualifier 0x5b 16 Bit Free Format Tx Authentication Key Status KeyWrapAlgorithm AES 128 User 1 Sequence 2 hmacAlgorithm SHA1 4 OCTET Status 4 AUTHFAIL lt 32000 Application Header Authentication Response FIR 1 FIN 1 CON 0 UNS 0 SEQ 6 Security Technical Diagnostic Example Successful Critical Message Challenge DNP3 Secure Authentication Example 3 Master device establishes session with security authentication successfully Critical operations are challenged and accepted C gt DNPDIAG Set DNP Diag Filters Usage DNPDIAG mode filter filter param Where mod ENABLE DISABLE Where filter 1 2 3 ETH APPL BYTES DBASE EVENTS FILTER_ADDR LINK NETWORK RAW_NET S
2. See the following sections for more details e How does AGA12 Work 2 22 e Using AGA12 Securityl33 22 SCADAPack E Security Technical Reference 5 3 4 How does AGA12 Work The AGA12 suite uses cryptography to protect SCADA communications Essentially it provides a means to take clear text messages and convert them into unintelligible forms ciphertexts using a secret number These encrypted messages can be sent over an insecure connection without the threat of interception and being read by a user or device other than that to which the message was sent Once the message arrives at its secure location it is deciphered using the same secret number This secret number is called a key The figure below illustrates how an AGA12 message is handled during the encryption and decryption processes CLEAR TEXT DATA CIPHERTEXT Ciphenext amp Sign stu re randomised packaged inAGA12 protocol wrapper qomusb ch sind db q gt y 27 CIPHERTEXT andomised extracted calculate SIGNATURE SIGNATURE SIGNATURE ced culated UPDATE KEY Secret AGA12 incorporates security key technology This technology is based on open cryptography standards for example AES encryption As well as encrypting data content with security keys AGA12 validates connections between users using secret keys The use of these keys allows AGA12 to protect messages by authenticating partner devices and randomizing transactions be
3. e Close the equipment enclosure door e Remove ground from incoming power lines e Perform all start up tests recommended by the manufacturer OPERATION AND ADJUSTMENTS The following precautions are from the NEMA Standards Publication ICS 7 1 1995 English version prevails e Regardless of the care exercised in the design and manufacture of equipment or in the selection and ratings of components there are hazards that can be encountered if such equipment is improperly operated e lt is sometimes possible to misadjust the equipment and thus produce unsatisfactory or unsafe operation Always use the manufacturer s instructions as a guide for functional adjustments Personnel who have access to these adjustments should be familiar with the equipment manufacturer s instructions and the machinery used with the electrical equipment e Only those operational adjustments actually required by the operator should be accessible to the operator Access to other controls should be restricted to prevent unauthorized changes in operating characteristics 3 References e American Gas Association AGA12 Part 1 Recommendations 2006 See http www aga org our issues security Documents 0603REPORT12 PDE e AGA12 2 Protocol and Java Reference Application see http scadasafe sourceforge net e Distributed Network Protocol DNP3 see http www dnp org 3 SCADAPack E Security Technical Reference e 1EC62351 Part 1 and Part 5 Standards Av
4. Provide access to DNP3 Master Station s to a secured AGA12 system by e Encoding and routing cleartext DNP3 to AGA12 ciphertext e Passing cleartext DNP3 frames from Master to remote unsecured RTUs where MIXED MODE is enabled 2 Secure the access from DNP3 remote configuration amp maintenance tools to a secured AGA12 system DNP3 Protocol ADe ames E series RTU in Security Gateway Cipertext Port Security Gateway RTU AGA12 2 protected Encodes cleartext pete ranit DNP3 Frames to AGA12 2 FRAMES Figure 5 5 AGA12 Gateway RTU Mixed Mode disabled Encoding and decoding of messages on behalf of other devices can only be done in GATEWAY MODE This security mode is configured by the SCADAPack E Security Administrator application The AGA12 Gateway RTU needs to be physically and logically secured from external influences The RTU s DNP Network Routing Table includes a Security Type identifying and authorizing encoding and decoding of messages to AGA12 protected device s Security COUNTERPART ENTRIES are required for each remote SCM or Virtual SCM with which the AGA12 Gateway communicates MIXED MODE am SCADAPack E Security Technical Reference Local DNP3 Protocol Access cleartext DNP3 Port AS Clear Device ONPS Routing Part DNP3 FRAMES 3 ae E series RTU in Gateway amp Cipertext Port Mixed mode Security Gateway RTU encodes to AGA12 2 FRAMES for authorised nodes and rou
5. RTU Non critcal message Perform operation Critical Message IV Authenticate amp perform Ze operation Authentication response The following DNP3 function codes are challenged by the SCADAPack E RTU when received from a Master device DNP3 Function Code 2 3 4 5 13 14 15 20 21 22 24 Write Select Operate Direct Operate Cold Restart Warm Restart Initialize Data Enabled Unsolicited Responses Disable Unsolicited Responses Assign Class Record Current Time 3 SCADAPack E Security Technical Reference 25 Open File 27 Delete File 7 2 2 Security Settings A number of security settings can be adjusted by the Security Administrator for DNP3 Secure Authentication interoperability and security performance Security settings for the SCADAPack E controllers are set on the Security Adminstrator s Group page 28 Project Group Name NorthemATUs J Groups pg eaa Allow Update of Security File CompactFlash Configurator or Host 5 Common Key 341 47D 25B5BFFD 2E 1 6B5BACO61 050494 BNP3 Algorithms HMAC CHA truncated to 4 octets serial Key Wrap AES 128 w DNP3 Session Keys Change Interval 11800 seconds Change Count 2000 DNP3 Aggressive Mode Accepts Requests Issues Requests C Advanced DNP3 Options Challenge Data Length 4 bytes Session Key Lenath 128 bits P Maximum Error Count 2 Allow Update of Security File Common Key This is the security key static DNP3 Update Key com
6. amp Duplicated RTU Personality 2 s cccecssseseeesseseeeeeseeseeeeeeeseeneseseaeeneneeananenensaneeeeaes 97 11 Using AGA12 Security Components Copyright ccccceeeeceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseeeeeeeeees 98 4 SCADAPack E Security Technical Reference I Security Technical len Documentation 2013 Control Microsystems Inc All rights reserved Printed in Canada Version 8 05 4 The information provided in this documentation contains general descriptions and or technical characteristics of the performance of the products contained herein This documentation is not intended as a substitute for and is not to be used for determining suitability or reliability of these products for specific user applications It is the duty of any such user or integrator to perform the appropriate and complete risk analysis evaluation and testing of the products with respect to the relevant specific application or use thereof Neither Schneider Electric nor any of its affiliates or subsidiaries shall be responsible or liable for misuse of the information contained herein If you have any suggestions for improvements or amendments or have found errors in this publication please notify us No part of this document may be reproduced in any form or by any means electronic or mechanical including photocopying without express written permission of Schneider Electric All pertinent state regional and local safety regulations
7. security facilities are provided using the following mechanisms e a system using DNP3 Authentication is secured through Groups where a security key Group s Common Key is shared between outstations and the Master Station Host requires DNP3 Secure Authentication at the master station e a system using AGA12 is secured using SCM SCADA Cryptographic Module devices In the case of SCADAPack E RTUs a virtual SCMI10 is integrated with the RTU this operates via an AGA12 Gateway RTU independent of the master station e a system using DNP3 Authentication and AGA12 Encryption concurrently is secured using an AGA12 Gateway RTU and Master Station Host supporting DNP3 Secure Authentication The common Group key and AGA12 Encryption Key is used by the outstation and the AGA12 Gateway RTU The Group key is used by the Master Station Host and RTUs The Security Administrator application is used to generate Security Configuration files for SCADAPack E controllers and SCADAPack E Configurator nodes SCADAPack E Security Technical Reference 7 2 DNP3 Secure Authentication DNP3 Secure Authentication operates at the DNP3 Application Layer Where Master Station Host to RTU controller security is desired the Master Station Host must natively support DNP3 Secure Authentication Licensing and enabling DNP3 Secure Authentication on the SCADAPack E RTU secures DNP3 interfaces serial ports Ethernet ports USB on SCADAPack 300E RTUs including com
8. 5 qualifier 0x5b SCADAPack E Security Technical Reference 16 Bit Free Format Tx Authentication Key Status User 1 Sequence 2 KeyWrapAlgorithm AES 128 hmacAlgorithm SHA1 4 OCTET Status 1 OK lt 32000 Insert request in queue Authentication Key Status lt 32000 Application Header Authentication Response FIR 1 FIN 1 CON DI UNS 0 SEQ 2 gt 32000 Application Header Direct Operate FIR 1 FIN 1 CON 0 UNS 0 SEQ 3 lt 32000 Build DNP3 Message Authentication Challenge Tx Object 120 Authentication variation 1 qualifier 0x5b 16 Bit Free Format Tx Authentication Challenge User 0 Sequence 1 Algorithm 1 SHA1 4 OCTET Reason 1 CRITICAL lt 32000 Insert request in queue Authentication Challenge lt 32000 Application Header Authentication Response FIR 1 FIN 1 CON 0 UNS 0 SEQ 3 gt 32000 Application Header Authentication Request FIR 1 FIN 1 CON 0 UNS 0 SEQ 3 Rx Object 120 Authentication variation 2 qualifier 0x5b 16 Bit Free Format Rx Authentication Reply User 1 Sequence 1 SUCCESS Rx Object 12 Control Relay Output Block variation 1 qualifier 0x28 16 Bit Index Control Relay Output Block 000001 0x04 LATCH_OFF NUL count 1 on 0 off 0 status 0 SUCCESS lt 32000 Insert request in queue Direct Operate Response lt 32000 Application Hea
9. 701 om 30000 30000 Ethemet 1 1 2 3 4 U NONE This entry with AGA12 security will use the Destination DNP address as the SCM address thereby minimizing configuration in the route table and maximizing use of route range entries The gateway RTU s route entry 901 999 sends data to Cipher text port 2 but in cleartext mode i e no security This is Mixed Mode communications ER SCADAPack E Security Technical Reference 7 3 10 AGA12 Parameters The following sections describe parameters associated with AGA12 2 serial protocol known as SSPP their pre defined use for DNP3 operation as per AGA12 2 reference code and SCADAPack E RTU user configured parameters e DNP3 Routing Table and AGA12 Settingsle e Fixed AGA 12 2 Parameters 62 e Vulnerabilities Addressed 64 Security Technical st 7 3 10 1 DNP3 Routing Table and AGA12 Settings Route Table A AGA12 Gateway requires knowledge of nodes whose packets received on the clear device port are going to be encrypted and sent to a cipher port An AGA12 Gateway also requires knowledge of cleartext nodes whose packets are to be routed and sent in the clear when in MIXED MODE It derives this information from the routing table The Routing table AGA12 type selections include e None default e AGA12 Node e AGA12 GWn A gateway will generally use AGA12 Node for route entries to RTU devices supporting encryption and None for route entries to conventional devices using st
10. D2 02 89 DO 12 CF D8 7B D5 82 64 A1 FF 72 15 09 09 640 AGA12 gt gt Transport update sent a block of 204 bytes 15 09 09 640 AGA12 gt gt SCM sent DTA payload 15 09 09 656 AGA12 gt gt Transport doFinal in sendTrailer SCADAPack E Security Technical Reference 15 09 09 656 AGA12 gt gt Transport sendPayload length 1 203 15 09 09 656 AGA12 gt gt LinkLayer send trailer 20 bytes E7 74 67 21 FA 36 04 1A 50 8D 3D 63 EF 97 0D 01 C2 05 B9 87 15 09 10 156 AGA12 gt gt Tx Bytes on Port 0 10 11 23 00 04 00 02 02 00 00 00 67 34 90 13 3B 94 06 CC 85 42 00 74 34 E3 B2 27 82 42 19 70 C4 55 EE 83 1C C2 3C 30 D4 F8 53 35 E2 0E 9F 02 C5 4B BD 8A 2D 71 BA 6C B2 12 48 16 0A C3 2D AA AA 92 15 4A 2E 17 4A E0 26 B8 OA D5 1E 1C A4 1B 66 77 71 94 13 24 F6 OD 30 EA 4E B8 13 97 14 F5 A5 D1 29 21 ED 8F 49 07 9E D9 93 BA 33 42 38 EA EF 25 C2 4E 87 BB 55 1D 4E 9C OF 71 CE 7C E0 D3 C2 97 A2 76 70 29 7C 09 57 D6 58 D9 69 DB BB BA 86 1D 65 8A 79 2D 8D 3A D4 CA 34 2A 1A DF F6 B7 11 98 8D 4E 30 A3 38 01 EC 4B 15 11 A5 63 B9 1C 37 61 1F 82 DC 74 1D 03 7F EC 69 D8 04 7B 1E D3 E6 D9 9A FA FA E6 AC FA 49 25 34 D2 02 89 DO 12 CF D8 7B D5 82 64 A1 FF 72 10 13 E7 74 67 21 FA 36 04 1A 50 8D 3D 63 EF 97 OD 01 C2 10 15 B9 87 10 14 Security Technical 9 2 4 Diagnostic Example Session Re establishment Transactions AGA12 Session Re establishment Transactions NEW SESSION REQUEST FROM REMOTE DEVICE IS RECEIVED HERE 17 37 39 165 AGA12 gt gt Sessi
11. SCADAPack ER USB memory stick for loading to a controller by SCADAPack E Configurator etc Depending on the arrangement of RTU groups this allows multiple RTUs to be configured from the same single media Security Key In the case of SCADAPack ES SCADAPack ER a Compact Flash card could be plugged in amp removed from each RTU in the same Group in turn e DNP3 Secure Authentication diagnostics and AGA12 Diagnostics are available through the SCADAPack E RTU diagnostic mechanisms serial diagnostic port Telnet diagnostic file capture DNP3 Secure Authentication e A mixture of unsecured DNP3 devices and DNP3 Secure Authentication devices can coexist on the same network The Master station needs to be aware of the configuration requirements of individual devices which includes security configuration e SCADAPack E Configurator can communicate directly to devices configured with DNP3 Secure Authentication providing the SCADAPack E Configurator node and user is authorized configured by the Security Administrator and loaded to devices e Where both AGA12 and DNP3 Secure Authentication is configured communication from SCADAPack E Configurator nodes connected remotely on the network can optionally require SCADAPack E Configurator nodes and users to be authorized but requires communications to be routed via an AGA12 Gateway RTU e SCADAPack E Configurator Security can be setup in a number of ways A optionally require the use of
12. The RTU s general configuration file does not hold a copy of security information such as keys or security modes Key configurations are stored in encrypted format When using Peer communications security considerations are as needed as enabling secure communication with a master station In SCADAPack E security configurations require peer nodes to use the same Common Key e g configured by using the same Security configuration file Remote I O communication is not authenticated When the RTU uses Remote I O and is connected to a DNP3 Secure Authentication network it is recommended that the Remote I O not use this same connection For example e The Main RTU uses the ETH 1 port for connection with the DNP3 Secure Authentication network and uses ETH 2 port for Remote I O e The Main RTU uses a serial for connection with the DNP3 Secure Authentication network and ETH 1 for Remote I O a SCADAPack E Security Technical Reference 7 3 AGA12 Encryption There are two broad ways an RTU may be used with AGA12 encryption e As an AGA12 2 Node RTU e As an AGA12 Gateway A number of DNP3 communication port types are used when security is active on SCADAPack E RTUs These are described in more detail throughout this Section In summary the port types are e AGA12 Ciphertext ports e One DNP3 Local Access Port e One DNP3 Clear Device Port AGA12 Gateway only e AGA12 Node RTU 45 e AGA12 Gateway and Session Establishment 4 e AGA12 Gatew
13. and Local Communication Addressing Default DNP3 node address 0 on a new or initialized SCADAPack E RTU is not supported by AGA12 on ciphertext ports As such a DNP3 address change is required for an RTU before it is used as an AGA12 Encryption secured device Where an RTU sends data to a node typically the master across the AGA12 Gateway an SCM address which differs from the DNP3 destination address is required see Example Configurations 58 This is so that the AGA12 message is delivered to the AGA12 Gateway it extracts the protected DNP3 message which is then forwarded to the Master at its DNP3 address In these cases AGA12 nodes are configured with the SCM address of the AGA12 Gateway DNP3 device addresses in an interconnected system NEED TO BE UNIQUE so that the derived SCM addressing is unique Local Communications When you enable AGA12 encryption on an SCADAPack E RTU device without DNP3 Secure Authentication DNP3 communications on serial or Ethernet ports on the device are protected that being DNP3 ports are ciphertext ports except one single Local Access Port DNP3 cleartext serial port A single Local Access DNP3 cleartext port is enabled on the RTU by default port 1 when encryption is active Local configuration and maintenance by the SCADAPack E Configurator routing of cleartext packets is still possible on this port Subject to mixed mode settings This port may be changed from port 1 to another port but to do s
14. case of AGA12 on SCADAPack E RTUs a session is established between each pair of SCADAPack E virtual SCM s A session has a type indicating it as static or dynamic Static sessions have cryptographic and other parameters that are configured in SCM configuration data Dynamic sessions have negotiated cryptographic parameters and vary with time and each message sent on the session Management of sessions is one of the tasks carried out by the SCADAPack E RTU s Virtual SCM DNP3 similarly establishes a session for communication between two devices Part of the DNP3 session s information includes DNP3 Secure Authentication information SSPP SCADA Security Protection Protocol Defined by the AGA12 2 standard This is the technical name of the AGA12 2 protocol that transports session information and secured data between SCMs Unique Key The SCADAPack E security mode requiring that SCADAPack E Configurator nodes be individually secured optional Update Key DNP3 Secure Authentication terminology for the secret key 10 known to devices that communicate with each other 12 SCADAPack E Security Technical Reference 5 Introduction This document describes Integrated SCADA security for SCADAPack E RTU devices Audience This document is for use by product users system designers and SCADA security administrators It is recommended that you have an understanding of DNP3 Secure Authentication and AGA12 Encryption Scope This document conta
