The solution to this problem can be some software complication of data exchange

It is known that it’s easy to get into the open Modbus protocol and manage any devices. This is similar to the truth, if you have a register map and understand what command words values should be sent to the slave device.

хакер

The solution to this problem can be some software complication of data exchange, when in the exchange between devices we “mix” the authorization variable into a cyclic poll. This will allow each network device that has control functions to understand what kind of master telegrams come from.

If you have a set of signatures (authorization variables) that change cyclically and are checked against the same set at the other end,
There is a question of the dissynchronization of the master and slave (for example, one package was lost or beaten somewhere along the way). Since the sequence should not change, a mechanism for restoring the lost authorization is started in the slave, that is, it makes a bias in the loop and checks again, with two unsuccessful attempts, an alarm.

It is also necessary to agree with the fact that the set of signatures is not infinite and with a great desire and time of monitoring, analysis, you can make up your own dictionary and bypass protection.

On this I say so, there are no locks that can not be opened. The castle has two tasks:

1. Change the article from the incoming from penetration by negligence – to break

2. Increase the time for unauthorized login

#Closing, #Modbus

Russian version

Array
(
    [ID] => 70
    [IBLOCK_ID] => 1
    [NAME] => Modbus protocol safety
    [IBLOCK_SECTION_ID] => 
    [IBLOCK] => Array
        (
            [ID] => 1
            [~ID] => 1
            [TIMESTAMP_X] => 26.03.2021 22:40:30
            [~TIMESTAMP_X] => 26.03.2021 22:40:30
            [IBLOCK_TYPE_ID] => EN
            [~IBLOCK_TYPE_ID] => EN
            [LID] => s2
            [~LID] => s2
            [CODE] => articals
            [~CODE] => articals
            [API_CODE] => 
            [~API_CODE] => 
            [NAME] => Articles
            [~NAME] => Articles
            [ACTIVE] => Y
            [~ACTIVE] => Y
            [SORT] => 10
            [~SORT] => 10
            [LIST_PAGE_URL] => /articals/
            [~LIST_PAGE_URL] => /articals/
            [DETAIL_PAGE_URL] => /articals/#ELEMENT_CODE#.html
            [~DETAIL_PAGE_URL] => /articals/#ELEMENT_CODE#.html
            [SECTION_PAGE_URL] => 
            [~SECTION_PAGE_URL] => 
            [CANONICAL_PAGE_URL] => https://lapshinvr.com/articals/articals.html
            [~CANONICAL_PAGE_URL] => https://lapshinvr.com/articals/articals.html
            [PICTURE] => 
            [~PICTURE] => 
            [DESCRIPTION] => 
            [~DESCRIPTION] => 
            [DESCRIPTION_TYPE] => html
            [~DESCRIPTION_TYPE] => html
            [RSS_TTL] => 24
            [~RSS_TTL] => 24
            [RSS_ACTIVE] => Y
            [~RSS_ACTIVE] => Y
            [RSS_FILE_ACTIVE] => N
            [~RSS_FILE_ACTIVE] => N
            [RSS_FILE_LIMIT] => 
            [~RSS_FILE_LIMIT] => 
            [RSS_FILE_DAYS] => 
            [~RSS_FILE_DAYS] => 
            [RSS_YANDEX_ACTIVE] => N
            [~RSS_YANDEX_ACTIVE] => N
            [XML_ID] => 
            [~XML_ID] => 
            [TMP_ID] => 
            [~TMP_ID] => 
            [INDEX_ELEMENT] => Y
            [~INDEX_ELEMENT] => Y
            [INDEX_SECTION] => N
            [~INDEX_SECTION] => N
            [WORKFLOW] => N
            [~WORKFLOW] => N
            [BIZPROC] => N
            [~BIZPROC] => N
            [SECTION_CHOOSER] => L
            [~SECTION_CHOOSER] => L
            [LIST_MODE] => 
            [~LIST_MODE] => 
            [RIGHTS_MODE] => S
            [~RIGHTS_MODE] => S
            [SECTION_PROPERTY] => N
            [~SECTION_PROPERTY] => N
            [PROPERTY_INDEX] => N
            [~PROPERTY_INDEX] => N
            [VERSION] => 1
            [~VERSION] => 1
            [LAST_CONV_ELEMENT] => 0
            [~LAST_CONV_ELEMENT] => 0
            [SOCNET_GROUP_ID] => 
            [~SOCNET_GROUP_ID] => 
            [EDIT_FILE_BEFORE] => 
            [~EDIT_FILE_BEFORE] => 
            [EDIT_FILE_AFTER] => 
            [~EDIT_FILE_AFTER] => 
            [SECTIONS_NAME] => 
            [~SECTIONS_NAME] => 
            [SECTION_NAME] => 
            [~SECTION_NAME] => 
            [ELEMENTS_NAME] => Элементы
            [~ELEMENTS_NAME] => Элементы
            [ELEMENT_NAME] => Элемент
            [~ELEMENT_NAME] => Элемент
            [REST_ON] => N
            [~REST_ON] => N
            [EXTERNAL_ID] => 
            [~EXTERNAL_ID] => 
            [LANG_DIR] => /
            [~LANG_DIR] => /
            [SERVER_NAME] => lapshinvr.com
            [~SERVER_NAME] => lapshinvr.com
        )

    [LIST_PAGE_URL] => /articals/
    [~LIST_PAGE_URL] => /articals/
    [SECTION_URL] => 
    [CANONICAL_PAGE_URL] => https://lapshinvr.com/articals/Modbus-protocol-safety.html
    [SECTION] => Array
        (
            [PATH] => Array
                (
                )

        )

    [IPROPERTY_VALUES] => Array
        (
            [ELEMENT_PREVIEW_PICTURE_FILE_NAME] => modbus protocol safety
            [ELEMENT_META_TITLE] => How to make Modbus Protocol secure - one solution
            [ELEMENT_META_KEYWORDS] => Modbus, protocol, safety, Closing
            [ELEMENT_META_DESCRIPTION] => It is known that it’s easy to get into the open Modbus protocol and manage any devices.
            [ELEMENT_PAGE_TITLE] => The solution to this problem can be some software complication of data exchange
            [SECTION_META_TITLE] => Automation articles 
            [SECTION_META_KEYWORDS] => Automation, Articles 
            [SECTION_META_DESCRIPTION] => I met something worthy of attention during the work. It is difficult to assess the necessity of posting this or that article, I tried to clean up the obvious garbage
            [SECTION_PAGE_TITLE] => Here I published articles that may be useful to someone in the production of work
        )

    [TIMESTAMP_X] => 24.03.2018 13:36:00
    [META_TAGS] => Array
        (
            [TITLE] => The solution to this problem can be some software complication of data exchange
            [BROWSER_TITLE] => How to make Modbus Protocol secure - one solution
            [KEYWORDS] => Modbus, protocol, safety, Closing
            [DESCRIPTION] => It is known that it’s easy to get into the open Modbus protocol and manage any devices.
        )

    [PREVIEW_TEXT] => It is known that it’s easy to get into the open Modbus protocol and manage any devices. This is similar to the truth, if you have a register map and understand what command words values should be sent to the slave device.
    [PREVIEW_PICTURE] => Array
        (
            [ID] => 126
            [TIMESTAMP_X] => Bitrix\Main\Type\DateTime Object
                (
                    [value:protected] => DateTime Object
                        (
                            [date] => 2018-03-24 13:36:00.000000
                            [timezone_type] => 3
                            [timezone] => Europe/Moscow
                        )

                )

            [MODULE_ID] => iblock
            [HEIGHT] => 436
            [WIDTH] => 800
            [FILE_SIZE] => 97838
            [CONTENT_TYPE] => image/png
            [SUBDIR] => iblock/d13
            [FILE_NAME] => modbus_protocol_safety.png
            [ORIGINAL_NAME] => modbus-protocol-safety.png
            [DESCRIPTION] => Closing Modbus
            [HANDLER_ID] => 
            [EXTERNAL_ID] => 5491c8e5554b6f55bc33c76ce73e6b65
            [~src] => 
            [SRC] => /upload/iblock/d13/modbus_protocol_safety.png
            [UNSAFE_SRC] => /upload/iblock/d13/modbus_protocol_safety.png
            [SAFE_SRC] => /upload/iblock/d13/modbus_protocol_safety.png
            [ALT] => Modbus protocol safety
            [TITLE] => Modbus protocol safety
        )

    [DETAIL_PAGE_URL] => /articals/Modbus-protocol-safety.html
)
Ваш комментарий добавлен

Возврат к списку