SP 800-24 PBX缺陷分析

合集下载

05B0702同wbh-800技术说明书

05B0702同wbh-800技术说明书

目录1概述 (3)1.1功能简介 (3)1.2保护配置 (3)1.3功能特点 (5)2基本技术参数 (5)2.1基本数据 (5)2.2功率消耗 (7)2.3热稳定性 (7)2.4输出触点 (7)2.5绝缘性能 (7)2.6冲击电压 (7)2.7寿命 (7)2.8机械性能 (7)2.9环境条件 (7)2.10抗干扰能力 (8)3主要技术指标 (8)3.1动作时间 (8)3.2保护定值整定范围和定值误差 (8)3.3记录容量 (9)3.4通信接口 (9)3.5对时方式 (9)4装置整体说明 (9)4.1硬件平台 (9)4.2软件平台 (10)4.3与综合自动化监控系统接口说明 (10)4.4WBH-801保护装置背视图 (11)4.5WBH-801保护装置端子图 (11)4.6WBH-802保护装置背视图 (16)4.7WBH-802保护装置端子图 (16)5WBH-801装置保护原理说明 (26)5.1比率差动保护 (26)5.2分侧差动保护 (30)5.3过励磁保护 (31)5.4相间阻抗保护 (32)5.5接地阻抗保护 (34)5.6复合电压判别 (35)5.7复合电压(方向)过流保护 (36)5.8零序(方向)过流保护 (39)5.9反时限零序(方向)过流保护 (42)5.10零序过压保护 (43)5.11非全相保护 (44)5.12失灵启动保护 (44)5.13过负荷(通风启动)保护 (45)5.14限时速断保护 (45)5.15TV断线判别 (46)6WBH-801装置非电量保护原理 (46)7整定内容及整定说明 (47)7.1WBH-801装置整定内容及整定说明 (47)7.2WBH-802装置整定内容及整定说明 (55)8保护装置整定计算 (55)8.1比率差动保护整定计算 (55)8.2分侧差动整定计算 (61)8.3阻抗保护整定计算 (62)8.4复合电压判别整定计算 (63)8.5复合电压方向过流保护整定计算 (64)8.6零序过流保护整定计算 (65)8.7低压侧零序电压保护整定计算 (66)9订货须知 (66)10附录一:装置运行说明 (66)10.1键盘 (66)10.2面板指示灯说明 (67)10.3运行工况及说明 (67)10.4故障报文和处理措施 (67)11附录二:装置通讯说明(IEC 60870-5-103规约) (68)11.105B0702合同WBH-801微机变压器保护装置的信息 (68)11.205B0702合同WBH-802微机变压器保护装置的信息 (72)1概述1.1功能简介WBH-800微机型变压器保护装置适用于500kV电压等级的变压器。

丹佛斯-转向系统技术

丹佛斯-转向系统技术

40-500
60/120125/440 80/125160/320 58/116125/500 520-1200 160-400 520-800 160-400 50-100
Max steering pressure, bar
140 210 210
210
210
210
210 240 210 240 210 125
LSd
ON, ORM, LSd, LSRd, LSRMd
LSd, LSRd
OSPU
OSPL OSPBX OSPLX OSPCX OSPCX
LSd
LS, LSd LS LS LSd CN
Description
Mini steering unit for smaller vehicles Steering unit with no valve functions
丹佛斯动力 技术交流
——转向系统

目录
• 转向系统的工作原理与应用 • 转向器介绍 • 优先阀介绍 • 流量放大器介绍 • 外置阀块介绍 • 转向系统的设计 • 装机注意事项 • 故障排除
Danfoss Power Solutions
Optional text
Request OSP mount In Line Pump mount 40, 80 l/min
120, 160, 320 l/min Requested in OLS Rules of thumb: <4 m: use internal PP >4 m: use external PP
Static for OSPB, OSPC, OSPD, OSPL
转向器介绍
弹簧设定
Danfoss Power Solutions