15. cryptographic session is established the SCMs encrypt and authenticate SCADA messages between each other Where a single SCM has multiple counterparts cryptographic sessions need to be individually opened for each counterpart pair A session is typically established between SCMs as a result of a DNP3 message that is initiated from one of the devices A small delay is introduced while AGA12 session establishment messages are exchanged between the SCMs Following this and while the session remains open each DNP3 message corresponds to one AGA12 message The cryptographic algorithms that are used between SCM counterparts are negotiated between the SCMs the Cipher Suite when the session is established Cryptographic sessions have a finite expiration based on time After expiration an SCM needs to establish a new session with its counterpart SCM s to resume secure communications A session can be re established by either of the counterpart SCM s when there is a requirement to send a new message payload See Diagnostic Example Session Re establishment Transactions E Security Technical a 7 3 3 AGA12 Gateway RTU AGA12 Encryption secured RTU systems may include one or more SCADAPack E AGA12 Gateway RTUs An AGA12 Gateway RTU is a standard SCADAPack E RTU configured for AGA12 Gateway operation It is highly recommended that a SCADAPack ES or SCADAPack ER be used as AGA12 Gateway RTUs The purpose of an AGA12 Gateway is to 1
16. each device using the Common kel zg See Aggressive Model 41 for more information Issues Requests Determines whether the controller will send Aggressive Mode requests when communicating as a DNP3 Master e g Data Concentrator to remote outstations or IEDs Peer to peer with another RTU This setting applies to communications initiated by the RTU If a remote device rejects an aggressive mode request authentication will be unsuccessful Disable the Aggressive Mode Issues Requests setting if there are authentication issues The setting of this field must be the same on all devices using the Common Key 38 See Aggressive Model 41 for more information Advanced DNP3 Options Challenge Data Length This sets the number of bytes of pseudo random challenge data used in session key negotiation and authentication challenge messages The minimum length of challenge data is 4 octets The maximum SCADAPack E length for challenge data is 40 octets The larger the challenge data the better the security but the more overhead on security establishment and challenge messages The setting of this field needs to be the same on each device using the Common Key 38 This setting may be a global setting on some devices thereby requiring a whole system to operate with the same value Session Key Length The size of the dynamic session key used in session key negotiation and protecting critical message challenges The minimum length of session keys i
17. file is generated by the SCADAPack E Security Administrator application Standard RTU Operation Secure communications is enabled on a device when a security configuration has been loaded on the RTU for the first time If a security configuration has not been loaded in to an SCADAPack E RTU security will not be active on its DNP3 ports and the RTU operates in its standard non secured way Le communications will operate as standard DNP3 on DNP communication ports until a security configuration is loaded for the the first time When operating this way the RTU ports are referred to as RS SCADAPack E Security Technical Reference Standard DNP3 Ports 5 3 Security Technical SCADAPack E RTU Security e What is DNP3 Secure Authentication 18 e What is DNP3 Secure Authentication 18 e How does DNP3 Secure Authentication Work 2 18 e What is AGA122 20 e How does AGA12 Work 2 22 e Supported AGA 12 2 Functionalityl22 e How do AGA12 encyption and DNP3 Secure Authentication Work 2 24 e Highlights of 2SCADAPack E RTU Security 2 1 SCADAPack E Security Technical Reference 5 3 1 What is DNP3 Secure Authentication DNP3 Secure Authentication is a bi directional protocol that adds data integrity protection and user and device authentication resulting in protection between master stations HMI control servers outstations PLCs RTUs IEDs and Configuration software using the DNP3 protocol SCADAPack E RTUs suppor
18. individual Username Password logins to authenticate with RTUs Username password lists are configured in all RTU devices in this case B Choose one of three SCADAPack E Configurator Security modes B 1 Default Key mode where the Configurator and RTUs will communicate out of the box most convenient but least secure B 2 Common Key mode where a new key is provided to all Configurators and all RTUs disabling the user of the Default Key and configuring a single specific key convenient with better security B 3 Unique Key mode where all Configurators have an individually unique key and all RTUs are aware of the authorized configurators best security AGA12 Encryption e SCADAPack E RTUs support defining a SCADA Cryptographic Module SCM This AGA12 functionality is integrated with the RTU s serial port communication drivers DNP3 stack and IP stack e To provide AGA12 encryption features or DNP3 Secured Authentication a controller feature licence 27 needs to be installed e RTUs can be setup to operate in AGA12 GATEWAY mode receiving cleartext DNP3 and encrypting to AGA12 prior to transmission on a communications channel Conversely a gateway can receive SCADAPack E Security Technical Reference encrypted DNP3 response frames and decipher them to cleartext DNP3 for transmission back to the requester Typically this gateway mode is used via serial or network links for host system communications Gateway mode can be
19. is not used immediately In conformance with DNP3 s use of the IEC62351 131 standard security credentials need to first be confirmed between the devices through a full authentication challenge reply transaction Le the first challenge of a critical operation uses a full authentication challenge response transaction exchange Subsequent critical wgl operations can then use aggressive mode e SCADAPack E Security Technical Reference Master RTU Critical Message weng EE Authenticate Authentication response amp perform i operation S tandard protocol response Authenticate amp perform operation Critical message with Aggressive Mode Request aa Critical message with Aggressive Mode Request EE It is equally secure to operate DNP3 Secure Authentication transactions with Aggressive Mode enabled or disabled It is more bandwidth efficient to operate with it enabled when there are multiple controls issued in a single session Authenticate amp perform operation A configuration option is provided for Aggressive Mode as a requirement of the IEC62351 131 standard Security Technical 4 7 2 4 Vulnerabilities Addressed Outstation security modes can be changed remotely for convenience if so enabled For highest security disable this in the SCADAPack E Security Administrator application Security configuration then requires Physical Access Setting a Master Key requires Physical Access
20. only You can add edit or remove instances of SCADAPack E Configurators from the system but similarly needs to update every controller with revised settings The Security Administrator generates a unique security key for each instance of SCADAPack E Configurator An advantage of using this mode over the common key mode is that if a laptop is compromised there is no need to update the security configuration file for each instance of SCADAPack E Configurator You can remove the compromised SCADAPack E Configurator from the Security Administrator and new controller security configuration files can be generated and deployed to the RTUs 5 5 2 Master Key Configuration The security infrastructure is designed so that master keys are deployed once during the lifetime of a system from the Security Administrator application to controller devices It is highly recommended that a trusted individual responsible for system security deploy the master keys to controller devices before releasing them for field installation EN SCADAPack E Security Technical Reference Copies of the master key file need to be removed from portable media and devices following deployment To ensure the integrity of the security system you need to take all possible steps to keep the password phrase master key file and its deployment secure To deploy a generated master key file to SCADAPack ES or SCADAPack ER controllers you need to do so from a CompactFLASH card You ca
21. the outstation device From the Update key a dynamic Session Key is created that protects critical operational data A summary of this data flow is shown in the following picture SCADAPack E Security Technical Reference Critical data amp Critical data amp REQUEST FOR Signature sent e deet CRITICAL CRITICAL OPERATION OPERATION Critxal Dats N h e e SECURED la A MESSAGE d eg Hash SIGNATUR SIGNATUR E extracted E calculated d g e Dynamic hore Static 2 lt i 8 UPDATE KEY SESSION KEY l Secret Dynamic Static SESSION KEY UPDATE KEY Secret This data flow applies to DNP3 security initialization 18 periodiche key changes and challenged critical requests fia Aggressive Mode The data flow described in the above picture also applies to DNP3 Aggressive Model 41 transactions Once security credentials are established through a previous critical request sl aggressive mode allows the challenge data to be appended to the critical request message without having to go through the full challenge reply exchange as shown in the following picture 5 3 3 What is AGA12 The American Gas Association AGA in a project for the Gas Technology Institute formed a working group to develop a cryptography standard to protect SCADA data communications from cyber attacks The working group developed AGA12 which is a suite of cryptography standards that recommend how to achieve this The AGA12 standa
22. through the SCADAPack E Security Administrator application This is a secure application requiring licensed authorization to operate To obtain an activation license for the Security Administrator please contact Schneider Electric This application allows configuration of the security modes keys DNP3 Secure Authentication parameters users configurators AGA12 Counterpart authorization and Gateway addresses etc It provides a Windows user interface and includes both manual and automatic generation of keys New Project Security Administrator DER Ge Security P NorthemRTUs Administrator Users a Joe k CONTROL ei MICROSYSTEMS OD Fred E Configurators Maint Laptop 1 Security Mode O AGA12 2 Encryption DNP3 Secure Authentication DNP3 Secure Authentication and AGA12 2 Encryption Configurator Key Mode Detault Key All instances of E Series Configurator will use the same pre shared key for DNP3 security This is a basic form of security that does not require keys to be managed for every instance of E Series Configurator Security Level Lowest Common Key Allinstances of E Series Configurator will use the same key as specified below The same security file must be imported into every instance of E Series Configurator Security Level Medium xst A digits B0B New Key Unique Keys Every instance of E Series Configurator will use a different security file This is the most secure option but requ
23. to operate on a given customer network or portion of a customer network Master Station Host The device in a SCADA network that most remote devices report to It typically initiates the majority of communication transactions in a network In DNP3 Secure Authentication the Master Station Host natively supports the Secure Authentication objects that are use the establish security with remote devices Mixed Mode AGA12 Mixed Mode operation allows an SCM to simultaneously forward encrypted and unencrypted communications between SCADA equipment This permits a SCADA master equipped with or connected to an SCM to communicate with a SCADA unit e g RTU that does not have an SCM Mixed mode operation can be disabled Mixed mode can be used for SCADAPack E AGA12 Gateway RTUs and RTUs routing DNP3 cleartext Pass Phrase In SCADAPack E the user enters this phrase to generate the Master Key 10 for a system Responder A device sending authentication 9 information to a partner device in reply to prove it is who it claims to be See also Challenger 9 SCM A SCADA Cryptographic Module is a Cryptographic Module CM designed to or configured to operate on the communications channels between SCADA hosts and SCADA remote devices SCADAPack E telemetry supports a Virtual SCM as part of its operating system firmware rather than requiring an external bump in the wire Electronic device Security Technical d SCM Configuration Every SCM has
24. used for central maintenance access to remote RTUs and for DNP3 masters not supporting integrated AGA12 functionality e Communication networks can operate in AGA12 MIXED MODE as described by the AGA12 2 standard allowing a mixture of cleartext DNP3 and encrypted AGA12 frames to operate on the same network Gateways setup to operate in MIXED MODE allow the user to decide if the risk profile for some RTU s indicates they aren t worth securing and therefore can continue to run in cleartext DNP3 This also allows systems to be transitioned from cleartext DNP3 to secure AGA12 systems in a planned migration strategy e Encrypted data is supported on multiple communications media direct serial keyed serial Ethernet UDP TCP GPRS 1xRTT AGA12 Encryption for PSTN is not currently supported in SCADAPack E RTUs DNP3 Secure Authentication can operate with PSTN communications e Every RTU configured with AGA12 security provides a Local Access port The provides communication using cleartext DNP3 this is primarily for use of SCADAPack E Configurator but may also be used by other devices locally securing this port is a physical security issue All other RTU DNP3 ports are AGA12 encryption protected for routing backup links etc when AGA12 security is configured e SCADAPack E Configurator and other package s using DNP3 protocol can communicate with remote protected RTUs through a central AGA12 Gateway RTU Security Technical 5 4 Licens
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gt gt LinkLayer received packet 200 bytes 21 00 02 00 04 01 83 32 8F 8F 29 14 8C 07 8A 88 C7 53 CC DO 7C F2 B8 1B F1 93 8D 57 6A 22 1A 43 25 75 B3 EA DA AA A8 B4 F5 3D 6C D8 C4 65 71 B1 15 4E DO 58 08 D5 1A 87 DA AE B5 A9 7B AF 7A CB D4 B8 8B F7 EF 8D E4 E6 AF 6D 21 OA OB 9B FO E0 B2 1E 2C DF 44 38 AC C7 CA BB 55 77 6D 3E 69 E0 05 CD 9E 8E 81 C4 6B 65 24 E9 83 3C 21 41 12 90 C1 CF 22 83 DC 72 AF 4A 1D 55 B3 4F B4 CO B4 45 26 CA 44 95 AE F7 F6 E0 8A 80 27 7F 8C E4 DF 9F F6 34 30 AO F1 9C 57 OF AF DD 25 6C 07 4E BB DA 16 OE 1A E4 1A 91 73 93 0D EC 10 A6 0A D2 9E FC 05 83 1C E3 CC 4C 0E F6 7E 93 07 C9 E1 7B 71 37 C4 A8 9D CD F4 DE D8 AE 15 04 09 781 AGA12 gt gt Transport receiveBegin Security Technical e 15 04 09 781 AGA12 gt gt Transport receiveHeader 10 bytes 15 04 09 781 AGA12 gt gt Transport re
26. 12 gt gt SCM add broadcast lt 4 id 2 15 04 09 828 AGA12 gt gt SessionRequest base 9785 expiry 72000 15 04 09 828 AGA12 gt gt SCM sending ACK 2 gt 4 1 nonceOpn 2813167e nonceAck 915621b7 data id 2 resolution 100000 tolerance 51 base 0 expiry 256 suite 1 macLength 20 key 2FAC98B13B2E68AD43B486CC6709D21E macKey 93541 242DB1 1551B678CCB3752A6DA3C2FD8C569 15 04 09 843 AGA12 gt gt Transport sendHeader dest 4 src 2 session 1 type 2 15 04 09 843 AGA12 gt gt LinkLayer send header 10 bytes 22 00 04 00 02 01 7C 7C 3E DB 15 04 09 843 AGA12 gt gt LinkLayer send payload 174 bytes 3A AF 3F 39 E1 DE 11 9F BF 21 B5 E1 DB 1E D8 7C 35 CB BF 67 57 2B 5F 14 36 07 BC C6 C9 2E 3A 7B 2C 83 DC 74 E3 21 13 4E 04 94 B7 B7 B4 C1 86 66 8A 21 FA C3 B1 3D 6C 16 08 43 58 F4 20 5D 27 95 56 7A CO DC D4 C7 53 D5 03 AA 89 04 BE CD CO 93 11 2C 44 8A CF D7 AQ 6D 7F 82 CF 92 C3 20 05 78 23 16 8D AD C1 C5 13 52 16 97 A9 45 38 OF F6 3E 8E AD 5E AD C9 BO E0 21 BC 70 16 49 25 DB 13 AD B8 10 32 B1 BC 17 36 9C E0 72 F6 BD 83 AB 8E 7C 46 70 CO FD 54 29 C5 83 F4 05 27 D1 E1 19 BE 9C 2B BE 65 46 E5 F1 EE AO D3 A2 96 7D 9F CO 15 04 09 859 AGA12 gt gt Transport update sent a block of 174 bytes 15 04 09 875 AGA12 gt gt Transport doFinal in sendTrailer 15 04 09 875 AGA12 gt gt Transport sendP ayload length 1 173 15 04 09 875 AGA12 gt gt LinkLayer send trailer 20 bytes 71 D2 DE 39 88 CF 06 87 51 09 8E BF A6 21 36 51 BA FC AG OD Security Technical 15 0
27. 4 10 312 AGA12 gt gt Tx Bytes on Port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equest Response Transactions 15 09 09 140 AGA12 gt gt Bytes Rx on Port 0 10 11 23 00 02 00 04 02 00 00 00 62 40 86 AD 5E AGA12 gt gt Bytes Rx on Port 0 02 6E 3F 9E CB 74 85 BD 03 C3 5F A8 D3 AF 3F 47 AGA12 gt gt Bytes Rx on Port 0 39 24 2D CC E0 8F E9 6D 2C 53 F0 9E F8 B8 CA AA AGA12 gt gt Bytes Rx on Port 0 B9 29 69 64 8C 60 90 C2 1C 1C 67 CD CO 5F 4A 57 AGA12 gt gt Bytes Rx on Port 0 C3 A8 FB E6 95 5C 07 E0 69 DC BF AGA12 gt gt Bytes Rx on Port 0 AF A4 BD AB AF 96 38 CO 7B 46 C6 19 86 DF FA CA AGA12 gt gt Bytes Rx on Port 0 AA DF 48 BD 86 51 66 3F 72 F4 C7 86 B2 6B 13 3B AGA12 gt gt Bytes Rx on Port 0 90 90 73 7F 8F 26 9B AE 06 B9 53 04 86 35 AGA12 gt gt Bytes Rx on Port 0 10 13 C9 A2 2F 2B CC AC 28 C5 71 9D 9D E4 C2 8C AGA12 gt gt Bytes R
28. A qualified person is one who has skills and knowledge related to the construction and operation of electrical equipment and the installation and has received safety training to recognize and avoid the hazards involved BEFORE YOU BEGIN Do not use this product on machinery lacking effective point of operation guarding Lack of effective point of operation guarding on a machine can result in serious injury to the operator of that machine ACAUTION e Verify that all installation and set up procedures have been completed e Before operational tests are performed remove all blocks or other temporary holding means used for shipment from all component devices Security Technical 7 e Remove tools meters and debris from equipment Failure to follow these instructions can result in injury or equipment damage Follow all start up tests recommended in the equipment documentation Store all equipment documentation for future references Software testing must be done in both simulated and real environments Verify that the completed system is free from all short circuits and grounds except those grounds installed according to local regulations according to the National Electrical Code in the U S A for instance If high potential voltage testing is necessary follow recommendations in equipment documentation to prevent accidental equipment damage Before energizing equipment e Remove tools meters and debris from equipment
