In 2006, the OPC Foundation released the first specification for OPC Unified Architecture protocol, one of the industrial protocols that promises security features such as authentication, authorization, integrity, and confidentiality. Challenges in the practical adoption of those security features by product vendors, libraries implementing the standard, and end-users were not investigated so far. In this work, we systematically investigate practical challenges to configure OPC UA securely. In particular, we review 48 artifacts consisting of products and libraries for OPC UA and show that 38 out of the 48 artifacts have one (or more) security issue. In particular, we show that 7 OPC UA artifacts do not support the security features of the protocol at all. In addition, 31 artifacts that partially feature OPC UA security rely on incomplete libraries and come with misleading instructions. Consequently, relying on those products and libraries will result in vulnerable implementations of OPC UA security features. We design, implement and demonstrate attacks in which the attacker can steal credentials exchanged between victims, eavesdrop on process information, manipulate the physical process through sensor values and actuator commands, and prevent the detection of anomalies in the physical process.
翻译:2006年,OPC基金会公布了OPC统一建筑议定书的第一个规格,这是保证认证、授权、完整性和保密等安全特征的工业协议之一。迄今为止,尚未对产品供应商、实施标准的图书馆和最终用户实际采用这些安全特征的挑战进行调查。在这项工作中,我们系统地调查安全配置OPC UA的实际挑战。特别是,我们审查了由OPC UA产品和图书馆组成的48件文物,显示48件文物中有38件存在一个(或更多的)安全问题。特别是,我们表明OPC UA7件艺术品根本不支持协议的安全特征。此外,部分以OPC UA安全特征为主的31件艺术品依赖不完整的图书馆,并附有误导性指示。因此,依靠这些产品和图书馆将导致实施OPC UA安全特征的脆弱性。我们设计、实施并演示攻击,攻击者可以窃取受害人之间交换的证书,窃取过程信息,通过传感器值和动作指令操纵物理过程,防止物理过程不正常现象。