Security White Paper DLR 110623: Miercom
Security White Paper DLR 110623: Miercom
DLR 110623
June 2011
Miercom
www.miercom.com
Contents
Executive Summary ................................................................................................................... 3
Terminology Used in this Document .......................................................................................... 4
Testing Methodology.................................................................................................................. 5
Test Bed Diagram ............................................................................................................... 5
Can opening the firewall to POP3 be a conduit for attacks on the network? .................... 12
Can opening the customer's firewall to POP3 be a conduit for attacks on ....................... 17
Conclusion ............................................................................................................................... 21
Certified Secure — a Miercom program started in 2001 that established the first product and
technology agnostic approach to security testing. Certified Secure Testing involves the
complete system or solution for a product or service being tested using an arsenal of
vulnerability security targets.
Multifunction Printer (MFP) — a network device offering many functions, including but not
limited to, network copying, fax, scanning and other functions consolidated in one device.
Post Office Protocol (POP3) —protocol used to retrieve email from a server. Most email
applications use the POP3. POP3 email is commonly critiqued for lack of security if not
implemented correctly. POP3 is used to retrieve or “pull mail” whereas SMTP is used to
“push” mail to external mail servers. POP3/SMTP are often used in conjunction with one
another.
Security Target (ST) — a set of security requirements and specifications used for testing
products.
Simple Mail Transfer Protocol (SMTP) — is the foundation of Internet email. SMTP used in
conjunction with a mail client application sends and retrieves mail.
System Under Test (SUT) — a product or system that is the subject of an evaluation.
Global System for Mobile (GSM) – GSM is a standard set developed by the European
Telecommunications Standards Institutes (ETSI) to describe technologies for second
generation (2G) digital cellular networks.
General Packet Radio Service (GPRS) – GPRS is a packet oriented mobile data service on
the 2G and 3G cellular communication systems global systems for GSM.
Test systems included ClearSight Analyzer, BackTrack, open source test scripts, and a Mu
Security 4000 Analyzer. The ClearSight Analyzer was used to monitor and capture POP3 and
SMTP traffic between the bizhub MFPs and the CSRC server. Sequences of normal status
and maintenance traffic as well as manually induced fan failures and recovery alert
conversations between the bizhub MFP and CSRC server -- in both encrypted and
unencrypted mode -- were captured and analyzed to determine what sensitive information
might be revealed by eavesdropping. Zenmap was used to scan open ports on each of the
MFPs and communication server.
1. Automatically reads the meters and frees the customer from the meter
collection process.
Konica Minolta CS Remote Care is an environmentally friendly solution that reduces the
need for service visits and unnecessary travel to service equipment in the field.
The MFPs can also communicate with the CSRC server using three different types of
modems: GSM, GPRS or Fax modems.
MFP
One-Way Email Communication is initiated from the bizhub MFP to send information, such as
counter status, daily to the CSRC server. SMTP push is also used to send all alert
notifications to predesignated email accounts via the CSRC server.
Two-Way Email Communication allows the bizhub MFP to poll the CSRC server for requests
for counter status. SMTP push is then used to send these status messages, as well as alert
notifications, to predesignated email accounts via the CSRC server.
CSRC Server
MFP
One-Way HTTP/HTTPs communication is initiated from the bizhub MFP to send information,
such as counter status, daily to the CSRC server. HTTP/HTTPs push is also used to send all
alert notifications to the predesignated CSRC server.
GPRS/GSM
Modem
CSRC Server
GPRS/GSM
Cascade
Server
MFP
Customer
INTERNET Notifications
CSRC Web View
(Service and Administration)
Telephone
Company
Fax Modem
Two-Way Fax communication works the same way as GPRS/GSM communication by using a
fax modem. The CSRC server can initiate communications to the bizhub MFP to request
information, such as counter status, and report back to the CSRC server. Fax also
communicates directly with the CSRC server, bypassing the customer network, eliminating
any security risks.
We found the POP3, SMTP, and HTTP/HTTPs either over the customer network or over
GPRS, GSM and fax to be particularly robust and resistant to hacking from outside the
network, based on hands-on testing. The following are specific reasons:
1. The CSRC system utilizes an external mail server and does not rely on or reveal
any information regarding the customer premise mail server.
2. With a properly configured firewall at the customer site, open ports for SMTP, POP3
or HTTP/HTTPs are unlikely to be used as access points to a private network.
Following standard practices for firewall configuration and other suggestions
included in this document will alleviate this threat.
3. The information contained within the payload component of the email messages
can be encrypted by the MFPs’ communications to and from the CSRC servers.
We confirmed by traffic capture that no useful intelligible data could be utilized from
the encrypted data.
4. The pre-encrypted information content transmitted by the MFPs to and from the
CSRC servers is of no use to a hacker to gain insight to the interior network. Basic
statistics, counter information and non-sensitive details on the copier is the only
information contained within these messages.
5. Three levels of protection are provided on messages between the CSRC server and
the MFP, including proprietary header, proprietary attachment file and predefined
source and destination addresses.
6. The basic information for copier health can only be determined through decodes
using a Konica Minolta proprietary procedure of the DAT file types.
7. Email messages to and from CSRC servers are handled in a proprietary way that
can reside transparently on a customer network with no interaction whatsoever of
the customer premise mail server.
8. “Spoofing” for other malicious use of this mail component of CSRC to do harm to
customer premise equipment of the underlying network was found ineffective in our
real world testing.
9. A hacker cannot gain access to the GPRS, GSM or fax modems to disrupt
communication between the MFP and the CSRC server. Traffic between the MFPs
and the CSRC server are secured by completely bypassing the customer network,
communicating directly with Konica Minolta servers through GPRS, GSM or fax.
It is unlikely for a hacker to utilize POP3 as a network ingress point, with the exception of
installing or packaging malicious code (to provide this entry point) in the payload or
attachment component of the mail message. We specifically tested for this vulnerability and
found the implementation of the CSRC service using email to be extremely resilient to “piggy-
back” or “Trojan” access to a network. Konica Minolta’s implantation of POP3 is secure based
on the following observations:
1. Tests were conducted in which we attempted to send malicious content using the
POP3 mail handling component of CSRC. These attacks were thwarted by the
CSRC server and content was not delivered to the server message blocks (SMBs)
or anywhere on the customer protected network.
2. We were unable to compromise the POP3 mail handling system of CSRC in any
way that would allow a malicious attack directly through a firewalled environment.
3. Konica Minolta uses a very defined, finite, and securable email dialog for the POP3
service it utilizes. This allows a network administrator to easily provide a limited
POP3 service to traverse the customer firewall without need to open POP3
globally.
2. Follow the vendor’s instructions for hardening firewalls by opening only necessary
ports.
3. If the only POP3 access to the network is for CSRC, additional filters for source
and destination address, specific content filtering and other techniques may be
applied to restrict other POP3 unauthorized traffic.
5. Utilize Konica Minolta bizhub products that support SMTP push-only technology, if
the customer is decidedly against using POP3 access through their firewall.
7. Although CSRC will not utilize the customer premise mail server, the customer may
still wish to harden their own mail server from attack. A common attack by flooding
the mail server with mail to cause a Denial of Service can be prevented by setting
a number of restrictions and limiting techniques including:
• MIN FREE BLOCKS — the minimum number of free blocks which must be
available for the server to accept mail.
• MAX HEADERS LENGTH — the maximum acceptable size (in bytes) for a
message header.
• MAX MESSAGE SIZE — the maximum acceptable size (in bytes) for any one
message.
8. Follow procedures outlined later in the document on page 13 for mitigating risk for
SMTP regarding firewalls and other network hardening measures.
2. Administrators should establish firewall rules that allow only authorized gateways
to communicate with outside servers on TCP ports 25 or 465.
3. CSRC will not utilize the customer premise mail server; the customer may still wish
to harden their own mail server from attack if ports are opened for SMTP access
through the customer premise firewall. To help stop attackers from speaking
SMTP directly to a full-featured server, we recommend using a substitute server.
Only a handful of commands are needed by an SMTP server to accept mail. A few
ways to mitigate this risk are outlined below:
a. Limit traffic - set rules on the firewall or router to allow authorized traffic.
Have permission/rules in place for external access that allows only specified
inbound and outbound traffic. This is the best defense to prevent an attack
on the firewall.
b. Block ICMP to help prevent abuse from automated tools, such as Firewalk.
The primary vulnerability seen from within the network regarding POP3 is the potential access
to the email accounts themselves.
SMTP service is always a “push” sending email out from the MFPs off the customer network.
There is little to no risk from inside the network from an SMTP standpoint.
Can opening the customer's firewall to POP3 be a conduit for attacks on the
network?
Using techniques described previously on pages 13 and 14 for network and email server
hardening will mitigate this risk. Hands-on vulnerability testing conducted with “privileged”
local access could only disrupt the CSRC management system. We could not conduct further
attacks on the network using POP3. The mail server for POP3 is located off the customer
premise. We were unsuccessful, as previously discussed on page 11 using POP3 as a
means to provide a greater DoS attack.
Before performing these attacks we completed a Zenmap scan on each attack surface to
obtain a list of open and vulnerable ports. Once the list of ports was acquired, we configured
the Mu-4000 Service Analyzer to attack each device specific to its vulnerable ports.
During our security attacks on the SUTs we simulated error codes by unplugging fans on the
MFPs. Each time an error code is detected on the MFP it communicated back to the CSRC
server using a configured modem (GSM, GPRS or fax). This verified whether the
communication between the MFP and CSRC server remained intact via the configured
modems.
The first DoS attack sent 100,000 IP packets per second directed at the MFPs IP address.
The second attack was directed at the communication server, also sending 100,000 IP
packets per second.
This DOS attack tests the ability of the modems and server to withstand the attack and not be
disrupted. Functionality of Konica Minolta CSRC system remained operational during our
DoS attack on the MFP and communication server.
A TCP attack was run against all open ports found on the MFPs, CSRC server and
Communication server. The open ports that the Zenmap port scanning application found were
analyzed and attacked accordingly. The purpose of the test is to verify that all open ports are
secure from TCP based attacks. This also determines if the configured modem
communication is secure between the MFP and CSRC.
Our directed TCP attacks toward the open ports on the MFPs, CSRC server and
communication server was unsuccessful in finding any vulnerabilities. No security flaws with
the open ports have been found that would enable an attacker to obtain sensitive information.
The modem communication also remained secured during our attacks and did not cause any
communication outages.
The Mu-4000 Security Analyzer was configured to attack the HTTP/HTTPs ports on the CSRC
server. The purpose of the test is to verify that the HTTP/HTTPs ports on the server are
secure and cannot be compromised and communication between the modems and CSRC
server is secure.
All directed attacks to the CSRC server were handled successfully and no faults were found.
The CSRC server was available for the duration of the test. There were no vulnerabilities
detected with HTTP/HTTPs protocol implementation on the CSRC server. Konica Minolta
HTTP/HTTPs protocol implementation on the CSRC server is highly secure. If an attacker
tried to attack the HTTP and HTTPs ports on the CSRC server, the modem communication
with the Konica Minolta servers will remain intact.
All directed attacks to the CSRC server were handled successfully and no faults were found.
The CSRC server was available for the duration of the test. There were no vulnerabilities
detected with ARP protocol implementation on the CSRC server. Konica Minolta’s ARP
protocol implementation on the CSRC server is highly secure. If the ARP protocol was
attacked on the CSRC server, the modem communication with the Konica Minolta servers
would remain intact.
The Mu-4000 Security Analyzer was configured to attack the DHCP protocol on the
multifunction printers.
All directed attacks to the MFPs were handled successfully and no faults were found. The
MFPs were available for the duration of the test. There were no vulnerabilities detected with
DHCP protocol implementation on the CSRC server. Konica Minolta’s DHCP protocol
implementation on the CSRC server is highly secure. If an attacker tried to attack the DHCP
protocol on the CSRC server, the modem communication with the Konica Minolta servers will
remain intact.
• Three layers of security are employed on all email messages used for CSRC.
• An SMTP push only for sending information off net requires no inbound network
security access reconfiguration
• Management option available through secure HTTP/HTTPs; also through “push only”
default option for maximum security.
• MFPs communicate with Konica Minolta CSRC servers directly using GSM, GPRS or
fax, completely bypassing the customer network eliminating any security risks.
Miercom conducted a battery of assaults to disrupt the communication between the
multifunction printers and CSRC. We were unsuccessful in hacking into the bizhub solutions
through the network ports and unable to affect the ability of the MFPs to print, be managed, or
actively participate in CSRC reporting by any attacks through the CSRC functionality. We
found that Konica Minolta’s deployment of GSM, GPRS and Fax modems for communication
directly with their servers is a well implemented approach. In our thorough testing we could
not find any type of security vulnerability in the implementation of GSM, GPRS, or fax.
The uptime management benefits of utilizing CSRC are tremendous. The system maximizes
MFP uptime through real-time service alerts. Real-time email alerts were observed for critical
events, such as a cooling fan failure, supplies needed, service required, or any of over 100
other trouble counters supported.
Miercom recommends customers to employ a layered active security defense to any network.
The deployment of CSRC on a customer network is strongly encouraged as an aid with MFP
device uptime management. We see no risk and only benefits of implementing CSRC in
customer environments. The requirements to use the system should not concern even the
most security conscious customers.
Miercom’s private test services include competitive product analyses, as well as individual
product evaluations. Miercom features comprehensive certification and test programs
including: Certified Interoperable, Certified Reliable, Certified Secure and Certified Green.
Products may also be evaluated under the NetWORKS As Advertised program, the industry’s
most thorough and trusted assessment for product usability and performance.