29. ECURITY TIME TRANSP USER DNP Diags link net trans appl user C gt DNPDIAG ENABLE APPL DBASE USER SECURITY DNP3 Diags Enabled 0 1 2 3 4 ETH1 APPL DBAS T USER SECURITY C gt DIAG Connecting to diagnostic display Use lt ESC gt to disconnect gt 32000 Application Header Authentication Request FIR 1 FIN 1 CON 0 UNS 0 SEQ 1 Rx Object 120 Authentication variation 4 qualifier 0x07 8 Bit Limited Quantity Rx Authentication Key Status Request User 1 lt 32000 Build DNP3 Message Authentication Key Status Tx Object 120 Authentication variation 5 qualifier 0x5b 16 Bit Free Format Tx Authentication Key Status User 1 Sequence 1 KeyWrapAlgorithm AES 128 hmacAlgorithm SHAl1 4 OCTET Status 2 NOTINIT lt 32000 Insert request in queue Authentication Key Status lt 32000 Application Header Authentication Response FIR 1 FIN 1 CON DI UNS 0 SEQ 1 gt 32000 Application Header Authentication Request FIR 1 FIN 1 CON 0 UNS 0 SEQ 2 Rx Object 120 Authentication variation 6 qualifier 0x5b 16 Bit Free Format Rx Authentication Key Change Request User 1 Key Length 32 Sequence 1 Expected 1 SUCCESS lt 32000 Build DNP3 Message Authentication Key Status Tx Object 120 Authentication variation
30. NP3 Secure Auth nticati n ed e ceca na a pa apad eaea e aa Sa eae Aaaa E aE AE idi 36 rera 1 Challenged FUuNGtiOns EREE ETAT EO TE E S SS TAE 36 K Securty SettiNgS ein ae a RN E A A AA AE A AS 38 7 2 3 Aggressive EE 41 7 2 4 Vulnerabilities e E E 43 7 3 AGA12 Encryption EE 44 K ba AGAT2 Node RT EE 45 7 3 2 AGA12 Gatew ay and Session Establishment 47 7 3 3 AGAT2 Gateway RE 49 7 3 3 1 Configuring an AGA12 Gatew ay HILL 51 7 3 4 Secure Communications and Node Operation cece eee eee e eee ce cece cece see seeseesnessegseseseseeeeees 52 7 3 5 Typical System layout 54 7 3 6 Addressing and Local Communication 55 7 3 7 Remote RTUs Communicating using an AGA12 Gatew au 56 7 3 8 Operating as a Data Concenttrator ee eeceeeceeseeseeeneeeeeeeseeeeeeseeseeeaeeeaeesaeseaeeeaeesaeseaeeeeseeesseesaeesseesaeeeaeeeaeeeae 57 7 3 9 Example Configurations EE 58 Ti3 10 AGA12 Parameters EE 60 7 3 10 1 DNP3 Routing Table and AGA12 Gettngs nenne 61 Contents 3 7 3 10 2 Fixed AGA12 2 Parameters tna tAtnA AtA EAEE EAEn EEE EE an En nean an anene 63 7 3 10 3 Vulnerabilities E 64 T a ET EE 65 7 5 Peer Communication Multiple Masters amp Start Up and Shutdown sssssssssssesrsssureunnnnnnnnnnnenunnnnnnnnnnnnnnnnnn 67 7 6 Sec rity Considerations seiten EES Eege 68 8 Security Adminisraton SEENEN ence ee ee ENEE ence ee eee seca REENEN ENEE ENEE 69 8 1 Security File Management amp Counterpart Entry Management 2 csc
31. P3 message is received by a AGA12 Gateway in Mixed Mode on a Clear Text port A route entry has AGA12 security level but can t be sent to the Local Access port Message is discarded DNP3 message is received by a AGA12 Gateway in Mixed Mode on a Clear Text port A route entry has AGA12 security level but can t be sent to a Clear Text port Message is discarded DNP3 Clear Text message is received on a Cipher Text port Mixed mode is disabled so message is discarded DNP3 Clear Text message is received by a AGA12 Gateway on a Clear Text port Mixed Mode is disabled and even though a route entry has no security level message is discarded D16 DNP3 message is received by a AGA12 Gateway on a Clear Text port A route entry has AGA12 security level and is sent encrypted on a Cipher Text port DNP3 message is received by a AGA12 Gateway on a Clear Text port A route entry has AGA12 security level but can t be sent to the Local Access port Message is discarded DNP3 message is received by a AGA12 Gateway on a Clear Text port A route entry has AGA12 security level but can t be sent to a Clear Text port Message is discarded DNP3 Clear Text message is received on a Local Access port Mixed mode is disabled so message is discarded DNP3 message is received in Mixed Mode on the Local Access port A route entry has no security level and is routed in Clear Text DNP3 Clear Text message is received on a Local Access port in Mixed Mode A route entry has AGA12
32. PP routing and AGA12 Gateway operation e Static session negotiation for dynamic session exchanges standard AGA12 e Dynamically changing on air keys for maximum protection e Association numbers Session ids validity time windows standard AGA12 e Fixed signaling character and byte stuffing characters as per AGA12 2 reference application for DNP3 e Counterpart List detailing nodes permitted to interact with this node key definitions time windows e Communication synchronization to re establish AGA12 sessions following expiry of sessions standard AGA12 feature Omissions The SCADAPack E RTU does not currently provide the following AGA12 2 facilities Selection of AES128 CBC mode Cipher Block Chaining and session establishment BEG message AGA12 2 changes from March 2006 These will be supported in a future version of the SCADAPack E RTU Selection of AES128 PE low SCM latency high computation variant of AES encryption This methodology is useful for SCM bump in the wire external devices to minimize re transmission latency This is not a consideration where systems deal with only remote SCADAPack E RTU s Virtual SCM devices as there is no serial retransmission of cleartext messages Where the SCADAPack E RTU AGA12 Gateway transmits cleartext data this is typically at a higher data e g va Ethernet AES128 PE may be supported in a future version of the SCADAPack E RTU Selectable signaling characters and byte stuffin
33. Rule D9 The routing rule numbers have the following meanings D1 Security is not enabled DNP3 message is for me and is processed Security is not enabled DNP3 message has a route in the route table and is routed in Clear D3 DNP3 Clear Text message is received for me on a Cipher Text port in Mixed Mode not as a Data Concentrator Message is discarded D4 DNP3 Clear Text message is received on a Cipher Text port in Mixed Mode A route entry has no Security Level so is routed in Clear Text D5 DNP3 Clear Text message is received on a Cipher Text port in Mixed Mode A route entry has AGA12 security level so message is discarded De DNP3 message is received on Local Access port for me and is processed D7 DNP3 message is received by a AGA12 Gateway in Mixed Mode on the Local Access port A route entry has no security level and is routed in Clear Text DNP3 Clear Text message is received by a AGA12 Gateway on a Local Access port in Mixed Mode A route entry has AGA12 security level so message is discarded DNP3 message is received for me as a AGA12 Gateway on a Clear Text port and is processed D10 DNP3 message is received by a AGA12 Gateway in Mixed Mode on a Clear Text port A route entry has no security level and is routed in Clear Text 11 DNP3 message is received by a AGA12 Gateway in Mixed Mode on a Clear Text port A Security Technical route entry has AGA12 security level and is sent encrypted on a Cipher Text port DN
34. S INC CR ITS CONTRI BUTORS BE LI ABLE FOR ANY INDI RECT NC DENTAL SPECI AL EXEMPLARY OR CONSEQUENT AL DAIVAGES 1NCLUD NG BUT NOT LIM TED TQ PROGUREMENT OF SUBSTI TUTE GOODS OR SERVI CES LOSS O USE DATA OR PROFI TS OR BUSI NESS NTERRUPTI ON HOWEVER CAUSED AND ON ANY THEORY LI ABI LI TY WETHER IN OONTRACT STRI CT LI ABI LI TY CH TORT 1 NCLUDI NG NEGLI GENCE OR OTHERWSE ARI SING IN ANY WY OUT QF THE USE TH S SOTW EVEN IF ADVISED O THE POSSI BI LI TY OF SUCH DAMAGE TH S LIM TATI ON CF LI ABI LI TY SHALL NOT APPLY TO Security Technical 9 LI ABI LI TY FOR DEATH CH PERSONAL NJURY RESULTING FROM SUCH PARTY S NEGLI GENCE TO THE EXTENT APPLI CABLE LAW PECH BI TS SUCH LI M TATI CN SOE JURI SDI CTI ONS DO NOT ALLOW THE EXCLUS ON CR LI M TATI CN CF I NCI DENTAL CH OCNSEQUENTI AL DAVA S SO THAT EXCLUSI CN AND LI M TATI ON MAY NOT APPLY TO YOU FURTHER YOU AGREE THAT IN NO EVENT WLL Q SOO S LI ABI LI TY UNDER CR RELATED TO TH S AGREEMENT EXCEED AMOUNT FI VE THOUSAND DCLLARS US US 5 000 LICENSE TERMS Copyright c 2002 D Brian G adman Wrcester UWK AIl rights r eser ved The free distribution and use of this software in both source and binary formis allowed wth or wthout changes provi ded that 1 distributions of this source code incl ude the above copyri ght notice this list of conditions and the foll owi ng di scl ai ner 2 distributions in binary formincl ude the above copyri ght notice this lis
35. SCADAPack E Security Technical Reference Schneider Documentation 2 SCADAPack E Security Technical Reference Table of Contents Part I a P O N ch Security Technical 4 Technical Suppor ecoin eg ce teen ddan oe cect ee cect we ce dpe ee cet ened cade NEE ee ca 4 Safe lte E Le EE 5 ROTC re NCO ries eccts cts E A E E Se ectind cceecelatceleesnde See 7 TO du le e E 9 WMO GUC RE 12 De WEE EI EE 13 5 2 Operational Goals Functionality Summary amp Standard RTU Operation s cscsssseeceeesteeeseeeeeeeeeeeneens 15 5 3 SCADAPack E RTU Seet a r r E a a raa aA a SieEEeEEEEeEen 17 5 3 1 What is DNP3 Secure Autbentcaton nenen neneen nennen 18 5 3 2 How does DNP3 Secure Authentication Work 18 loi We We EE EE 20 5 34 How does A GA 12 Work EE 22 5 3 5 Supported AGA12 2 Functonaty EEN 22 5 3 6 How do DNP3 Secure Authentication and AGA12 Encryption Work Wee e 24 5 3 7 Highlights of SCADAPack E RTU Security E EE EI WEE 5 5 Key Management Eed Eeer 5 5 1 SCADAPack E Configurator Key Modes annen nn nennen e 5 5 2 Master Key Contiouraton 5 5 3 Compact Flash Entry and UTIL LED 5 5 4 Local USB Configuration 5 6 User based Authentication E Telnet and FTP Autbenttcaton SEENEN REENEN REENEN EEN EEN EEN Using SCADAPack E Security ss risssrseissonrerininnranonninnnianAonnnNEnANNNAANSSNENNEEN nOn NREN ANN NANES SANNAA NS iann 33 7 1 Description of Security Facilities s n E r a A a 35 7 2 D
36. Scenarios are the same as described above for various connection points in the network Requires either knowledge of Master address encryption and hash keys or requires physical access to RTUs May also be possible through physical or logical access to SCADA LAN in order to access and route through the gateway See Protocol Attacks on RTUI93 and Networked Configuratorl9e 10 4 Security Technical IP Networked RTUs amp Duplicated RTU Personality IP Networked RTUs An attacker connects to the wde area IP network attempting to connect to RTUs IP end nodes with DNP3 Secure Authentication enabled process transported DNP3 frames as if they were arriving locally They are treated the same way so attack vectors described above apply with respect to DNP3 data IP end nodes with AGA12 security enabled process transported DNP3 frames as if they were arriving on a standard serial link AGA12 encrypted DNP3 frames are treated the same way so attack vectors described above apply with respect to DNP3 data Remote DNP3 master station or configuration messages arriving at the RTU require either DNP3 Secure Authentication or AGA12 Encryption security va an AGA12 Gateway IP security for access to IP device connectivity is not used by SCADAPack E RTUs Duplicated RTU Personality An attacker takes a configuration file or plug in media and loads it on a stolen RTU Security information is not included in standard RTU configurations that ca
37. ailable from IEC Webstore Security Technical 9 4 Terminology SCADA Security and its options for Encryption and Authentication can be complex Refer to this glossary of terms used in this document For additional definitions related to SCADAPack E see SCADAPack E Technical Overview AGA12 Gateway RTU An SCADAPack E RTU operating mode that performs encoding and decoding between cleartext 9 and ciphertext 9 on behalf of other nodes in the network Commonly used to interface a secure AGA12 network to a cleartext master station The DNP3 Host uses the AGA12 gateway feature of a SCADAPack ES to encypt plain text DNP3 messages frong from the Host to the RTUs in the field The same gateway decrypts the cipher text messages coming back from the field RTUs to the Host AGA12 Node A device providing SCADA Cryptographic Module SCM services in order to receive and transmit secure data to the AGA12 2 standard Authentication A challenge and reply exchange between two devices that provides them both with confidence that the other device is who it claims to be Authority An independent entity holding and providing security credentials The SCADAPack E Security Administratorl 11 application is an example of a simple authority Challenger A device attempting to authenticatel 9 that a partner device is who it claims to be See also Responder 10 Cipher Suite A set of cryptographic algorithms keys and parameters identified by a cipher su
38. although it avoids making this worse e Authentication e Confidentiality e Minimal number of messages additional to the SCADA messages e g initiating sessions only when SCADA units send a message the first time no retries and no keep alive messages Functionality Summary The Integrated Security functionality provided by the SCADAPack E RTUs includes Secure Authentication with optional integrated user credentials and maintenance software security Protection is provided on DNP3 communication ports operating on short range local and long range remote links DNP3 Secure Authentication is provided to v2 of the DNP User Group Secure Authentication standard AGA12 Encryption for DNP3 is provided to the AGA12 2 recommendations DNP3 Secure Authentication and AGA12 Encryption security on SCADAPack E RTUs applies only to DNP3 communications The following SCADAPack E RTU communications media support security e DNP3 RS232 serial ports e Hayes Modem dial up connections DNP Secure Authentication only e DNP3 RS422 serial ports e DNP3 RS485 serial ports e DNP3 IP communications TCP and UDP including Ethernet PPP GPRS 1xRTT etc e USB local connection SCADAPack 300E controllers only Security is a licensed feature of SCADAPack E RTUs When the controller is licensed for Encryption AGA12 or Authentication SAv2 security operation is activated when a security configuration file is loaded in to the device The security configuration
39. andard DNP3 communications AGA12 GWn types are not usually used in configurations on a gateway Typically they are used for end node RTUs M DNP3 Network DNP3 Routing Table SrePort_ SreStart Sre End Dest Start Dest End Dest Port ConnectNo status acaz Lifetime Table End 0 65535 0 0 USB 0 On Static AGAI2Node 0 Table End 0 65535 0 0 USB 0 On Static None o Table End 0 65535 0 0 USB 0 On Static AGA12 GYM o Table End 0 65535 0 0 USB 0 On Static AGA12 GW2 o 5 Table End 0 65535 0 0 USB 0 On Static AGA12 GW3 o Ip Table End 0 65535 0 0 USB 0 On Static AGA12 Gm o Table End 0 65535 0 0 USB 0 On Static AGAIZGWS sl 5 Table End 0 65535 0 0 USB 0 On Static None o B Table End 0 65535 0 0 USB 0 On Static None 0 Table End 0 65535 0 0 USB 0 On Static None o Table End 0 65535 0 0 USB 0 On Static None o Table End 0 65535 0 0 USB 0 On Static None o Table End 0 65535 0 0 USB 0 On Static None o Table End 0 65535 0 0 USB 0 On Static None o TableEnd 0 65535 0 0 USB 0 On Static None o Table End 0 65535 0 0 USB 0 On Static None 0 Encryption Settings AGA12 encryption settings for an AGA12 Gateway operate the same way as a remote RTU Encryption modes and counterpart entries are configured by the Security Administrator application and deployed through Compact Flash security key GCADAPack ES SCADAPack ER or SCADAPack E Configurator Configuration of gateway settings for non
40. at has no security level Message discarded AGA12 Gateway Mixed Mode disabled DNP3 message sent as encrypted AGA12 message on a Cipher Text port DNP3 message sent in Clear Text on Local Access port O11 Mixed mode disabled DNP3 message can t be sent on a Cipher Text port with route entry that has no security level Message discarded DNP3 message sent as encrypted AGA12 message on a Cipher Text port Security Technical at 013 Mixed mode enabled DNP3 message sent to Slave RTU in Clear Text on a Cipher Text port as route entry has no security level 014 Mixed mode enabled DNP3 message can t be sent on a Cipher Text port with route entry that has no security level Message discarded 015 AGA12 Gateway in Mixed mode DNP3 message sent to Slave RTU in Clear Text on a Cipher Text port as route entry has no security level 22 SCADAPack E Security Technical Reference 9 2 3 Diagnostic Example Session Open Transactions AGA12 Session Open Transactions AGA12DIAG ENABLE 15 04 09 359 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 AGA12 gt gt Bytes Rx on Port 0 10 11 21
41. ay RTU 49 e Secure Communications and Node Operation 52 e Typical System Layout 54 e Addressing and Local Communication sei e Remote RTUs Communicating using an AGA12 Gateway 5e e Operating as a Data Concentratorl 57 e Example Configurations 5 e AGA12 Parameters 60 7 3 1 Security Technical 45 AGA12 Node RTU The majority of SCADAPack E RTUs in an AGA12 Encryption secured system will operate as AGA12 Node RTUs This includes RTUs whose functions are e End node devices communicating with Master Station s e End node devices communicating with Peer node devices e Routing devices that pass messages between RTU sub networks e AGA12 2 frame routing e Cleartext DNP3 frame routing where Mixed Mode is enabled meer Local Access Port DNP3 Protocol E series RTU communicates using ENCRYPTED PROTECTED AGA12 2 FRAMES Figure 5 2 AGA12 Node as an RTU End Node Device AGA12 Node RTUs are configured through the SCADAPack E DNP3 Network Routing Table with the SCM address DNP3 destination address of the AGA12 Gateway through which they communicate with the Master Station The route entry s AGA12 field needs to be set to one of the AGA12 Gateway settings AGA12 GW1 AGA12 GWa The SCM address of the Gateway is itself set through the Security Administrator software and security configurations loaded to the AGA12 Node RTUs include configurations for up to five 5 AGA12 Gateway device
42. based authentication to be selected in SCADAPack E Configurator and the controller as a separate layer of security The default key mode is provided for simplifying initial access to controllers however it is strongly recommended that you not use the factory default key mode in field installations Common Key Mode To simplify key management for small systems the common key mode provides more security than the default key mode The common key mode requires that the same Configurator security configuration file be deployed to every instance of SCADAPack E Configurator The advantage of this is that it means you only have to maintain one key for all of your SCADAPack E Configurator installations The disadvantage of this is that if a laptop with SCADAPack E Configurator is compromised the security configuration files needs to be updated on all instances of SCADAPack E Configurator as well as on every controller that is associated with SCADAPack E security features The common key is generated as part of the Security Administrator project settings Like the default key and unique key modes this option does allow user based authentication in SCADAPack E Configurator and the controller Unique Key Mode The unique key mode provides the highest level of security Each instance of SCADAPack E Configurator is identified using a specific security configuration file This file is tied to a Machine ID to restrict operation of the software to authorized PCs
43. by the router relying on the destination node to protect itself e Mixed Mode is enabled by default following AGA12 2 standard allowing unprotected cleartext DNP3 frames to be routed untouched it is the responsibility of the destination node to protect itself by rejecting unprotected cleartext DNP3 frames if necessary If you disable Mixed Mode cleartext DNP3 frames are not routed e Cleartext DNP3 frames received on a Local Access port can be routed to a ciphertext port but only when Mixed Mode is enabled for AGA12 Encryption only licensing If you have DNP3 Secure Authentication licensed or DNP3 Secure Authentication with AGA12 Encryption as your license options this does not apply i e whenever DNP3 Secure Authentication is enabled routing is allowed e Cleartext DNP3 received by a secure RTU will not be encrypted and routed in ciphertext This is the purpose of AGA12 Gateway RTU devices but this mode needs to be explicitly configured This forms part of the secure configuration methodology used to configure AGA12 RTU encryption and is not permitted to be remotely enabled or disabled e These routing rules are supported by a number of SCADAPack E RTU diagnostics detailing specific forwarding or rejection of frames dependent on frame type cleartext ciphertext port type ciphertext clear device local access security operation AGA12 enabled mixed mode gateway SCADAPack E Security Technical Reference mode ro
44. c All rights reserved Subj ect to the foll owi ng terns and conditions Q sco Systems Inc hereby grants you a worl dwi de royalty free nonexclusive license subj ect to third party intellectual property claims to create deri vati ve works of the Licensed Code and to reproduce di spl ay perform sublicense distribute such Licensed Code and deri vative works All rights not expressly granted herein are reserved 1 Redistributions of source code nust retain the above copyri ght notice this list of conditions and the follow ng di scl ai rer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the foll owi ng di scl ai mer in the documentation and or other materials provi ded wth the di stri buti on 3 The names Q sco and Q sco AGA 12 1 Reference npl erent ati on must not be used to endorse or promote products derived fromthis software wthout prior witten perm ssion For witten perm ssion pl ease contact opensour ce i sco com 4 Products derived fromthis software may not be called Q sco or Q sco AGA nor may Q sco or Q sco AGA appear in their nane wthout prior witten perm ssion of Q sco Systems Inc TH S SOFTWARE S PROVI DED AS 1S AND ANY EXPRESSED OR MPLI ED WARRANTIES INCLUDI NG BUT NOT LIM TED TO THE MLI ED WARRANTI ES QF MERCHANTABI LI TY FI TNESS FOR A PARTI CULAR PURPOSE TITLE AND NON NFRI NGEMENT ARE DI SCLAI MED IN NO EVENT SHALL CI SCO SYSTEM
45. c Example Incorrect Security Credentials 7 e Diagnostic Example Successful Critical Message Challengel7 Diagnostic Example No RTU Security Configured DNP3 Secure Authentication Example 1 In the following example a master device tries to establish DNP3 Secure Authentication session with SCADAPack E RTU RTU is not configured for or does not support DNP3 Secure Authentication C gt DNPDIAG Set DNP Diag Filters Usage DNPDIAG mode filter filter param Where mod ENABLE DISABLE Where filter 12 3 ETH APPL BYTES DBASE EVENTS FILTER_ADDR LINK NETWORK RAW_NET SECURITY IME TRANSP USER DNP Diags link net trans appl user C gt DNPDIAG ENABLE APPL DBASE USER SECURITY DNP3 Diags Enabled 0 1 2 3 4 ETH1 APPL DBASE USER SECURITY C gt DIAG Connecting to diagnostic display Use lt ESC gt to disconnect gt 32000 Application Header Authentication Request FIR 1 FIN 1 CON 0 UNS 0 SEQ 1 Rx Object 120 Authentication variation 4 qualifier 0x07 8 Bit Limited Quantity Rx Authentication Key Status Request User 1 SCADAPack E Security Technical Reference lt 32000 Insert request in queue NULL Response lt 32000 Application Header Respons FIR 1 FIN 1 CON 0 UNS 0 SEQ 1 TIN 0x0100 32000 IIN Bits IIN2 0 Function Code N
46. ceiveHeader dest 2 src 4 sessionld 1 sequence 2201128847 type 1 15 04 09 781 AGA12 gt gt Transport updateMac in receivePayload 10 bytes 15 04 09 796 AGA12 gt gt Packet receiveHeader dest 2 src 4 session 1 type 1 size 0 15 04 09 796 AGA12 gt gt Transport receivePayload length 1 169 15 04 09 796 AGA12 gt gt Transport receiveTrailer 15 04 09 796 AGA12 gt gt Packet receiveTrailer 15 04 09 796 AGA12 gt gt SessionRequest base 0 expiry 278 15 04 09 796 AGA12 gt gt SessionRequest base 45785 expiry 72000 15 04 09 796 AGA12 gt gt SessionRequest base 9785 expiry 72000 15 04 09 812 AGA12 gt gt SCM received OPN 4 gt 2 1 nonce 2813167e data id 2 resolution 100000 tolerance 21 base 0 expiry 278 suite 1 macLength 20 key 2FAC98B13B2E68AD43B486CC6709D21E macKey 93541 242DB1 1551B678CCB3752A6DA3C2FD8C569 15 04 09 812 AGA12 gt gt SCM remove Session broadcast lt 4 id 1 15 04 09 812 AGA12 gt gt SCM remove Session broadcast lt 4 id 2 15 04 09 812 AGA12 gt gt New session 2 lt gt 4 2 15 04 09 812 AGA12 gt gt SCM add 2 lt gt 4 id 2 15 04 09 812 AGA12 gt gt SessionRequest base 0 expiry 256 15 04 09 828 AGA12 gt gt New session broadcast lt gt 4 1 15 04 09 828 AGA12 gt gt SCM add broadcast lt 4 id 1 15 04 09 828 AGA12 gt gt SessionRequest base 45785 expiry 72000 15 04 09 828 AGA12 gt gt New session broadcast lt gt 4 2 e SCADAPack E Security Technical Reference 15 04 09 828 AGA
47. ch of the AGA12 2 processing layers INROUTE Inbound routing rule diagnostics OUTROUTE Outbound routing rule diagnostics RAWBYTES AGA12 frame bytes as they are received and transmitted on the communications port SCADAPack E Security Technical Reference 9 2 2 Routing Rule Diagnostics AGA12 amp DNP3 Routing Diagnostics Inbound AGA12 frames received on a cipertext port and not destined for the receiving node are routed according to DNP3 routing entries They are routed and are not subject to the AGA12 processing rules or DNP3 routing rules that result is the diagnostic messages described in the following tables AGA12 frames destined for the receiving node are subject to routing rules and will produce messages described in the following tables DNP3 frames being unsecured are subject to routing rules and will produce messages described in the following tables SCADAPack E routing diagnostics refer to the route rule numbers These are shown along with a description of their meaning in the following tables e Routing Rule Diagnostics for Inbound DNP3 Eramesd ze e Routing Rule Diagnostics for Inbound AGA12 Framesi79 e Routing Rule Diagnostics for Unsolicited Peer Master Messages 80 Routing Rule Diagnostics for Inbound DNP3 Frames When the AGADIAG ENABLE INROUTE command is used diagnostics similar to the following are shown referencing routing rules AGA12 gt gt Inbound DNP3 frame from 32002 Process Frame for Me
48. ch00 00004 gt 00002 FRAME ADDRESSED TO ME 15 09 09 593 gt ch00 00004 gt 00002 TRANSPORT HEADER First 1 Final Sequence 01 15 09 09 593 gt ch00 00004 gt 00002 APPLICATION HEADER READ Security Technical First 1 Final 1 Confirm 0 Sequence 02 15 09 09 609 lt ch00 00004 lt 00002 APPLICATION HEADER RESPONSE TO REQUEST First 1 Final 1 Confirm 0 Sequence 02 IIN 0x8020 15 09 09 609 lt chO0 00004 lt 00002 TRANSPORT HEADER First 1 Final 1 Sequence 06 15 09 09 609 lt ch00 00004 lt 00002 PRIMARY LINK HEADER UNCONFIRMED USER DATA FCV 0 FCB 0 DIR 0 Length 177 15 09 09 609 AGA12 gt gt Received Scada message dest 4 src 2 15 09 09 625 AGA12 gt gt Transport sendHeader dest 4 src 2 session 2 type 3 15 09 09 625 AGA12 gt gt LinkLayer send header 10 bytes 23 00 04 00 02 02 00 00 00 67 15 09 09 625 AGA12 gt gt LinkLayer send payload 204 bytes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
49. configuration for security parameters for both security methods The SCADAPack E Security Administrator provides for combined mode operation Secure Node Operation On an SCADAPack E AGA12 Node RTU all but one of the DNP3 communication ports including Security Technical 53 Ethernet and PPP ports are Ciphertext ports One port on SCADAPack E RTUs is set aside as a Local Access DNP3 port for configuration of the RTU as normal Configuration of encryption settings on an SCADAPack E RTU is not carried out through the normal configuration mechanism You need to configure AGA12 Encryption using the Security Administrator application Use a plug in Compact Flash cardfs1 for SCADAPack ES SCADAPack ER or locally through the USB port from the SCADAPack E Configurator Remotely configuring Security using SCADAPack E Configurator is also possible if configured by the Security Administrator Routing is supported for ciphertext AGA12 frames and cleartext DNP3 frames when in mixed mode For more information see Routing 65 s SCADAPack E Security Technical Reference 7 3 5 Typical System Layout Configuration j E A DNP3 capable gege Master Station CC DNP3 AGA12 Gateway DNP3 AGA12 Router AGAI2 capable Outstations AGAI 2 capable Outstations DNP3 Outstation no security Figure 8 1 Where AGA12 Gateway is Used example shows Mixed Mode Security Technical 55 7 3 6 Addressing
50. d Individual Counterpart entries are still required for AGA12 configurations The AGA12 Gateway address configurations previously described also allow the use of separate AGA12 gateways for multiple masters that communicate with an SCADAPack E RTU The AGA12 Gateway address fields may also be referenced from other routing table entries See Remote RTUs Communicating Via a AGA12 Gatewayl5e Start Up and Shutdown As per the AGA12 2 standard system start up generates new random seeds for the OPN association number Upon a DNP Warm Restart or RTU Orderly shutdown an AGA12 2 CLS close session is issued to any open AGA12 connections e SCADAPack E Security Technical Reference 7 6 Security Considerations Use of IP facilities While the AGA12 encryption mechanism on SCADAPack E RTUs applies to media and transports used for DNP3 non DNP3 IP application communications in particular may not be secure As such an RTU operating with wide area TCP IP communications and using AGA12 encryption for DNP3 should NOT have the following services enabled without consideration of the security implications e Telnet e FTP e Modbus TCP Server IP Forwarding Restricted When AGA12 Encryption security is active on an RTU operating as an AGA12 Gateway IP Forwarding across IP interfaces which are normally enabled on SCADAPack E RTUs are DISABLED This prevents one IP network interface automatically forwarding routing IP packets to other interface
51. data stream For SCADAPack E RTU security implementation these are chosen to minimize cleartext DNP3 frames from attempting synchronization part way through a ciphertext SSPP frame SCn characters represent the SCADA protocol Character to be replaced RCn characters represent the replacement Character Hardcoded characters are chosen as follows ESC octets are byte stuffed with ESC ESC if followed by one of ESC SOM SOT EOM SC1 RC1 For SCADAPack E RTUs 05 octets are replaced by 10 15 A Typical SSPP frame format ESC SOM 10 byte header encrypted payload ESC SOT trailer ESC EOM 10 11 header payload 10 13 trailer 10 14 e SCADAPack E Security Technical Reference 7 3 10 3 Vulnerabilities Addressed Outstation security modes can be changed remotely for convenience if so enabled For highest security disable this in the SCADAPack E Security Administrator application Security configuration then requires Physical Access Setting a Master Key requires Physical Access Routing and encoding from cleartext to ciphertext is only permitted in AGA12 Gateway mode The state of the Gateway mode setting can be read via a read only system point but cannot be changed remotely or using SCADAPack E Configurator default is Gateway Mode DISABLED The RTU s general configuration file does not hold a copy of security information such as keys or security modes Key configurations are stored in encrypted format AGA12 Mixed Mode operat
52. der Respons FIR 1 FIN 1 CON 0 UNS 0 SEQ 3 IIN 0x0000 Security Technical 9 2 AGA12 Encryption Diagnostics Extensive diagnostics are provided by the SCADAPack E RTU for AGA12 Encryption operation and communication e Diagnostic Filteringl77 e Routing Rule Diagnostics zi e Diagnostic Example Session Open Transactions 82 e Diagnostic Example Session Re establishment Transactions sch e System Points 91 9 2 1 Diagnostic Filtering A Command line diagnostic interface is provided on the SCADAPack E RTU for AGA12 For more information on command line operation and diagnostics refer to the SCADAPack E Operational Reference Manual Set AGA12 Diag Filters Usage AGA12DIAG mode filter filter Where mode ENABLE DISABLE Where filter SCM PACKET TRANSPORT LINK BYTES INROUTE OUTROUTE RAWBYTES TIMESTAMP The filters can be set for various levels of diagnostics on AGA12 communications See Diagnostic Example Session Open Transactions 82 and Diagnostic Example Session Re establishment Transactions ss for typical diagnostic output FILTER i diagnostics A large volume of information provided for each transaction SCM SCADA Cryptographic Module highest AGA12 layer diagnostics PACKET AGA12 packet receive header diagnostics TRANSPORT AGA12 transport wrapper diagnostics LINK AGA12 link layer receive and send length diagnostics BYTES The data content bytes as each is decoded or built for ea
53. e select from one of the AGA12 GWn types on the route entry This causes the AGA12 messages to be directed to a nominated gateway SCM address rather than to the destination DNP3 address A route entry for a master station needs to be present where an AGA12 Gateway is used for communication with that master station An AGA12 GWn type can select from one of five Gateway SCM DNP addresses Multiple gateways can be used for a number of purposes including multiple masters and distributed access from configuration terminals See Section Peer Communication Multiple Masters amp Start Up and Shutdown 67 Multiple Masters 67 The Gateway SCM addresses form part of the security configuration set by the Security Administrator Security Configuration is deployed va plug in media SCADAPack ES SCADAPack ER or via SCADAPack E Configurator When sending a DNP3 message using AGA12 ciphertext e g encoding a DNP3 frame to AGA12 and there is a route entry selecting an AGA12 GWn type for that entry the AGA12 frame is sent to the nominated device Virtual SCM address rather than the device at the destination DNP3 address The destination DNP address being transported by the AGA12 frame is not modified For DNP3 frames to be sent to a Master in ciphertext and for which no route entry is present for the master s DNP3 address the master s DNP3 address will be used as the destination SCM address this is the default For system
54. e Security Administrator application s PC and on each of the physical RTU devices is an important link in the security chain This should be carried out by trusted personnel only Security Technical 95 10 2 Routed Communication to RTU amp Access to Gateway Routed Communication to RTU The attacker routes across a wde area DNP3 SCADA network to attempt to connect to RTU DNP3 cleartext DNP3 Secure Authentication and AGA12 2 SSPP cipher text messages are routable by nodes even when AGA12 is enabled The end node is responsible for protecting itself as per Protocol and Configuration attacks on RTU E Access to Gateway An attacker attempts to connect to the AGA 12 Gateway The Ethernet port on an AGA12 Gateway device is typically enabled for clear device operation and DNP routing Access from beyond the SCADA LAN is required to be protected by firewall Physical access to the SCADA LAN would be required to compromise this It is an important part of the security chain to protect physical access to the AGA12 Gateway An AGA12 Gateway will not answer cleartext requests on its ciphertext ports even though it may route clear RTU responses back to the master station Remote access back in to the Gateway to read or disrupt routing requires AGA12 access and key knowledge See Protocol Attacks on RTU 93 Gateway security settings and in fact security settings are not exposed through remote links ER SCADAPack E Security Technical R
55. ed frame corrupted key mismatch AGA12 ACK Timeouts 57612 Session open attempts where no reply was received within the timeout period AGA12 Frames Blocked 57613 AGA12 frames that couldn t be delivered e g no configured SCM address AGA12 Frames Routed 57614 Successfully routed AGA12 frames AGA12 Frames Decoded 57615 Successful incoming frames correctly signed and decrypted AGA12 Frames Encoded 57616 Outgoing frames successfully delivered 2 SCADAPack E Security Technical Reference 10 Attack Vectors amp Requirements The following descriptions are not for an exhaustive analysis of possible attack vectors rather highlight usage guidelines and reasons for those guidelines when using DNP3 Secure Authentication and or AGA12 on SCADAPack E RTUs The intention is to make the user aware how to maximize the effectiveness of deploying security e Configurator or DNP3 to RTU amp AGA 12 to RTUI93 e Routed Communication to RTU amp Access to Gatewayl95 e RTU Local Port Access Networked Configurator amp Spoofing Master Address oc e IP Networked RTU amp Duplicated RTU Personalityl9 Security Technical 93 10 1 Protocol and Configuration attacks on RTU Configurator or DNP3 attack on RTU The attacker uses SCADAPack E Configurator or other DNP3 software through the SCADA comms link to attempt to connect to RTU SCADAPack E Configurator uses DNP3 and operates in either clear text or using DNP3 Secure Authent
56. eference 10 3 RTU Local Port Access Networked Configurator amp Spoofing Master Address RTU Local Port Access The attacker connects SCADAPack E Configurator or malicious software to AGA12 local clear device port on an RTU at a site or a stolen device lf AGA12 security is licensed and configured but DNP3 Secure Authentication is not configured the Local RTU may be compromised as physical access is available If DNP3 Secure Authentication is used local configuration or control attempts will be challenged If RTU is operating with DNP3 Secure Authentication only or in AGA12 Mixed Mode messages may be routed throughout the network Each RTU is responsible for its own protection AGA12 protected RTUs will discard any cleartext messages from the network DNP3 Secure Authentication configured devices will challenge any remote configuration or control attempts RTU device will not encrypt cleartext to AGA12 ciphertext Networked Configurator An attacker sitting on a network behind the AGA12 Gateway uses SCADAPack E Configurator to attempt to connect to RTU The SCADA sub network where the authorized SCADAPack E Configurator is connected requires IP security e g firewall to prevent unauthorized nodes from accessing the gateway If DNP3 Secure Authentication is licensed and configured critical messages are challenged by the RTU Spoofing Master Address An attacker spoofs the Master Station address to attempt to connect to RTU