故障模型

故障模型

15
数字电路的测试(续) 数字电路的测试(续)
4 故障模拟 故障模拟用于评价测试矢量的故障检测和定位能力,分 析电路在故障条件下的工作情况。为了进行故障模拟, 首先要建立电路的逻辑模拟,模拟电路无故障时的逻辑 行为。然后注入故障,模拟电路有故障时的逻辑行为。 故障模拟分为串行故障模拟和并行故障模拟。串行故障 模拟是在模拟器中每次只注入一个故障进行模拟,效率 低。并行故障模拟是对多个单故障同时进行模拟。 在并行故障模拟中,对一个测试矢量的评价须对故障表 内的所有故障进行模拟,而实际上有不少故障未能检测 ,对它们的计算是多余的,因此降低了效率。而在演绎 故障模拟中,只有那些能传送到器件输出,因而能被检 测的故障才被计算,这就提高了效率。
2006-5-7
VLSI Test: Bushnell-Agrawal/Lecture 1
13
数字电路的测试(续) 数字电路的测试(续)
2 测试评价 测试评价常采用两种方法。一种方法是把故障插入一 个已知好的数字电路内,测试器把测试矢量加到该电 路,并观察电路响应,检测插入的故障是否已被检测 ,以评价测试矢量的有效性。另一种方法是逻辑模拟 。逻辑模拟通常是软件模拟,因此逻辑模拟器是能够 实现数字电路的计算机程序。先运行正常的逻辑模拟 器,施加测试矢量并记录无故障电路的响应。然后在 逻辑模拟器中注入故障,在施加测试矢量,比较有故 障和无故障电路的响应。若两者出现任何差异,就意 味着故障已被检测。对故障表中的每个故障重复上述 过程,就可求出故障覆盖率,亦即评价了测试矢量的 有效性。
2006-5-7
VLSI Test: Bushnell-Agrawal/Lecture 1
9
故障模型(续) 故障模型(续)
故障模型化的基本原则有两个: 1)模型化故障应能准确地反映某一类故障对电路的影响 ,即模型化故障应具有典型性、正确性和全面性。 2)模型化故障应尽可能简单,以便作各种运算和处理。 显然这两个原则是相互矛盾的,因此往往要采取一些折 衷的方案。由于解决的问题不同和研究的侧重面不同, 而采用的故障模型也不同,因此在决定使用什么样的故 障模型时,首先要考虑研究对象的重点是什么,所研究 电路的实现技术和采用的器件是什么,最后还应考虑到 研究用的设备、软件和其它条件。总而言之,故障模型 化在故障诊断中起着举足轻重的作用,一个好的故障模 型化方案往往能使故障检测、诊断理论和方法得以发展 和完善。

CHEMIX—800全自动生化分析仪常见故障原因及处理方法

CHEMIX—800全自动生化分析仪常见故障原因及处理方法

CHEMIX—800全自动生化分析仪常见故障原因及处理方法介绍CHEMIX-800全自动生化分析仪使用中常见的故障、原因及处理方法,使用户能自己动手解决,从而提高设备使用效率,为临床提供及时、准确、可靠的检测结果,为就医群众提供快捷、便利的医学检验服务。

标签:CHEMIX-800全自动生化分析仪;常见故障原因;处理方法CHEMIX-800全自动生化分析仪是由日本(SYSMEX)希森美康株式会社生产一款广泛用于临床生化和免疫学定量检测的自动化仪器。

其主要由自动加样部分(ASP)、样品加样部分(SPT)、试剂1/2加样部分(R1PT/R2PT)、反应盘(RCT)、试剂盘(RGT)、光学部分、搅拌混匀部分(STIRRER-1/STIRRER-2)、比色杯冲洗部分(CRU)、加样泵集合(SPP、R1PP、R2PP注射器)等部分组成。

配备英文操作系统、中文报告系统,具备自动检测故障报警功能,每小时进行360个测试。

该仪器占地面积小、自动化程度高,操作简便、性能稳定、测速较快、软件功能丰富,非常适合基层医院使用。

我院仪器使用五年来,通过实践总结,笔者积累了一些使用中出现异常和故障时分析处理的经验,现介绍如下。

1同批中个别标本结果明显异常在日常工作中,由于急于上机测定,血液标本未完全凝固就开始检测,导致加样针吸样不准或者将凝固的纤维蛋白吸至试管外,甚至携带至反应杯,造成污染和测定结果明显异常,测定项目数值一般均偏低甚至为零,检测结果无法报告。

原因是血液中纤维蛋白原未完全析出或标本量太少,血清分离少,采样针取样时针孔被堵,取样受影響造成。

这既造成试剂浪费,又耽误时间,还需重新检测。

最简单、快速有效的预防办法就是将新收到未凝固的标本试管平放或置25~37℃水浴中5~10min,然后离心,对离心后的试管可倾斜一定角度,仔细观察血液标本凝固情况,确定血清析出、离心效果理想,再进行上机检测就可避免上述问题。

2预防加样针出现堵孔现象该仪器加样针由于吸样微量且具备良好的内冲洗功能,一般不会因为血清未分离好而发生堵塞,但不按要求清洗维护、使用未凝固好的标本,偶尔也会出现堵塞现象,一般及时暂停检测,执行加样针清洗即可解决,不必人为机械疏通。

Wire-Bond-缺陷分析只是分享

Wire-Bond-缺陷分析只是分享

o 原因 : 特殊设计的键合衬垫!!! 如果键合金球偏出键合区域, 键合金球可能
损坏键合衬垫.
© 2005 Amkor Technology, Inc.
Amkor Confidential / Proprietary Business Information
引脚键合翘起
o 客户 o 不良 o 失效模式
如果键合金球偏出键合区域键合金球可能损坏键合衬垫
Wire-Bond-缺陷分析
© 2005 Amkor Technology, Inc.
Amkor Confidential / Proprietary Business Information
键合衬垫损坏
o 客户 o 不良 o 失效模式
: ATi (CABGA) : 键合衬垫损坏并与相邻衬垫短路. : 测试失效 (短路)
o 客户 o 不良 o 失效模式
上层线弧下塌/损坏
: Intel (SCSP) :上层线弧下塌损坏 : 测试失效 (短路)
o 原因 : 上层线弧被压板损伤 (Only for KnS8028).
© 2005 Amkor Technology, Inc.
Amkor Confidential / Proprietary Business Information
引脚键合翘起
o 客户 o 不良 o 失效模式
: Intel (CVBGA) : 引脚键合翘起 : 测试失效 (断开)
o 原因 : 引脚键合位置设定错误.
Solder Mask Area
© 2005 Amkor Technology, Inc.
Amkor Confidential / Proprietary Business Information

中国移动招聘考试考试题

中国移动招聘考试考试题

中国移动招聘考试考试题中国移动招聘考试考试题1单选支路净负荷处理功能,用于AU4指针的锁定和TU指针的重新计算,并完成复帧的产生。

以下那些Opti(江南博哥)(江南博哥)X2500+单板上没有支路净负荷处理功能:()。

A、S16B s SD4C、S14D、SQ1E x SDEF、XCS答案:A2、多选在长距离传输的系统中,影响10GMADM设备传输质量的因素主要有()A.衰减B.色散C.光信噪比D.光纤非线性效应答案:A,B,C,D3、填空题集团公司E-OMS系统主要功能包括:()、()、信息发布功能、业务论坛功能、()、系统管理功能。

答案:工单处理功能;值班管理功能;资料管理功能4、填空题三相供电电压不平衡度不大于()。

电压波形正弦畸变率不大于()。

答案:4%;5%5、单选以下不能用来平衡小区话务的方式有:()。

A.载波调整B.小区负荷分担C.调整功率D.降低接入电平答案:D6、填空题128X设备属于多ADM集成系统,从软件上最多可以设置的逻辑系统个数为();最多能支持()个复用协议控制器;最多可以处理了()路ECC 通道,每个槽位最多可走()路ECC o答案:48个;12;20;47、填空题话音信道拥塞率(不含切换)=()×100%答案:忙时话音信道溢出总次数(不含切换)/忙时话音信道试呼总次数(不含切换)8、多选下列关于PDH s SDH的说法,错误的是()A s45Mbit/s属于欧洲标准系列的,我国广电部传送节目使用这种接口B、PDH接口规范统一,容易实现不同厂家设备互连C、SDH频带利用率比PDH高D、SDH光信号的码型是加扰的NRZ码答案:A,B,C9、填空题在连接或拆下启动电瓶时,除了分清正负极外还应注意连接顺序,当连接时应先可靠接上()极;当拆下电瓶时应先拆下()极。

答案:正;负10、填空题()号码是用来替换在无线接口中用来替换IMSI,以增加用户数据的保密性。

答案:TMSI11、单选SDH传输设备中,155M容量含有多少个2M?()A、252个B s244个C、61个D、63个答案:D12、单选SMP系统负责和SCP通信的进程是()A、SmapsubserverB、schedu1eC、smpsyncD s Smpmanager答案:C13、问答题保证OPtiXiManagerRMS工作站网管RMS能够正常运行的基本条件有那些?答案:数据库启动、rms用户登录CDE、环境变量正确、用户数据库和RMS初始化配置数据正确。

PBX常见故障处理

PBX常见故障处理

1.故障现象1,用户电话外线打不出、打不进。

交换机分机提机有拨号音,能打内线。

多为两兆线路传输不通。

看交换机信令上指示灯亮是否正常。

正常为最上面黄灯长亮,第2个长灭,第3、4个绿灯每10秒钟同步闪一次。

如果正常请检查传输状态,在交换机信令接口上端,将S200设备的两兆线自环,让传输班看传输状态是否正常。

2.故障现象2,用户电话提机没有拨号音,电话机上指示灯亮。

内线分机不能通话。

看交换机信令上指示灯亮是否正常。

正常为最上面黄灯长亮,第2个长灭,第3、4个绿灯每10秒钟同步闪一次。

如果第2个黄灯闪烁,交换机出问题,首先重启交换机,看能否恢复正常。

如果还不行,重新导入数据(可从厂家处获取)保存A库,上传A库,重启交换机,看能否恢复正常。

如果还不行,则需更换主板。

3. 用户某一个分机不能打电话,提机无拨号音,看电话能否呼入,如果能呼入,且分机振铃,说明此端口故障,更换用户板,看能否恢复正常。

如果呼入听忙音,说明线路短路(碰线);如果呼入听正常音,分机不振铃,说明线是路断路,请检查线路。

4.ping 192.168.0.235无法连接交换机。

(电脑与天波交换机直接相连的情况),解决方法:检查网络连接线是否为交叉线;B检查交换机的网络指示灯是否点亮;C检查计算机和交换机是否在同一网段,注:可以通过串口检查交换机的网络设置。

