Advanced Security

Created on March 11, 2026

The Advanced Security component (CcspAdvSecurity) provides TR-181 parameter management interface for network security features on RDK-B devices. The component serves as the middleware interface for advanced security services, coordinating with the advanced security agent that implements device fingerprinting, safe browsing protection, network flow monitoring, and parental controls to deliver real-time threat detection and network protection capabilities.

The component operates as a critical security layer in the RDK-B middleware stack, providing TR-181 parameter management for various security features while the advanced security agent handles actual threat detection and mitigation. The component enables management and configuration of device identification, malicious website blocking, network traffic analysis, and advanced parental control functionalities through a unified TR-181 interface.

At the module level, the Advanced Security component implements a plugin-based architecture with separate DML modules providing TR-181 parameter support for Device Fingerprinting (network device identification and classification), Safe Browsing (malicious URL detection and blocking), Softflowd (network flow monitoring), and Advanced Parental Control (content filtering and access control). The actual implementation of these security features is performed by the advanced security agent. The component also provides WebConfig integration for remote configuration management and RFC (Remote Feature Control) support for enabling/disabling security features dynamically.

graph LR
    subgraph "External Systems"
        RemoteMgmt["Remote Management"]
        LocalUI["Local Web UI"]
    end

    subgraph "RDK-B Platform"
        subgraph "Remote Management Agents"
            ProtocolAgents["TR-069/WebPA/TR-369<br/>Protocol Agents"]
        end
        
        AdvSec["CcspAdvSecurity<br/>(Advanced Security)"]
        
        subgraph "RDK-B Core Components"
            PSM["PSM"]
            CR["Component Registry"]
            WebConfig["WebConfig"]
            DeviceMgr["Device Manager"]
        end
        
        SecurityAgent["Advanced Security Agent<br/>(Security Enforcement)"]
        
        subgraph "System Layer"
            Netfilter["Netfilter/iptables"]
            Linux["Linux Kernel"]
        end
    end

    RemoteMgmt -->|TR-069/WebPA| ProtocolAgents
    LocalUI -->|HTTP/HTTPS| ProtocolAgents
    ProtocolAgents -->|IPC| AdvSec
    
    AdvSec -->|IPC| PSM
    AdvSec -->|IPC| CR
    AdvSec -->|IPC| WebConfig
    AdvSec -->|IPC| DeviceMgr
    AdvSec <-->|IPC/Sockets| SecurityAgent
    
    SecurityAgent <-->|Policy| Netfilter
    SecurityAgent <-->|System Calls| Linux

    classDef external fill:#fff3e0,stroke:#ef6c00,stroke-width:2px;
    classDef advSec fill:#e3f2fd,stroke:#1976d2,stroke-width:3px;
    classDef rdkbComponent fill:#e8f5e8,stroke:#2e7d32,stroke-width:2px;
    classDef system fill:#fce4ec,stroke:#c2185b,stroke-width:2px;

    class RemoteMgmt,LocalUI external;
    class AdvSec advSec;
    class ProtocolAgents,PSM,CR,WebConfig,DeviceMgr rdkbComponent;
    class SecurityAgent,Netfilter,Linux system;

Key Features & Responsibilities:

  • Device Fingerprinting Interface: Provides TR-181 parameter interface to control network device identification and classification capabilities implemented by the advanced security agent
  • Safe Browsing Protection Interface: Provides TR-181 parameter interface to control malicious website detection and blocking functionality implemented by the advanced security agent
  • Network Flow Monitoring (Softflowd) Interface: Provides TR-181 parameter interface to enable/disable network traffic analysis and flow monitoring capabilities implemented by the advanced security agent
  • Advanced Parental Controls Interface: Provides TR-181 parameter interface to control content filtering and access control features implemented by the advanced security agent
  • RFC Feature Management: Provides Remote Feature Control capabilities for dynamically enabling/disabling security features through centralized configuration management without requiring device restarts
  • WebConfig Integration: Supports remote configuration management through WebConfig framework, enabling cloud-based security policy updates and configuration synchronization
  • TR-181 Data Model Interface: Implements comprehensive TR-181 parameter support for security feature management, providing standardized access to security configuration and status information
  • Security Agent Coordination: Coordinates with the advanced security agent for configuration changes, status monitoring, and feature control through IPC mechanisms

Design

The Advanced Security component follows a layered modular design that separates policy management from enforcement mechanisms. The core design principle centers around providing a standardized TR-181 interface for security feature configuration while the advanced security agent handles actual security processing and enforcement. This separation allows for flexible deployment while maintaining consistent management interfaces across various RDK-B device types.