57. eployed locally AGA12 Counterpart Entry Management Authorization for this node to communicate with other AGA12 nodes is given through Counterpart Entries including the Master Station or AGA12 Gateway RTUs The list shown in the lower part of the Security Administrator form provides counterpart entry configuration A separate counterpart entry is required for each node with the Group to which RTUs may communicate with See SCADAPack E Security Administrator User Guide for more information on setting Counterpart Entries Diagnostics e Diagnostic Filteringl7 e Routing Rule Diagnostics z i e Diagnostic Example Session Open Transactions sch e Diagnostic Example Session Re establishment Transactions 89 e System Points ah 9 1 Security Technical DNP3 Secure Authentication Diagnostics A Command line diagnostic interface is provided on the SCADAPack E RTU for DNP3 Secure Authentication For more information on command line operation and diagnostics refer to the SCADAPack E Operational Reference Manual Set DNP3 Diag Filters Usage DNPDIAG mode filter filter Where mode ENABLE DISABLE Where filter SECURITY Other DNP3 protocol diagnostic filters are described in SCADAPack E Operational Reference manual Set the diagnostic filters on other protocol layers using DNPDIAG if necessary then use DIAG command to enter diagnostic stream mode e Diagnostic Example No RTU Security Configured 7 e Diagnosti
58. eted operation on the Compact FLASH Utility port Upon successfully loading a security configuration file from the Compact FLASH port the UTIL LED flashes alternately on and off at a steady rate for 5 seconds 32 SCADAPack E Security Technical Reference 5 5 4 Local USB Configuration The following RTU hardware allows the use of USB peripheral interfaces locally for security configuration entry e SCADAPack 300E RTUs Security Configuration for these devices can be loaded using the USB peripheral interface and SCADAPack E Configurator from a security configuration file generated by the Security Administrator This file is called SYSTEMRTK Like KEYS for a door or any other form of security safe keeping and distribution of security keys is necessary SCADAPack E Configurator For SCADAPack 300E RTUs SCADAPack E Configurator provides a facility for loading the security configuration file through the USB interface Use the Transfer gt Load Security Config File menu item to do so It prompts you to choose the security configuration file Set RTU Time Get ATU Time Write File Read File Update Boot Monitor Update System Firmware Retrieve Trend Data CH Points Class 0 Poll DN 4 Remote Command Line Bi Refresh Page F5 Cc Load Master Key File i Pc Load Security Config File ai Ir Activate License File a main Security Technical 33 5 6 User based Authentication This feature is o
59. g characters These are not available for user configuration rather fixed as per the description in Section Fixed AGA12 2 Parameters 63 BROADCAST or MANAGEMENT dynamic or static session data Management session handling may be provided in a future version of SCADAPack E RTU SCM Bank support for modem banks Instruct an SCM to establish a dynamic session manually forcing a session to open to another SCM device is not supported RCA CAR commands address request amp response are not supported by the SCADAPack E RTU Optimization of SSPP operation for PSTN and other long connection establishment media This may be provided in a future version of SCADAPack E RTU 24 SCADAPack E Security Technical Reference 5 3 6 How do DNP3 Secure Authentication and AGA12 Encryption Work together When used together AGA12 provides the encryption and session validation security facilities while DNP3 Secure Authentication provides the challenge reply authentication security facilities Both AGA12 and DNP3 Secure Authentication standards are relevant to DNP3 communications and SCADAPack E RTUs To suit retrofit of existing systems AGA12 and DNP3 Secure Authentication can be configured without affecting the control system infrastructure and without an interruption in the system s operation Retrofits can be achieved without compromising communications between the RTUs and master stations 5 3 7 Highlights of SCADAPack E RTU Security For
60. gured through the SCADAPack E DNP3 Network Routing Table with the SCM address DNP3 destination address of remote devices that have protection enabled and to which AGA12 encoded messages need to be sent Setting the route entry s AGA12 field to AGA12 Node does this In addition the AGA12 Gateway is configured for DNP3 destination addresses for RTUs that do not have protection enabled and to which cleartext DNP3 messages need to be sent Similarly cleartext messages arriving for the Master Station from unprotected RTUs needs to be allowed through the AGA12 Gateway RTU to the Master Station Setting the route entry s AGA12 type to None does this For more information on AGA12 Gateway configuration see Section Configuring a AGA12 Gateway RTU 5 Session Establishment SCM configuration includes details for authorizing session establishment connection to other AGA12 devices This authorization is managed by way of entries in a Counterpart List by security administration personnel using the Security Administrator Knowledge of DNP3 nodes including unprotected nodes and AGA12 Gateways is handled in the DNP3 ER SCADAPack E Security Technical Reference Network Routing table in the same manner as standard DNP3 communication configuration See Section Remote RTUs Communicating Via a AGA12 Gateway z i An SCM at the master establishes a cryptographic session with its SCM counterpart or multiple SCM counterparts on the channel After a
61. hain and needs to be kept secret Whenever you enter the pass phrase you need to enter it exactly the same each time Security Technical 31 The pass phrase is stored on the security administration computer independently of the Security Administrator project The pass phrase needs to be re entered on every Security Administrator you have installed In addition the Security Administrator provides the means to export a master key file The master key file is called system key When you choose to generate a new master key you will need to update the master key locally at each RTU device using this key as described above and shown in the picture 5 5 3 Compact Flash Entry and UTIL LED Using Compact Flash to load security configuration is supported by the following RTU hardware e SCADAPack ES e SCADAPack ER Security Configuration for these devices can be loaded from a file on the plug in media security key i e CompactFlash card Insertion of a card in to the SCADAPack E RTU is automatically detected If security is licensed on the RTU the media root directory is checked for the security configuration file SYSTEMRTK If the RTU does not find this file the RTU encryption information remains unchanged Like KEYS for a door or any other form of security safe keeping and distribution of AGA12 keys is necessary UTIL LED The SCADAPack ES and SCADAPack ER RTU hardware includes a UTIL LED that indicates the state of a compl
62. hic keyI 10 Le obscuring data so that it looks random in order to hide the content of the data Also see Decryption 101 Key In DNP3 Secure Authentication this is also known as the Update Key and encodes dynamic session keys for authenticating devices In AGA12 this is also known as the Encryption Key to distinguish it from the Mac Key I101 The Key is the common secret held by a pair of devices used for obscuring data before transmission and retrieving data from obscured data stream Key Pair the combination of the Key encryption key and Mac Key which as a pair form the common secret held by AGA12 counterpart devices when the Cipher Suite uses both encryption and verification signing Local Access Port A dedicated local port supporting direct connection of a DNP3 configuration terminal for local maintenance of the RTU For RTUs using AGA12 this is the only port that communicates cleartext DNP3 and is for physically local access only DNP3 Secure Authentication does not use the concept of a local access port on a controller every port is secured Mac Key This is the common secret held by a pair of devices and in used for digitally signing a data stream to ensure it has not been tampered with In SCADAPack E this refers to one of the AGA12 key pairs Mo Master Key The master key customizes the controller security configuration file generated by the SCADAPack E Security Administrator application and is loaded into SCADAPack E RTUs that are
63. ication if enabled Similarly an attack may attempt to utilize third party software with cleartext DNP3 When DNP3 Secure Authentication is licensed and configured on the SCADAPack E RTU the RTU challenges critical cleartext messages for itself If a challenge reply is not forthcoming or is incorrect the critical operation is not performed e g control action configuration change etc When AGA12 security is licensed and configured the RTU discards cleartext messages for itself including wide area ports other than local clear device port If the RTU is secured with DNP3 Secure Authentication then the RTU may be protected using a default common or unique security key The RTU may optionally require the authentication information to include username password credentials If the RTU is secured with AGA12 physical access is required to the local clear device port of the RTU Remote access via DNP3 is only available through a gateway External configuration messages to the RTU are protected RTU needs to have matching key to the configuration in the gateway User needs to have physical or network access to the secured gateway The RTU can optionally allow SCADAPack E Configurator software to change keys for maintenance flexibility If so configured it is highly recommended that DNP3 Secure Authentication also be enabled so it challenges the writing and activation of the new security configuration Protocol Attacks on RTU The attacke
64. ignature in the form of a security key prevents tampering but does not include data encryption See How does AGA12 Work 2 22 for information on encryption See the following for more information on DNP3 Secure Authentication e What is DNP3 Secure Authentication 18 e How does DNP3 Secure Authentication Work 18 AGA12 Suite The AGA12 suite includes specific designs and reference applications for use with DNP3 as well as other SCADA protocols AGA12 is designed to operate outside of existing SCADA protocols specifies an additional protocol wrapper so it s adaptable for implementation on existing systems and new m SCADAPack E Security Technical Reference systems External devices can be used to provide security Typically sessions between a device external to a Master Station e g gateway or other bump in the wire device and Outstations RTUs are secured The IEEE is currently running projects to define AGA12 as part of substation communication security See the following for more information on the AGA12 suite e What is AGA122 20 e How does AGA12 Work 2 22 e Using AGA12 Security 33 Security Technical 15 5 2 Operational Goals Functionality Summary amp Standard RTU Operation Operational Goals The operational goals of the SCADAPack E RTU s integrated security are to provide e Message integrity protection e Defense against injection modification splicing replay reordering but not Denial of Service
65. ing To license either DNP3 Secure Authentication or AGA12 Encryption for DNP3 you need a controller feature licence Typically this is done when the controller is purchased although a controller feature licence can be purchased and added at a later time The controller feature licence file is deployed using SCADAPack E Configurator For more information on licensing RTUs see the SCADAPack E Telemetry Operational Reference manual z SCADAPack E Security Technical Reference 5 5 Key Management e SCADAPack E Configurator Key Model z i e Configurator Key Model z i e Compact Flash Entry and UTIL LE ah e Local USB Configuration 32 Security Technical 5 5 1 SCADAPack E Configurator Key Modes There are three modes for security keys when securing access from SCADAPack E Configurator to SCADAPack E controllers These modes are Default Key Mode The default key mode is the easiest option to use and maintain The disadvantage of using a default key is the same as its convenience it works out of the box and so it provides the weakest level of security The advantage of this mode is that there is no need to manage Configurator security files because the secret key is known by SCADAPack E controllers and SCADAPack E Configurator by default It does help with protecting against external attempts to access the protocol but not against copies of the SCADAPack E Configurator software This mode does however still allow user
66. ins user information as well as technical reference information For information on configuring the Security features refer to the SCADAPack E Security Administrator User Manual and SCADAPack E Configurator User Manual See the following for more information e Standards MA e Operational Goals Functionality Summary amp Standard RTU Operation 15 e SCADAPack E RTU Security 17 e Licensing Ich e Key Management 28 e User based Authentication 32 Platforms The following controllers support AGA12 Encryption security and DNP3 Secure Authentication e SCADAPack 300E Controllers e SCADAPack ES e SCADAPack ER SCADAPack E Security Components The SCADAPack E security components include the following e Security Administrator license file e Security Administrator project file e Controller Security configuration file e SCADAPack E Configurator Security file Security Technical 13 5 1 Standards Standards Security recommendations and standards of interest to utility sector markets include e IEC 62351 e DNP3 Secure Authentication e AGA12 suite The DNP3 Secure Authentication and AGA12 standards each aim to solve different security conditions DNP3 s use of IEC62351 focuses on Authentication while AGA12 focuses on Encryption It is widely regarded that a combination of encryption and authentication services would provide optimum protection scenarios for SCADA protocols IEC 62351 Standard IEC 62351 standard specifies au
67. ion processing messages for both cleartext and ciphertext on the same port is permitted for routing and on an AGA12 Gateway mode It operates in conjunction with routing entries Mixed mode operation on RTUs relates to cleartext DNP3 routing on ports A system point indicates if mixed mode is enabled or disabled If enabled may be disabled remotely If mixed mode is enabled cleartext and ciphertext routing is permitted on Cipher text ports on all nodes it is the responsibility of the end node to protect itself When using Peer communications security considerations are as necessary as enabling secure communication with a master station In SCADAPack E security configurations require peer nodes to use the same Common Key e g configured by using the same Security configuration file Security Technical e 7 4 DNP3 Routing DNP3 Secure Authentication When DNP3 Secure Authentication is enabled a routing mechanism that uses a variable address structure creates a routing path between communicating devices The routing path reduces protocol overhead typically associated with network layers and provides a unique network address for every device in the distribution system The routing mechanism is interoperable with DNP3 based devices and does not alter the DNP3 specification Routing in an AGA12 Network Routing can be used for SCADAPack E outstation network architectures supporting cleartext DNP3 ciphertext AGA12 and mixed systems Provi
68. ires more security files to be managed Security Level Highest Users Mode No user authentication provided by the Controllers Individual users can be configured and authenticated by the Controllers Figure 9 1 SCADAPack E Security Administrator Application SCADAPack E Security Technical Reference 8 1 Security File Management amp Counterpart Entry Management Security File Management The SCADAPack E Security Administrator application manages security configuration files allowing security configuration files to be exported including to plug in media security key devices for example a Compact Flash card This allows deployment of security configurations to the SCADAPack E RTU Existing security configuration files can also be opened and managed Key values may be copied from the application to other applications This includes SCADA Host Master Stations that support security keys for example Common Key and security mode configurations for each RTU security Group are exported from the Security Administrator It stores the security configuration for one group or all groups in a SYSTEM RTK files This contains security configuration for both DNP3 Secure Authentication and AGA12 Encryption Master Key configuration for all controllers can be exported from the Security Administrator and saved as a SYSTEM KEY file The Master Key files are typically set once in the lifetime of a system and must be d
69. iry 41 17 37 46 814 AGA12 gt gt SCM sending ACK 3 gt 20000 1 nonceOpn c76c68fd nonceAck ba60f068 data id 2 resolution 100000 tolerance 46 base 0 expiry 41 17 37 47 113 AGA12 gt gt SCM received DTA 20000 gt 3 2 90 SCADAPack E Security Technical Reference 17 37 47 122 AGA12 gt gt Inbound AGA12 frame from 32000 Process Frame for Me Rule A2 17 37 47 127 AGA12 gt gt Received Scada message dest 20000 src 3 17 37 47 129 AGA12 gt gt SCM sent DTA payload SESSION TIMES OUT LOCALLY AND IS DISCONNECTED HERE 17 37 50 894 AGA12 gt gt Session Timeout for ID 2 17 37 50 895 AGA12 gt gt SCM sending CLS 3 gt 20000 2 17 37 50 896 AGA12 gt gt SCM remove Session 3 lt gt 20000 id 2 Security Technical 9 2 5 System Points The follow system points are provided for monitoring security status on the SCADAPack E RTU Security Information System Point Description Address Security Mode Analog Input 57600 0 None read only 1 AGA12 RTU 2 AGA12 Gateway AGA12 Mixed Mode Binary Input 50740 Enabled Disabled read write Only Disabled state can be written as per AGA12 rules Communication Performance Monitoring Performance Counter System Point Description Address Analog Input AGA12 Open Failures 57610 Session negotiation rejections e g not a configured or authorized SCM AGA12 HMAC Failures 57611 Frames where the verification signature doesn t match e g content modifi
70. ite number The AGA12 virtual SCM within each RTU maintains a mapping of every static session and every open dynamic session to a cipher suite see also session 11 Cipher text Transmitted or received data that has been encoded see also encodingho Cipher text Port In the context of SCADAPack E RTUs this is a communications port supporting ciphertext DNP3 In the case of a AGA12 Gateway RTU a ciphertext port may also support cleartext DNP3 when operating in mixed mode Clear Device Port Applies to SCADAPack E AGA12 Gateway RTU only see AGA12 Gateway 9 This port receives DNP3 data in cleartext and encodes it for transmission on a ciphertext port A clear device port transmits cleartext DNP3 data after it has been decoded from reception on a ciphertext port Cleartext Data that has not been encoded see also encoding 10 It may be received data that is to be transmitted in the clear data that is yet to be encoded or data that is already decoded ab Common Key A cryptographic key value that is used amongst multiple entities to allow inter operation e g a Group of controllers e g each Configurator node Counterpart An associated AGA12 device that together with this device form a pair for secure data exchange CM A Cryptographic Module defined in the US Federal Information Processing Standard FIPS 140 2 is an electronic component that is placed in line on a communications channel and affords cryptographic protec
71. missions in these TCP IP application protocols transmit their data including usernames and passwords in clear text 9 It is strongly recommended that Telnet and FTP are DISABLED when not in use Leaving these two applications enabled creates a security vulnerability if the remote IP connection to an RTU is not secured using another means To determine if your Telnet and FTP settings are enabled check the SCADAPack E Configurator TCP IP property page 7 Using SCADAPack E Security The following sections describe configuration and the use of SCADAPack E security facilities An individual RTU s security settings can be configured by plugging a media interface into the RTU for example a CompactFlash card for SCADAPack ES and SCADAPack ER or by direct location connection of SCADAPack E Configurator through a USB peripheral port for example for SCADAPack 300E RTUs Alternatively the Security Configuration may permit it to be loaded remotely This allows remote maintenance of security configurations from SCADAPack E Configurator and Master Station Host systems such as ClearSCADA See Section Security Administration 69 for information on Security Administration and plug in media e Description of Security Facilities 35 e DNP3 Secure Authentication 3 SCADAPack E Security Technical Reference e AGA12 Encryption A e Security Considerations ec Security Technical 35 7 1 Description of Security Facilities In general terms
72. mon to devices in this security Group It can be generated by the Security Administrator application or generated externally and entered in this field on the Security Administrator Devices that use this key may include Master Station Host Data Concentrators Remote RTUs and IEDs Peer RTU devices This key is also used by AGA12 Encryption 44 Security Technical ER DNP3 Algorithms HMAC This is the security algorithm used for signing security messages to confirm they have not been tampered with The setting of this field needs to be the same on each device using the Common KeyI38 This setting applies to DNP3 interfaces on the SCADAPack E RTU Choose one of the algorithms e SHA 1 truncated to 4 octets serial e SHA 1 truncated to 10 octets networked e SHA 256 truncated to 8 octets serial e SHA 256 truncated to 16 octets networked The SHA 256 algorithms are more secure than the SHA 1 algorithms but are more RTU processing intensive Algorithms with more octets are more secure but cause longer messages using more bandwidth for critical messages It is recommended to use one of the algorithms with a serial indicator where the primary communications interface protection is being deployed on is DNP3 serial ports It is recommended to use one of the algorithms with a network indicator where the primary communications is a network interface Ethernet PPP etc Key Wrap This is the security algorithm used for encryp
73. munication with SCADAPack E Configurator software SCADAPack E RTUs support DNP3 Secure Authentication when operating as a Data Concentrator communicating with remote outstations SCADAPack E RTUs also support DNP3 Secure Authentication when operating with peer to peer communications with other outstations SCADAPack E Data Concentrator and Peer communication security relies on inter communicating devices to be in the same security Group i e use the same security keys to configure their communication For example the same key value needs to be used at the Master Station host data concentrator remote RTUs as part of the same Group DNP3 Secure Authentication operates using a Challenge Response security model Critical operations are challenged by a node when it receives a message to perform a critical operation e Challenged Functions zi e DNP3 Security Setting z e Aggressive Model 41 e Vulnerabilities Addressed Ah 7 2 1 Challenged Functions When DNP3 Secure Authentication is active on an SCADAPack E RTU it challenges the mandatory DNP3 critical function codes and several of the DNP3 optional function codes Le The RTU challenges the operation of a rejecter whenever it sends any of these function codes Requester could be a Master Station host Data Concentrator Peer device or Configurator tool Master Standard protocol response Authentication challenge Standard protocol response Security Technical
74. must be observed when installing and using this product For reasons of safety and to help ensure compliance with documented system data only the manufacturer should perform repairs to components When devices are used for applications with technical safety requirements the relevant instructions must be followed Failure to use Schneider Electric software or approved software with our hardware products may result in injury harm or improper operating results Failure to observe this information can result in injury or equipment damage 1 Technical Support Support related to any part of this documentation can be directed to one of the following support centers Security Technical 5 Technical Support The Americas Available Monday to Friday 8 00am 6 30pm Eastern Time Toll free within North America 1 888 226 6876 Direct Worldwide 1 613 591 1943 Email TechnicalSupport controlmicrosystems com Technical Support Europe Available Monday to Friday 8 30am 5 30pm Central European Time Direct Worldwide 31 71 597 1655 Email euro support controlmicrosystems com Technical Support Asia Available Monday to Friday 8 00am 6 30pm Eastern Time North America Direct Worldwide 1 613 591 1943 Email TechnicalSupport controlmicrosystems com Technical Support Australia Inside Australia 1300 369 233 Email au help schneider electric com 2 Safety Information Read these instructions carefully and look at the equipment to bec
75. n a media Security Key e g CompactFlash card from your Security Administrator into each SCADAPack ES or SCADAPack ER RTU in turn and setup the routing tables as below For SCADAPack 300E RTUs load the security file va USB using SCADAPack E Configurator Alternatively 2 Setup configurations as follows RTU 701 configurations Common Key 123456789ABCDEF0123456789ABCDEFO Mac Key ABCDEF0123456789ABCDEF0123456789ABCDEF01 Gateway 1 SCM Address 40000 Counterpart List 701 802 As a AGA12 Gateway RTU address 40000 is used for master and SCADAPack E access routing entries with SCM addressing will be required Dest Connect Port Number o 65535 30000 30000 Port 2 AGA en GW 1 CORE ete D o a RTU 802 configurations Same Group security configuration as 701 As a AGA12 Gateway RTU address 40000 is used for master and SCADAPack E Configurator access routing entries with SCM addressing will be required Security Technical s Dest Dest Connect End Port Number ary o esses 30000 0000 Pon T aoeng RTU 903 configurations AGA12 security not supported so standard configurations only Gateway 40000 configurations GATEWAY mode enabled MIXED MODE enabled Clear Device Port ETH1 Common Key 123456789ABCDEF0123456789ABCDEFO Mac Key ABCDEF0123456789ABCDEF0123456789ABCDEF01 Dest Dest Dest Port Connect Start End Number Gert 30000 30000 701 feso Jon _ _ AGA2 node Port 2
76. n be uploaded from an RTU Duplicating the security personality of a protected RTU requires physical access to security key media possession of an authorized copy of the SCADAPack E Security Administrator software or knowledge of the keys used in the system An intercepted configuration file for a secured RTU cannot be validly loaded on an RTU unless the RTU has been set with an identical master key requiring an original master key file as well It is necessary to keep original master key files secured Security file information is itself encrypted and signed for tamper detection Contents of a security file cannot be altered and re used 98 SCADAPack E Security Technical Reference 11 Using AGA12 Security Components Copyright AGA12 components in the SCADAPack E RTU firmware are based on reference code distributed under two public software licenses as detailed below The text of these licenses are reproduced here in accordance with requirements described in the AGA12 reference source code copyright notices and at http scadasafe sourceforge net LICENSE License for Cisco AGA 12 1 Reference Implementation The li cense applies to all software incorporated in the G sco AGA 12 1 Reference npl erent ati on except for those porti ons incorporating third party software specifically identified as being licensed under separate i cense The Q sco Systens Public Software License Version 1 0 Copyright c 2000 Gsco Systems In
77. n period is 14 days A new dynamic session key is generated and exchanged during each periodic update Critical Function Code Requests Messages that are regarded as critical operations are challenged by the receiver asking the requester for security credentials The receiver needs to gain confidence that the requester is who he says he is before proceeding to perform the request Both non critical and critical message transactions are shown in the picture to illustrate the difference between the unchallenged message whose operation is the same as the standard DNP3 protocol without security and the challenged message that utilizing the DNP3 Secure Authentication mechanism Security Technical 1 See Challenged Functions se for a list of the critical function codes challenged by the SCADAPack E RTU Master RTU Non critical message Perform operation Standard protocol response Critical Message Authentication challeng Authenticate amp perform operation Authentication response Standard protocol response Further transaction scenarios are detailed in the DNP3Specification Volume 2 Supplement 1 Secure Authentication document available to DNP User Group members See www dnp org Use of Security Keys DNP3 Secure authentication uses a cryptographic key technically known as the Update Key for securing messages This static key is the pre shared secret between a master device and
78. nly available when DNP3 Secure Authentication is licensed and configured To enhance security when multiple SCADAPack E Configurator users are present in a system the Controller Security configuration file can include a user list The SCADAPack E Security Administrator application allows configuration of users providing a list of the usernames and passwords associated with the usernames This is configured in RTUs using the Group security configuration files The User based authentication feature uses the SCADAPack E RTU to act as an authentication server for access requests from SCADAPack E Configurator When an access request is received from the SCADAPack E Configurator the RTU uses DNP3 Secure Authentication keys and the usernames and passwords When a user accesses a system using SCADAPack E Configurator with User based Authentication enabled username and password credentials are entered into SCADAPack E Configurator The controller verifies that the username and password match the information entered on the security configuration user list When this information matches the user is authenticated and the action is permitted If the information does not match the controller rejects the attempted action and SCADAPack E Configurator displays a message 6 Telnet and FTP Authentication The Telnet and FTP applications provided on SCADAPack E as part of the IP management suite can be insecure if not externally secured This is because trans
79. nnot deploy it from the Security Administration application To deploy a generated master key file to a SCADAPack 300E controller you need to use SCADAPack E Configurator through the USB peripheral port S Man e lag any Ze Erie Mer Spy Key A VK A de Yn lt S PA Security wu Administrator application A K Security __ Administrator application CH Securely he stored on KS PC E Series Ny ns Configurator Q Loca cat De SP 309 Genen EX SCADAPack ES ER Controller nly loaded vier Bees Port oo Meco lo y Gei 20 gt K S SCADAPack 300E Series Controlier The master key contains the security boundary for RTUs and security administration for one organization or a part of an organization What the master key does is that it customizes the controller security configuration file that the Security Administrator generates so that the file is system or organization specific The RTU reads this information If required the Security Administrator can generate new master keys This is done by entering a new pass phraseUsing a one way has function to transform an arbitrary length test string ito a psuedo random bit string is a technique called key crunching The text string is often referred to as a pass phrase Sometimes written as passphrase The reason for using passphrases is the avoidance of ever recording un encrypted keying information to prevent its compromise It is a critical piece in the security c
80. o this needs to be configured through a new security configuration file from the SCADAPack E Security Administrator application When you specify a new port for Local Access operation the previous Local Access DNP3 port automatically becomes a ciphertext protected port It is valid for an SCADAPack E RTU Ethernet port or serial PPP port to be chosen as the Local Access port Using an IP capable port for this purpose needs to be considered carefully Exposing an IP port to connections beyond the vicinity of the local RTU may invalidate the use of AGA12 as a security methodology ER SCADAPack E Security Technical Reference 7 3 7 Remote RTUs Communicating using an AGA12 Gateway This section describes remote RTUs sending data to AGA12 Gateway nodes See Section Configuring an AGA12 Gateway RTU 51 for a description of how to use and configure an AGA12 Gateway RTU Distributed DNP3 and AGA12 communication is configured in the RTU s DNP Network Route Table To access the appropriate security fields in the SCADAPack E Configurator ensure the configurator s RTU Features selection includes the AGA12 Encryption setting Where route table entries are added for operation as a data concentrator or peer node an AGA12 encryption type can be set for each route entry Typically this will be set to AGA12 Node for devices protected by AGA12 and therefore communicating using ciphertext Where the route directs messages using an AGA12 gateway nod
81. ome familiar with the device before trying to install operate or maintain it The following special messages may appear throughout this documentation or on the equipment to warn of potential hazards or to call attention to information that clarifies or simplifies a procedure The addition of this symbol to a Danger or Warning safety label indicates that an electrical hazard exists which will result in personal injury if the instructions are not followed This is the safety alert symbol It is used to alert you to potential personal injury hazards Obey all safety messages that follow this symbol to avoid possible injury or death 6 SCADAPack E Security Technical Reference A DANGER DANGER indicates an imminently hazardous situation which if not avoided will result in death or serious injury AWARNING WARNING indicates a potentially hazardous situation which if not avoided can result in death or serious injury ACAUTION CAUTION indicates a potentially hazardous situation which if not avoided can result in minor or moderate injury CAUTION CAUTION used without the safety alert symbol indicates a potentially hazardous situation which if not avoided can result in equipment damage PLEASE NOTE Electrical equipment should be installed operated serviced and maintained only by qualified personnel No responsibility is assumed by Schneider Electric for any consequences arising out of the use of this material
82. ommunicate Peer to peer both talk to a master station host All 3 devices need to use the same key in this case e Licensed RTUs can operate as end nodes receiving AGA12 encrypted DNP3 frames and responding with AGA12 encrypted DNP3 frames Similarly they can operate send and receive DNP3 Secure Authentication messages e RTUs can be DNP3 and AGA12 routers on any communications media No special configurations are required for this A router passes on AGA12 frames or DNP3 secure authentication frames This is particularly useful for wide area radio networks e SCADAPack E RTUs also support encryption of Unsolicited Peer DNP3 and DNP3 Master data concentrator transmissions with both DNP3 Secure Authentication and AGA12 encryption security Security Technical 25 e Remote configuration of security parameters can be granted through the Security Administrator to allow security configuration files to be loaded remotely This feature can be disabled for increased security protection In this case it is only possible to configured security through the following mechanisms Compact Flash card plugged in to SCADAPack ES or SCADAPack ER RTUs with security configuration files loaded va SCADAPack E Configurator to SCADAPack 300E via USB peripheral communications Configuration files containing the security keys and other security parameters can be put on a media interface for direct deployment to RTUs e g Compact Flash card for SCADAPack ES
83. on of an AGA12 Gateway RTU is to provide access to a secured RTU network deployment of AGA12 Gateway RTUs needs to be carefully considered AGA12 Gateway RTUs need to be located in a physically and logically secure environment Typically they will be located adjacent to the master station possibly connected via serial links Ifa TCP IP LAN or WAN network interconnects an AGA12 Gateway with a master station the TCP IP network needs to itself be secured If this TCP IP network is to be interconnected with further networks firewalls and other security mechanisms may be required To configure a AGA12 Gateway plug in the appropriate media security key provided by the Security Administrator or open the DNP3 Network Property page in SCADAPack E Configurator and enter the appropriate information on the DNP3 Routing table Typically you configure an AGA12 Gateway RTU with a number of counterpart entries one for each remote SCM device or Virtual SCM RTU with which the AGA12 Gateway communicates By default a AGA12 Gateway RTU also has MIXED MODE enabled as required by the AGA12 2 standard This allows an AGA12 Gateway RTU to be configured to pass received cleartext DNP3 on to devices on a protected network unmodified This mode may be disabled for improved security at the expense of requiring ALL nodes on the network to be operating with AGA12 encryption SCADAPack E Security Technical Reference 7 3 4 Secure Communications and Node Opera
84. onRequest base 0 expiry 49 17 37 39 166 AGA12 gt gt SCM received OPN 20000 gt 3 1 nonce f11ebf5e data id 2 resolution 10000 0 tolerance 46 base 0 expiry 49 17 37 39 166 AGA12 gt gt New session 3 lt gt 20000 2 17 37 39 167 AGA12 gt gt SCM add 3 lt gt 20000 id 2 17 37 39 167 AGA12 gt gt SessionRequest base 0 expiry 47 17 37 39 168 AGA12 gt gt SCM sending ACK 3 gt 20000 1 nonceOpn f11ebf5e nonceAck feb7c6e0 data id 2 resolution 100000 tolerance 46 base 0 expiry 47 17 37 39 467 AGA12 gt gt SCM received DTA 20000 gt 3 2 17 37 39 475 AGA12 gt gt Inbound AGA12 frame from 32000 Process Frame for Me Rule A2 17 37 39 481 AGA12 gt gt Received Scada message dest 20000 src 3 17 37 39 483 AGA12 gt gt SCM sent DTA payload SESSION TIMES OUT LOCALLY AND IS DISCONNECTED HERE 17 37 43 852 AGA12 gt gt Session Timeout for ID 2 17 37 43 852 AGA12 gt gt SCM sending CLS 3 gt 20000 2 17 37 43 853 AGA12 gt gt SCM remove Session 3 lt gt 20000 id 2 NEW SESSION REQUEST FROM REMOTE DEVICE IS RECEIVED HERE 17 37 46 811 AGA12 gt gt SessionRequest base 0 expiry 45 17 37 46 812 AGA12 gt gt SCM received OPN 20000 gt 3 1 nonce c76c68fd data id 2 resolution 10000 0 tolerance 46 base 0 expiry 45 17 37 46 812 AGA12 gt gt New session 3 lt gt 20000 2 17 37 46 813 AGA12 gt gt SCM add 3 lt gt 20000 id 2 17 37 46 813 AGA12 gt gt SessionRequest base 0 exp
85. ot Implemented Disconnected from diagnostic display GENS 9 1 2 Security Technical Diagnostic Example Incorrect Security Credentials DNP3 Secure Authentication Example 2 Master device tries to establish DNP3 Secure Authentication with incorrect security credentials separate for wrong keys vs invalid username password Va C gt DNPDIAG Set DNP Diag Filters Usage DNPDIAG mode filter filter param Where mod ENABLE DISABLE Where filter 1 2 3 ETH APPL BYTES DBASE EVENTS FILTER_ADDR LINK NETWORK RAW_NET SECURITY TIME TRANSP USER DNP Diags link net trans appl user C gt DNPDIAG ENABLE APPL DBASE USER SECURITY DNP3 Diags Enabled 0 1 2 3 4 ETH1 APPL DBAS T USER SECURITY C gt DIAG Connecting to diagnostic display Use lt ESC gt to disconnect gt 32000 Application Header Authentication Request FIR 1 FIN 1 CON 0 UNS 0 SEQ 1 Rx Object 120 Authentication variation 4 qualifier 0x07 8 Bit Limited Quantity Rx Authentication Key Status Request User 1 lt 32000 Build DNP3 Message Authentication Key Status Tx Object 120 Authentication variation 5 qualifier 0x5b 16 Bit Free Format Tx Authentication Key Status User 1 Sequence 1 KeyWrapAlgorithm AES 128 hmacAlgorithm SHAl1 4 OCTET Status 2 NOTINIT
86. r uses a security protocol mechanisms through the wide area network to attempt to connect to RTU If DNP3 Secure Authentication is licensed and configured protocol attacks are repelled Knowledge of the DNP3 security Update Key Security Administrator Group s Common Key is necessary for devices to correctly challenge and authenticate critical actions When using AGA12 communications protocol attacks require the equivalent of an AGA12 Gateway such as SCADAPack E RTU This needs to be licensed and configured with Security and AGA12 Gateway options Knowledge of both the encryption and hash keys is required for SCM configuration The gateway node itself is protected by AGA12 The AGA12 Gateway in a system needs to be installed in a physically and networked logically secure environment Use of AGA12 Gateway in field installations is strongly discouraged Security Configuration Attacks on RTU The attacker attempts to build a security configuration file to reconfigure the security settings of an RTU The SCADAPack E Security Administrator application utilizes a system master key inside the security configuration file This master key is configured in SCADAPack E RTUs as a security administration function prior to controllers being installed in the field Once set for this system a security configuration generated by one system cannot be validly used on a different system SCADAPack E Security Technical Reference Setting the Master Key on th
87. rd consists of four documents Each document addresses different aspects of SCADA data transmission protection AGA12 2 details the requirements to build interoperable cryptographic modules to protect SCADA communications for low speed legacy SCADA systems and maintenance ports AGA12 2 is one component of cryptographic protection for SCADA communications AGA12 2 specifically defines a protocol SSPP for use in establishing connection transporting encrypting and signing serial SCADA protocols including DNP3 It also defines its operation on a device known as a SCADA Cryptographic Module SCM AGA12 includes specific designs and reference applications for use with DNP3 as well as other SCADA protocols AGA12 is designed to operate outside of existing SCADA protocols because AGA12 specifies and additional protocol wrapper It is adaptable to implement on existing systems and new systems External devices can be used to provide security Typically sessions between a device external Security Technical 21 to a master station for example gateway or other bump in the wire device BITW and outstations RTUs are secured SCADAPack E RTUs support AGA12 2 protocol through a Virtual SCADA Cryptographic Module SCM integrated with the various operational aspects of the RTU The implementation adheres to the AGA12 2 recommendations and inter operates with the AGA12 2 reference application It is for interoperabilitye with other AGA12 2 compliant devices
88. red in the RTU i e routing AGA12 frames follow the same rules in the RTU as for routing of DNP3 frames 7 3 2 Security Technical AGA12 Gateway and Session Establishment AGA12 Gateway Typically an SCM is used to take DNP3 messages received from a SCADA master on a Clear Device Port encodes it then sends the secure data out a Ciphertext Port The virtual SCM on an SCADAPack E RTU configured as an AGA12 Gateway is used for this purpose It is highly recommended that a SCADAPack ES or SCADAPack ER RTU is used as an AGA12 Gateway The AGA12 Gateway RTU is usually installed at the host master station and is capable of establishing cryptographic sessions with multiple remote SCMs SCADAPack E RTU Virtual SCMs on the same communications link The AGA12 Gateway RTU can also communicate with remote RTUs that not having physical or virtual SCMs installed This is only possible when Mixed Mode is enabled on the AGA12 Gateway RTU The figure below illustrates a typical installation where DNP3 is encrypted using AGA12 and uses an AGA12 Gateway em mm mm mm mm mm mm mm mm mm mm mm emm mm emm mm mm mm mm mm mmm mmm mmm mm Dei TU Trio Radio ao BA ES ei AGA12 aaen DNP3 encrypted using AGA12 SCADAPack ES ui Trio Radio SCAD Pack ER i ee mmm mmm mmm mmm mmm mmm mmm zem mmm wf RTU SCADAPack 3xxE Trio Radio DNP3 Host e g ClearSCADA When operating in Mixed Mode the AGA12 Gateway RTU is confi
89. rocessed A11 AGA12 message from ClearText port on AGA12 Gateway has a route entry Security Level and is routed encrypted A7 8 A9 A12 AGA12 message from ClearText port on AGA12 Gateway has no route entry Security Level and is routed to ClearText port A13 AGA12 message from ClearText port on AGA12 Gateway has no route entry Security Level can t be routed to CipherText port so is discarded A14 AGA12 message from ClearText port on AGA12 Gateway has no route entry Security Level can t be routed to Local Access port so is discarded Routing Rule Diagnostics for Unsolicited Peer Master Messages When the AGADIAG ENABLE OUTROUTE command is used diagnostics similar to the following are shown referencing routing rules AGA12 gt gt Outbound Message to 30000 Msg Sent Encrypted Rule 012 The routing rule numbers have the following meanings Security is disabled DNP3 message sent in Clear Text AGA12 Gateway in Mixed Mode DNP3 message sent in Clear Text on a Clear Text port Rule port with route entry that has no security level Message discarded Cipher Text port Clear Text port AGA12 Gateway Mixed Mode disabled The Route entry has no security level DNP3 message is sent in Clear Text on a Clear Text port O7 AGA12 Gateway Mixed Mode disabled DNP3 message sent as encrypted AGA12 message on a Clear Text port AGA12 Gateway Mixed Mode disabled DNP3 message can t be sent on a Cipher Text port with route entry th
90. s For example in a dual Ethernet architecture IP packets from one Ethernet interface are blocked from routing to the other Ethernet interface A similar philosophy applies to serial PPP links and mixed Ethernet PPP links Security is maintained in situations such as an AGA12 Gateway where one Ethernet interface is configured as a Clear Device port default and the other Ethernet interface is used as a ciphertext AGA12 secured network port SSPP Timing Summary AGA12 2 includes a time based security definition with tolerance to aid in detecting replay attacks Each Cipher text frame includes a Sequence Number that is the time in ticks since the start of a session The duration of a tick is negotiable at OPN time resolution in uS For maximum security one message fits in 1 tick The receiver only pays heed to a packet received where the sequence number is within a tolerance of a locally derived sequence number If sequence numbers are incorrect communications can t be regained until the session expiry timer expires A CLS close is sent after this time and a new OPN restarts the sequence numbers Time drift tolerance also dictates a time at which this CLS OPN process occurs normally Similarly the ACKTIMEOUT is used in the calculation as a measure of expected link delay to calculate the time tolerance Security Technical e Security Administration Administration of the SCADAPack E RTUs security facilities is provided
91. s 128 bits 16 octets The session key length can be selected from one of the following on the SCADAPack E RTU 128 bits 192 bits 256 bits 384 bits 512 bits 1024 bits The larger the session key the better security but large session keys have more overhead on security establishment and are more RTU processing intensive The setting of this field needs to be the same on each device using the Common Key fsa Maximum Error Count This sets the number of consecutive security conditions for which the SCADAPack E RTU will return errors After this number of errors security conditions are silently discarded This mechanism attempts to alleviate denial of service issues Security Technical In In a noisy network environment it may be necessary to increase this count for consistent security exchanges The higher this number the more prone the communications is to disruption if a device is subject to denial of service incident This setting affects only the RTU for which it is configured 7 2 3 Aggressive Mode Aggressive Mode is a security configuration set by the Security Administrator It is either enabled or disabled It allows challenge data to be appended to a critical request message without having to go through the full challenge response exchange as shown in the following picture l e itis a more efficient short form method of providing authentication information in critical transactions When enabled Authentication mode
92. s in a system Typically the AGA12 Node RTU s gateway will be selected by choosing AGA12 GWT in the route tables AGA12 field Check with security administration personnel if you are unsure of the configuration to use for a specific AGA12 Node RTU Message Routing Local DNP3 Protocol ege 1 Port E series ae RAY RTU routes AGA12 2 FRAMES a SCADAPack E Security Technical Reference Figure 5 3 AGA12 Node asa Routing Device Message routing is a standard feature of SCADAPack E RTUs AGA12 frames are routed according to the RTU s DNP Network Routing Table rules When simply routing AGA12 frames the AGA12 setting in the route table is not used and security Counterpart List entries are not required in the RTU Le routing AGA12 follows the same rules in the RTU as for routing of DNP3 frames Local inrnece DNP3 Protocol DNP3 Routing Cleartext DNP3 3 af Cipertext Ports E series RTU routes AGA12 2 FRAMES and cleartext DNP3 FRAMES Figure 5 4 AGA12 Node as a Routing Device in Mixed Mode Message routing is a standard feature of SCADAPack E RTUs An AGA12 Node can route both AGA12 frames and DNP3 frames when it is operating in MIXED MODE AGA12 and DNP3 frames are routed according to the RTU s DNP Network Routing Table rules When routing AGA12 and DNP3 frames the AGA12 setting in the route table is not required in a routing only RTU and security Counterpart List entries are not requi
93. s using an AGA12 gateway each remote AGA12 secured RTU requires an AGA GWn type to be set in the DNP3 Network Route Table You need also configure a Gateway SCM address Security Technical 7 3 8 Operating asa Data Concentrator When licensed with a DNP3 Master data concentrator functionality DNP3 ports may need to communicate with cleartext ab DNP3 slave devices and possibly ciphertext devices on the same port The following will apply if AGA12 encryption is enabled on a Data Concentrator RTU e DNP3 ports operate as AGA12 encrypted ciphertext 9 ports e The AGA12 column shows each remote RTU node or node range route entry as NONE cleartext DNP3 device with no encryption default or AGA12 Node device secured DNP3 e Nodes defined as AGA12 devices will also require counterpart list entries e Normal data concentrator DNP3 processing and routing rules apply e Cleartext DNP3 can be sent and received by the data concentrator on an AGA12 protected port only if the RTU is configured for operation in Mixed Model10 ER SCADAPack E Security Technical Reference 7 3 9 Example Configurations Communication required between master station 30000 and RTU nodes through an AGA12 Gateway RTU Configuration Maintenance computer permitted to connect to nodes 701 and 802 and peer communications required between 701 and 802 RTU Configuration Maintenance 30000 A DNP3 AGA12 Gateway 1 Simply plug i
94. sececeseseeseeeseseeeeeeeetesnenenenneeeneneats 70 9 e D E 70 9 1 DNP3 Secure Authentication Diagnostics EEN 71 9 1 1 Diagnostic Example No RTU Security Contoured nnn 71 9 1 2 Diagnostic Example Incorrect Security Credentials cccccccccecececesceseseseseseeseecseseeeeseseseeceeaeseeeceeaeeeeeeseaeees 73 9 1 3 Diagnostic Example Successful Critical Message Challenge 75 9 2 AGA12 Encryption Diagnostics yiii eiai a ea ae aaen pea Ea a re a aE 77 9 2 1 Diagnostic Filtering cccccccssscsccscseccsesescscsesescsesesesescsesescsesescscscsesescacsesescscsescacacscscscseseacscscseseacscasscseacscseseaes 77 9 2 2 Routing Rule DiaQnosti s ear EE Nasa retealieate area ad cane eet ENAS 78 9 2 3 Diagnostic Example Session Open Trans actone cece cee eeeeeeeeeteceeeeeeeeesaseesesaeeesaeeeseetaseeseeesetate 82 9 2 4 Diagnostic Example Session Re establishment Transactions ccceccccccscssesesesseseeesesceeeeceeseeeecseateeeeeseaeees 89 le PARNE EE 91 10 Attack Vectors amp RequirementsS sssssssnnunsnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn neneman nnmnnn 92 10 1 Protocol and Configuration attacks on RTU cccssssssssssssssssscssscseseseseecseseseseseseecesseseecsnseesecenseseeeesseseeeenseeeeeeses 93 10 2 Routed Communication to RTU amp Access to Gateway EENEG 95 10 3 RTU Local Port Access Networked Configurator amp Spoofing Master Address cscsssssssssssesssessseseeeseee 96 10 4 IP Networked RTUs
95. secured and secured nodes is via a combination of settings in the DNP3 Network Routing Table AGA12 type field and AGA12 counterpart entries Nodes that have entries in the routing able with AGA12 selection also require an entry in the counterpart list AGA12 frames can also be routed Remote RTUs prevent encoding of cleartext DNP3 on a ciphertext link by not allowing gateway functions On an AGA12 Gateway RTU high levels of protection can only be provided by secure environments on the AGA12 Gateway and strict source destination routing In bound serial DNP3 requests for the gateway node address e g remote access attempts to the gateway configuration need to be authorized through AGA12 This means the remote access attempt needs to have a matching key and have a valid session connected SCADAPack E Security Technical Reference Security Technical e 7 3 10 2 Fixed AGA12 2 Parameters The following AGA12 2 SSPP Serial SCADA Protection Protocol options are used by SCADAPack E RTUs Refer to the AGA 12 Standard for more information e SSPP 8 bit Link Layer only e No Broadcast frames e No Management sessions support future e Encryption algorithm AES128CTR fixed e CipherSuite HmacSHA1 fixed e SCM address RTU DNPS node address e SSPP Link Layer Markers for DNP3 are as follows from AGA12 2 DNP3 reference code Link Layer Control Octet hex Marker e Replacement Characters are byte stuffed in the SSPP
