Section 8. Operation
8.11.1 Vulnerabilities
While "security through obscurity" may have provided sufficient protection in the
past, Campbell Scientific dataloggers increasingly are deployed in sensitive
applications. Devising measures to counter malicious attacks, or innocent
tinkering, requires an understanding of where systems can be compromised and
how to counter the potential threat.
Note
Older CR1000 operating systems are more vulnerable to attack than recent
updates. Updates can be obtained free of charge at
www.campbellsci.com
.
The following bullet points outline vulnerabilities:
•
CR1000KD Keyboard Display
o
Pressing and holding the
Del
key while powering up a CR1000 will
cause it to abort loading a program and provides a 120 second window to
begin changing or disabling security codes in the settings editor (not
Status
table) with the keyboard display.
o
Keyboard display security bypass does not allow telecommunication
access without first correcting the security code.
o
Note
These features are not operable in CR1000KDs with serial
numbers less than 1263. Contact Campbell Scientific for information on
upgrading the CR1000KD operating system.
•
LoggerNet
o
All datalogger functions and data are easily accessed via
RS-232
and
Ethernet using Campbell Scientific datalogger support software.
o
Cora command
find-logger-security-code
•
Telnet
o
Watch IP traffic in detail. IP traffic can reveal potentially sensitive
information such as FTP login usernames and passwords, and server
connection details including IP addresses and port numbers.
o
Watch serial traffic with other dataloggers and devices. A Modbus
capable power meter is an example.
o
View data in the
Public
and
Status
tables.
o
View the datalogger program, which may contain sensitive intellectual
property, security codes, usernames, passwords, connection information,
and detailed or revealing code comments.
•
FTP
o
Send and change datalogger programs.
o
Send data that have been written to a file.
•
HTTP
o
Send datalogger programs.
o
View table data.
o
Get historical records or other files present on the datalogger drive
spaces.
o
More access is given when a .csipasswd is in place, so ensure that users
with administrative rights have strong log-in credentials.
468
Summary of Contents for CR1000
Page 2: ......
Page 4: ......
Page 6: ......
Page 32: ......
Page 36: ......
Page 38: ......
Page 40: ......
Page 60: ...Section 4 System Quickstart Figure 16 PC200W View Line Graph 60 ...
Page 96: ......
Page 98: ...98 ...
Page 302: ......
Page 453: ...Section 8 Operation Figure 115 Using the Keyboard Display 453 ...
Page 456: ...Section 8 Operation Figure 118 Real Time Custom 456 ...
Page 457: ...Section 8 Operation 8 8 1 3 Final Memory Tables Figure 119 Final Memory Tables 457 ...
Page 458: ...Section 8 Operation 8 8 2 Run Stop Program Figure 120 Run Stop Program 458 ...
Page 460: ...Section 8 Operation Figure 122 File Edit 460 ...
Page 461: ...Section 8 Operation 8 8 4 PCCard Memory Card Display Figure 123 PCCard CF Card Display 461 ...
Page 478: ......
Page 506: ......
Page 536: ......
Page 636: ......
Page 642: ......
Page 644: ......
Page 676: ......
Page 677: ......