OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.



Similar documents
Security and Security Certificates for OpenADR systems. Background. Content:

SSL BEST PRACTICES OVERVIEW

Chapter 17. Transport-Level Security

mod_ssl Cryptographic Techniques

TLS and SRTP for Skype Connect. Technical Datasheet

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

An Introduction to Cryptography as Applied to the Smart Grid

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.7+

SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service

Using etoken for SSL Web Authentication. SSL V3.0 Overview

SBClient SSL. Ehab AbuShmais

Overview. SSL Cryptography Overview CHAPTER 1

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

2014 IBM Corporation

SSL Protect your users, start with yourself

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Thank you for joining today s webinar: Developing and Applying Open-Source Implementations of OpenADR

Domino and Internet. Security. IBM Collaboration Solutions. Ask the Experts 12/16/2014

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Managing SSL certificates in the ServerView Suite

WEB SERVICES CERTIFICATE GUIDE

Is Your SSL Website and Mobile App Really Secure?

Chapter 7 Transport-Level Security

TLS/SSL in distributed systems. Eugen Babinciuc

Web Security: Encryption & Authentication

Grid Computing - X.509

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

What in the heck am I getting myself into! Capitalware's MQ Technical Conference v

Implementing SSL Security on a PowerExchange Network

Savitribai Phule Pune University

(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING

Instructions on TLS/SSL Certificates on Yealink Phones

Understanding digital certificates

HTTPS Configuration for SAP Connector

BEA Weblogic Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

SolarWinds Technical Reference

Encrypted Connections

Snow Agent System Pilot Deployment version

Rocket UniVerse. Security Features. Version April 2014 UNV-1123-SECU-1

SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release [August] [2014]

[SMO-SFO-ICO-PE-046-GU-

ATSC Standard: ATSC Security and Service Protection Standard

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

HTTPS is Fast and Hassle-free with CloudFlare

Transport Level Security

How To Encrypt Data With Encryption

Communication Systems SSL

Security Policy Revision Date: 23 April 2009

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Einführung in SSL mit Wireshark

SSL/TLS: The Ugly Truth

Factory Application Certificates and Keys Products: SB700EX, SB70LC

, ) I Transport Layer Security

CRYPTOGRAPHY AS A SERVICE

PUBLIC Connecting a Customer System to SAP HCI

Cisco TelePresence VCS Certificate Creation and Use

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

SSL Certificate Generation

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

White Paper. Enhancing Website Security with Algorithm Agility

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Cisco Expressway Certificate Creation and Use

Web Security Considerations

Network Security Essentials Chapter 5

NIST Test Personal Identity Verification (PIV) Cards

Certificate technology on Pulse Secure Access

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Generating and Installing SSL Certificates on the Cisco ISA500

Certificate technology on Junos Pulse Secure Access

Introduction to Security and PIX Firewall

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Avoid the SSLippery Slope of Default SSL

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS by Nikos Mavroyanopoulos

IT Networks & Security CERT Luncheon Series: Cryptography

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Lecture 9 - Network Security TDTS (ht1)

SSO Eurécia. and external Applications. Purpose

More on SHA-1 deprecation:

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Cisco TelePresence VCS Certificate Creation and Use

This section includes troubleshooting topics about certificates.

Lecture 9: Application of Cryptography

WiMAX Public Key Infrastructure (PKI) Users Overview

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Introduction to Cryptography

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.

Displaying SSL Certificate and Key Pair Information

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Lukasz Pater CMMS Administrator and Developer

Digital Certificates Demystified

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Computer System Management: Hosting Servers, Miscellaneous

How To Understand And Understand The Security Of A Key Infrastructure

Transcription:

OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc.

Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 Optional XML payload signatures Requirements above are out of box, deployment security may differ

Focus Most common support issue for OpenADR implementers is getting communication going over a secure channel This presentation will focus on the minimum necessary concepts and steps required to be successful setting up secured OpenADR communication

Cipher suites An algorithm for performing encryption or decryption. OpenADR support two types of cipher suites ECC (Elliptical Curve Cryptography) RSA The OpenADR RSA and ECC cipher suites used by OpenADR have a strong SHA256 hash algorithm

X.509 Certificates Root Certificate Used to validate the identity of a counterparty such as a VEN trying to talk to a VTN Certificates are managed by a Certificate Authority (CA), NetworkFX for OpenADR OpenADR has a public cert each for RSA and ECC Intermediate Root Certificate Signed by the root cert s private key Used in conjunction with root cert for identifying counterparties VENs and VTNs have separate intermediate certs

X-509 Certificates Device Certificate Identifies a specific VTN or VEN Signed by the intermediate cert s private key Private Key Matching device certificate private key. Used to encrypt hash of traffic payloads, which can only be decrypted with public device cert

Cert Tree

TLS Negotiation TLS is a cryptographic protocol designed to provide communications security over a computer network. Think HTTPS. TLS negotiation does the following Sets the TLS version to use (TLS 1.2 for OpenADR) Sets the cipher suites to use Exchanges client and server device certificates Validates certificates are trusted Establishes symmetric encryption key for data exchange

TLS Negotiation Client Hello (TLS/Cipher Options) Server Hello(selected TLS/Cipher) VTN (ISO or Utility) Send Server Device Certificate Request Client Certificate Send Client Device Certificate Establish Symmetric Encryption Key VEN (C&I, SMB)

Certificate and Stores Certificates are available in a number of formats: PEM Format Base64 encoded certificate DER Format Binary encoded certificates PKCS12 Format Contains both public device and private key Stores Trust Store Contains public root and intermediate Certs from counterparty Key Store Contains device cert and private key

Certificate Management Tools OpenSSL and Keytool Convert between certificate formats Create trust and key stores Verify device certs validate against public certs (OpenSSL)

Test Certificates ww.networkfx.net DNS name is stores in cert CN field. Must match VTN URL if host authentication not disabled.

Test Certificates The MAC address is stored in the CN field of the VEN certificate with out colons. If using OpenFireXMPP Server, the XMPP user name must match the VEN CN Name in the Cert

HTTP Certificate Configuration Example VEN VTN Common Root Cert Common Root Cert Trust Store VTN Intermediate Cert VEN Intermediate Cert Key Store VEN Device Cert VTN Device Cert VEN Private Key VTN Private Key All Certs must be of a common type: RSA or ECC. Can be both

XMPP Transport All communication flows through the XMPP Server Note that the connection between the XMPP server and the VTN is a private connection. From the VEN s perspective the XMPP server is the VTN.

XMPP Certificate Configuration Example VEN XMPP Server VTN Trust Store Common Root Cert Common Root Cert Common Root Cert VTN Intermediate Cert VEN Intermediate Cert VTN Intermediate Cert Key Store VEN Device Cert VTN Device Cert VEN Device Cert VEN Private Key VTN Private Key VEN Private Key The connection between the VTN and the XMPP server is a private connection. The cert configuration shown for the VTN is just a suggestion to deal with the OpenFire scn name to user name match requirement

Fingerprint The VEN Zip package with certificates from NetworkFX will contain a fingerprint file This fingerprint value may need to be installed in the VTNs back-end server configuration in order to interoperate

Questions?