96. security level so message is discarded DNP3 Clear Text message from a slave device is received for me on a Cipher Text port as a data concentrator in Mixed Mode and is processed Routing Rule Diagnostics for Inbound AGA12 Messages When the AGADIAG ENABLE INROUTE command is used diagnostics similar to the following are shown referencing routing rules AGA12 gt gt Inbound AGA12 frame from 2 to 32002 Msg Sent in Clear Text Rule A3 The routing rule numbers have the following meanings Security is not enabled AGA12 message from DNP3 port is discarded AGA12 message from CipherText port is for me and will be processed A3 AGA12 message from CipherText port is routed in ClearText by AGA12 Gateway to ClearText port AGA12 message on CipherText port to other CipherText port has no route entry security level and is discarded AGA12 message on CipherText port cannot route to Local Access port has no route entry security level and is discarded AGA12 message on CipherText port is routed to other CipherText port s SCADAPack E Security Technical Reference AGA12 message on CipherText port cannot route to Local Access port even though it has a route entry security level and is discarded A AGA12 message from CipherText port is routed encrypted by AGA12 Gateway to ClearText port AGA12 message fromLocal Access port cannot be routed and is discarded AGA12 message from ClearText port on AGA12 Gateway is for me and will be p
97. security management a Security Administrator application allows the creation of a security management collection containing security configuration for a whole system It can generate Master Key file RTU security configuration files and SCADAPack E Configurator security files These can be written directly to a media interface Generally system security is setup in the following ways 1 have unique security keys for each remote RTU that communicates only with the master station host most secure or 2 have a common security key across a Group of controllers that interact together or are in some collection with the master station host e g Northern RTU sites Different groups have unique security keys pretty good security 3 have a common security key across a whole system i e one Group most convenient but least secure Option 1 has the benefit that someone learning one key does not have access to the whole system Similarly Peer nodes can be restricted as to what other Peer nodes they can talk to This provides maximum security but means additional management of keys Option 3 is simpler to manage but if the common key becomes known all RTUs are compromised Option 2 is a compromise offering pretty good securty but may be necessary where there is interaction between peer RTUs for example SCADAPack E DNP3 Secure Authentication or AGA12 Encryption requires that all interacting devices share the same keys e g RTU1 amp 2 c
98. sion of encyrption and authentication to these SCADAPack E architectures requires routing facilities to be secured Typically only a few DNP3 nodes devices in a DNP3 network are configured to route DNP3 traffic These devices usually have two or more DNP3 communication ports and are are used to connect sub networks groups of RTUs together AGA12 Message Encryption When AGA12 message encryption is enabled typical SCADAPack E outstation DNP3 network architectures are retained for example radio repeater or sub network links while increasing the security of such distributed systems An SCADAPack E outstation routes encrypted frames between ciphertext ports intact This improves transaction efficiency AGA12 frames which are not decoded and re encoded before they are passed on Counterpart entries are not required DNP Network Routing Table AGA712 type fields are not need for routing of AGA12 frames between ciphertext ports In accordance with AGA12 2 requirements the SCADAPack E RTU architecture also allows mixed cleartext and protected sub networks You need to understand which sub networks or individual devices are using AGA12 encryption and which are not MIXED MODE needs to be enabled for an SCADAPack E RTU to route cleartext message to a ciphertext port Routing rules include e Protected AGA12 ciphertext frames can be routed from port to port when AGA12 encryption is enabled on any SCADAPack E RTU The protected frames are untouched
99. t DNP3 Secure Authentication to the DNP User Group Secure Authentication Specification v2 00 For more information see e How does DNP3 Secure Authentication Work 2 18 5 3 2 How does DNP3 Secure Authentication Work DNP3 protocol specifies data link transport and application layers DNP3 Secure Authentication operates at the application layer This means that DNP3 transactions are secured from end to end through a system regardless of the communications protocol specified TCP IP UDP IP serial and independent of the presence of communications gateways routers etc It also means DNP3 can be secured in hybrid networks for example through TCP IP then to serial communications DNP3 Secure Authentication takes place in three scenarios e Initialization 8 e Periodic wei e Critical Function Code Requests ei Initialization When initiating a session DNP3 Secure Authentication authenticates that the master station and outstation are who they claim to be This scenario is designed to prevent spoofing replay and other forms of cyber attacks This is accomplished using a unique session key dynamic derived from the pre shared secret keys known by both devices static Update key Periodic Once a session is established the master station and outstation periodically verify again who they claim to be to prevent hijacking and other attacks The default SCADAPack E authentication period is 30 minutes The maximum periodic authenticatio
100. t of conditions and the follow ng disclaimer in the document ation and or other associ ated materials 3 the copyright holder s name is not used to endorse products built using this software without specific witten perm ssi on ALTERNATI VELY provided that this notice is retained in full this product may be distributed under the terns of the GNU General Publ i c License GPL in which case the provisions of the GPL appl y NSTEAD CF those gi ven above DI SCLAI MER This software is provided as is wth no explicit or inpli ed warranties in respect of its properties including but not lim ted to correctness and or fitness for purpose 10 SCADAPack E Security Technical Reference
101. tes cleartext DNP3 FRAMES for authorised nodes Media AGA12 2 frames DNP3 cleartext frames Figure 5 6 AGA12 Gateway RTU Operating in Mixed Mode Encoding and decoding of messages on behalf of other devices can only be done in GATEWAY MODE The AGA12 Gateway RTU needs to be physically and logically secured from external influences The RTU s DNP Network Routing Table includes a Security Mode identifying and authorizing encoding and decoding of messages to AGA12 protected device s When in MIXED MODE the Network Routing Table also authorizes routing of cleartext DNP3 messages to DNP3 devices from the Clear Device Port to a Ciphertext Port Security COUNTERPART ENTRIES are required for each AGA12 remote SCM device or Virtual SCM with which the AGA12 Gateway communicates Gateway mode Mixed Mode and Counterpart Entries are configured by the SCADAPack E Security Administrator application e Configuring an AGA12 Gateway RTUI5 Security Technical 51 7 3 3 1 Configuring an AGA12 Gateway RTU The role of an AGA12 Gateway RTU is to take received cleartext DNP3 frames and encode the messages to ciphertext AGA12 frames Similarly the AGA12 Gateway takes cipertext AGA12 frames and decodes and transmits them as cleartext DNP3 frames Typically an AGA12 Gateway RTU is used to provide access to a secured RTU network on behalf of a DNP3 Master Station or configuration packages not supporting AGA12 communication Given the primary functi
102. thentication of SCADA data transfer using digital signatures The objectives of this standard include providing only authenticated access stopping eavesdropping spoofing and playback as well as intrusion detection The security design specified in this standard is integrated within a SCADA protocol requiring end to end implementation in order to operate DNP3 uses the IEC 62351 standard for Secure Authentication DNP3 Secure Authentication DNP3 Secure Authentication specification is based on authentication and challenge principles These security principles have been in place since the advent of dial up Internet connections These principles include Hashed Message Authentication Code HMAC HMAC is a calculation performed on a message DNP3 authentication performs an HMAC on each critical message to authenticate it in other words prove that you are who say you are by requiring challenge reply a common mechanism to stop replayA replay attack is a form of network attack in which a valid data transmission is maliciously or fradulently repeated or delayed attacks DNP3 Secure Authentication also incorporates security key technology DNP3 Secure Authentication is designed to protect only actions that are deemed critical This conserves bandwidth and results in only minor processing results DNP3 Secure Authentication uses protocol Application Layer authentication when issuing the challenges for example controls or configuration changes A s
103. ting the security exchanges that set the dynamic session key from the static DNP3 Update Key The setting of this field needs to be the same on all devices using the Common Key 38 Only the AES 128 algorithm is presently supported DNP3 Session Keys These settings control how the session key regularly changes also known as key rotation Changing the session key is a very large part of security strategy It stops large volumes of data using the same cryptographic parameters which can lead to the ability to learn the session key Session keys will be renegotiated when either of the Change Interval or Change Count criteria is met Whichever criteria is met first will cause the renegotiation then checking for both criteria is restarted Change Interval When enabled this interval sets the time period for which the DNP3 dynamic session key is valid After this time the session key is renegotiated Change Count This is the number of times a session key can be used before it is renegotiated ER SCADAPack E Security Technical Reference DNP3 Aggressive Mode Accepts Requests Determines whether the controller will accept Aggressive Mode requests from a master device sending critical controls If Aggressive Mode is disabled then an aggressive mode request will the rejected by the RTU The master should use or be configured to use standard challenge reply security messages in this case The setting of this field needs to be the same on
104. tion AGA12 Encrypted Communications After a cryptographic session is opened between SCM devices a message arriving at the remote SCADAPack E RTU enters the Virtual SCM from the Ciphertext Port where it is decoded verified and decrypted then passed to DNP3 for normal processing When a response is generated by the RTU the DNP3 message passes into the Virtual SCM for encoding encrypting and signing and is then transmitted on the Ciphertext Port Cleartext DNP3 messages are NOT processed on ciphertext ports DNP3 Protocol DNP3 message Communication Drive E series RTU 1 ENCRYPTED amp E series RTU 2 PROTECTED AGA12 2 FRAMES Cipertext Ports Figure 5 1 Encoding and Decoding DNP3 with AGA12 DNP3 Secure Authentication Communications Unlike AGA12 encryption DNP3 Secure Authentication does not use the concept of a Local Access Port on a controller nor is an AGA12 Gateway RTU required To use DNP3 Secure Authentication you need to have a Master that natively supports DNP3 Secure Authentication that being a Master Station Host or a Data Concentrator DNP3 Secure Authentication is enabled using the same security file generated by the Security Administrator DNP3 Secure Authentication and AGA12 Encryption Communications To use DNP3 Secure Authentication and AGA12 Encryption simultaneously requires a DNP3 security capable Master and an AGA12 Gateway RTU Using both DNP3 Secure Authentication and AGA12 Encryption modes requires
105. tion for the communications including but not limited to encryption and authentication The class of such electronic devices is sometimes referred to as bump in the wire Decoding The process of checking data is signed correctly not tampered with and extracting the original data from the obscured encrypted data The algorithms for decoding are determined by the Cipher Suite and security keys Decoding is one of the tasks carried out by the SCADAPack E RTU s Virtual SCM receiving a message from another SCM Also see Encoding 10 10 SCADAPack E Security Technical Reference Decryption Translating Cipher Text ab into Clear Text 9 using a cryptographic key ho Le converting obscured data back into the original useful data Default Key Pre assigned key or key mode typically a factory set key Mo allowing devices to communicate out of the box For good security keys that are different from the default key should be used In SCADAPack E refers to the security configuration mode for SCADAPack E Configurator keys cf Common Keyl 9 Unique Key 11 Encoding The process of encrypting and signing data to ensure its contents are obscured and protected from tampering The algorithms for Encoding are determined by the Cipher Suite and security keys This is one of the tasks carried out by the SCADAPack E RTU s Virtual SCM sending a message to another SCM Encryption Translating Clear Text 9 into Cipher Text a using a cryptograp
106. tween the devices AGA12 defines a device as a SCADA Cryptographic Module SCM For more details on how AGA12 works see e Description of Security Facilities 35 e Using AGA12 Security 33 5 3 5 Supported AGA12 2 Functionality Notable AGA12 2 standard functionality provided in the SCADAPack E RTU includes e SSPP SCADA Security Protection Protocol The SCM address is equated with the existing DNP3 node address to reduce configuration effort The SCADAPack E RTU routing architecture already requires uniqueness DNP3 provides node addresses in the range 0 65520 SSPP allows SCM addressing in the range 1 65535 The unique address range that should be used for DNP3 SCM addressing is 1 65520 A limited ability to override a destination SCM address is provided primarily to permit AGA12 Gateway operation i e the destination of RTU messages is typically the Master Station DNP3 address and is different from the SCM address of the AGA12 Gateway e Ciphersuites encryption algorithm hash algorithms supported are e AES128 CTR HMACSHA 1 suite 1 e AES128 CTR HMACSHA 256 suite 4 e Suite 1 uses 128 bit encryption with 160 bit verification signing while suite 4 uses 128 bit encryption with 256 bit verification signing Suite 4 provides better security but more computation Security Technical 23 e Concurrent mixed mode operation of cleartext DNP3 protocol and AGA12 2 SSPP protocol on the same link for DNP3 amp SS
107. ute AGA12 mode None AGA12 Node AGA12 Gateway n The AGA12 field defines a protocol SSPP for use for connecting transporting encrypting and signing serial SCADA protocols including DNP3 The following selections are available None standard DNP3 device with no encryption AGA12 Node secure DNP3 device with encryption AGA12 GWn AGA12 messages are directed to a nominated gateway SCM address rather than to the DNP3 address Diagnostics are described further in System Points oi including a detailed list of routing diagnostic rules To enable or disable Mixed Mode operation plug in the appropriate media module set up by the Security Administrator 7 5 Security Technical Peer Communication Multiple Masters amp Start Up and Shutdown Peer Communication Where a node is protected by AGA12 encryption or DNP3 secure authentication a peer node communicating with that node needs to use the same With AGA12 matching counterpart entries including key pairs needs to be configured for the peer device in both devices Peer devices need to be configured with the security Group s Common key 9 For AGA12 individual counterpart entries are still required listing the address for each peer node Multiple Masters As the Common Keyl als shared across a Group of devices and individual AGA12 sessions are opened with each master the Common Key is used to authenticate each session with each master and other devices if require
108. various configuration parameters that include an SCM address communication parameters and static session information SCADAPack E RTU Virtual SCMs can be configured through command line text entry through a plug in media module e g Compact Flash card on SCADAPack ES or SCADAPack ER or through local USB peripheral communication port using SCADAPack E Configurator GCADAPack 300E The security files for Compact Flash card or SCADAPack E Configurator loading of the configuration is managed by a Windows Security Administrator application SCM Address SCADAPack E RTU s Virtual SCM address is obtained directly from the device s configured DNP3 node address Every SCM on a shared or networked communications link needs to have a unique SCM address and therefore unique DNP3 address Addresses in the range 1 65519 are valid addresses for both DNP3 and SCM Address 0 is not a valid SCADAPack E SCM address and can not be used as an SCADAPack E RTU DNP3 node address when using AGA12 security Security Administrator The SCADAPack E application used by the person responsible for security administration in a network This application is a type of security Authority oh that retains and provides security configuration files for the rest of the system It should be operated by corporate level security administration personnel Session A session is a bidirectional virtual communications channel established between a specific pair of devices In the
109. x on Port 0 C7 C2 CA 58 F9 1B 10 14 15 09 09 546 AGA12 gt gt LinkLayer received packet 139 bytes 23 00 02 00 04 02 00 00 00 62 40 86 AD 5E 02 6E 3F 9E CB 74 85 BD 03 C3 5F A8 D3 AF 3F 47 39 24 2D CC E0 8F E9 6D 2C 53 FO 9E F8 B8 CA AA B9 29 69 64 8C 60 90 C2 1C 1C 67 CD CO 5F 4A 57 C3 A8 FB E6 95 5C 07 E0 69 DC BF AF A4 BD AB AF 96 38 CO 7B 46 C6 19 86 DF FA CA AA DF 48 BD 86 51 66 3F 72 F4 C7 86 B2 6B 13 3B 90 ER SCADAPack E Security Technical Reference 90 73 7F 8F 26 9B AE 06 B9 53 04 86 35 C9 A2 2F 2B CC AC 28 C5 71 9D 9D E4 C2 8C C7 C2 CA 58 F9 1B 15 09 09 562 AGA12 gt gt Transport receiveBegin 15 09 09 562 AGA12 gt gt Transport receiveHeader 10 bytes 15 09 09 562 AGA12 gt gt Transport receiveHeader dest 2 src 4 sessionld 2 sequence 98 type 3 15 09 09 562 AGA12 gt gt seq 98 readSeq 30 now 103 diff 5 maxdiff 51 15 09 09 562 AGA12 gt gt Transport updateMac in receivePayload 10 bytes 15 09 09 562 AGA12 gt gt Packet receiveHeader dest 2 src 4 session 2 type 3 size 0 15 09 09 578 AGA12 gt gt SCM received DTA 4 gt 2 2 15 09 09 578 AGA12 gt gt Transport receivePayload length 1 108 15 09 09 578 AGA12 gt gt Transport receiveTrailer 15 09 09 578 AGA12 gt gt Packet receiveTrailer 15 09 09 578 gt ch00 00004 gt 00002 PRIMARY LINK HEADER UNCONFIRMED USER DATA FCV 0 FCB 0 DIR 1 Length 092 15 09 09 593 Security Route gt gt Inbound Frame Route Result TO_ME Rule A3 15 09 09 593 gt

Download Pdf Manuals

image

Related Search

Related Contents

  LifeSize Bridge 2200 Administrator Guide  Getting Started - Gforge  User Manual TCM 400  

Copyright © All rights reserved.
Failed to retrieve file