Promise Technology SmartStor NS2300N User Manual

Browse online or download User Manual for Networking Promise Technology SmartStor NS2300N. UPnP Gateway Working Committee: IGD:2

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - Mika Saaranen – Nokia

UPnP Forum and GatewayUPnP Forum and Gateway committee overviewcommittee overviewMarch 15, 2010Mika Saaranen – NokiaUPnP Gateway ChairMark Baugher–Cis

Page 2 - Introduction

Security in Gateway V1• IGD and other UPnP DCPs have had the option of iUPPDiS itfth t6using UPnP Device Security for the past 6 years• This is a high

Page 3 - What is UPnP Technology

Gateway v2 overview• Enhanced security by new DeviceProtection service li d t ll IGD i bl d tiapplied to all IGD variables and actions• Enhanced portm

Page 4

Addressing Security in V2• Threats: Malicious edits to critical configuration variablesDiP i ibli(hid)•DeviceProtection service uses public(unauthenti

Page 5 - UPnP Working Committees

Security in Gateway V2• Gateway v2 will use UPnP Device Protection• Does not require a third-device as a security console• Uses X.509 certificates and

Page 6 - What is UPnP?

Access Controls in IGD:2Access control is definedAccess control is defined• For all IGD ActionsThree levels of access• Admin•Basic• PublicBetter overa

Page 7 - UDA Overview

UDA Annex A IPv6 Changes• IPv6 support in UDA 1.0 and 1.1 evolved with the li t d devolving standard• Deprecation of site-local addressing• Developmen

Page 8 - The Risks of Home Networking

Time tableThis presentation covers on-going work and may change before publication Target timeline is:change before publication. Target timeline is:•

Page 9 - Gateway V1 overview

Summary• IGD:2 introduces two new services:•DeviceProtection :1 to enable authentication and accessDeviceProtection :1 to enable authentication and ac

Page 12 - Addressing Security in V2

IntroductionIntroduction• This is a public presentation of the the UPnP Forum’s Gateway workthe UPnP Forum’s Gateway work • The contents of this prese

Page 13 - Security in Gateway V2

Key Use CasesKey Use Casesz Use case #1 Add portmappingUser has an application that needs to be contacted from thezUser has an application that needs

Page 14 - Access Controls in IGD:2

List of Key changes Features -actionsz DeletePortMappingRange() allows removing a range ft iof portmappingsz GetListOfPortmappings() allows retrieving

Page 15 - UDA Annex A IPv6 Changes

List of Key changes Features New –state variablesz SystemUpdateID is used to track changes in NAT tiportmappingsz A_ARG_TYPE_MANAGE is a parameter use

Page 16 - Time table

List of Key changes Features –policy changesz PortmappingLeaseTime can have values between 1 to 604800 secondssecondsz If control point uses value 0 t

Page 17

DeviceProtection:1Vic Lortz (Intel) chair of UPnP Gateway security Task ForceyMika Saaranen (Nokia), Chair of UPnP Gateway committeey

Page 18 - Technical details

Background• Ease of use is generally at odds with secure use• People find that passwords and other authentication methods are a challenge to manage on

Page 19 - WANIPCONNECTION:2

Basic Security Requirements1. Simple to understand and useMt l th ti ti2.Mutual authentication3. Access control4. Privacy5Align with widely-supported

Page 20

Device Protection Properties1. Trust based on physical proximity and access¾ Such as reading a PIN¾ Pushing a button,¾ NFC touch, etc.2. Bootstraps st

Page 21

Trust Boostrapping by Introduction1. Pair-wise introductionPINbdDeviceDeviceA.PIN-based, run onceB. Establishes trust in self-signed certs of both Dev

Page 22

Securing the Control PlaneDeviceSecure URLStart TLS TLS HandshakeProtocolto HTTPSRecordProtocolfor UPnPControl URLActionsUser Control Point

Page 23

What is UPnP Technology1. UPnP Technology is an open international ISO/IEC standard for device & service discovery & control of devices on an