5. ping 192.168.0.235不通天波交换机。

(电脑通过网络交换机与天波交换机间接相连的情况)解决方法:A检查交换机的网络指示灯是否点亮;B检查计算机和交换机是否在同一网段;C检查交换机的IP是否正确,注:可以通过串口检查交换机的网络设置。

6.管理软件不能登陆天波交换机。

解决方法:A通过方法4、5检查连接是否正确;B检查防火墙是否对5003端口屏蔽;C可能上次登陆没有正常,重启交换机。

7.其他软件不能登陆天波交换机。

解决方法:参考方法6.8.设置分机数据不生效。

解决方法:A确认上传为A库;B确认A库是否为激活库;C如果上传库不是A库,检查上传库是否为激活的库;D确认上传后已经重启交换机。

Wire-Bond-缺陷分析只是分享

Wire-Bond-缺陷分析只是分享

o 客户 o 不良 o 失效模式
: Atheros (CABGA) : 金线与接地引脚短路 : 测试失效 (短路)
o 原因 : 线弧参数未优化.
© 2005 Amkor Technology, Inc.
Amkor Confidential / Proprietary Business Information
键合球与相邻球短路
o 客户 o 不良 o 失效模式
: Broadcom (CABGA) : 键合球与相邻球短路 : 测试失效 (短路)
o 原因 : 1) 键合参数未优化 2) 键合球尺寸,厚度未优化.
© 2005 Amkor Technology, Inc.
Amkor Confidential / Proprietary Business Information
上层线弧与下层线弧短路
o 客户 o 不良 o 失效模式
: Intel (SCSP) :上层线弧与下层线弧短路 : 测试失效 (短路)
o 原因 : 线弧参数设定错误.
© 2005 Amkor Technology, Inc.
Amkor Confidential / Proprietary Business Information
o 原因 : 特殊设计的键合衬垫!!! 如果键合金球偏出键合区域, 键合金球可能
损坏键合衬垫.
Hale Waihona Puke © 2005 Amkor Technology, Inc.
Amkor Confidential / Proprietary Business Information
引脚键合翘起
o 客户 o 不良 o 失效模式
金线与金线短路
o 客户 o 不良 o 失效模式
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

