3. Security Analysis

3 Security Analysis

The security module is designed for the use in automation networks. For automation networks availability and robustness are of first priority since the network must be protected against any failure so that the production never stops. For instance, in the chemical industry this is extremely important.

Of course there are also high demands regarding the data security objectives including data confidentiality, data integrity, and resistance against attacks from the external network. From the technical point of view the security module meets these high security goals. In this chapter the technical aspects will be analyzed in detail.

3.1Network and Protocol Analysis

3.1.1 VPN

The VPN is based on the IPsec protocol family. In the last years this protocol family was established as an industrial standard for VPNs. Hence, interoperability with other systems is provided. Within this analysis the interoperability to the IPsec- implementation of the Linux kernel 2.6.x was confirmed. For the VPN functionality the IKE daemon isakmpd of OpenBSD was used. The IKE-protocol supports the following algorithms, where the default values are represented in bold:

Phase 1

 

Authentication

 

RSA , PSK

 

 

Modes

 

Main, Aggressive

 

 

DH-groups

 

1 (768 bit key-length), 2 (1024 bit), 5

 

 

 

 

(1536 bit)

 

 

Encryption

 

DES, 3DES

 

 

 

999.999.999 seconds

 

 

Life cycle

 

 

 

 

SHA1, MD5

 

 

Authentication

 

 

 

 

 

 

 

 

 

 

 

 

Phase 2

 

 

 

 

 

 

 

 

 

Life cycle

 

Time (7200s), limit

 

Encryption

 

DES, 3DES, AES

 

Authentication

 

SHA1, MD5

 

PFS

 

yes, no

 

 

 

 

 

19-Aug-05

escrypt GmbH

12

Page 12
Image 12
Siemens Version: 1.2 manual Security Analysis, 1 VPN