04.01.2015 Views

CR1000 Manual - Campbell Scientific

CR1000 Manual - Campbell Scientific

CR1000 Manual - Campbell Scientific

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Section 5. System Overview<br />

supplied void of active security measures. By default, RS-232, Telnet, FTP and<br />

HTTP services, all of which give high level access to <strong>CR1000</strong> data and programs,<br />

are enabled without password protection.<br />

<strong>Campbell</strong> <strong>Scientific</strong> encourages <strong>CR1000</strong> users who are concerned about security,<br />

especially those with exposure to IP threats, to send the latest operating system to<br />

the <strong>CR1000</strong> (available at www.campbellsci.com) and to disable un-used services<br />

and secure those that are used. Actions to take may include the following:<br />

• Set passcode lockouts<br />

• Set PakBus/TCP password<br />

• Set FTP username and password<br />

• Set AES-128 PakBus encryption key<br />

• Set .csipasswd file for securing HTTP and Web API<br />

• Track signatures<br />

• Encrypt program files if they contain sensitive information<br />

• Hide program files for extra protection<br />

• Secure the <strong>CR1000</strong> datalogger and power supply under lock and key.<br />

Note All security features can be subverted through physical access to the<br />

<strong>CR1000</strong>. If absolute security is a requirement, the <strong>CR1000</strong> datalogger must be<br />

kept in a secure location.<br />

5.1.10.1 Vulnerabilities<br />

While "security through obscurity" may have provided sufficient protection in the<br />

past, <strong>Campbell</strong> <strong>Scientific</strong> dataloggers increasingly are deployed in sensitive<br />

applications. Devising measures to counter malicious attacks, or innocent<br />

tinkering, requires an understanding of where systems can be compromised and<br />

how to counter the potential threat.<br />

Note Older <strong>CR1000</strong> operating systems are more vulnerable to attack than recent<br />

updates. Updates can be obtained free of charge at www.campbellsci.com.<br />

The following bullet points outline vulnerabilities:<br />

<strong>CR1000</strong>KD Keyboard Display<br />

• Pressing and holding the "Del" key while powering up a <strong>CR1000</strong> will cause it<br />

to abort loading a program and provide a 120 second window to begin<br />

changing or disabling security codes in the settings editor (not Status table)<br />

with the keyboard display.<br />

• Keyboard display security bypass does not allow telecommunications access<br />

without first correcting the security code.<br />

• Note These features are not operable in <strong>CR1000</strong>KDs with serial numbers<br />

less than 1263. Contact <strong>Campbell</strong> <strong>Scientific</strong> for information on upgrading the<br />

<strong>CR1000</strong>KD operating system.<br />

71

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!