The component implements a plugin-based architecture where each security feature (Device Fingerprinting, Safe Browsing, Softflowd, Parental Controls) is handled by dedicated DML modules with well-defined TR-181 parameter interfaces. The design ensures loose coupling between components while providing centralized configuration management and event coordination. The architecture supports both synchronous parameter operations (get/set) and asynchronous event-driven processing for real-time security responses.

North-bound interactions are handled through R-Bus/DBus messaging for integration with other RDK-B components, WebConfig framework for cloud-based configuration management, and direct TR-181 parameter access for management systems. South-bound interactions utilize IPC mechanisms (sockets, shared memory) for communication with the advanced security agent, system calls for kernel module management, and file-based configuration for persistent settings.

IPC mechanisms are designed based on platform capabilities, with R-Busbeing the preferred method for component-to-component communication on newer platforms, while maintaining DBUS compatibility for legacy systems. The design includes fail-safe mechanisms ensuring that security features degrade gracefully when the advanced security agent is unavailable, and configuration changes are validated before commitment to prevent system instability.

Data persistence is achieved through a combination of syscfg for persistent configuration storage, temporary files for runtime state management, and WebConfig framework for cloud-synchronized settings. The component manages configuration versioning and provides rollback capabilities for failed configuration updates.

graph LR
    subgraph "External Systems"
        SecurityAgent["Advanced Security Agent<br/>(Security Enforcement)"]
    end

    subgraph "CcspAdvSecurity"
        subgraph "Core Engine"
            SSPMain[SSP Main Engine]
            DMLHandler[DML Handler]
            WebConfigInteg[WebConfig Handler]
        end
        
        subgraph "Security Features"
            Fingerprint[Device Fingerprinting]
            SafeBrowsing[Safe Browsing]
            Softflowd[Softflowd]
            ParentalCtrl[Parental Controls]
        end
    end

    subgraph "RDK-B Components"
        PSM[(PSM Storage)]
        CR[Component Registry]
        WebConfig[WebConfig Framework]
    end

    SecurityAgent <-->|IPC Sockets| Fingerprint
    SecurityAgent <-->|IPC Sockets| SafeBrowsing
    SecurityAgent <-->|IPC Sockets| Softflowd
    SecurityAgent <-->|IPC Sockets| ParentalCtrl
    
    SSPMain --> DMLHandler
    DMLHandler --> Fingerprint
    DMLHandler --> SafeBrowsing
    DMLHandler --> Softflowd
    DMLHandler --> ParentalCtrl
    WebConfigInteg --> DMLHandler
    
    SSPMain -->|IPC| CR
    DMLHandler -->|Config Storage| PSM
    WebConfigInteg -->|Cloud Config| WebConfig

    classDef external fill:#fff3e0,stroke:#ef6c00,stroke-width:2px;
    classDef core fill:#e3f2fd,stroke:#1976d2,stroke-width:2px;
    classDef features fill:#c8e6c9,stroke:#388e3c,stroke-width:2px;
    classDef rdkbComp fill:#e8f5e8,stroke:#2e7d32,stroke-width:2px;

    class SecurityAgent external;
    class SSPMain,DMLHandler,WebConfigInteg core;
    class Fingerprint,SafeBrowsing,Softflowd,ParentalCtrl features;
    class PSM,CR,WebConfig rdkbComp;

 Prerequisites and Dependencies

Build-Time Flags and Configuration:

Configure OptionDISTRO FeatureBuild FlagPurposeDefault
--enable-unitTestDockerSupportN/AUNIT_TEST_DOCKER_SUPPORTEnable Docker support for unit testingDisabled
--with-ccsp-arch={arm,atom,pc,mips}N/ACCSP_ARCHSpecify the CCSP board CPU platformNone (must be specified)
--enable-wifidclN/AWIFI_DATA_COLLECTIONEnable WiFi data collection for advanced security agentDisabled
--enable-downloadmoduleN/ADOWNLOADMODULEEnable downloadable module supportDisabled

RDK-B Platform and Integration Requirements

  • RDK-B Components: PSM (Persistent Storage Manager), Component Registry (CR), WebConfig Framework, Device Manager, System Info component
  • HAL Dependencies: Platform HAL for network interface management, minimum version supporting netfilter integration
  • Systemd Services: CcspCrSsp.service, CcspPsmSsp.service must be active before advanced security starts; network.target dependency for network availability
  • Hardware Requirements: Minimum 256MB RAM for agent operation, netfilter kernel support, network interface access capabilities
  • Message Bus: R-Busregistration for “eRT.com.cisco.spvtg.ccsp.advsecurity” namespace (newer platforms) or DBUS com.cisco.spvtg.ccsp.advsecurity (legacy platforms)
  • TR-181 Data Model: Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.* and Device.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity.* parameter support
  • Configuration Files: /usr/ccsp/advsec/TR181-AdvSecurity.xml data model definition, /tmp/advsec/ runtime configuration directories
  • Startup Order: Must initialize after PSM, CR, and WebConfig components; coordinates with advanced security agent after component initialization

Threading Model:

The Advanced Security component implements a lightweight multi-threaded architecture with event-driven processing for security feature management and agent coordination. Unlike components with extensive threading models, Advanced Security focuses on minimal threading while maintaining responsive parameter operations and agent communication.

Thread & FunctionPurposeCycle/TimeoutSynchronization
Main Threadmain() / ssp_main()Component initialization, TR-181 parameter processing, daemon lifecycle managementEvent-driven message loop, signal handling, component registration, configuration loadingpthread signals for termination, SSP lifecycle callbacks
Logger Threadadvsec_logger_th()Device fingerprinting logging and periodic system monitoringConfigurable logging period (default 1440 minutes), health monitoring cycleslogMutex mutex, logCond condition variable for timeout control
Sysevent Handler Threadadvsec_sysevent_handler_th()System event processing and bridge mode detectionContinuous event listening, 2-second polling intervals, event-driven responsesEvent-based synchronization, sysevent file descriptor monitoring
WebConfig ProcessingIntegrated in main threadCloud configuration updates and synchronizationWebConfig framework callbacks, asynchronous processingWebConfig framework internal synchronization

 Component State Flow

Initialization to Active State

The Advanced Security component follows a structured initialization sequence ensuring proper dependency resolution and secure agent coordination. The component validates system prerequisites, loads configuration from persistent storage, establishes IPC connections, and coordinates with the advanced security agent lifecycle management before transitioning to active operational state.

sequenceDiagram
    participant System
    participant AdvSec as Advanced Security
    participant PSM as PSM Storage
    participant Agent as Advanced Security Agent

    System->>AdvSec: Start Component
    AdvSec->>AdvSec: Initialize Logging & Resources
    AdvSec->>PSM: Load Configuration
    PSM-->>AdvSec: Configuration Data
    AdvSec->>AdvSec: Register TR-181 Parameters
    AdvSec->>System: Connect to R-Bus/DBUS
    System-->>AdvSec: IPC Established
    AdvSec->>Agent: Coordinate with Agent
    Agent-->>AdvSec: Agent Ready
    AdvSec->>System: Initialization Complete
    
    loop Runtime
        AdvSec->>AdvSec: Process TR-181 Requests
        AdvSec->>Agent: Send Commands
        Agent->>AdvSec: Status Updates
    end

Runtime State Changes and Context Switching

The component supports dynamic feature activation/deactivation based on RFC (Remote Feature Control) settings and user configuration changes. State transitions occur when security features are enabled/disabled, when the advanced security agent requires restart due to configuration changes, or when the system enters/exits bridge mode.

State Change Triggers:

  • RFC parameter changes requiring agent reconfiguration (triggers agent restart with new settings)
  • Bridge mode activation/deactivation (disables/enables security features as network topology changes)
  • Advanced security agent crashes or becomes unresponsive (triggers automatic restart procedures)
  • WebConfig updates from cloud services (triggers validation and application of new security policies)
  • Memory pressure conditions (triggers agent hibernation to preserve system resources)

Context Switching Scenarios:

  • Bridge Mode Context: Component disables all security features when device operates in bridge mode, preserving configuration for later restoration
  • Agent Recovery Context: When advanced security agent fails, component maintains TR-181 parameter access while attempting agent restart in background
  • Configuration Update Context: During WebConfig updates, component validates new configuration before committing changes and restarting affected services

 Call Flow

Initialization Call Flow:

sequenceDiagram
    participant Init as Initialization
    participant AdvSec as CcspAdvSecurity
    participant Deps as Dependencies

    Init->>AdvSec: Start Component
    AdvSec->>AdvSec: Load Configuration
    AdvSec->>Deps: Register TR-181 & Connect
    Deps-->>AdvSec: Ready
    AdvSec->>Deps: Coordinate with Agent
    Deps-->>AdvSec: Agent Active
    AdvSec->>Init: Component Active

Request Processing Call Flow:

The most critical flow involves TR-181 parameter operations that trigger security feature configuration changes and agent interactions.

sequenceDiagram
    participant Client as Management Client
    participant AdvSec as Advanced Security
    participant Agent as Advanced Security Agent

    Client->>AdvSec: Set Parameter (SafeBrowsing.Enable)
    AdvSec->>AdvSec: Validate Parameter
    AdvSec->>Agent: Apply Configuration
    Agent-->>AdvSec: Configuration Applied
    AdvSec-->>Client: Success
    
    Agent->>AdvSec: Feature Status Update
    AdvSec->>AdvSec: Update Internal State

TR‑181 Data Models

Supported TR-181 Parameters

The Advanced Security component implements vendor-specific TR-181 parameters under the Device.DeviceInfo.X_RDKCENTRAL-COM namespace, providing comprehensive management interfaces for advanced security features. The implementation follows BBF TR-181 specification guidelines for parameter structure, access controls, and data validation while extending functionality for RDK-B specific security requirements.


Object Hierarchy

Device.
└── DeviceInfo.
    ├── X_RDKCENTRAL-COM_DeviceFingerPrint.
    │   ├── Enable (boolean, R/W)
    │   ├── LoggingPeriod (unsignedInt, R/W)
    │   ├── EndpointURL (string, R/W)
    │   └── LogLevel (unsignedInt, R/W)
    ├── X_RDKCENTRAL-COM_AdvancedSecurity.
    │   ├── Data (string, W)
    │   ├── SafeBrowsing.
    │   │   ├── Enable (boolean, R/W)
    │   │   ├── ConfigVersion (unsignedInt, R/W)
    │   │   ├── RouterIP (string, R)
    │   │   ├── DNSServerIP (string, R)
    │   │   ├── Blockpage (string, R)
    │   │   ├── Warnpage (string, R)
    │   │   ├── Cacheurl (string, R)
    │   │   └── OtmDedupFqdn (string, R)
    │   ├── Softflowd.
    │   │   └── Enable (boolean, R/W)
    │   └── RabidFramework.
    │       ├── MacCacheSize (unsignedInt, R/W)
    │       └── DnsCacheSize (unsignedInt, R/W)
    └── X_RDKCENTRAL-COM_RFC.
        ├── Feature.
        │   ├── AdvancedParentalControl.
        │   │   └── Enable (boolean, R/W)
        │   ├── PrivacyProtection.
        │   │   └── Enable (boolean, R/W)
        │   ├── DeviceFingerPrintICMPv6.
        │   │   └── Enable (boolean, R/W)
        │   ├── WSDiscoveryAnalysis.
        │   │   └── Enable (boolean, R/W)
        │   ├── AdvancedSecurityOTM.
        │   │   └── Enable (boolean, R/W)
        │   ├── AdvancedSecurityUserSpace.
        │   │   └── Enable (boolean, R/W)
        │   ├── AdvancedSecurityCujoTracer.
        │   │   └── Enable (boolean, R/W)
        │   ├── AdvancedSecurityCujoTelemetry.
        │   │   └── Enable (boolean, R/W)
        │   ├── AdvancedSecurityWiFiDataCollection.
        │   │   └── Enable (boolean, R/W)
        │   ├── AdvancedSecurityLevl.
        │   │   └── Enable (boolean, R/W)
        │   ├── AdvancedSecurityAgent.
        │   │   └── Enable (boolean, R/W)
        │   └── AdvancedSecuritySafeBrowsing.
               └── Enable (boolean, R/W)

Parameter Definitions

Core Parameters:

Parameter PathData TypeAccessDefault ValueDescriptionBBF Compliance
Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.EnablebooleanR/WfalseEnables or disables device fingerprinting functionality. When enabled, the system analyzes network traffic patterns to identify and classify connected devices automatically. Valid values: true (enabled), false (disabled).TR-181 Issue 2
Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.LoggingPeriodunsignedIntR/W1440Specifies the logging period in minutes for device fingerprinting data collection. Range: 60-2880 minutes (1-48 hours). Controls frequency of fingerprinting data uploads to cloud services.TR-181 Issue 2
Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.EndpointURLstringR/W""Defines the endpoint URL for device fingerprinting data uploads. Must be a valid HTTPS URL. Used for sending collected device classification data to cloud analytics services.TR-181 Issue 2
Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.LogLevelunsignedIntR/W3Controls logging verbosity for device fingerprinting module. Valid values: 1 (Error), 2 (Warning), 3 (Info), 4 (Verbose). Higher values produce more detailed logging output.TR-181 Issue 2
Device.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity.SafeBrowsing.EnablebooleanR/WfalseEnables or disables safe browsing protection. When enabled, system blocks access to malicious websites and provides warning pages for suspicious content. Requires active security agent.TR-181 Issue 2
Device.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity.Softflowd.EnablebooleanR/WfalseEnables or disables network flow monitoring via softflowd daemon. When enabled, collects network flow statistics for security analysis and anomaly detection.TR-181 Issue 2
Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.AdvancedParentalControl.EnablebooleanR/WfalseRFC parameter controlling advanced parental control features. When enabled, allows content filtering and access restrictions based on device, time, and content category policies.Custom Extension