Page 24 - DeviceProtection:1

D-P Functional Block DiagramACLD-PD-PervicesTLSserviceOtherEmbeddeddevicesTLSLogicOther seTLSlogicCertOtherservicesTLSlogicCertDEVICE CONTROL POINT

Page 25 - Background

IGD User ExperienceIGD User Experience Scenario

Page 26 - Basic Security Requirements

IGD ScenarioIGDIGDControl Pointw CP on laptop and IGD are already connected to an IP network (may be wired or wireless)U i t d CP t IGD (IGD d CP hwUs

Page 27 - Device Protection Properties

Example Setup UI FlowSetup…Setup…CP’s GUICP’s GUIGatewayXYZGatewayXYZ1234567812345678Please enter GatewayXYZ’s SETUP PIN number.Please enter GatewayXY

Page 28 - 2. “Gossip” introduction

Administrator Login (rarely needed)SettingsSettingsIGDIGD……TLS connectionTLS connectionTLS connectionTLS connectionConfiguration UIConfiguration UIAdv

Page 29 - Securing the Control Plane

Concept UI of Administrative CPAdvanced SettingsAdvanced SettingsStP i iStP i i**************Administrator Password: Administrator Password: Set Permi

Page 30 - D-P Functional Block Diagram

SOAP Actions & Roles for the D-P Service• SendSetupMessage() [Public] • GetSupportedProtocols() [Public] GetAssignedRoles() [Public]•GetAssignedRo

Page 31

Summary1. CPs and Devices authenticate each other using certificates, users of shared CPs can also authenticate with Username/password over TLSADevice

Page 32 - IGD Scenario

WANIPv6FirewallControl:1Mika Saaranen, NokiaFabrice Fontaine OrangeFabrice Fontaine, OrangeMark Baugher, Cisco

Page 33 - Example Setup UI Flow

Introduction• It is expected that massive roll-outs of IPv6 will start itlfin next couple of years• In IPv6, we likely won’t have NATs, but it seems t

Page 34 - (rarely needed)

Diversity of UPnP Vendors & Products1. Acer Aspire Laptop PC series2. Buffalo HS-DS Network Attached Storage (NAS) series3. Canon Digital Camera D

Page 35 - Mika’s PhoneMika’s Phone

Key use casesz Use case #1 Add pinholeUh liih d b dzUser has an application that needs to be contacted from the internetz Usually, no user interaction

Page 36

State variables• FirewallEnabled : is firewall enabled• InboundPinholeAllowed : Can pinholes be created• OutboundPinholeTimeout : How long a pinhole c

Page 37 - 3. Remaining threats

Actions• GetFirewallStatus() : returns information if the fi ll i ti d i h l b t dfirewall is active and new pinholes can be created• GetOutboundPinho

Page 38 - WANIPv6FirewallControl:1

Summary• IGD:2 has release target in Q4/2010 including:• WANIPConnection:2• DeviceProtection:1•WANIPv6Firewall control:1WANIPv6Firewall control:1• Pre

Page 39

For the interconnected lifestyle

Page 40 - Key use cases

UPnP Working Committees• UPnP protocols are developed in UPnP Working CommitteesCommittees• There are many past and present WCs including• Audio/Video

Page 41 - State variables

What is UPnP?•UPnP Addressing •UPnP Control•UPnP Addressing •UPnP Control•UPnP Discovery •UPnP Eventing•UPnP Description•UPnP Devi

Page 42

UDA OverviewUPnP Discovery•Device sends SSDP Notify •Control Point sends SSDP MSearch messagesAnnouncementsSSDP MSearch messages•Devices respond with

Page 43 - UPnP Forum members

The Risks of Home Networking• Home networks face risks• Well-known admin passwordsHome networks are vulnerable to malware and war driverspasswords• Li

Page 44

Gateway V1 overview• Manage and configure physical connections e.g. tdi tconnect or disconnect• Automatic and seamless configuration of Internet acces

Comments to this Manuals

No comments