Cybersecurity of Firmware Updates DISCLAIMER

Total Page:16

File Type:pdf, Size:1020Kb

Cybersecurity of Firmware Updates DISCLAIMER DOT HS 812 807 October 2020 Cybersecurity of Firmware Updates DISCLAIMER This publication is distributed by the U.S. Department of Transportation, National Highway Traffic Safety Administration, in the interest of information exchange. The opinions, findings, and conclusions expressed in this publication are those of the authors and not necessarily those of the Department of Transportation or the National Highway Traffic Safety Administration. The United States Government assumes no liability for its contents or use thereof. If trade or manufacturers’ names are mentioned, it is only because they are considered essential to the object of the publication and should not be construed as an endorsement. The United States Government does not endorse products or manufacturers. Suggested APA Format Citation: Bielawski, R., Gaynier, R., Ma, D., Lauzon, S., & Weimerskirch, A. (2020, October). Cybersecurity of Firmware Updates (Report No. DOT HS 812 807). National Highway Traffic Safety Administration. Technical Report Documentation Page 1. Report No. 2. Government Accession No. 3. Recipient's Catalog No. DOT HS 812 807 4. Title and Subtitle 5. Report Date Cybersecurity of Firmware Updates October 2020 6. Performing Organization Code 7. Authors 8. Performing Organization Report No. Russ Bielawski, Ron Gaynier, Dr. Di Ma, Sam Lauzon, and Dr. André Weimerskirch 9. Performing Organization Name and Address 10. Work Unit No. (TRAIS) Transportation Research Institute 11. Contract or Grant No. University of Michigan (Ann Arbor, MI) DTNH22-15-R-00104 Vehicle University of Michigan-Dearborn Electronics Systems Safety IDIQ Volkswagen Group of America (Herndon, VA) 12. Sponsoring Agency Name and Address 13. Type of Report and Period Covered National Highway Traffic Safety Administration Final Report 1200 New Jersey Avenue, SE 14. Sponsoring Agency Code Washington, DC 20590 15. Supplementary Notes 16. Abstract Over-the-Air (OTA) software and firmware updates are widely considered essential for networked devices. In the automotive industry, OTA firmware updates are anticipated to increase the efficiency and decrease the time in updating the critical firmware in vehicles’ electronic control units (ECUs). This project had these objectives: understand the scope and relevant attributes of firmware updates, understand their vulnerabilities and update solutions, understand mitigation methods for those vulnerabilities, and learn from adjacent industries. The report first presents a literature and technology review of the state-of-the-art of software updates in industries related to automotive, including the commercial aviation, medical, and consumer electronics industries. Next it identifies and assesses software update functionality risks in current and near-term future automobiles. Finally, it reviews mitigation methods to address those risks. In addition, this report describes the SAE AS5553A voluntary standard for the detection of and protection against counterfeit electronic parts in the aerospace industry and how it relates to the automotive industry. 17. Key Words 18. Distribution Statement Over-the-Air, Updates, Firmware, Software, This document is available to the public through ECU (Electronic Control Unit), Automotive, the National Technical Information Service, Network, Theft, Counterfeit, SAE AS5553A www.ntis.gov. 19. Security Classif. (of this report) 20. Security Classif. (of this page) 21. No. of Pages 22. Price Unclassified Unclassified 103 Form DOT F 1700.7 (8-72) Reproduction of completed page authorized i Executive Summary Over-the-Air (OTA) software and firmware updates are widely considered essential for networked devices. In the automotive industry, OTA firmware updates are anticipated to increase the efficiency and decrease the time in updating the critical firmware in vehicles’ electronic control units (ECUs). There is a demand to better understand firmware and software updates, particularly for embedded systems, and how to implement them securely. This work had the following objectives. • Understand the scope and relevant attributes of firmware updates • Understand the vulnerabilities of firmware update solutions • Understand the mitigation methods for those vulnerabilities • Learn from adjacent industries The report first presents a literature and technology review of the-state-of-the-art of software updates in industries related to automotive, including the commercial aviation, medical, and consumer electronics industries. Next it identifies and assesses the risks presented by software update functionality in current and near-term future automobiles. Finally, it gives a review of the mitigation methods to address those risks. In addition, this report describes the