Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review security architecture of OpenHAB #187

Open
mmccool opened this issue Sep 14, 2020 · 4 comments
Open

Review security architecture of OpenHAB #187

mmccool opened this issue Sep 14, 2020 · 4 comments
Labels

Comments

@mmccool
Copy link
Contributor

mmccool commented Sep 14, 2020

see in general if this is consistent with WoT https://www.openhab.org/

@mmccool
Copy link
Contributor Author

mmccool commented Nov 16, 2020

@OliverPfaff to review, trying to answer questions raised in the "template" defined in this issue: #191

@mmccool mmccool assigned mmccool and unassigned mmccool Nov 16, 2020
@OliverPfaff
Copy link
Contributor

abc

@mmccool mmccool assigned mmccool and OliverPfaff and unassigned mmccool Nov 16, 2020
@mmccool mmccool added the Hubs label Nov 16, 2020
@OliverPfaff
Copy link
Contributor

With respect to security, the openHab documentation appears to be scattered and fuzzy in parts. The parts with a more clear description appear to suffer from a low level of elaboration. This creates the impression that security is no major prio in openHab development.

Here is my reading:

  1. "Thing-to-Thing"-security in openHab: openHab uses the term "channel" to denote actual operational exchanges within the system. I did not find information about "channel" security and guess that openHab anticipates a default deployment where unprotected plaintext exchanges happen between things within a dedicated/segregated local network. I.e. security between things seems to remain unelaborated (beyond making that a concern of the network that is being utilized). However this appears to be implicit i.e. the Thing-to-Thing security aspect of openHab security appears to be not elaborated at all (its probably fair to descope this aspect but a descopting of this should be explicit)

  2. "User-to-openHab system"-security: is elaborated in https://www.openhab.org/docs/installation/security.html and distinguishes resp. supports:

  • Commandine console: this means can (shall) use SSH. In contrast to HTTP-over-TLS for "user-to-openHab system"-security, the SSH flavor supports client resp. user authentication (hence gets around the wrap it again with virtual private networking techniques)
  • HTTP: this means must use TLS (subject to an embedded Web server [Jetty]). But the employed TLS security model is pretty naive and seems to utilize bad practices such as self-signed EE certs (for the embedded Web server) for TLS server authentication. It does not support TLS client authentication as well as client or user authentication on the HTTP layer (layer 7a) or inside HTTP payload (layer 7b). For that reason another protecttion layer is needed to protect the HTTP-over-TLS responder. That is suggested to be done using virtual private network techniques

@OliverPfaff OliverPfaff removed their assignment Dec 7, 2020
@mmccool
Copy link
Contributor Author

mmccool commented Jan 25, 2021

Content moved to https://github.com/w3c/wot-security/blob/master/background/hubs.md, further work should be against that file. Will leave open and review next week, in case @OliverPfaff has any further input.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants