User's Manual
Table Of Contents
- Table of Contents
- List of Tables
- List of Figures
- Figure1.1 Typical SEL3022 and SEL5810 Virtual Serial Software Application 1.2
- Figure1.2 Encrypted Packet Stream 1.4
- Figure1.3 Typical Connections for the SEL3022 1.6
- Figure1.4 Typical Alarm Output Installation 1.8
- Figure2.1 SEL3022 Dimension Drawing 2.2
- Figure2.2 Windows Run Command 2.3
- Figure2.3 Product Unregistered Prompt 2.4
- Figure2.4 Select a Device Type to Create 2.7
- Figure2.5 Specify New Device Location 2.8
- Figure2.6 Opening Device 2.8
- Figure2.7 Identification Screen 2.9
- Figure2.8 Status: Device 2.10
- Figure2.9 Settings: Wireless 2.10
- Figure2.10 Settings: WEP Keys 2.11
- Figure2.11 Settings: User 2.11
- Figure2.12 Settings: Operator 2.12
- Figure2.13 Settings: Security Officer 2.12
- Figure2.14 Confirm Send Prompt 2.13
- Figure2.15 Send Operation Message 2.13
- Figure2.16 Select Items to Print 2.14
- Figure2.17 Print Window 2.14
- Figure3.1 Remotely Located Recloser Control 3.2
- Figure3.2 Job Done Example SEL-5809 Top Level View 3.3
- Figure3.3 Select a Wireless Session for DNP3 Job Done Example 3.4
- Figure3.4 Settings: DCE Port 3.4
- Figure3.5 Status: Virtual Serial Port With Connection Status Red 3.5
- Figure3.6 Communication Parameters Window in acSELerator 3.6
- Figure3.7 Status: Virtual Serial Port With Connection Status Green 3.6
- Figure3.8 Reading Settings Via the SEL3022 3.7
- Figure3.9 Monitoring SEL651R Meter Data Via the SEL3022 3.8
- Figure3.10 Status: Virtual Serial Port Connection Status Red 3.9
- Figure3.11 Specify Device to Export to SEL5810 Virtual Serial Software 3.10
- Figure3.12 Export Encrypted User Configuration File 3.10
- Figure3.13 Store Encrypted File 3.11
- Figure3.14 Password Prompt in SEL5810 Virtual Serial Software 3.12
- Figure3.15 Communication Parameters Window in acSELerator 3.13
- Figure3.16 Reading SER Report Via acSELerator 3.14
- FigureB.1 PC to SEL3022 Connection B.2
- FigureB.2 SEL3022 and SEL-5809 Connection Parameters B.2
- FigureB.3 SEL5809 Settings Software Connection Method B.3
- FigureB.4 SEL-5809 Opening Connection B.3
- FigureB.5 Status: Device Window B.4
- FigureB.6 Confirmation Prompt B.4
- FigureB.7 Send Operation Prompt B.4
- FigureB.8 Configuring Serial Port Settings in the Terminal Software B.5
- FigureB.9 Send File Prompt B.6
- FigureB.10 Sending Confirmation Window B.6
- FigureB.11 Terminal Invalid Firmware Error Message B.7
- FigureB.12 Terminal Valid Firmware Message B.7
- FigureC.1 Two Independent Layers of Cryptographic Security Protect the SEL3022 Wireless Operato...
- FigureC.2 Operation of the HMAC SHA-1 Keyed Hash Authentication Function C.9
- FigureC.3 Operation of the AES Encryption Function C.10
- FigureC.4 SEL3022 Security Application Overview C.11
- FigureC.5 Wireless Interface Session Authentication Dialog C.15
- Preface
- Introduction & Specifications
- Installation
- Job Done Example
- Settings and Commands
- Testing and Troubleshooting
- Firmware and Manual Versions
- Firmware Upgrade Instructions
- Wireless Operator Interface Security
- Introduction
- Wireless Interface Security Overview
- IEEE 802.11 WEP Security
- The SEL Security Application
- Certificates
- Glossary
Date Code 20050615 Instruction Manual SEL-3022 Transceiver
Wireless Operator Interface Security
The SEL Security Application
C.13
Cryptographic Manual—Do Not Copy
1.83 • 10
63
years, on average, to guess both the authentication key and the encryption
key values. The analysis just described suggests that it is statistically impossible to
launch a key guessing attack against the SEL-3022 device that would result in
compromise of the system.
Even if someone were to steal a maintenance PC with the wireless interface encryption
and authentication keys programmed and saved on the PC hard drive, an attacker would
have to crack the SEL-3022 connection password to use the stolen computer to
successfully authenticate with the SEL-3022. To launch a password guessing attack, an
attacker would have to repeatedly send an initial session request frame and enter the
password guess into the SEL-5809 Settings Software dialog box.
If the entered password value is incorrect, the SEL-3022 terminates the session
authentication dialog after receiving Frame 3 of the authentication dialog (see
Figure C.5 on page C.15 and the discussion Connection Authentication and Session
Replay Protection on page C.14). If the authentication dialog fails at any point, the
SEL-3022 performs a timeout of the wireless operator interface and refuses any session
connection requests for five seconds. This limits the rate of a password guessing attack
to one guess per five seconds.
The SEL-3022 accepts password entries between 6 and 80 characters in length. These
passwords can contain all 96 printable ASCII characters (including the Space
character). If we assume that the security officer has programmed strong passwords
into the SEL-3022, an attacker would not be able to use a typical password guessing
attack dictionary to limit the number of required password guesses. In this case, all
possible password values would be equally likely and the attacker would have to
launch a brute-force password guessing attack by sending all possible password values
to the SEL-3022, one at a time. Tabl e C.1 shows the number of potential password
values (i.e., the maximum number of guesses that an attacker will have to make) and
the average number of years required to launch a successful brute-force password
guessing attack on the SEL-3022 as a function of the length of your programmed
password value. The value representing the average number of years required to
successfully guess the SEL-3022 connection password was derived under the
assumption that all potential password values are equally probable (i.e., you do not
program a password value that is likely to be in an attack dictionary). Such strong
passwords do not form a word, slang term, or other meaningful value. A strong
password also contains a mixture of alphanumeric characters (numbers and uppercase
and lowercase letters) and non-alphanumeric characters (punctuation characters,
backslash, space, etc.).
Table C.1 Number of Years Required to Guess an SEL-3022 Password
Password
Length
Number of Possible
Password Values
Average Number of Years Required to
Guess the Password (Assuming Strong
Password Choice)
67.91 • 10
11
6.27 • 10
4
77.59 • 10
13
6.02 • 10
6
87.29 • 10
15
5.78 • 10
8
Preliminary Copy