SAE AS5553A voluntary standard for the detection of and protection against counterfeit electronic parts in the aerospace industry and how it relates to the automotive industry. Summary of Lessons Learned in Adjacent Industry: Common existing defense mechanisms (e.g., signing, fortification, and intrusion detection) and vulnerabilities are noted in the body of the report as are potential defenses for secure vehicle firmware updates. Risk Assessment Conclusions: In identifying risks at both the vehicle-level and the technological design and implementation level, the researchers have identified the biggest risk with software update mechanisms as malware installation. Mitigation Methods Conclusions: In-field software updates are a necessity in the automotive industry to fix flaws without replacing hardware that is already deployed in the field. The current generation of automobiles primarily uses OTA software updates for telematics and infotainment ECUs only. While software updates are a boon for security, the mechanism, particularly the remote mechanism, creates a new avenue for attackers to exploit. A matrix of specific mitigations versus risks appears in the report (see Table 17). Intellectual Property Theft Risks and Mitigations Conclusions: Intellectual property theft, particularly software theft, can be enabled and made easier with software update mechanisms, particularly OTA mechanisms. In discussions with the original equipment manufacturer (OEM) and tier-1 supplier employees, the majority opinion is that protecting the software binaries is not a priority. The prevailing opinion in the industry is that ii there are too many other ways for an adversary to obtain a software binary to justify the cost of adding encryption to the software update process. Counterfeit and Fraudulent Electronic Parts and Products Conclusions: Fraudulent and counterfeit parts can pose a safety and monetary liability risk. SAE AS5553A is an aerospace standard for the creation of processes for detection, prevention, mitigation, and disposition of suspect, fraudulent, and counterfeit electronic parts. In general, SAE AS5553A should apply to the automotive industry quite readily. It is designed to be flexible and risk- informed. The requirements themselves should be applicable to the automotive industry; however, a more tailored collection of best practices might be reasonable to develop for the automotive sector specifically (not developed within this project). Final Conclusions: Secure in-field software updates are nearly universally considered to be essential for any networked computer system. However, software update functionality creates a new attack surface for attackers to potentially exploit. The installation of malware is one of the biggest risks for software updates. There is no singular, perfect reference model for securing software updates. Every system has different requirements and user experience targets that shape the design enough to require security to be at a minimum analyzed and usually designed with an application-specific approach. While software updates have a large surface from which vulnerabilities can potentially spring, many of the mitigations are known. Software update functionality can be attacked at many different places in the distribution process. And, while technical risks exist, many of the risks are social (such as lost passwords, etc.) in nature. The benefit of reliable, prompt software updates for in-field electronics is significant. iii Table of Contents Executive Summary ........................................................................................................ ii Summary of Lessons Learned in Adjacent Industry: ............................................... ii 1. Introduction ............................................................................................................... 1 2. Background, Definitions, and Literature Review ....................................................... 2 2.1 Background ......................................................................................................... 2 2.2 Software Update: Overview and Definitions ........................................................ 2 2.2.1 Current automotive software update mechanism and best practices. ............ 3 2.3 Step-By-Step: The OTA Software Update Process ............................................... 5 2.3.1 Packaging. .................................................................................................. 6 2.3.2 Transport. ................................................................................................... 6 2.3.3 Reception. ................................................................................................... 6 2.3.4 Installation. ................................................................................................