S PECIAL P UBLICATION 800-24This document is a contribution of the National Institute of Standards and Technology, United States Department of Commerce, and is not subject to U.S. copyright.FOREWORD (VI)INTRODUCTION (1)Background (2)Evaluation Approach (3)SYSTEM ARCHITECTURE (5)Separation of Switching and Administrative Functions (5)Switching Algorithm (6)Function Allocation (7)HARDWARE (9)Susceptibility to Tapping (9)Analog Voice with or without Separate Control Signals (9)Analog Voice with Inclusive Control Signals (10)Digital Voice with Inclusive Control Signals (10)Echo Cancellation (11)Analysis of Signaling Methods (11)Instrument Modification Risks (12)Conferencing (Hardware) (13)Countermeasures (13)MAINTENANCE (14)Remote Access (14)Maintenance Feature Vulnerabilities (15)Line Testing Capabilities (15)Undocumented Maintenance Features (15)Special Manufacturer’s Features (16)Manufacturer’s Development & Test Features (17)Countermeasures (18)ADMINISTRATIVE DATABASES (19)Software Loading and Update Tampering (19)Tamper and Error Detection (19)Countermeasures (20)Crash-Restart Attacks (20)Live Microphone Vulnerabilities (20)Embedded Login IDs and Passwords (21)Countermeasures (21)Passwords (21)Password Types (22)Password Login Timeouts (23)Multi-Level Password Access (24)Countermeasures (24)Physical Security (24)Countermeasures (25)Remote Access (26)Remote Access via an Attendant Console (26)Remote Access via a Terminal (26)iiiCountermeasures (27)Alarms and Audit Trails (27)USER FEATURES (29)Attendant Console (29)Attendant Override (29)Attendant Forwarding (30)Attendant Conferencing (31)Automatic Call Distribution (ACD) (32)Call Forwarding (33)Account Codes/Authorization Codes (34)Access Codes (35)Silent Monitoring (36)Conferencing (37)Override (Intrude) (38)Auto Answer (39)Tenanting (40)Voice Mail (41)Unauthorized Access to Stored Messages (41)Denial of Service (42)Lengthy Messages (42)Embedding Codes in Messages (43)Access to Outgoing Lines (44)Privacy Release (44)Non-Busy Extensions (45)Diagnostics (46)Camp-On (46)Dedicated Connections (47)Feature Interaction Attacks (48)Call Forwarding/Return Call (48)Conference/Call Park (49)Return Call/Camp-On/Caller-ID Blocking (50)Countermeasures (50)COMPUTER TELEPHONY (52)SELECTED BIBLIOGRAPHY (52)APPENDIX A ABBREVIATIONS/ ACRONYMS (54)APPENDIX B EXAMPLE SECURITY POLICY (55)APPENDIX C BASELINE SECURITY CONTROLS (57)Manual Assurance of Database Integrity (57)Physical Security (57)Operations Security (58)Management Initiated Controls (58)PBX System Control (59)PBX System Terminal Access Control (59)ForewordThis publication is issued by the National Institute of Standards and Technology as part of its program to promulgate security standards for information systems as well as standards for test procedures for assessing the level of conformance to these standards. This document is intended for use primarily by system administrators of PBX systems, but may also be useful for security evaluators. Where possible, countermeasures are described that can be applied by system administrators. In some cases vulnerabilities may be discovered that require software patches from the manufacturer.Comments on this document should be directed to:Richard KuhnNIST/Computer Security DivisionGaithersburg, MD 20899-8930vINTRODUCTIONThe Private Branch Exchange (PBX) is an essential element that supports the critical infrastructure of both government agencies and U.S. industry. A PBX is a sophisticated computer-based switch that can be thought of as essentially a small, in-house phone company for the organization that operates it. Protection of the PBX is thus a high priority. Failure to secure a PBX can result in exposing the organization to toll fraud, theft of proprietary or confidential information, and loss of revenue or legal entanglements. This report presents a generic methodology for conducting an analysis of a Private Branch Exchange (PBX) in order to identify security vulnerabilities. The report focuses on digital-based PBXs and addresses the following areas for study:•System Architecture•Hardware•Maintenance•Administrative Database/Software•User FeaturesThis report is not intended to provide a step-by-step process, but rather a guideline for what specific areas should be studied for the existence of possible vulnerabilities. This process must be customized for each specific PBX, depending upon the actual switch features as well as the perceived threat. We do not identify known vulnerabilities in particular switches because doing so may encourage attacks by unsophisticated hackers or “script kiddies.” However, this report does provide information on vulnerabilities that are not well known to many system administrators, as well as procedures for penetration testing, i.e., determining the existence of these vulnerabilities and if they can be exploited. Sophisticated hackers and foreign intelligence organizations should be assumed to know of these vulnerabilities already. System administrators need to be able to find them before an attacker does. Note that some of the analysis methods described here may require instruments or expertise not available in all organizations. Individual judgment will be required to determine if the organization’s risk is sufficient to warrant obtaining additional assistance.A second reason for conducting penetration tests is to determine what countermeasures should receive priority. Not all of the vulnerabilities described in this report will appear on every PBX system. Depending on the system architecture and the set of active user features, the risk of some security weaknesses being exploited will be considerably less than for others. Given a limited budget for security, protecting against the higher riskP vulnerabilities will require giving less attention to others. To establish whether the potential exists for a particular attack on a PBX, testing will normally be needed. The methods described in this report are designed to assist administrators in conducting this type of testing. Computer based telephony systems and new techniques such as voice over IP (VOIP) present an entirely new collection of vulnerabilities and are not addressed in this report. However, some of the evaluation methods described here may be applied to these systems as well.B ACKGROUNDDigital PBXs are widespread throughout government and industry, having replaced their analog predecessors. The advent of software-based PBXs has provided a wealth of communications capabilities within these switches. Today, even the most basic PBX systems have a wide range of capabilities that were previously available only in large-scale switches. These new features have opened up many new opportunities for an adversary to attempt to exploit the PBX, particularly by using the features as designed for a purpose that was never intended. The threats to PBX telephone systems are many, depending on the goals of attackers. Threats include:•Theft of service – i.e., toll fraud, probably the most common of motives for attackers.•Disclosure of information - data disclosed without authorization, either by deliberate action or by accident. Examples include both eavesdropping on conversationsor unauthorized access to routing and address data.•Data modification - data altered in some meaningful way by reordering, deleting or modifying it. For example, an intruder may change billing information, ormodify system tables to gain additional services.•Unauthorized access - actions that permit an unauthorized user to gain access to system resources or privileges.•Denial of service - actions that prevent the system from functioning in accordance with its intended purpose. A piece of equipment or entity may be renderedinoperable or forced to operate in a degraded state; operations that depend ontimeliness may be delayed.•Traffic analysis - a form of passive attack in which an intruder observes information about calls (although not necessarily the contents of the messages)and makes inferences, e.g. from the source and destination numbers, orfrequency and length of the messages. For example, an intruder observes a highvolume of calls between a company’s legal department and the Patent Office,and concludes that a patent is being filed.PBXs are sophisticated computer systems, and many of the threats and vulnerabilities associated with operating systems are shared by PBXs. But there are two important ways in which PBX security is different from conventional operating system security:•External access/control. Like larger telephone switches, PBXs typically requireremote maintenance by the vendor. Instead of relying on local administrators tomake operating system updates and patches, organizations normally haveupdates installed remotely by the switch manufacturer. This of course requiresremote maintenance ports and access to the switch by a potentially large pool ofoutside parties.•Feature richness. The wide variety of features available on PBXs, particularly administrative features and conference functions, provide the possibility ofunexpected attacks. A feature may be used by an attacker in a manner that wasnot intended by its designers. Features may also interact in unpredictable ways,leading to system compromise even if each component of the system conformsto its security requirements and the system is operated and administratedcorrectly.Although most features are common from PBX to PBX, the implementation of these features may vary. For example, many PBX vendors have proprietary designs for the digital signaling protocol between the PBX and the user instruments. This is the reason digital instruments usually cannot be interchanged between PBXs of different manufacturers. The methodology outlined in this report will assist in the investigation of PBX features that are known to be susceptible to adversarial attack. However, the degree of vulnerability, if any, will depend on how each feature is implemented.E VALUATION A PPROACHThis report provides suggestions for areas of investigation. In practice, the evaluator may discover many other avenues of investigation. For some aspects of the PBX, specific steps are suggested to attempt to investigate a vulnerability (especially User Features). For others, the approach is necessarily architecture-dependent and must be discussed more generally.P The type of skills and number of evaluators required, as well as the length of time required to perform the evaluation cannot be fixed since these depend on the size and complexity of the PBX under study. The type of perceived threat and the seriousness of any discovered vulnerabilities must be decided by the evaluating organization. Consequently, any corrective actions must also be decided upon based on the cost of the loss compared with the cost of the corrective action. It is recommended that at least two individuals perform the evaluation in order to share observations and gain the advantage of multiple insights.SYSTEM ARCHITECTUREThis section addresses the ways in which an adversary may be able to exploit vulnerabilities that are inherent in the system architecture.S EPARATION OF S WITCHING AND A DMINISTRATIVE F UNCTIONSAll modern PBXs have central computer processors that are controlled from a software-driven stored program (see Figure 1). In addition, most PBXs have microprocessors dispersed throughout the switch that provide real-time signaling and supervision control as instructed from the central processor. One or more terminals and their associated port(s) provide computer operating system, database management, and maintenance access to the PBX processor. Access to these functions gives the administrator or maintenance personnel total control of the PBX. Depending on the size of the PBX, these functions may be separate or combined.Administrative Terminals. The switch should be examined to determine whether the administrative functions are performed on terminals that are connected to the PBX via the same type of ports that switch the voice and data traffic, or if the terminals are connected via dedicated ports. If they are connected via the same type of voice and data ports, these terminals could be surreptitiously switched to an unauthorized user. This may or may not require a modem. If the ports are dedicated for use by these terminals, this vulnerability is reduced. However, it may be possible for an adversary to gain access through the use of a modem coupled with an unauthorized connection to a switched port, enabling the adversary to dial in and make database modifications. Tests should be conducted to see if these functions can be rerouted to other physical terminals through configuration options or other changes to the administrative database.In smaller PBXs, these functions are often combined. For example, the attendant (operator) terminal may also be the database terminal, or the database terminal may also be the maintenance terminal. Attempts should be made to use these terminals to modify the database or gain access to unauthorized functions. For example, investigate whether the attendant or maintenance personnel can gain access and modify the database.Figure 1. PBX Block DiagramS WITCHING A LGORITHMSwitching is performed using time division multiplexing techniques where each voice (digitized) and data port is assigned a time slot. Under control of the call processing routines, incoming time slots are connected to outgoing time slots. If the number of incoming slots does not exceed the number of outgoing slots, there will be no contention for switching resources. This is commonly known as non-blocking switching.Dual Connections. To investigate for vulnerabilities, attempts should be made to route another incoming time slot to an outgoing time slot in addition to the intended time slot. This might be accomplished by a database entry or by a modification to the PBX control software. After accomplishing this, test calls should be made to verify the dual connection and to determine whether the calling or called party can detect the false connection. If the PBX under study has status or maintenance query features, attempts should be made to detect the modification.The documentation accompanying the PBX forms the basis for learning its structure and operation. The manufacturer may have additional documentation that will be useful during the course of the evaluation. It may be beneficial to have technical discussions with the manufacturer to fully understand how PBX functions are implemented. Since this information is usually proprietary, it may be necessary to negotiate a non-disclosure agreement between the evaluating organization and the manufacturer to protect this data.Also, the manufacturer may provide training as to the operation and maintenance of the PBX for customers that purchase their products.F UNCTION A LLOCATIONAlthough most PBX functions are software driven, the PBX under study should be examined to determine how specific features are implemented so that potential vulnerabilities can be explored. For example, conferencing can be implemented in hardware or software. Knowing the design implementation will aid in determining if an adversary may be able to exploit the function. Figure 2 shows a typical PBX functional architecture.Internal Switch SubscriberFigure 2. PBX Functional ArchitectureHARDWAREThis section addresses the ways in which an adversary could exploit vulnerabilities that are inherent in the system hardware to gain unwanted access to information passing through the switch.S USCEPTIBILITY TO T APPINGA PBX’s susceptibility to tapping depends on the methods used for communication between the PBX and its instruments. This communication may include voice, data, and signaling information. The signaling information is typically commands to the instrument (turn on indicators, microphones, speakers, etc.) and status from the instrument (hook status, keys pressed, etc.). Three general communications methods are discussed below. Analog Voice with or without Separate Control SignalsThis is the simplest of the three methods discussed here. Analog voice information is passed between the PBX and the instrument on either a single pair of wires or two pairs (one for transmit and one for receive). If there is any additional signaling communication (other than the hook switch) between the PBX and the instrument, it is done on wires that are separate from the voice pair(s).The voice information is transmitted essentially as it is picked up by a microphone. It is in a form that can be directly reproduced by a speaker. The voice line can be easily tapped by connecting a high impedance differential amplifier to the pair of voice wires. The amplified voice signal can then be heard directly with a speaker or headphones, or it can be recorded for later playback.If signaling data is transmitted on a separate set of wires, it is normally in proprietary formats. An adversary with physical access can gain useful information by hooking an oscilloscope up to each wire and observing the effects when the instrument is taken on and off hook, keys are pressed, etc. For example, in one common format the voltage present on each data wire reflects the on/off status of a control or indicator.Another possible format is one in which information is passed as bytes of digital data in a serial asynchronous bit stream similar to that of a PC’s or a terminal’s serial data port. Each data byte being transmitted would appear in a pattern similar to the following: Start Bit, Data Bits (5..8, frequently 8), optional Parity Bit, Stop Bits (1, 1.5, or 2). The Start Bit and Stop bits are of opposite polarity. The bit rate could be measured with an oscilloscope. A device such as a PC or terminal could then be configured to capture the serial data and perhaps store it for some later use.Analog Voice with Inclusive Control SignalsIn this scheme, analog voice and control signaling is passed between the PBX and the instrument on either a single pair of wires or two pairs (one pair for transmit and another for receive). This can be done if the signal path is of a high enough bandwidth to pass voice information (less than 4 KHz) plus additional data information. For example, voice information can be combined with data information modulated onto a carrier tone that is centered outside of the voice band.This type of line is vulnerable to tapping by connecting a high impedance differential amplifier to the pair and passing the signal through filters to separate the voice and data information. Data information could be recovered by demodulating the carrier tone. The methods outlined in the section above could then be used to determine the format of the data being transmitted.Digital Voice with Inclusive Control SignalsWith this method, voice and control signaling data are passed across the same pair of wires. There may be two pairs of wires, one for each direction, or both directions could be combined onto one pair of wires using echo cancellation as is done with ISDN. Conventional tapping techniques would not work against most types of digital lines. The format and type of digital signals that pass between the PBX and its instruments vary widely between switch types.If separate pairs are used for transmit and receive, each pair could be tapped to provide access to the transmit and receive digital bit streams by first determining in what digital format the data is being transmitted. Then a digital to analog converter could be used to convert the digital data back into analog voice that can be listened to or recorded. A great deal of information useful to an attacker could be gained by disassembling the telephone models of interest and determining what types of parts are used for CODECs, UARTs, A/Ds, D/As, etc. Published information on these parts can generally be obtained from the manufacturers.Echo CancellationIf both transmit and receive are combined on one pair using echo cancellation, the previously described methods would not be useful for tapping. This is because each transmit end of the link can only determine what is being received by subtracting out what it is transmitting from the total signal. An outside observer tapping the line somewhere between the two ends would only have access to the total signal and would therefore find it very difficult to reproduce either end. An attack would depend on a known initial condition on both ends (such as silence) in order to be able to subtract the correct information from the total signal. The technical difficulty of this attack probably makes systems using echo cancellation most resistant to attack among those described here. Protecting against this attack requires ensuring that lines are not physically compromised.Analysis of Signaling MethodsIt may be possible to discover information about the method of communication between the PBX and its instruments by disassembling and examining them. Most digital instruments are designed around a microcontroller that handles the PBX communication, controls the displays, and responds to key presses and hook status changes. There may be a PROM device in the instrument, or the microcontroller may have built-in PROM that stores the microcontroller’s software. With access to the PROM and/or microcontroller, the software could be disassembled, providing information about the PBX communication. If the software is stored directly in the microcontroller, it may not be accessible since some microcontrollers have a security feature that can make it difficult if not impossible to read its contents once it is programmed. An approach to investigating these vulnerabilities is the following:•Disassemble an instrument.•Note the integrated circuits (ICs) that are used and look up unfamiliar ICs in the corresponding vendors’ data books. This provides knowledge as to the signalingprotocols.•Determine if the instrument contains a PROM device. If so, a detailed investigation would require attempting to remove and read the device with aPROM programmer.•Locate the microcontroller and determine its part number. Look it up in the microcontroller manufacturer’s data books. Determine if it has a securityfeature and if so, how it works. A detailed investigation would requireattempting to read the microcontroller’s contents with a PROM programmer ora test circuit and a PC or workstation.•If the PROM or microcontroller code is readable, it may be desirable to try to disassemble the code to learn how the instrument communicates with the PBX.Some reverse engineering may be required.I NSTRUMENT M ODIFICATION R ISKS•Methods to prevent eavesdropping on an on-hook analog telephone by using telephone instruments that are known to resist such attacks have beendocumented in the Telephone Security Group (TSG) standards [TSG].However, digital instruments offer a similar vulnerability. An adversaryinterested in eavesdropping on a particular user instrument has three goals:•Create a condition so that the voice information will be transmitted to the PBX while giving the appearance that the instrument is on-hook.•Modify the instrument to keep the microphone live while in an on-hook condition.•Ensure that this condition is transparent to the user and the PBX.The circuitry of the digital instrument under study must be analyzed to determine the conditions that must exist to allow the digitized voice information to continue to transmit to the PBX. This may include having the handset off-hook electrically. Also, since the instrument would normally include a CODEC to convert the analog voice to digital data, this function must be enabled. In order to create the necessary conditions, it may be necessary to cut traces on the circuit board and/or insert jumpers to bypass certain safeguards within the instrument itself. One could also modify the on-board PROM containing the program that controls the instruments to create this condition. The key condition is that the instrument still appear to be on-hook to the user and the PBX so that normal calls can be made and received.Once the conditions are created, make calls to and from the modified instrument to assure normal operation. Also, if diagnostic tests are available, test the line in question to be sure that no abnormal conditions are detected.Having successfully modified an instrument now creates the opportunity for an adversary to exploit. As mentioned earlier, the line cannot simply be “tapped” to gain access to the voice data. An active device may be required to “tap” the line between the instrument and the PBX and convert the bit stream to analog form. Also, this condition may be exploited in conjunction with one or more feature vulnerabilities to allow undetected access to the telephone line of interest.C ONFERENCING (H ARDWARE)When implemented in hardware, the conferencing feature may employ a circuit card known as a conference bridge or a signal processor chip. This allows multiple lines to be “bridged”to create a conference where all parties can both speak and listen. Some PBXs have a feature where all parties can hear, but only certain parties can speak. This is a type of broadcast conference. An adversary would desire a connection to the bridge where the conference could be overheard. A hardware modification to the bridge itself may make it possible to cause the “output” of the bridge to be available to a specific port. As in instrument modifications, some additional steps must be taken to receive this information. This may include modifying the database to have the adversary be a permanent member of the bridge so that any conference on that bridge could be overheard.C OUNTERMEASURES•Physical security to prevent unauthorized access to telephone closets and PBX facilities is important. Whenever possible, the PBX should be kept in a locked room with restricted access.•Critical hardware components may be locked with anti-tamper devices.•Periodic integrity checks should be made to ensure that components have note been tampered with.MAINTENANCEMaintenance procedures are among the most commonly exploited functions in networked systems, and the problem is even more acute with PBXs because PBX maintenance frequently requires the involvement of outside personnel. This section addresses the ways in which an adversary could exploit vulnerabilities in maintenance features to gain unwanted access to the switch.R EMOTE A CCESSRemote access is frequently an unavoidable necessity, but it can represent a serious vulnerability. The maintenance features may be accessible via a remote terminal with a modem, an Attendant Console or other instrument, or even over an outside dial-in line. This allows for systems to be located over a large area (perhaps around the world) and have one central location from which maintenance can be performed. Often it is necessary for the switch manufacturer to have remote access to the switch to install software upgrades or to restart a switch that has experienced a service degradation.Dial-back modem vulnerabilities.Unattended remote access to a switch clearly represents a vulnerability. Many organizations have employed dial-back modems to control access to remote maintenance facilities. This access control method works by identifying the incoming call, disconnecting the circuit, and dialing the identified person or computer at a predetermined telephone number. Although helpful, this form of access control is weak because methods of defeating it are well known. For example, if the local telephone company central office uses originator control for phone lines, the attacker can stay on the line, send a dial tone when the modem attempts to disconnect, then wait for the modem to dial out again on the same line. A more sophisticated means of defeating dial-back modems has also been used in attacks reported in the open literature. In this method, the local phone company switch is penetrated and its databases modified to forward the returned calls directly to the attacker’s computer. Social engineering attacks.Even if the organization requires some action by local operators to provide access to the remote maintenance connection, serious vulnerabilities may still exist. For example, modems on lines used by remote maintenance may be kept off, and only turned on when a。

相关文档
最新文档