OctetView
0x00000…00100 (0, 0, 0) Sector 02844130323834 ┆ A0284A ┆
0x00100…00200 (0, 0, 1) Sector 00000000000000 ┆ ┆
0x00200…00300 (0, 0, 2) Sector ff00c0feffffff ┆ @~ x ┆
0x00300…00306 (0, 0, 3) WangDocument {d00=0x34, d01=0x89, d02=0x41, ptr=(22,0, 0), d05=0x00}
0x00306…0030c WangDocument {d00=0x36, d01=0x68, d02=0x41, ptr=(49,0, 8), d05=0x00}
0x0030c…00312 WangDocument {d00=0x37, d01=0x83, d02=0x41, ptr=( 2,0, 8), d05=0x00}
0x00312…00318 WangDocument {d00=0x37, d01=0x92, d02=0x41, ptr=(57,0, 0), d05=0x00}
0x00318…0031e WangDocument {d00=0x41, d01=0x30, d02=0x41, ptr=(62,0, 8), d05=0x00}
0x0031e…00320 00 00 ┆ ┆
0x00320…00340 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ┆ ┆
[…0x5…]
0x003e0…00400 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e ┆ ┆
0x00400…00500 (0, 0, 4) Sector 00000000000000 ┆ ┆
0x00500…00600 (0, 0, 5) Sector 86312020202020 ┆ 1 8 8 7 Q? > 7 | W d N ~< v <)&4'>( 1c5 & & ┆
0x00600…00700 (0, 0, 6) Sector 421c402600415b ┆B @& A[' X% % PO P ; A0A ? C g x g V WD O 8 :W W ) 4130A g r < {C < { ; 0 X w! p pv * 9 8 : t xZy# ^0 ^4 ┆
0x00700…00800 (0, 0, 7) Sector 00000000000000 ┆ ┆
[…0x8…]
0x01000…01100 (1, 0, 0) WangDocumentBody
[…0x1…]
0x01200…01300 (1, 0, 2) Sector 00000000000000 ┆ ┆
[…0x5…]
0x01800…01900 (1, 0, 8) WangDocumentBody
[…0x6…]
0x01f00…02000 (1, 0, 15) Sector 00000000000000 ┆ ┆
0x02000…02100 (2, 0, 0) WangDocumentBody
[…0x7…]
0x02800…02900 (2, 0, 8) WangDocumentHead {hdr=WangSectHead {next=( 2,0, 9), len=0xff, h3=41378341}, f00=»3783A «, f01=»SFS/TN/005ilter Study «, f02=»pan «, f03=»PEH «, f04=»Interf. Flexibility «, f05=01-06-83 09:44, f06=» 1 «, f07=»34 «, f08=» 4089 «, f09=01-06-83 13:13, f10=» «, f11=»02 «, f12=» 86 «, f13=01-06-83 13:31, f14=07-06-83 14:04, f15=»0284A «, f16=» 5 «, f17=» 2 «, f18=»08 «, f19=» 72 «, f20=» 4216 «, f21=» «, f22=» «, f99=020010000120056610110180aaca15050000000000000137031700df}
0x02900…02a00 (2, 0, 9) WangDocumentBody
[…0x136…]
0x16000…16100 (22, 0, 0) WangDocumentHead {hdr=WangSectHead {next=(22,0, 1), len=0xff, h3=41348941}, f00=»3489A «, f01=»SFS/TN/004 «, f02=»pan/mp «, f03=»PEH/KFL «, f04=»Security Filter Stud «, f05=06-04-83 09:40, f06=» 12 «, f07=»37 «, f08=» 44554 «, f09=07-06-83 12:36, f10=» «, f11=»00 «, f12=» 2 «, f13=01-06-83 13:37, f14=17-10-83 11:09, f15=»0284A «, f16=» 58 «, f17=» 22 «, f18=»25 «, f19=» 1216 «, f20=» 62442 «, f21=» «, f22=» «, f99=200010000110362710110250aaca15050000000000000142033a01df}
0x16100…16200 (22, 0, 1) WangDocumentBody
[…0xb…]
0x16d00…16e00 (22, 0, 13) Sector 160eff00348941 ┆ 4 A...... 52 7.4 SELECTED SWITCH TYPES ...................... 53 7.4.1 Reed Relay ............................. 53 7.4.2 Semiconductor Logic Switch ............. 54 7.4.3 Electro-optical Switch ................. 55 7.5 DESIGN EX┆
0x16e00…16f00 (22, 0, 14) Sector 160fd400348941 ┆ T 4 AAMPLES ........................... 55 7.5.1 Reed Relay ............................. 55 7.5.2 Semiconductor Logic Switch ............. 56 7.5.3 Electro-optical Switch ................ 56 2.1.1 The need .........................┆
0x16f00…17000 (22, 0, 15) Sector 1600ff00348941 ┆ 4 A 1 1 GENERAL 1.1 INTRODUCTION This technical note represents the output of work package no. 320, Configuration Study, within the framework of the Security Filter Study, performe┆
0x17000…17100 (23, 0, 0) WangDocumentBody
[…0x1a7…]
0x31800…31900 (49, 0, 8) WangDocumentHead {hdr=WangSectHead {next=(49,0, 9), len=0xff, h3=41366841}, f00=»3668A «, f01=»SFS/FS/001 «, f02=»pan «, f03=»KFL «, f04=»FILTER SPECIFICATION «, f05=04-05-83 09:40, f06=» 9 «, f07=»33 «, f08=» 36546 «, f09=07-06-83 12:35, f10=» «, f11=»00 «, f12=» 37 «, f13=03-05-83 08:35, f14=17-10-83 11:09, f15=»0284A «, f16=» 75 «, f17=» 20 «, f18=»12 «, f19=» 1712 «, f20=» 67584 «, f21=» «, f22=» «, f99=200010000110362710110250aaca1505000000000000013703b501df}
0x31900…31a00 (49, 0, 9) WangDocumentBody
[…0x6…]
0x32000…32100 (50, 0, 0) Sector 3201ff00366841 ┆2 6hAstics are implemented by means of a definition of all legal messages and their contents. The security filter software (computer programs) shall be so constructed that any foreseeable change in message structure and contents can be handled without mo┆
0x32100…32200 (50, 0, 1) Sector 3202ff00366841 ┆2 6hAdification of the software. As a consequence of the definition of all legal traffic, any message traffic deviating from the definition shall be considered illegal and handled in accordance with that condition. Illegal messages shall be logged by┆
0x32200…32300 (50, 0, 2) Sector 3203ff00366841 ┆2 6hA the security filter and may not be transmitted from the filter. In case of frequent traffic of illegal messages (frequency exceeding a prespecified maximum) an audible alert shall be sounded in order to inform the security officer of this fact. ┆
0x32300…32400 (50, 0, 3) Sector 3204ff00366841 ┆2 6hA 1 To expand the useful scope of the security filter to encompass lines where the traffic will contain messages too complex for automatic validation operator communication facilities ┆
0x32400…32500 (50, 0, 4) Sector 3205ff00366841 ┆2 6hAcan be added. This will allow for human validation of for instance free text messages. However, message types or message contents demanding human validation shall be defined to the filter. The display of a message for an operator must never be trigg┆
0x32500…32600 (50, 0, 5) Sector 3206ff00366841 ┆2 6hAered by the fact that the message is considered illegal by the automatic validation. 2.2.2 Auxiliary Functions The security filter shall be operative without any human intervention, and it shall be possible to modify neither software nor messag┆
0x32600…32700 (50, 0, 6) Sector 3207ff00366841 ┆2 6hAes on site while the filter operates. Hence, any authorized modification must be performed off-line and installed afterwards on the filter site following a prespecified procedure. The following auxiliary functions to be performed off-line have b┆
0x32700…32800 (50, 0, 7) Sector 3108ff00366841 ┆1 6hAeen identified: 2.2.2.1 Software Production and Maintenance The computer programs necessary to perform the security filter functions must be analyzed, planned, documented, coded, compiled, tested and verified. Since the security filter by its┆
0x32800…32900 (50, 0, 8) Sector 3209ff00366841 ┆2 6hAays but with different filter characteristics. The messages which shall be withheld are not only those which are classified higher than the receiving ADP- system but also messages containing information outside the receiving system's scope of "ne┆
0x32900…32a00 (50, 0, 9) Sector 320aff00366841 ┆2 6hAed to know". To achieve this goal it is necessary to provide full and positive description of this "need to know", so that the security filter will only allow messages to pass if they are positively identified as containing only such information. ┆
0x32a00…32b00 (50, 0, 10) Sector 320b0800366841 ┆2 6hA 1.3 TERMS AND ABBREVIATIONS 1 Firmware Software stored in a type of memory which is readable but not alterable b┆
0x32b00…32c00 (50, 0, 11) Sector 320cea00366841 ┆2 j 6hA 1 Alert ADP Security ADP System Filter System Log clear distinction is ┆
0x32c00…32d00 (50, 0, 12) Sector 320dff00366841 ┆2 6hA 1 Fundamentally, the security filter is aimed at automated operation without any human intervention. This requires, however, that the traffic consists solely of well structured messa┆
0x32d00…32e00 (50, 0, 13) Sector 320eff00366841 ┆2 6hAges with a predictable set of contents. If the traffic on a line is expected to also contain unstructured messages or free text, which cannot be automatically analyzed, human support may be introduced as an option. Even though the concept of a sec┆
0x32e00…32f00 (50, 0, 14) Sector 320fff00366841 ┆2 6hAurity filter originally is aiming at a separate filter for each point-to-point line it may be considered to develop a multiline security filter, or to share hardware, software, or peripherals among a number of security filters, to achieve cost effec┆
0x32f00…33000 (50, 0, 15) Sector 3200ff00366841 ┆2 6hAtive operation. The design of such a multiline system would need to provide for the additional security required to keep messages separate and to ensure their proper delivery. 2.2 SYSTEM FUNCTIONS 2.2.1 Filter Functions The filter characteri┆
0x33000…33100 (51, 0, 0) WangDocumentBody
0x33100…33200 (51, 0, 1) Sector 33024600366841 ┆3 F 6hAte than normal transmission speed. TDG Test Data Generator ..... 19 4.2.2 Analysis of an MSGID ................... 28 4.2.3 Main Text Analysis ..................... 29 4.3 PRINCIPLES OF MESSAGE SPECIFICATION ........ 40 4.3.┆
0x33200…33300 (51, 0, 2) Sector 3303ff00366841 ┆3 6hA 1 Validation The act of checking a message for validity. Message, Legal A message which is allowed to pass the security filter. Message, Illegal A message which is not allowed t┆
0x33300…33400 (51, 0, 3) Sector 3304ff00366841 ┆3 6hAo pass the security filter. Message, Validated A message which has been subject to validation. Message, Accepted A message which by the validation has been found to be legal. Message, Rejected A message which by the validation has been fo┆
0x33400…33500 (51, 0, 4) Sector 3305ff00366841 ┆3 6hAund to be illegal. Message, Logged A rejected message which has been written onto the logging medium. Message, Suspended A message which by its type or contents or otherwise demands operator assisted validation and hence has been stored for┆
0x33500…33600 (51, 0, 5) Sector 33065a00366841 ┆3 Z 6hA this purpose. 1 DWARE AND SOFTWARE ............................... 72 5.5 MEASURES TO PREVENT INTENTIONAL DISRUPTION ................................. 73 5.5.1 Temp┆
0x33600…33700 (51, 0, 6) Sector 3307ff00366841 ┆3 6hA 1 2 SUMMARY OF REQUIREMENTS 2.1 SYSTEM DESCRIPTION The Security Filter is an electronic device (computer) placed on a point-to-point communication line connecting two ADP-syst┆
0x33700…33800 (51, 0, 7) Sector 3208ff00366841 ┆2 6hAems of unequal security classification, with the purpose of filtering the message traffic, i.e. to withhold messages which for security reasons are not allowed to pass the subject communication line. The security filter operates on traffic both w┆
0x33800…33900 (51, 0, 8) WangDocumentBody
[…0x57…]
0x39000…39100 (57, 0, 0) WangDocumentHead {hdr=WangSectHead {next=(57,0, 1), len=0xff, h3=41379241}, f00=»3792A «, f01=»SFS/TN/007 «, f02=»vhn «, f03=»KFL «, f04=» «, f05=06-06-83 10:06, f06=» 2 «, f07=»35 «, f08=» 18467 «, f09=07-06-83 10:03, f10=» «, f11=»01 «, f12=» 8 «, f13=07-06-83 10:04, f14=07-06-83 14:25, f15=»0284A «, f16=» 16 «, f17=» 2 «, f18=»47 «, f19=» 404 «, f20=» 18637 «, f21=» «, f22=» «, f99=020010000110462710110260aaca15050000000000000137036000df}
0x39100…39200 (57, 0, 1) WangDocumentBody
[…0x56…]
0x3e800…3e900 (62, 0, 8) WangDocumentHead {hdr=WangSectHead {next=(62,0, 9), len=0xff, h3=41413041}, f00=»4130A «, f01=»SECURITY FILTER STUDY «, f02=»am] «, f03=»PEH/RH «, f04=»EXECUTIVE SUMMARY «, f05=10-10-83 14:17, f06=» 1 «, f07=»39 «, f08=» 7588 «, f09=26-10-83 10:57, f10=» «, f11=»11 «, f12=» 46 «, f13=19-10-83 13:29, f14=03-11-83 13:05, f15=»0284A «, f16=» 20 «, f17=» 4 «, f18=»19 «, f19=» 332 «, f20=» 12929 «, f21=» «, f22=» «, f99=020020000210462710110060aaca15050000000000000138035900df}
0x3e900…3ea00 (62, 0, 9) WangDocumentBody
[…0x6…]
0x3f000…3f100 (63, 0, 0) Sector 00000000000000 ┆ ┆
[…0xdf…]