1 Introduction
This document describes the security functions implemented by the vMRF. The document also describes the security-related procedures that can be performed.
2 Functions and Concepts
This document covers the following security functions provided by vMRF:
For a complete list of vMRF functions, including other security functions, refer to the vMRF Overview.
2.1 Traffic Separation
The traffic for O&M, signaling, trusted payload, and untrusted payload uses separate vNICs. Virtual switch traffic separation is also a requirement in the cloud environment for vMRF. For more information on security requirements in the cloud environment for vMRF, refer to the vMRF Infrastructure Requirements.
2.2 O&M Traffic Protection
The Northbound Interface (NBI) is assumed to be accessed from a trusted O&M network. O&M traffic is secured using various security protocols, see Services, Ports, and Protocols for the details. Other protocols, for example, Telnet or FTP, are not permitted on the O&M interface.
It is recommended to configure a rate limit in an external firewall for protection of the NBI. For a description of the O&M traffic architecture, refer to Security Management for ECLI, NETCONF, and SFTP Users.
2.3 O&M Administrator Access Control
vMRF uses Role-Based Access Control (RBAC) with different rules that can be granted to various role groups. vMRF uses an external Lightweight Directory Access Protocol (LDAP) server to provide user authentication. It is recommended to follow the operator's security policy when defining O&M users and assigning specific roles to them. It is recommended that access to sensitive information is restricted to those roles and operations personnel who need the access.
Table 1 shows the default roles defined in vMRF:
|
Role |
Permission |
MOM Fragment |
Command and File Access |
|---|---|---|---|
|
SystemAdministrator |
R |
ManagedElement,SystemFunctions,SecM (only the MO, but not the attributes) |
Access to all vMRF CLI commands except for MSR |
|
RW |
ManagedElement,SystemFunctions,SwInventory,* |
||
|
RWX |
ManagedElement ManagedElement,SystemFunctions ManagedElement,SystemFunctions,Fm,* ManagedElement,SystemFunctions,Pm,* ManagedElement,SystemFunctions,SwM,* ManagedElement,SystemFunctions,SysM,* ManagedElement,Transport |
||
|
SystemSecurityAdministrator |
R |
ManagedElement ManagedElement,SystemFunctions ManagedElement,SystemFunctions,Fm,* ManagedElement,SystemFunctions,SwInventory,* |
Access to system logs and logs produced by the vMRF for troubleshooting purposes Access to all vMRF CLI commands for information printing |
|
RWX |
ManagedElement,SystemFunctions,SecM* |
||
|
SystemTroubleshooter |
- |
- |
Access to commands of the underlying Ericsson Component Based Architecture (CBA) application Access to imm OpenSAF commands Access to system logs and logs produced by the vMRF for troubleshooting purposes Access to all vMRF CLI commands except for MSR |
|
MrfApplicationOperator |
R |
ManagedElement,* |
Access to all vMRF CLI commands for information printing Read access to PM files and alarm and event logs through SSH/SFTP |
|
RX |
ManagedElement,SystemFunctions,SysM,* |
||
|
MrfApplicationAdministrator |
RWX |
ManagedElement,* |
Access to all vMRF CLI commands for information printing Read and write access to PM files and alarm and event logs through SSH/SFTP |
|
R |
ManagedElement,SystemFunctions,SecM,* |
||
|
MrfApplicationSecurityAdministrator |
R |
ManagedElement,* |
Access to all vMRF CLI commands for information printing Read access to PM files and alarm and event logs through SSH/SFTP |
|
RWX |
ManagedElement,SystemFunctions,SecM,* |
||
|
MrfApplicationTroubleshooter |
- |
- |
Access to all vMRF CLI commands except for MSR |
|
MrfApplicationTroubleshooter |
- |
- |
Access to MSR commands |
|
MrfApplicationSftpUser |
R |
ManagedElement,SystemFunctions,FileM,* |
Read access to PM files and alarm and event logs through SFTP port (115) only. Restricts all other access. |
Users are given access to CLI commands based on their roles as shown in Table 1. It is recommended that access to sensitive information is restricted to those roles and operations personnel who need the access. A user can be assigned multiple roles simultaneously. MrfApplicationSftpUser is a special role that restricts all other access and allows only SFTP access even when combined with other roles. Media Stream Recording (MSR) access must only be granted to Ericsson troubleshooters. For more information, refer to Media Stream Recording.
2.3.1 Reserved POSIX Groups
Table 2 lists POSIX groups, their corresponding Group Identifiers (GIDs), and their function in vMRF. Users are automatically given command access based on their role, as described in tbl-MRSV_Roles. The following GID ranges are reserved and should not be assigned for LDAP users to avoid unintentional command access assignment: 0–1001, 2000–2008, and 7000–7999.
|
Name |
GID |
Description |
|---|---|---|
|
system-ts |
2000 |
Troubleshooter; Access to commands of the underlying Ericsson Component Based Architecture (CBA) application |
|
mrf-op |
2005 |
Normal operator; Access to all vMRF CLI commands for information printing |
|
mrf-ts |
2006 |
Troubleshooter; Access to all vMRF CLI commands except for MSR |
|
mrf-msr |
2008 |
Ericsson troubleshooter; Access to MSR commands |
|
cmw-imm-users |
2004 |
IMM troubleshooter; Access to imm OpenSAF commands |
|
sftpusers(1) |
2007 |
Restricted operator; Access to PM files and alarm and event logs through SFTP port (115) only |
|
mrsv-admin |
1001 |
Emergency user |
|
systemd-journal |
994 |
Access to logs produced by the vMRF for troubleshooting |
The emergency user is a user that can log on to the system controller using SSH through the NBI, even when the LDAP server is unavailable. The emergency user is defined during deployment and cannot be changed during operation. The emergency user has access to all MOs and can therefore log on to the system to restore LDAP connectivity and return the system to normal operation.
| Note: |
The emergency user must be only used for emergency recovery purposes and not as a
shared account for normal O&M operations. |
SSH login for the root user is not permitted for normal users. The root user is locked, so that normal users cannot change to root with the su root command. The emergency user can change to root with the sudo -i command.
Logging in through the serial port is not permitted.
SSH host keys (RSA, DSA, ECDSA) for the VMs of the VNF cluster are generated automatically by the first VM during the deployment process, and copied to all other VMs. The fingerprints of the SSH host keys are visible in the console tool after deployment.
2.4 Idle Session Time-out
An SSH session is an interval that starts when a user is authenticated and can start operations. It ends when the user exits, or when the connection to the VNF is closed because of user inactivity. If the session ends because of inactivity, the situation is called idle session time-out.
Idle session time-out is a fixed time of 30 minutes and is enforced for all CLI command, NETCONF, and file access sessions. Traffic is monitored only in the client-to-server direction.
2.5 Brute-Force Attack Protection
The vMRF SSH interface uses a mechanism to protect against password cracking with brute-force attacks. The mechanism temporarily bans login attempts from IP addresses that reach the maximum allowed number of failed login attempts. The ban period and the maximum allowed number of failed login attempts are preconfigured in vMRF.
The ban period is set to 10 minutes, and the maximum allowed number of failed login attempts is five. This means that after five unsuccessful login attempts, no more login attempts are allowed from the given IP address for 10 minutes.
3 Services, Ports, and Protocols
The services, ports, and protocols that are used by vMRF are listed in Table 3.
|
Service or Interface Name |
Protocol |
IP Address Type |
Port |
Transport Protocol |
IP Version |
|---|---|---|---|---|---|
|
CLI access |
22 |
||||
|
PM report file access Alarm and alert log file access |
115 |
||||
|
389 |
|||||
|
636 |
|||||
|
9095 |
|||||
|
830 |
|||||
|
6513 |
|||||
|
161 (configurable) |
|||||
|
10161 (configurable) |
|||||
|
Synchronization |
123 |
|
Service or Interface Name |
Protocol |
IP Address Type |
Port |
Transport Protocol |
IP Version |
|---|---|---|---|---|---|
|
Ia, Ix, or Iq |
H.248 |
Signaling IP |
2944 (configurable) |
4 Security Configuration
This section describes how to configure the security functions in vMRF.
4.1 O&M Administrator Access Control
This section provides the instructions for operating the security functionality of the product.
4.1.1 Configure LDAP Authentication and Authorization in vMRF
This procedure describes how to configure vMRF to use an LDAP server for authentication and authorization.
Prerequisites
vMRF has been deployed.
LDAP authentication and authorization has not yet been configured in the vMRF VNF, or the configuration needs to be changed. For instructions on how to import the LDAP configuration below into the VNF during deployment, refer to the relevant deployment guide.
You have logged in to vMRF either as the emergency user, or as the security administrator.
An Ericsson Command-Line Interface (ECLI) session in Exec mode is in progress.
Steps
4.2 Recommended Periodic Operations
Even though vMRF has been installed and hardened securely, administrator and user activity over time can introduce security exposures. Also, new vulnerabilities which need to be mitigated are frequently found in the existing products. Therefore it is necessary to maintain the security posture of the product in service on a regular, ongoing basis.
This section describes recommended periodic operations.
Take system backups regularly according to the vMRF Backup and Restore Guideline.
Restrict access to backup files so that unauthorized persons cannot view or modify the included sensitive data. This recommendation also refers to backups stored in an external server.
Apply password policies on the LDAP server to enforce password complexity, aging, and recovery.
Ensure that no unnecessary accounts exist.
Ensure that no unnecessary listening ports are open.
Ensure that no shared user accounts are used.
Ensure that the emergency user password is not known by more people than necessary.
Ensure that user rights are assigned only to real needs.
Monitor the log of access and authorization events in the system by using the following commands:
journalctl _COMM=sshd – sshd access logs
journalctl SYSLOG_FACILITY=10 – authentication logs
journalctl _COMM=com – NBI audit logs
5 Privacy
vMRF includes features for troubleshooting and media plane problem solving that have privacy impacts. These features can be used by both Ericsson and operator trusted personnel.
To be able to provide services in the network, vMRF handles sensitive personal data. To restrict access to personal data, vMRF uses RBAC for roles and operations personnel who need access to such information. It is the responsibility of operators to use these security controls appropriately to protect personal data and mitigate any possible privacy impact. For more information on RBAC roles see O&M Administrator Access Control.
5.1 Notice and Consent
Locally applicable privacy statements must be made available to users whose data is being collected.
Locally applicable user consent must be in place for processing personal information.
Furthermore, it is assumed that all personal privacy related information is handled by the operator according to all applicable local and international laws and regulations in the countries in which they operate.
5.2 Personal Data Classification
The following table lists the collected data item types by Personal Data Category:
|
Personal Data Category |
Data Item |
|---|---|
|
Basic data |
IP address. IP addresses of media plane packets are considered as Personally Identifiable Information (PII) and may be included in log files. To provide services, vMRF processes the IP addresses in RTP and IP packets sent from or received by the UE. These IP addresses are not stored by vMRF, except possibly in troubleshooting logs. In most deployments, the IP addresses visible for vMRF are not UE IP addresses, but internal IP addresses of the operator's border gateway (vBGF), or media gateway (IM-MGW) instances used for connecting the UE to the IMS core network. |
|
Sensitive data (identifiable user activity) |
Content of media plane traffic when Media Stream Recording (MSR) is active: voice, text, sound, pictures, or other content of the communication. MSR is used for troubleshooting only by Ericsson personnel only, and only after the operator has explicitly requested Ericsson to analyze the problem and has agreed with Ericsson on the use of MSR. The produced recording files are sent to Ericsson vMRF support for analysis. For more information on MSR, refer to Media Stream Recording. |

Contents