Bosch/Genetec Video Cybersecurity Partnership Examined (CHAVE)

Author: Brian Karas, Published on Feb 15, 2017

Surveillance products have been relatively weak when it comes to cyber security. Default passwords, open ports, and weak authentication mechanisms led to a wave of exploits.

Now, Bosch and Genetec are working together to deliver a system that is "resilient against unauthorized access, malware, brute force cracking and other exploit techniques."

The two companies described the solution, which Bosch is marketing as CHAVE (Credentialed High Assurance Video Encryption), in a conversation with IPVM.

In this report we describe how CHAVE differs from other security mechanisms, what it adds in terms of costs, and how installation and day to day use vary from other systems.

************ ******** **** **** ********** **** **** ** ***** ** cyber ********. ******* *********, **** *****, *** **** ************** ********** led ** * **** ** ********.

***, ***** *** ******* *** ******* ******** ** ******* * system **** ** "********* ******* ************ ******, *******, ***** ***** ******** *** ***** exploit **********."

*** *** ********* ********* *** ********, ***** ***** ** ********* as ***** (************ **** ********* ***** **********), ** * ************ **** ****.

** **** ****** ** ******** *** ***** ******* **** ***** security **********, **** ** **** ** ***** ** *****, *** how ************ *** *** ** *** *** **** **** ***** systems.

[***************]

CHAVE ****** ********

***** ** ** ***-**-*** ******** *********** *** ***** *******. ** utilizes ******* **** ********** ******** / ******** *** ******** **** encryption, ***** **** ***-****** ******** ************ *** * *** **** can ********* **** *** ** ***** **********.

*** **** ** ***** ** ** ****** *** ********* ** video, **** *** ******* **** *** **** ***********, *** ** better ****** *** *** **** ****** ** **** *** ****** video. ***** ***** *.*. ************** ***-****** * ************, ***** ***** ****** ** ***** ************ ** able ** **.

*********, ***** ** ********* *****-******* *******, *** ******* ** ****** CHAVE ******* ** ** ******** ******** ****** *******.

User **************

***** ** * ***** ****** *** ****** ***** *****, **** commonly**********-****** ****-** *****, ***** **** **** ** ********** ****. ***** ** *** VMS ******** ********* ***** ***** **** ** * ****** ******** to *** ****** ** *** ******** * ***.

Target *********

*******/**********, ** ******* ********* **** **** ********** ** ********** ************ around ************* *** *** ****** ******. ** ** ******** **** even * ***** ********** *******-****** ******** ***** ********* ***** ******* outside ************.

CHAVE ********** ********

********* ** *****, *** ********** ********** ** ***** *** *** based ** *********-********* ********, **** ***.*** ****************** (********* ***** ********). ***** ** *****'* ********* **** *** ******* ***** ********* together **** ** ** ******, *** ************ *** ******** *** accessing *** *******.

******* ******* *** ******** ** **** ******** ******** ********** ** support *****, ** ** *** * ******* **** *** ** added ** ******** ******* *** ******** ******** ** ***** *******.

Username/Password ** ****

***** *************** ***** **************, ***** ********** ********/******** ****** ** *******, *** *** **** of ****** ** ******* *********. *** ****** ** ******** ** have ****** ** *** ********, ** **** *** ******* *** routinely ******* *** *********** ********* ** ****** *** ***** *** still *****. ********* ** *****, *** ******** ****** *********** ** not ** *****, **** *** ********-****** ********** *************, ** *** systems ********* ******* **** ******** ****** *** ****** ******/************** ********.

Supported *******

***** ***** *** ********* ******* ** ********* ********** *****:

  • ********* ** **** ** ***** **** ******
  • ********* ** ********* **** ** ***** **** ******
  • ****** ** ********* **** ** ***** *** ******
  • ********* ** **** ** ********* ******
  • ******** ** ******* **** ** ***
  • *** ** ********* **** ** ********** ***
  • ****** ** ****** **** ** ******

Genetec *******

******* **** **** *** ****** ** **** **** ******* *** CHAVE ** *** **** ******* ** ******** ******, ***** ****** be *.*.

********* ***** ******* ** ********* ** *******, ****** ******* ***** nor ******* ***** ******* *** **** *** ********* *********** ** intended ** ****.

Additional ******** *** ************ ************

******* **** ** **** *** ******** ************ ***-********* ****** ********, this **** ** ******* **************. *** *********** ******* ******* **** ******** ****-**** ********, ********* to *****, *** ****** *** *** **** **** * *** extra ****.

**** ********, ************* ************ **** ** ** ******** **** ******** Center ****** *** ******* *** ** ***** ** *** *** and **********. ***** ******** ** ****** *****, **** ** ******** bitrate ******** ** ******** ******** *** *** **** ** ***-***** cameras.

*******, *** ********** **** ******** ** ******* *** ********* *****-******* cameras ****** ** *******, *** **** ******* ***** ** ** through * ********/************* *******.

Training ************

***** **** **** *********** **** **** ** ******* ********** ******** before **** *** ********* ** **** *** ******* ***** ********. The ******** ** ******** ** ** ********* *****, *** **** likely ** * **** *** ******.

Cost ** *****

***** *** ********** ******* ***** ** ********* ***** ** * non-CHAVE ******. ***** *** ********* ******* ** *** **** ***** and ***-***** ********, ******* **** * ******** **** *** *** more *** ***** *******, *** ******* ***** *** * ***** camera *** ** ****** **** * *********** *******.

*** ******** ******** ************ **** $**-$***, ********* ** *** ***** level ** *** *********** ***** ******, *** **** **** ** be ******* ***** * *****.

******* **** **** **** *** ********* ******* *** ******** ****** with *****, *** *** *** ** ***** ****** ** * different ******* *******, **** ** ********** ****.

***** **** **** **** ** ** ****** ***** *****, *** have ****** *** ******** **** ***** **** *******. *******, ** is ****** **** ********* ************ ***** **** ******* ** ***** smart *****, ** **** **** *** *** ** ********, ** may **** ******* * *** *** ** **** ***** **** readers *****.

Compared ** ***** ******** *******

*****'* ******* *************** *** *** **** ***-* ***** * **********, and ***********-***** ****** **** *** *********** ** ********/******** *****. **** *** **** ******** ** *** ***** ** **** ************ claims *** **** **********, ***** ***** ** ******** ** ********* that **** ** **** ***** ************, ** ** ***** ********* the **** ** ****** ** *********** ******** *** *******/********. *********** the ******* ** ***** **** * ****/**** ***** ***** ** valuable ** ********-****** *********, **** ** **** *** *** **** to **** *** ******** ********** ************.

*******, * ***** ****** ***** ****** ** ************ **** ********* than *********** *******, **** ** ***** * *** *** ******* that ******* ***** ************** *** ***** *********, ** ** ******** specific ****** ********, ************ **** **** ** ** ****** ********* and **** ******* ***** * *****, **** ********** *****/************ ****.

Outlook *** *****

***** **** ** ****** ******** ** ********** ************, ** **** help *** * ********* *** **** *** ** **** **** a ************* *********** ** **** ******* **** **********. ****/** ***** VMSes ******* *****, ** *** ****** **** ** ***** ******** methods ** *******-**** ** ******** *******, ****** ****** **** ******* requirements (*.*., ** *********** *** ***** *****). *****, **** ** unlikely ** ****** ** ****, ****** ***** * ********** ***** concept **** **** ** *** ********** ******.

Comments (19)

This is a fantastic and innovate solution that Bosch have come up with. I am jealous.

Well, I can buy 2 of your cameras for the cost of adding just the certificate to Bosch, so you may still have some advantages ;)

CHAVE's primary differentiators are the FIPS 140-2 Level 3 compliance, and certificate-based logins with the elimination of username/password login. it is the only approach we are aware of that specifically claims the FIPS compliance, which would be valuable to customers that need to meet these requirements, as it would eliminate the need to submit an alternative approach for testing/approval. Eliminating the ability to login with a user/pass combo could be valuable to security-minded customers, even if they did not need to meet any specific regulatory requirements

Panasonic Has something similar to this they claim FIPS Level-1 or something on the new extreme cameras coming out along with the new WJ-NX400.

Details are still fuzzy on the new Security licenses that the have listed for the Units but I still havent really sat down and looked at the FIPS Documentation on my desk yet anyway so I'll make that decision when i get there.

FIPS 140-2 has 4 levels of protection, 1 being the most basic, 4 being the most secure.

Panasonic lists FIPS 140-2 Level 1 in their Extreme series release. We covered some more details of the newer Extreme cameras, and also did a test.

The Panasonic cameras also only offer 720p and 1080p fixed options, the Bosch cameras have options for a 1080p PTZ, 5MP box camera, and 12MP panoramic.

From an end user standpoint, I'd like to see the camera manufacturers provide notification (email or alarm into VMS etc) when the number of failed log-in attempts exceeds a configurable number. This would provide the system administrator visibility of how often a human or bot etc. is attempting to access to the cameras.

I agree with that sentiment. I appreciate that Dahua, Hanwha, and Hikvision have added auto account lock, but I believe only Hikvision allows emails to be sent or events sent to the client (and I believe that's only compatible with iVMS, but I haven't checked). Locking the account is good, but without notification, far less useful than it could be.

That setup in Hikvision cameras is here:

The bigger issue is how few manufacturers support failed login detection at all. My email tells me the second someone tries to login with a wrong password, but cameras and VMSes, products in the security industry, do not?