Recommended publications
  • Diseño E Implementación De Actualizaciones Over the Air (OTA) Para Redes De Sensores Inalámbricas
    Diseño e implementación de actualizaciones Over The Air (OTA) para redes de sensores inalámbricas David García Fernández GRADO EN INGENIERÍA INFORMÁTICA FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID Trabajo Fin de Grado en Ingeniería Informática Curso 2018-2019 Director: Joaquín Recas Resumen en castellano El objeto de este trabajo es el estudio de la viabilidad de las actualizaciones de firmware Over The Air (OTA) utilizando una red LPWAN, en concreto LoRaWAN. Dar soporte para actualizaciones de firmware OTA a día de hoy resulta fundamental y más todavía cuando estos nodos se encuentran en lugares remotos o sitios donde el acceso es muy limitado o peligroso. Tener implementada la funcionalidad para actualizaciones vía OTA permite corregir errores o añadir nuevas funcionalidades a distancia. Uno de los objetivos prioritarios consiste en que la misma actualización pueda llegar a un conjunto de nodos a la vez evitando tener que actualizar los nodos uno por uno, ya que esto supondría el envío de gran cantidad de información duplicada. Para llevar a cabo esta tarea, se ha realizado un estudio en profundidad sobre las características y el funcionamiento de la red LoRaWAN teniendo en cuenta que las redes LPWAN en general dificultan llevar a cabo este tipo de actualizaciones debido a sus conocidas limitaciones en cuanto a tamaño de payload y elevada latencia. Finalmente, este trabajo demuestra la viabilidad de las OTA mediante la aplicación de parches de actualización de firmware a conjuntos de nodos. Palabras clave OTA Over The Air Pycom Lopy STM32L475 LoRa LoRaWAN Bajo consumo Firmware OTA LoRa Server Red de sensores Abstract The aim of this work is the study of the feasibility of firmware updates Over The Air (OTA) using an LPWAN network, specifically LoRaWAN.
    [Show full text]
  • July 20 2020 Linux Documentation
    Linux SAFR® Documentation Linux SAFR® Documentation Documentation Version = 2.016 Publish Date = July 20, 2020 Copyright © 2020 RealNetworks, Inc. All rights reserved. SAFR® is a trademark of RealNetworks, Inc. Patents pending. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. 1 Contents 1 What’s New 5 2 SAFR Overview 6 3 SAFR System Requirements 9 4 Licensing 15 5 Getting Started with SAFR Platform on Linux 17 6 Camera Best Practices 20 7 Manage People in the Person Directory 28 8 Importing and Registering People 29 9 Image Quality Metrics Guidance 31 10 Actions Overview 35 11 Actions Relay Event Service (ARES) 37 12 SAFRActions.config 38 13 Large Scale Deployments 49 14 Database Redundancy 53 15 Object Storage Service Redundancy (CVOS) 58 16 SSL Certificate Installation 63 17 SAFR Support Tools and Scripts 67 18 SAFR Server Backup and Restore 69 19 SAFR Platform Command Line Install
    [Show full text]
  • MBS Macextras Plugin.Pdf
    MBS MacExtras Plugin Documentation Christian Schmitz September 6, 2021 2 0.1 Introduction This is the PDF version of the documentation for the Xojo Plug-in from Monkeybread Software Germany. Plugin part: MBS MacExtras Plugin 0.2 Content • 1 List of all topics 3 • 2 List of all classes 29 • 3 List of all controls 31 • 4 List of all modules 33 • 5 List of all global methods 35 • 6 All items in this plugin 37 • 18 List of Questions in the FAQ 231 • 19 The FAQ 241 Chapter 1 List of Topics • 7 Apple Remote 39 – 7.1.1 class AppleRemoteMBS 39 ∗ 7.1.7 startListening 40 ∗ 7.1.8 stopListening 40 ∗ 7.1.10 ClickCountEnabledButtons as Integer 40 ∗ 7.1.11 ClickCountingEnabled as Boolean 40 ∗ 7.1.12 Handle as Integer 41 ∗ 7.1.13 ListeningOnAppActivate as Boolean 41 ∗ 7.1.14 ListeningToRemote as boolean 41 ∗ 7.1.15 MaximumClickCountTimeDifference as Double 41 ∗ 7.1.16 OpenInExclusiveMode as boolean 42 ∗ 7.1.17 ProcessesBacklog as Boolean 42 ∗ 7.1.18 RemoteAvailable as boolean 42 ∗ 7.1.19 remoteId as Integer 42 ∗ 7.1.20 SimulatesPlusMinusHold as Boolean 42 ∗ 7.1.22 ButtonPressed(ButtonID as Integer, PressedDown as boolean, clickCount as Integer) 43 ∗ 7.1.24 kRemoteButtonFullscreen2009 = 32768 43 ∗ 7.1.25 kRemoteButtonLeft = 64 43 ∗ 7.1.26 kRemoteButtonLeftHold = 256 43 ∗ 7.1.27 kRemoteButtonMenu = 8 44 ∗ 7.1.28 kRemoteButtonMenuHold = 512 44 ∗ 7.1.29 kRemoteButtonPlay = 16 44 ∗ 7.1.30 kRemoteButtonPlay2009 = 16384 44 ∗ 7.1.31 kRemoteButtonPlaySleep = 1024 44 ∗ 7.1.32 kRemoteButtonRight = 32 44 ∗ 7.1.33 kRemoteButtonRightHold = 128 45 3 4 CHAPTER 1.
    [Show full text]
  • MBS Cocoaextras Plugin Documentation
    MBS CocoaExtras Plugin Documentation Christian Schmitz July 16, 2017 2 0.1 Introduction This is the PDF version of the documentation for the Xojo (Real Studio) Plug-in from Monkeybread Software Germany. Plugin part: MBS CocoaExtras Plugin 0.2 Content • 1 List of all topics 3 • 2 List of all classes 31 • 3 List of all controls 33 • 4 List of all modules 35 • 5 List of all global methods 37 • 6 All items in this plugin 39 • 20 List of Questions in the FAQ 223 • 21 The FAQ 233 Chapter 1 List of Topics • 6 Apple Remote 39 { 6.1.1 class AppleRemoteMBS 39 ∗ 6.1.3 startListening 39 ∗ 6.1.4 stopListening 39 ∗ 6.1.6 ClickCountEnabledButtons as Integer 40 ∗ 6.1.7 ClickCountingEnabled as Boolean 40 ∗ 6.1.8 Handle as Integer 40 ∗ 6.1.9 ListeningOnAppActivate as Boolean 40 ∗ 6.1.10 ListeningToRemote as boolean 41 ∗ 6.1.11 MaximumClickCountTimeDifference as Double 41 ∗ 6.1.12 OpenInExclusiveMode as boolean 41 ∗ 6.1.13 ProcessesBacklog as Boolean 41 ∗ 6.1.14 RemoteAvailable as boolean 41 ∗ 6.1.15 remoteId as Integer 42 ∗ 6.1.16 SimulatesPlusMinusHold as Boolean 42 ∗ 6.1.18 ButtonPressed(ButtonID as Integer, PressedDown as boolean, clickCount as Integer) 42 ∗ 6.1.20 kRemoteButtonFullscreen2009 = 32768 42 ∗ 6.1.21 kRemoteButtonLeft = 64 43 ∗ 6.1.22 kRemoteButtonLeftHold = 256 43 ∗ 6.1.23 kRemoteButtonMenu = 8 43 ∗ 6.1.24 kRemoteButtonMenuHold = 512 43 ∗ 6.1.25 kRemoteButtonPlay = 16 43 ∗ 6.1.26 kRemoteButtonPlay2009 = 16384 43 ∗ 6.1.27 kRemoteButtonPlaySleep = 1024 43 ∗ 6.1.28 kRemoteButtonRight = 32 43 ∗ 6.1.29 kRemoteButtonRightHold = 128 44 3 4 CHAPTER 1.
    [Show full text]
  • Cybersecurity of Firmware Updates DISCLAIMER
    DOT HS 812 807 October 2020 Cybersecurity of Firmware Updates DISCLAIMER This publication is distributed by the U.S. Department of Transportation, National Highway Traffic Safety Administration, in the interest of information exchange. The opinions, findings, and conclusions expressed in this publication are those of the authors and not necessarily those of the Department of Transportation or the National Highway Traffic Safety Administration. The United States Government assumes no liability for its contents or use thereof. If trade or manufacturers’ names are mentioned, it is only because they are considered essential to the object of the publication and should not be construed as an endorsement. The United States Government does not endorse products or manufacturers. Suggested APA Format Citation: Bielawski, R., Gaynier, R., Ma, D., Lauzon, S., & Weimerskirch, A. (2020, October). Cybersecurity of Firmware Updates (Report No. DOT HS 812 807). National Highway Traffic Safety Administration. Technical Report Documentation Page 1. Report No. 2. Government Accession No. 3. Recipient's Catalog No. DOT HS 812 807 4. Title and Subtitle 5. Report Date Cybersecurity of Firmware Updates October 2020 6. Performing Organization Code 7. Authors 8. Performing Organization Report No. Russ Bielawski, Ron Gaynier, Dr. Di Ma, Sam Lauzon, and Dr. André Weimerskirch 9. Performing Organization Name and Address 10. Work Unit No. (TRAIS) Transportation Research Institute 11. Contract or Grant No. University of Michigan (Ann Arbor, MI) DTNH22-15-R-00104 Vehicle University of Michigan-Dearborn Electronics Systems Safety IDIQ Volkswagen Group of America (Herndon, VA) 12. Sponsoring Agency Name and Address 13. Type of Report and Period Covered National Highway Traffic Safety Administration Final Report 1200 New Jersey Avenue, SE 14.
    [Show full text]
  • May 12 2020 Linux Documentation
    Linux SAFR® Documentation Linux SAFR® Documentation Documentation Version = 2.007 Publish Date = April 12, 2020 Copyright © 2020 RealNetworks, Inc. All rights reserved. SAFR® is a trademark of RealNetworks, Inc. Patents pending. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. 1 Contents 1 What’s New 5 2 SAFR Overview 6 3 SAFR System Requirements 9 4 Licensing 15 5 Getting Started with SAFR Platform on Linux 17 6 Manage People in the Person Directory 20 7 Importing and Registering People 21 8 Image Quality Metrics Guidance 23 9 Actions Overview 27 10 Actions Relay Event Service (ARES) 29 11 SAFRActions.config 30 12 Large Scale Deployments 41 13 Database Redundancy 45 14 Object Storage Service Redundancy (CVOS) 50 15 SSL Certificate Installation 55 16 SAFR Support Tools and Scripts 59 17 SAFR Server Backup and Restore 61 18 Video Recognition Gateway (VIRGO) 62 19 VIRGO Installation
    [Show full text]
  • Securing Software Updates for Automobiles∗
    Uptane: Securing Software Updates for Automobiles∗ Trishank Karthik Akan Brown Sebastien Awwad Kuppusamy NYU Tandon School of NYU Tandon School of NYU Tandon School of Engineering Engineering Engineering [email protected] [email protected] [email protected] Damon McCoy Russ Bielawski Cameron Mott NYU Tandon School of University of Michigan Southwest Research Institute Engineering [email protected] [email protected] [email protected] Sam Lauzon André Weimerskirchy Justin Cappos University of Michigan University of Michigan, NYU Tandon School of [email protected] Lear Corporation Engineering [email protected] [email protected] ABSTRACT 26,27,29–31,33–37,39]. In one such case, a compromised Source- Forge mirror distributed a malicious version of phpMyAdmin, a Software update systems for automobiles can deliver significant popular database administration software [33]. The modified ver- benefits, but, if not implemented carefully, they could potentially sion allowed attackers to gain system access and remotely execute incur serious security vulnerabilities. Previous solutions for secur- PHP code on servers that installed the software. ing software updates consider standard attacks and deploy widely understood security mechanisms, such as digital signatures for the Automobiles introduced software updates more than a decade software updates, and hardware security modules (HSM) to sign ago, and today many electronic components in a vehicle can be up- software updates. However, no existing solution considers more dated by an automotive technician with a proper tool. However, advanced security objectives, such as resilience against a reposi- available update mechanisms played a crucial role in a variety of tory compromise, or freeze attacks to the vehicle’s update mech- published automotive related hacks, such as the recent study by anism, or a compromise at a supplier’s site.
    [Show full text]
  • Diffusion 6.6 User Guide Contents
    Diffusion 6.6 User Guide Contents List of Figures..............................................................................................10 List of Tables............................................................................................... 12 Part I: Welcome.......................................................................... 15 Introducing Diffusion................................................................................................. 16 Introducing topics and data................................................................................................ 16 Introducing sessions.............................................................................................................20 What's new in Diffusion 6.6?...................................................................................... 23 Part II: Quick Start Guide............................................................ 26 Part III: Design Guide.................................................................. 27 Support.....................................................................................................................28 System requirements for the Diffusion server....................................................................28 Platform support for the Diffusion API libraries.................................................................31 Feature support in the Diffusion API...................................................................................33 License types.........................................................................................................................38
    [Show full text]
  • Common Installation Guide CARAB 2.0 SPS1 Content
    Installation Guide CUSTOMER SAP Customer Activity Repository retail applications bundle Document Version: 1.0.0 – 2017-02-27 Common Installation Guide CARAB 2.0 SPS1 Content 1 Introduction.................................................................. 5 1.1 About this Document.............................................................5 1.2 Integration with SAP Fashion Management.............................................6 1.3 SAP Notes for the Installation.......................................................7 1.4 Information Available on SAP Help Portal..............................................13 1.5 Naming Conventions............................................................15 2 Planning.................................................................... 18 2.1 Overall System Planning..........................................................18 2.2 System Landscape Variants.......................................................21 SAP Allocation Management for Retail............................................. 21 SAP Assortment Planning for Retail...............................................22 SAP Customer Activity Repository................................................26 SAP Merchandise Planning for Retail..............................................30 3 Prerequisites.................................................................33 4 Preparation..................................................................41 4.1 SAP Assortment Planning for Retail..................................................41 Verify SAP
    [Show full text]
  • Apache Solr Reference Guide Covering Apache Solr
    TM Apache Solr Reference Guide Covering Apache Solr 5.5 Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to you under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. Apache and the Apache feather logo are trademarks of The Apache Software Foundation. Apache Lucene, Apache Solr and their respective logos are trademarks of the Apache Software Foundation. Please see the Apache Trademark Policy for more information. Fonts used in the Apache Solr Reference Guide include Raleway, licensed under the SIL Open Font License, 1.1. Apache Solr Reference Guide This reference guide describes Apache Solr, the open source solution for search. You can download Apache Solr from the Solr website at http://lucene.apache.org/solr/. This Guide contains the following sections: Getting Started: This section guides you through the installation and setup of Solr. Using the Solr Administration User Interface: This section introduces the Solr Web-based user interface. From your browser you can view configuration files, submit queries, view logfile settings and Java environment settings, and monitor and control distributed configurations.
    [Show full text]
  • June 28 2020 Linux Documentation
    Linux SAFR® Documentation Linux SAFR® Documentation Documentation Version = 2.010 Publish Date = June 5, 2020 Copyright © 2020 RealNetworks, Inc. All rights reserved. SAFR® is a trademark of RealNetworks, Inc. Patents pending. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. 1 Contents 1 What’s New 5 2 SAFR Overview 6 3 SAFR System Requirements 9 4 Licensing 15 5 Getting Started with SAFR Platform on Linux 17 6 Camera Best Practices 20 7 Manage People in the Person Directory 28 8 Importing and Registering People 29 9 Image Quality Metrics Guidance 31 10 Actions Overview 35 11 Actions Relay Event Service (ARES) 37 12 SAFRActions.config 38 13 Large Scale Deployments 49 14 Database Redundancy 53 15 Object Storage Service Redundancy (CVOS) 58 16 SSL Certificate Installation 63 17 SAFR Support Tools and Scripts 67 18 SAFR Server Backup and Restore 69 19 Video Recognition Gateway (VIRGO)
    [Show full text]
  • Application Hosting Configuration Guide for Cisco ASR 9000 Series Routers
    Application Hosting Configuration Guide for Cisco ASR 9000 Series Routers First Published: 2016-11-01 Last Modified: 2021-07-30 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]