The rapid growth of Internet-enabled services is nowadays expanding towards the wide class of those ones requiring "things" of any kind to integrate into the network. Although the recent and explosive interest in the Internet of Things concept, the problem of onboarding such "thing" devices into the network in a secure fashion existed already back to the beginning of the 21st century. Indeed, service providers have long been striving for what is commonly known as Zero-Touch Provisioning, the unattended and automatic onboarding, configuration, and management of those devices enabling subscribed services. Expecting an exponential growth in number of IoT devices, it is considered crucial to securely implement these provisioning solutions which enormously simplify delivery processes up to strong cost reductions. Hence, we study existing zero-touch deployments built around the massively adopted CPE WAN Management Protocol (CWMP) as an apparent potential forerunner of such kind of solutions. We therefore review its security model in depth, and we develop an auditing framework for our KNP analysis on purpose. Then we apply this methodology to some peculiar real-world cases of CWMP based zerotouch deployments and we test them against possible flaws in their security design by also taking into account the potential weaknesses deriving from the context of services they are programmed to provide and they operate within. In the end, it will be clear how and why many real-world deployments of CWMP based zero-touch provisioning solutions unsurprisingly fail to achieve the same degree of security the protocol specification promises. We thereby conclude by drawing some considerations about the adequateness of the CWMP security model against real-world zero-touch deployment expectations, giving some guidelines about how to tackle existing security issues, and also proposing a potential, somehow natural, but secure kind of trade-off solution to the zero-touch provisioning problem we believe to match market-friendly ambitions.
La rapida crescita dei servizi fruibili tramite Internet va oggi espandendosi verso la vasta classe di quelli si appoggiano a oggetti o "cose" di un qualsiasi tipo per integrarsi con la rete. Malgrado il recente ed esplosivo interesse verso il concetto di Internet of Things, il problema di integrare in sicurezza tali dispositivi "cose" nella rete esisteva già all'inizio del ventunesimo secolo. I fornitori di servizi hanno infatti da tempo dovuto scontrarsi con la loro ambizione di realizzare ciò che è comunemente noto come Zero-Touch Provisioning, ovvero la totale assenza di interazione utente nei processi di onboarding, configurazione e gestione remota di quei dispositivi tramite cui i servizi sottoscritti vengono forniti. In previsione di una crescita esponenziale del numero di dispositivi IoT, è da considerarsi cruciale l'implementazione sicura di soluzioni del genere in grado di semplificare enormemente I processi di delivery e ridurne notevolmente i costi. Andiamo quindi a studiare quelle esistenti di tipo zero-touch basate sull'ampiamente adottato CPE WAN Management Protocol (CWMP), apparente precursore di tali soluzioni. Ne revisioniamo dunque in profondità il security model e sviluppiamo un apposito framework di auditing per la nostra KNP analysis. Applichiamo poi tale metodologia ad alcuni casi peculiari tratti dal mondo reale di implementazioni zero-touch basate su CWMP ed esaminiamo eventuali difetti in termini di sicurezza nella loro progettazione tenendo anche conto delle potenziali debolezze createsi dal contesto dei servizi che sono programmate per gestire e in cui operano. Sarà chiaro a posteriori come e perché molte implementazioni reali di soluzioni per provisioning zero-touch basate su CWMP non raggiungano lo stesso livello di sicurezza promesso dalle specifiche del protocollo. Concludiamo quindi traendo alcune considerazioni sull'adeguatezza del security model di CWMP rispetto alle aspettative che il mondo reale nutre verso implementazioni zero-touch e forniamo alcune linee guida su come affrontare i problemi di sicurezza riscontrati, oltre a proporre una potenziale, forse scontata, ma sicura soluzione di compromesso al problema del provisioning zero-touch che riteniamo possa essere in linea con le ambizioni del mercato.
Zero-touch disasters. KNP analysis for real-world CWMP deployments
PICCIRILLO, LUCA
2019/2020
Abstract
The rapid growth of Internet-enabled services is nowadays expanding towards the wide class of those ones requiring "things" of any kind to integrate into the network. Although the recent and explosive interest in the Internet of Things concept, the problem of onboarding such "thing" devices into the network in a secure fashion existed already back to the beginning of the 21st century. Indeed, service providers have long been striving for what is commonly known as Zero-Touch Provisioning, the unattended and automatic onboarding, configuration, and management of those devices enabling subscribed services. Expecting an exponential growth in number of IoT devices, it is considered crucial to securely implement these provisioning solutions which enormously simplify delivery processes up to strong cost reductions. Hence, we study existing zero-touch deployments built around the massively adopted CPE WAN Management Protocol (CWMP) as an apparent potential forerunner of such kind of solutions. We therefore review its security model in depth, and we develop an auditing framework for our KNP analysis on purpose. Then we apply this methodology to some peculiar real-world cases of CWMP based zerotouch deployments and we test them against possible flaws in their security design by also taking into account the potential weaknesses deriving from the context of services they are programmed to provide and they operate within. In the end, it will be clear how and why many real-world deployments of CWMP based zero-touch provisioning solutions unsurprisingly fail to achieve the same degree of security the protocol specification promises. We thereby conclude by drawing some considerations about the adequateness of the CWMP security model against real-world zero-touch deployment expectations, giving some guidelines about how to tackle existing security issues, and also proposing a potential, somehow natural, but secure kind of trade-off solution to the zero-touch provisioning problem we believe to match market-friendly ambitions.File | Dimensione | Formato | |
---|---|---|---|
2020_07_Piccirillo_WE.pdf
Open Access dal 10/07/2021
Descrizione: white edition, unified
Dimensione
2.97 MB
Formato
Adobe PDF
|
2.97 MB | Adobe PDF | Visualizza/Apri |
2020_07_Piccirillo_WE_01-02.pdf
accessibile in internet per tutti
Descrizione: white edition, chapters 1-2
Dimensione
937.34 kB
Formato
Adobe PDF
|
937.34 kB | Adobe PDF | Visualizza/Apri |
2020_07_Piccirillo_WE_03-07.pdf
Open Access dal 10/07/2021
Descrizione: white edition, chapters 3-7
Dimensione
1.71 MB
Formato
Adobe PDF
|
1.71 MB | Adobe PDF | Visualizza/Apri |
2020_07_Piccirillo_WE_08-AF.pdf
accessibile in internet per tutti
Descrizione: white edition, chapters 8-AF
Dimensione
1.23 MB
Formato
Adobe PDF
|
1.23 MB | Adobe PDF | Visualizza/Apri |
I documenti in POLITesi sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/10589/167099