I'd like to see the camera manufacturers provide notification (email or alarm into VMS etc) when the number of failed log-in attempts exceeds a configurable number.

Related: Axis: 90% Of Hacks Are NOT The Manufacturer's Fault discusses how Axis does not support this.

With Hikvision cameras, simply keep the default setting of auto lock on illegal login enabled and let your VMS alert you of the camera being offline. Should be easy with any decent VMS.

Locking an account on a Hikvision camera doesn't drop the stream necessarily, just the web interface. I just tested this with Exacq and I've seen the same in other VMSes. It could vary depending on the VMS, though.

Second, even if it did reliably does kick the camera offline, that notification will only tell you it's offline. Then you're left investigating why it's offline separately. Actually sending a discrete event would be preferable.

I am hoping that camera manufacturers are reading this... As an end user and camera specifier of a relatively large video surveillance system - I will be making purchasing decisions based upon the camera's cyber-security features.. Top among these will be cameras that can notify me either by email or SDK hook into a VMS when failed login attempts occur as a prime differentiator as most camera manufacturers can do a decent job with WDR, picture quality etc. I don't think I am alone on this....

Curious, would you trade cyber-security features for other advancements? On-board analytics, higher resolutions, better compression, enhanced WDR?

Brian, For us, the features that you listed are nice to haves for the majority of our locations needing surveillance. That being said, I am a big fan of the Smart Codecs for reducing file storage and better performing WDR.

In my opinion, from a corporate network standpoint - having features that provide notification of threat to the security of your video surveillance system is a higher priority (Marai Botnet which you covered extensively etc) .

Putting this all together - I am looking for a 4K dome with built in IR , an excellent wide dynamic range, good low light performance, utilizes a smart codec and includes log-in failure notification - Am I asking for too much :) ??

I don't think you are asking for too much in the sense of wanting a product featureset that is impractical. I think the challenge for manufacturers is that it is often a zero-sum game with engineering resources. Implementing more cyber-security features means something else gets cut or delayed. Maybe that delay is just 1 quarter, maybe it is 1 year, hard to say.

I think more customers need to make it clear the cyber security enhancements might be more important than "camera stuff" like analytics or smart(er) CODECs (assuming of course that the other camera features are on par with industry standards, a company with an old H.264 CODEC might be better off working on that first).

I agree with what you are saying - all things being equal we will lean towards companies that have robust security features. At this point I feel that notification would add more value than all of the overhead involved in using certificate based authentication etc.

"The system is required to have access to the internet, so that the devices can routinely contact the certificate authority to ensure the certs are still valid. According to Bosch, the internet access requirement is not an issue, even for security-minded government organizations, as the systems typically already have internet access for remote access/administration purposes."

This is where I stopped reading. My opinion is no security systems should be EVER connected to the Internet. Especially not for remote administration purposes.

Another issue I have with this system that you need one card and a login/password combo and you can login to the system. These can be stolen or cloned, so your system is vulnerable again.

If the user is already on the Internet, why can't the user use their smartphone NFC with the builting fingerprint reader, online certification system can be developed for iOS or Android, I know one system like that already.

So do you mean NFC to camera? if you installed a camera up a 30foot pole how you doing to touch it with your Android phone!

Also currently NFC on iOS currently at 10.3beta3 as yet does not support NFC flags, rumour maybe iOS10 will.

So how to make a secure IPC for a respectable cost with minimal effort?

1. Camera has a Bluetooth module, and attached to this is a QR code label. removable.

2. Install camera where is needed, requires power PoE or direct.

3. Device on first power on will go into certification / password generation mode.

4. Installer run the appropriate phone App, which will then after a code scan allow a pairing with the device, for only enough time so than certification generate is done from phone (because it will have a better chance at a random generation) making the use wiggle his finger over the screen to be used a part of the certificate generation. (see PuTTy software which is what the do via the mouse)

5. When complete the device then can enable Ethernet communication, close off Bluetooth.

6. Smart App now has a master public / private codes stored, when then can be passed to the software, this could be cloud based.

7. Camera generates it's own password, to stop reverse engineering of the App to discover a weakness.

8.Time/date can be set from phone to device as normally at least most users will have this correct.

7. Note: An installation engineer may not be person doing software side, so that the data now collected. Password and certificate are then delivered to the software side, or sent as data to customer.

8. Many assumptions that software platform is on internet, can allow phone - device (NVR or PC platform) to open a P2P pre-setup so all information about new device is added.

9 Software platform can be accessed by phone App so we don't need know password.

10. installation company could keep backup of device data, not even knowing the data contents.

11. Device will only now respond to communication from the generated certificate.

Linux as used in most IPC devices has all software certificate generation, and password generation available now. a simple 'openssl rand -base64 24' gives you a lovely password nobody would be able to guess.

No, I meant logging in to the VMS client:

Login to the VMS requires inserting their smart card in a reader attached to the client PC and entering a PIN.

Another issue I have with this system that you need one card and a login/password combo and you can login to the system. These can be stolen or cloned, so your system is vulnerable again.

Do not worry!

Bosch has already some good fingerprint readers, so if you have the requirement, then Bosch can supply that product as well

=> https://us.boschsecurity.com/en/products/accesscontrolsystems/readersandcards/biometricreaders/biometricreaders_34654

There is no exaggeration in suggestion that CHAVE by Genetec and Bosch is a giant step forward towards improving system hardening. It is also exciting to learn that authentication as been extended to biometric which appears to be more reliable.

I want to believe that the onus lies on the installers and integrators to utilise the systems tools and capabilities to full capacity.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Large US University End-User Video Surveillance Interview on Mar 18, 2019
Schools have become targets in modern days of active shooters and terrorist fears. The need for video and access security is high. Universities...
Hikvision Favorability Results 2019 on Mar 18, 2019
Hikvision favorability results declined significantly in IPVM's 2019 study of 200+ integrators. While in 2017 Hikvision's favorability was...
ONVIF Favorability Results 2019 on Mar 15, 2019
In the past decade, ONVIF has grown from a reaction to the outside Cisco-lead PSIA challenge, to being the de facto video surveillance standard...
Installation Course - Last Chance on Mar 14, 2019
This is the last chance to register for the March Installation course. This is a unique installation course in a market where little practical...
City Physical Security Manager Interview on Mar 14, 2019
This physical security pro is the Physical Security Manager for the City of Calgary. He is a criminologist by training with an ASIS CPP credential....
Pelco GFC 4K Dome Camera Tested (IMP831-1ERS) on Mar 12, 2019
Pelco has finally released their first 4K IP camera, after years of competitors' releases. Is this move too late? Or is their new GFC Professional...
Network Optix Favorability Results 2019 on Mar 11, 2019
Network Optix is arguably the last new VMS. Founded in 2010, more than a decade after most client/server VMS offerings, the company has become a...
BCDVideo Expansion And Switch From HP To Dell Examined on Mar 11, 2019
BCDVideo says they have more than tripled revenue in the past 5 years and are continuing to grow, powered most recently by switching their lead...
Arcules Favorability Report on Mar 08, 2019
ArculesĀ has amazing advantages. Tens of millions of funding from Canon. Unlimited access to Milestone's source code (see our test results). But...
Church Technology Director Security Interview on Mar 07, 2019
With 40+ years of experience in IT from a wide array of verticals, including US and foreign military, and large corporate and industrial settings,...

Most Recent Industry Reports

ONVIF Favorability Results 2019 on Mar 15, 2019
In the past decade, ONVIF has grown from a reaction to the outside Cisco-lead PSIA challenge, to being the de facto video surveillance standard...
Hanwha Aerospace / Techwin Korean Tax Evasion Raid on Mar 15, 2019
A Hanwha group subsidiary was raided as part of a tax evasion probe. While a Korean news media report listed the raided entity as 'Hanwha...
Installation Course - Last Chance on Mar 14, 2019
Today is the last chance to register for the March Installation course. This is a unique installation course in a market where little practical...
City Physical Security Manager Interview on Mar 14, 2019
This physical security pro is the Physical Security Manager for the City of Calgary. He is a criminologist by training with an ASIS CPP credential....
US Drafting Separate Rule for NDAA Dahua/Hikvision 'Blacklist' on Mar 14, 2019
The most debated provision of the NDAA ban of Dahua, Hikvision, Huawei, et al. is the so-called 'blacklist' provision which would ban any company...
OpenALPR Acquired By Mysterious Novume on Mar 13, 2019
Startup OpenALPR has been acquired by Novume, a company virtually unknown in the industry. While there are many LPR providers (see our directory),...
Milestone Machine Learning Camera Auto-Setting Examined on Mar 13, 2019
Milestone wants to improve image quality using Machine Learning to solve the problem of "a camera doesn't know what it is being used for",...
Integrator Profitability Bonuses - Statistics on Mar 13, 2019
While winning projects typically gets the most attention, how profitable those jobs turn out to be is key to the long-term success of integrators....
ADT Stock Drops After Announcing Loss And Amazon Delay on Mar 12, 2019
ADT's stock price dropped significantly after reporting heavy losses and delays in its Amazon partnership, as seen in the screenshot below: In...
Pelco GFC 4K Dome Camera Tested (IMP831-1ERS) on Mar 12, 2019
Pelco has finally released their first 4K IP camera, after years of competitors' releases. Is this move too late? Or is their new GFC Professional...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact