The invention relates to a mechanism and a coupling device, referred to as a secure switch, for securing data access of a first subscriber or a plurality of subscribers, which are arranged in a first subnetwork of an automation network, to a second subscriber or a plurality of subscribers, which are arranged in a second subnetwork of an automation network.
Subscribers can, for example, be servers, programming devices, operating and monitoring stations, service mechanisms for maintenance or diagnosis, automation devices, decentral peripherals or field devices, for example measuring transducers or actuators, which are connected to each other in a common automation network for transmitting data. They are components of an automation system which is used for monitoring a technical process, for example a manufacturing process, and is known per se. Automation networks of this type were previously divided hierarchically into a plurality of levels, for example processing, automating and central command levels. In this case components of the respective level were connected to each other by a data transmission unit, referred to as a gateway. Automation components of the processing level and/or automation level were horizontally connected to each other by means of what is known as a field bus system and vertically connected to the next highest level, for example to the central command or control level, by means of an Ethernet bus system. Field busses are specifically oriented toward the requirements of automation engineering. Communications media and protocols for field busses are, as a rule, not common in offices. As access from the central command and control level to the automation or field level was only possible via gateways, hacker attacks on the lower levels of the automation network were made difficult. Nowadays automation components of a level are increasingly also horizontally connected by means of an Ethernet bus system. With the increasing spread of Ethernet to the lower levels of an automation network as well, the various levels are merging ever more closely and special gateways are no longer necessary from a purely communications engineering point of view. Hacker attacks are therefore more easily possible at the lower levels of an automation network as well.
A further trend is the increasing fusion of office and production networks which can be regarded as sections of an automation network. New problems result from this, in particular in terms of safety and security. Disruptions to the automation devices that a re introduced via the office network into the production network can potentially severely disrupt or affect production. The risks associated therewith, for example loss of production through to danger to human life, are often much higher than in the case o f disruptions which are limited to an office network. Disruptions to the production network that start in the office network can be caused for example by operating errors, for example owing to the input of incorrect IP addresses, viruses, Trojan horses or worms, which attempt to spread in the network via personal computers in the office network and which potentially also reach the production network area, also due to employees who, for example, try out TCP/IP network tools or due to attacks by employees inside the automation engineering system, which, if of a passive nature, can be called spying and if of an active nature, sabotage. It is therefore necessary to protect certain parts of the automation network against unauthorized access.
It is known from DE 101 24 800 A1 to exchange function- and/or device-related data between various devices of a process automation system so it is at least partially encrypted. This should allow flexible and, at the same time, secure handling of selected important data of the process automation system. Encryption is performed directly in the end terminals. This requires all end terminals that are involved in encrypted data transmission to be relatively powerful.
A chapter entitled “Bridging and IPsec” was made accessible to the public on the web page with the address www.thought.net/jason/bridgepaper/node9.html. A bridge is described which is augmented by IPsec capabilities. Messages entering one side of the b ridge in Ethernet format are output at the other side of the bridge encrypted in accordance with the IPsec protocol, which is located on layer 3 of the ISO -OSI 7-layer model, and can thus be transmitted, so as to be protected against access, via an insecure portion of the network. An application on automation networks is not described.
An object of the invention is to provide an arrangement and a secure-switch for securing data access of a first subscriber or a plurality of subscribers, which are arranged in a first subnetwork of an automation network, to a second subscriber or a plurality of subscribers, which are arranged in a second subnetwork of an automation network, that are distinguished by particularly low expenditure.
This object is achieved by the claims.
In the context of this invention, the term “tunnel” is taken to mean a connection between two or more subscribers of the automation network, which advantageously ensures secure data transmission with respect to authenticity, integrity and/or confidentiality. All message data, in other words user data and header information of a message, is transmitted in a secure manner by the tunnel. Shared secrets are required to establish a tunnel. If the tunnel is established between two partners, both partners must have the same shared secret or a mutually matching public/private key pair. If the tunnel is to be expanded to more than two partners (global tunnel), shared keys for example must be distributed among all participating subscribers. If public/private keys are used and there are more than two partners, all partners must have key pairs of this type between themselves. The respective key pair that applies to the current partner must be used when encrypting or decrypting data. The use of public/private key pairs is rather complicated and expensive, however, particularly in relatively large systems. The process is simple in the case of a shared secret as all subscribers have the same key which can be used for all subscribers.
The invention allows inexpensive protection of subscriber networks, for example automation cells, within the production network in addition to decoupling of office network and production network. Consequently, unintentional interactions, such as may occur in a starting-up phase of sections, can be avoided. Potential internal attackers who are given access to the production network, for example employees in assembly companies, are considerably limited in their possibilities for disrupting the automation system.
A tunnel end point is produced in a switch with software and/or hardware modules. The switch assumes a substitute function for devices which are not themselves capable of producing a tunnel end point. Thus the mechanism for securing data access can advantageously be used without reaction in existing automation networks. “Without reaction” in this connection means that the subscribers to the existing network do not have to be changed with respect to their addressing, the respective subnetwork or their parameterization. For this purpose, the tunnel is advantageously allocated to the respective subscriber by using the respective subscriber address, i.e. by using the address of the subscriber or subscribers for which the tunnel is substitutionally established by the mechanism. An IP address is preferably used as the subscriber address. Alternatively the Ethernet MAC address may be used for this purpose. The decision regarding which tunnel is to be used in the event of a desired data transmission is therefore made by using the addresses of the end terminals involved. In the case of IP capable subscribers, this may be the IP address; in devices which communicate via level 2 protocols, the MAC address. The resources necessary for establishing the tunnel are only required in the preceding switch, so the subscribers or subnetworks located thereafter manage with few resources. In addition, in what are known as switched networks a switch that is present anyway may be replaced by a secure switch for securing the data traffic. Use of the invention is subsequently associated with particularly low expenditure.
By using a secure switch as a substitute for individual subscribers or a plurality of subscribers which are located in a subnetwork, the mechanism for securing data access may be subsequently integrated into existing networks without relatively major rearrangement of the subscriber parameterization being necessary. The automation devices, which may potentially be old devices with low power resources, can remain unchanged. Only the secure switches as substitutes have to be coordinated with each other. Apart from the aspect of continued use of the old devices, this property may, for example, also be significant if the parameterization on the automation devices themselves may no longer be altered, for example because they have been removed by test centers, and modifications would require new tests or verifications. The subscribers connected downstream are disconnected from the insecure network by the secure switch as a substitute. As a rule they can implicitly accept communication from outside via the tunnel. With other forms of communication however there must be a test as to whether it is acceptable for the subscribers. This test requires resources. In addition a large number of broadcast messages or additional loads may lead to considerable loading of the tunnel end point, for example owing to UDP flooding attacks from the office network. If the tunnel end point is produced in the secure switch as a substitute, the load falls to this. The resources of the subscribers connected downstream can continue to be used in the automation network completely for automation engineering functions. If the subscribers' load had to be overcome, the subscribers could be impaired when fulfilling their automation engineering functions and, in the worse case, fail. Without substitutes the automation devices would be visible immediately as network subscribers on the insecure network and would thus also be vulnerable to attack. In the event of errors in the implementation of a tunnel protocol executed on the sub scribers themselves, operation thereof could be impaired in the event of attacks.
As the use of secure tunnels ensures that the data is protected from interception and modification (privacy, integrity), in addition to protecting against access, data can be transmitted, for example between two secure switches, via an insecure network. No security requirements are specified for the security of the transmission media in this sector. Tunnels in pairs, i.e. tunnels between two subscribers, allow the individual bilateral connections to be separated from each other with respect to transmission security. A global tunnel, i.e. a tunnel with more than two end points, can contribute to a saving in resources, which are often limited in automation devices in particular, compared with a tunnel in pairs. Mixing of tunnels in pairs and global tunnels, i.e. the simultaneous existence of different types of tunnel, allows improved scaling of the automation network. Particularly critical communications connections are created via tunnels in pairs, less critical connections via a common, global tunnel.
As, in contrast to office engineering, networks are configured in automation engineering, with a suitably designed configuration tool a series of parameterization and/or configuration data can be derived for the secure switch from this configuration. Thus no, or only little, IT knowledge on the part of a user is required for configuration. Conventionally the devices of the automation system and its network connections are configured and/or parameterized. Configuring of the communications connections is necessary to allow communication between the devices. The following may be derived, by way of example, as information from configuration of the network and the communications subscribers:
which device is communicating with which other device,
which protocols are used during communication,
what direction communication is taking place in and/or
via which optionally alternative paths communication can proceed.
