beautypg.com

Devicemaster security, Understanding security methods and terminology, Security – Comtrol Hub DeviceMaster User Manual

Page 69

background image

DeviceMaster Installation and Configuration Guide: 2000594 Rev. A

DeviceMaster Security - 69

DeviceMaster Security

This subsection provides a basic understanding of the DeviceMaster security
options, and the repercussions of setting these options. See

Removing

DeviceMaster Security Features

on Page 171 if you need to reset DeviceMaster

security options. See

Returning the DeviceMaster to Factory Defaults

on Page 173

if you want to return the DeviceMaster settings to their default values.

Understanding Security Methods and Terminology

The following table provides background information and definitions.

Term or

Issue

Explanation

CA (Client
Authentication
certificate)

If configured with a CA certificate, the DeviceMaster requires all SSL/TLS
clients to present an RSA identity certificate that has been signed by the
configured CA certificate. As shipped, the DeviceMaster is not configured with
a CA certificate and all SSL/TLS clients are allowed.

This uploaded CA certificate that is used to validate a client's identity is
sometimes referred to as a trusted root certificate, a trusted authority
certificate
, or a trusted CA certificate. This CA certificate might be that of a
trusted commercial certificate authority or it may be a privately generated
certificate that an organization creates internally to provide a mechanism to
control access to resources that are protected by the SSL/TLS protocols.

See

Key and Certificate Management

on Page 86 for more information. This

section does not discuss the creation of CA Certificates.

Client
Authentication

A process using paired keys and identity certificates to prevent unauthorized
access to the DeviceMaster. Client authentication is discussed in

Client

Authentication

on Page 79 and

Changing Keys and Certificates

on Page 89.

DH Key Pair
Used by SSL
Servers

This is a private/public key pair that is used by some cipher suites to encrypt
the SSL/TLS handshaking messages. Possession of the private portion of the
key pair allows an eavesdropper to decrypt traffic on SSL/TLS connections
that use DH encryption during handshaking.

The DH (Diffie-Hellman) key exchange, also called exponential key exchange,
is a method of digital encryption that uses numbers raised to specific powers
to produce decryption keys on the basis of components that are never directly
transmitted, making the task of a would-be code breaker mathematically
overwhelming.

The most serious limitation of Diffie-Hellman (DH key) in its basic or pure
form is the lack of authentication. Communications using Diffie-Hellman all
by itself are vulnerable to

man in the middle attacks

. Ideally, Diffie-Hellman

should be used in conjunction with a recognized authentication method such
as digital signatures to verify the identities of the users over the public
communications medium.

See

Certificates and Keys

on Page 79 and

Key and Certificate Management

on

Page 86 for more information.

† All DeviceMaster units are shipped from the factory with identical configurations. They all

have the identical, self-signed, Comtrol Server RSA Certificates, Server RSA Keys, Server DH
Keys, and no Client Authentication Certificates. For maximum data and access security, you
should configure all DeviceMaster units with custom certificates and keys.

This manual is related to the following products: