Access Control Vulnerability & Interoperability: Improving the Reader-to-Panel Connection Tony Diodato, CTO Cypress Integration Solutions Access Control.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Arctic IEC-104 Gateway Jari Lahti, CTO.
Director of Product Line Management HID Proprietary & Confidential
Tech Data’s 2010 Physical Security Playbook Enablement for Networking Resellers.
N-TEC Access Control Connecting For Growth.
Peek – ACS Lite Deployment Quixote Traffic Corporation Peter Ragsdale August 17, 2006.
1 Conversion Solutions Easy, inexpensive solutions for converting analog to digital and upgrading Wiegand to WSE.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Presents The Silver Family An Integrated Approach to Processors, Data Communication and Head End Integration.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Overview The Basics Core Specification Version Spectrum International Radio Frequency Allocation Range Power Benefits Protocol Stack Bluetooth Architecture.
USB – An Overview Group 3 Kaushik Nandha Bikram What is the Universal Serial bus (USB)? Is a cable bus that supports data exchange between a host computer.
System Components Hardware overview for Apollo ACS.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Module Summary  Ethernet cables and segments can span only a limited physical distance,
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Cisco PIX 515E Firewall. Overview What a PIX Firewall can do Adaptive Security Algorithm Address Translation Cut-Through Proxy Access Control Network.
Introduction To DSX WinDSX DSS (Dallas Security Systems)
Introduction to USB Development. USB Development Introduction Technical Overview USB in Embedded Systems Recent Developments Extensions to USB USB as.
Profile Series v.S1 Intelligent Power over Ethernet Access Control Solution With the power of iCLASS.
1 Chapter Overview Wireless Technologies Wireless Security.
Lessons Learned in Smart Grid Cyber Security
1999 Cabletron Systems. Wireless Networking RoamAbout Introduction to Wireless Networking Overview of the Wireless functionality Applications for Wireless.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
Manufacturing Execution Real-time Lean Information Network Recent News 2013 Technology Innovation Leadership award for Machine Monitoring Systems  MERLIN.
The SMARTair Story 1 This is not a presentation about what SMARTair is… 2 What is SMARTair???
Ethernet and Wifi Chapter 7 & 8. Send and Receive Data network adapter or network interface NIC card the most common wired Ethernet network interfaces.
This is NUUO IO Device. Install IO Device IO Card Capture Card IO Box Converter USB RS485 PCI MPEG-4 Series H.264 Series.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Next Generation Security Solutions Next Generation Controllers January 2013.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
BOOT MODE 1 BOOT MODE 2 BIOS COMMUNICATION DEFAULT CONTROLLER INVERT RELAY OPERATION ENABLE COMM FAIL RELAY CONTROL RELAY OFF / ON COMM.
Connecting, Monitoring and Securing Manufacturing Assets 1 Yan Chen Professor, EECS Department Director, Lab for Internet & Security Technology (LIST)
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
Tim Gilger National Manager of OEM & Integration Partners.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Wireless and Mobile Security
End-to-End secure controller Solution New Product Announcement Feb 11.
August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.
Copyright © 2008 FingerTec Worldwide Limited. All rights reserved
NETWORKING & SYSTEM UPDATES
Communication Techniques Design Team 2 Luke LaPointe Nick Timpf Mark VanCamp Brent Woodman Steve Zuraski Design Team 2 Luke LaPointe Nick Timpf Mark VanCamp.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
The World Leader in High Performance Signal Processing Solutions SD/SDIO Introduction Cliff Cai.
Twesige Richard.  Advanced RISC Machines.  Set of instruction set architectures related to programing registers, CPU’s also I/O devices.  RISC acronym.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
1/2015 SE LP10 multiCLASS SE ® Integrated Wiegand Access Control Solution Sold through :Installed by:
Wireless LAN Concepts. Wireless LAN Standards.
emerald™ New Product Announcement November 2012.
U-PROX SMART HANDLE Fully incorporated Wireless Handle and Furniture Locking Set.
COSEC ARC IP based Access Control Panel.
2N® Access Unit.
2N® Access Unit Touch Keypad
Presented by: Jeffrey D. Bombell, American Computer Technologies
The future is NOW.
Wireless Universal Serial Bus
Profile Series v.N2 with Aperio™ Technology
Network Solutions Rev J. 11/8/2018.
2N® Access Unit RFID (125kHz or 13.56MHz).
CCS-ARC Assignment November 24, 2018.
Our Focus: Mechanical & Electronic Door Opening Solutions
Profile Series v.N2 with Aperio™ Wireless Lock Technology
2N® Access Unit Bluetooth
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Stable connection More secure More vulnerable to hacking Cheap set up costs Generally will have a good quality signal The connection is not as stable.
2N® Access Unit Bluetooth
Presentation transcript:

Access Control Vulnerability & Interoperability: Improving the Reader-to-Panel Connection Tony Diodato, CTO Cypress Integration Solutions Access Control Vulnerability & Interoperability 1 Babak Javadi, Director of Research The CORE Group

Prevalent Assumptions – Agree or Disagree? 2 Got vulnerabilities? Access Control Vulnerability & Interoperability Wiegand is inherently secure... so is RS-485 If you have a guy hunkered down in your electrical room with alligator clips on the 485 runs, then you have bigger problems. There’s not enough power in a prox card to be skimmed beyond a few inches. The Cloud is your friend. The IT department has it under control. Wired connections are more secure than wireless.

Where are the vulnerabilities? 3 Got vulnerabilities? Access Control Vulnerability & Interoperability The card? Between card and reader? Panel to console? Console to Cloud? The last few inches of wire? Between reader and panel?

How tough is it to hack a Wiegand connection? 4 Got vulnerabilities? Access Control Vulnerability & Interoperability

So what's vulnerable? All of the above! 5 Got vulnerabilities? Access Control Vulnerability & Interoperability The card? Between card and reader? The last few inches of wire? Between reader and panel? Panel to console? Console to Cloud?

Vulnerable point 1: Card and reader 6 Securing Vulnerabilities with OSDP Access Control Vulnerability & Interoperability 125KHz Marconi One-way conversation MHz HID iClass, MIFARE, DESFire, etc. 2-way conversation (key to securing) Can employ encryption and authentication

Vulnerable Point 2: Reader and panel 7 Securing Vulnerabilities with OSDP Access Control Vulnerability & Interoperability Fuel pump skimmers in the news Gecko Attack side / secure side 2-way conversation Can employ Secure Channel Authentication and encryption Standardization SIA standard (on track for ANSI)

Vulnerability 3: Panel to console 8 Securing Vulnerabilities with OSDP Access Control Vulnerability & Interoperability RS-232 RS-485 Ethernet Wi-Fi USB

Forecast: Cloudy with a chance of extinction 9 Securing Vulnerabilities with OSDP Access Control Vulnerability & Interoperability Substitute the phrase “Other peoples’ computers” for “The Cloud” Panel-to-console Console-to-Cloud

Current installation method overview: Reader to Panel 10 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability Wiegand Strobed Serial

Current installation method overview: Panel to door 11 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability Door strike REX Door monitor

Current installation method overview: Wiring 12 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability 11 wires 500 ft. limit Mixture of 22 to 12 AWG Most are unsupervised

Background on 2-wire protocols and OSDP “Back in my day...” 13 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability 2-wire protocol (not new) Very proprietary Fairly low speed No intent to be interoperable No progress until 2005, when Mercury Security Corporation and channel partners started work on an open protocol In 2012, Mercury, HID Global (and more recently Codebench, Inc.), assigned OSDP specification to SIA

Background on 2-wire protocols and OSDP 14 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability Can’t we all just get along? (Standardization) / 30th anniversary of “sun setting on Wiegand” OSDP leadership elicited stakeholder buy-in: Joe/SIA Frank/Mercury Criteria for standard from working group: Low cost of implementation for manufacturer Minimal packet structure Expandable as needed Well-defined security feature

OSDP overview 15 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability SIA Standard: Open Supervised Device Protocol Current version On ANSI track Open Source Tools Interoperability Currently working on Ethernet version using TLS (ONVIF) Low-cost Minimal feature set

OSDP overview 16 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability 2-Way Conversation 4 wires (sometimes 2) Fully supervised Authenticated Encrypted Expanded I/O Point-to-point Multi-drop

OSDP installation 17 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability Control Panel (CP) Master unit Command (poll) Peripheral Device (PD) Slave unit Response Addressable (126 devices) Multiple device types

OSDP installation demo 18 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability Legacy panel, OSDP reader Wiegand reader port REX, door monitor, tamper Supervision Secure Channel OSDP panel, Wiegand reader/door Signal wires reduced to single pair Supervision Secure Channel New install Panel Reader Door control

How hackable is OSDP? 19 Installation Comparisons: Current Practices v. OSDP Access Control Vulnerability & Interoperability

Review previous assumptions/assessments Thoughts, comments, questions 20 Summary: OSDP v. Wiegand Access Control Vulnerability & Interoperability