A configuration tool can be expanded such that the security devices and, in particular, the secure switch used are also configured. If the secure switch in a connection is placed between two subscribers, the following information may also be derived, by way of example, from the configuration:
which networks and/or devices are located downstream of the secure switch,
which devices downstream of the secure switch communicate with which devices downstream of a second secure switch,
which devices downstream of the secure switch are themselves capable of establishing secure tunnels, so the secure switch can easily pass along encrypted messages.
From this type of information, information may be derived for the parameterization of the secure switch such as:
between which secure switches and/or subscribers secure tunnels are to be established and which type of tunnel connections these are (for example host to network, network to network, host to host),
between which secure switches and/or subscribers authentication n is necessary and which of these devices must have shared secrets or where what type of certificates are required with a certificate-based authentication and/or
which security rules are to be employed for which connections.
By way of example, connections from a programming device to an office computer can be operated in the office network without security, i.e. data is transmitted by the secure switch, while connections from a programming device to an automation cell are to be secured via an additional secure switch, i.e. a tunnel should be established between the two secure switches.
The use of layer 3 (network layer) of the ISO -OSI 7-layer model as a basis for the tunnel protocol provides the advantage of compatibility with the infrastructure existing in the automation networks. Thus level 2 packets, as sometimes occur in automation engineering, may also be tunneled.
Production of a tunnel end point by a layer 3 port with IPsec protocol of a secure switch, which is constructed as an Ethernet switch, i s particularly advantageously expedient. A proven protocol that is already very common outside of automation engineering is thus used. In the case of IPsec as a basis for the tunnel protocol, personal computers with conventional operating systems can operate as the tunnel end point.
In principle, a layer 4 switch which produces a tunnel end point with a layer 4. protocol, for example based on SSL, Kerberos or SSH instead of the IPsec protocol, could also be used as the secure switch. Of course for transmission through the tunnel Ethernet packets have to be packed in IP packets in advance in this case as well, for example using EtherIP, before they can be sent through the security protocol, in this case SSL, Kerberos or SSH.
If the secure switch has at least one port, which is constructed as a WLAN end point and is capable of producing a tunnel end point, complex wiring and space requirements may be reduced. In this case the design of the secure switch does not place any particular security requirements on the WLAN end point. For example WEP (Wired Equivalent Privacy) security architecture, which allows data encryption and possible authentication of a subscriber device with respect to the WLAN end point, is not required for the WLAN. Of course existing security mechanisms in the WLAN end point, for example MAC address restrictions, continue to be retained. However, by using a tunnel the WLAN end point can accordingly be configured via secure communications paths. Setting of admissible MAC addresses in the WLAN end point is cited by way of example. The end of the tunnel is advantageously located between the WLAN end point and the central switch matrix of the secure switch.
The constructional configuration of the switch is advantageously chosen such that it is suitable for use in an automation system. Depending on the application it is constructed in such a way that the requisite class of protection, for example protection against dust, water or explosion, is adhered to. With suitable selection of the design a to p hat rail or cabinet mounting is possible. A power supply with low voltage, for example 24 v, is advantageous.
If a port suitable for producing a tunnel end point can be distinguished from other ports of the secure switch by a marking, this has the advantage that the cabling is simplified and cabling errors are reduced.
A user's feeling of security is increased if the state is displayed by a visually discernible marking. If a port of a secure switch allows transmission of secure and in secure messages it can be labeled with a marking that can be changed over.
One possible embodiment is, for example, a light-emitting diode which can change over in terms of color. If in the instantaneous configuration only secure transmission may take place, it illuminates in green; if in another case secure and insecure transmission may take place in the instantaneous configuration it illuminates in yellow, and if only insecure transmission is possible it changes to red. In addition to the configuration display a dynamic traffic display may also be advantageous which, to improve visibility, operates with appropriate extension of the display time. For example any packet transmitted insecurely can be displayed by a light-emitting diode that briefly illuminates in yellow and any packet transmitted securely can be displayed by a light-emitting diode that briefly illuminates in green. Mixed transmission results in flickering of the light-emitting diode. It is also advantageous for network management if the display can be interrogated automatically as to the security status of the port, for example via SNMP protocol.
The invention and configurations and advantages will be described in more detail hereinafter with reference to the drawings in which an exemplary embodiment of the invention is shown and in which:
To distinguish the ports 18, 19, 21, 22, 23 and 27, which like conventional ports of a switch are not capable of producing a tunnel end point, the ports 17, 25 and 28 of the secure switches 16, 24 and 26 are provided with a colored marking, with a black marking in the illustrated embodiment.
As an alternative to the illustrated exemplary embodiment of the automation network 1, the switch 16 could be omitted if the operating and monitoring device 10 and the programming device 11 were themselves capable of producing a tunnel end point. In this case these devices would be directly connected to the connecting line 4 and a global tunnel would have a respective end point in the operating and monitoring device 10, in the programming device 11 and, in the same form as described above with reference to
By using the switch 24 in the subnetwork 20 all connections of the network subscribers, in this case the automation device 12, the measuring transducer 13 and the operating and monitoring device 14 are produced by point-to-point connections. A structure of this type is frequently called a switched network, in particular a switched Ethernet. Alongside other measures it allows the real-time conditions required in an automation environment to be met.
The programming device 11 is used in the automation network 1 as a configuration tool with which, in addition to the conventional configuring in automation networks, the project engineer, when using secure switches, additionally determines in which network the secure switches are located and which subscribers located downstream of them should be protected. These inputs are usually easy to implement for an automation engineer. For example a secure switch, in this case the secure switch 24, is placed upstream of all devices which form part of a production cell, as in the illustrated embodiment upstream of devices 12, 13 and 14. The communications partners and the addresses thereof, for example IP addresses, network connections via which these communications partners are connected to each other, automation functions and their communication with each other and the position of the secure switch in the network are determined with the configuration tool. The following parameters, by way of example, can automatically be ascertained with reference to these determinations for construction of the tunnel: addresses of the individual tunnel end points, with which other tunnel end points a specific tunnel end point has to construct tunnels, generation of the secrets and/or certificates.
It can be established via the properties of the secure switches, application profiles or the user's project-global settings which ports of switches are secure, which tunnel protocol is to be used and/or which security settings are used, for example encryption methods, integrity protection methods, authentication methods, period of validity of the keys, etc.
has the maximum admissible received data rate been exceeded (DoS protection),
is the received message of the tunnel protocol type, with IPsec for example AH or ESP,
does the packet originate from an authorized sender (authentication),
is the packet unchanged (integrity) and/or
has the packet been received already (replay protection)?
If one of these tests turns out negative the packet is rejected and a logging entry is optionally made for a system analysis.
If these tests are successfully passed, the packet is forwarded to t he receiver in unpacked form, i.e. in the form originally transmitted by the subscriber. Unpacking can optionally include decryption. In the secure switch the unpacked packet can optionally be subjected in advance to further tests in the sense of conventional packet filters. As a result it is possible to produce finely graded access protection. This is based, for example, on IP addresses which in this case can be trusted as the packets have arrived via a secure tunnel. Following the tests and unpacking in the security channel converter 46 the packet is conventionally forwarded via the switch matrix 48 to one of the switch ports 41 . . . 44 and thus passed to the receiving subscriber.
Achieving the substitute function through a secure switch has for example the advantage compared with using a known VPN router that it is suitable for subsequent installation in existing flat networks, as are frequently encountered in automation engineering. A VPN router would require formation of subnetworks as well as a specific configuration on the subscribers, which want to communicate securely via the VPN tunnel, as the IP address of the VPN router as a gateway has to be registered with all communications partners, and the VPN router could only tunnel IP packets. Level 2 packets, as sometimes occur in automation engineering, would not be tunneled through the VPN router therefore and after the introduction of VPN routers into the automation network not all protocols would continue to work. By contrast, the described secure switch 40 can be integrated into an existing network virtually without reaction. It works like a conventional switch but with one or more secure port(s). For this reason it does not require any, or depending on the embodiment, requires one, IP address(es), any subnetwork formation, or reconfiguring of the end terminals involved in commuincation, and all traffic from level 2 of the 7-layer model can be tunneled.
Number | Date | Country | Kind |
---|---|---|---|
103 31 308.7 | Jul 2003 | DE | national |
This application claims priority to the German application No. 10331308.7, filed Jul. 10, 2003 and to the International Application No. PCT/EP2004/007594, filed Jul. 9, 2004 which are incorporated by reference herein in their entirety.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP04/07594 | 7/9/2004 | WO | 7/25/2006 |