论文标题
通过OPC UA宽松良心:一项关于不安全部署的互联网范围的研究
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments
论文作者
论文摘要
由于数字化的增加,以前是孤立的工业网络,例如,用于工厂和流程自动化,越来越靠近互联网,要求安全通信。但是,由于各种各样的不安全选择,安全地设立了安全工业交流的主要候选人OPC UA,这是具有挑战性的。为了研究面向互联网的OPC UA设备是否安全配置,我们会积极扫描IPv4地址空间,以供公开访问的OPC UA系统,并评估其配置的安全性。我们观察到有问题的安全性配置,例如缺少访问控制(在24%的主机上),残疾人安全功能(24%)或使用不推荐的加密原始原始图(25%),总计92%可触及的部署。此外,我们在共享相同安全证书的多个自主系统中发现了几百个设备,为模拟攻击打开了大门。总体而言,在本文中,我们突出显示了通常发现的安全性错误,并强调了适当配置对安全功能的协议的重要性。
Due to increasing digitalization, formerly isolated industrial networks, e.g., for factory and process automation, move closer and closer to the Internet, mandating secure communication. However, securely setting up OPC UA, the prime candidate for secure industrial communication, is challenging due to a large variety of insecure options. To study whether Internet-facing OPC UA appliances are configured securely, we actively scan the IPv4 address space for publicly reachable OPC UA systems and assess the security of their configurations. We observe problematic security configurations such as missing access control (on 24% of hosts), disabled security functionality (24%), or use of deprecated cryptographic primitives (25%) on in total 92% of the reachable deployments. Furthermore, we discover several hundred devices in multiple autonomous systems sharing the same security certificate, opening the door for impersonation attacks. Overall, in this paper, we highlight commonly found security misconfigurations and underline the importance of appropriate configuration for security-featuring protocols.