Internal Modules

The Advanced Security component consists of several specialized modules that handle different aspects of security functionality. Each module operates independently while sharing common infrastructure for configuration management and agent communication. The DML (Data Model Library) modules handle TR-181 parameter operations, while the SSP (Service Support Provider) module manages component lifecycle and IPC communications.

Module/ClassDescriptionKey Files
AdvSecurityDmlCore TR-181 parameter handling and security feature management. Implements all DML functions for device fingerprinting, safe browsing, and parental controls. Handles parameter validation, persistence, and agent coordination.cosa_adv_security_dml.ccosa_adv_security_dml.h
AdvSecuritySspService Support Provider for component lifecycle management. Handles process initialization, R-Bus/DBUS registration, message bus interface, and component shutdown procedures.ssp_main.cssp_messagebus_interface.cssp_global.h
WebConfigModuleWebConfig framework integration for cloud-based configuration management. Handles remote configuration updates, version management, and configuration validation for security features.cosa_adv_security_webconfig.ccosa_adv_security_webconfig.h
InternalHelpersUtility functions for security operations including parameter validation, URL checking, security agent communication, and system state management.cosa_adv_security_internal.ccosa_adv_security_internal.hadvsecurity_helpers.c
PluginMainPlugin initialization and function registration interface. Registers all DML callback functions with the COSA framework and manages plugin lifecycle.plugin_main.cplugin_main.h
AgentInterfaceInterface module for communication with the advanced security agent. Handles command sending, status monitoring, and agent lifecycle management.cujoagent_dcl_api.ccujoagent_dcl_api.h

Component Interactions

The Advanced Security component maintains extensive interactions with both RDK-B middleware components and system-level services. It serves as a bridge between high-level security policy management and low-level security enforcement, coordinating with the advanced security agent while providing standardized TR-181 interfaces for management systems.

Interaction Matrix

Target Component/LayerInteraction PurposeKey APIs/Endpoints
RDK-B Middleware Components
PSM (Persistent Storage Manager)Persistent parameter storage and retrieval, configuration backup/restorePSM_Set_Record_Value2()PSM_Get_Record_Value2()
Component Registry (CR)Component registration, namespace reservation, capability announcementCcspBaseIf_registerCapabilities()CcspBaseIf_unregisterComponent()
WebConfig FrameworkRemote configuration management, cloud policy updateswebconfig_subdoc_register()webconfig_apply_config()
Device ManagerDevice information queries, TR-069 parameter forwardingR-Busmethod calls: Device.DeviceInfo.*
System & HAL Layers
Advanced Security AgentSecurity enforcement, threat detection, policy applicationIPC sockets: /var/run/cujo/wifi.sock or /tmp/wifi.sock, agent control commands
syscfg ConfigurationPersistent configuration storage and system settingssyscfg_get()syscfg_set()syscfg_commit()
systemd ServicesService lifecycle management, dependency controlsystemctl start/stop/restart CcspAdvSecurity

Events Published by Advanced Security Component:

Event NameEvent Topic/PathTrigger ConditionSubscriber Components
Security Feature StatusDevice.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurityFeature enable/disable state changesWebUI, Device Manager, Telemetry
Agent Status UpdateeRT.com.cisco.spvtg.ccsp.advsecurity.agent.statusSecurity agent startup/shutdown, health status changesSystem Monitor, Telemetry Agent
Configuration ChangeeRT.com.cisco.spvtg.ccsp.advsecurity.configTR-181 parameter modifications, RFC feature togglesPSM, Configuration Management
Security EventeRT.com.cisco.spvtg.ccsp.advsecurity.securityThreat detection, policy violationsLogging, Telemetry, Notification Service

IPC Flow Patterns

Primary IPC Flow – TR-181 Parameter Operation:

sequenceDiagram
    participant Client as Management Client
    participant AdvSec as Advanced Security
    participant PSM as PSM Storage
    participant Agent as Advanced Security Agent

    Client->>AdvSec: SetParameterValues (R-Bus)
    AdvSec->>AdvSec: Validate & Access Control
    AdvSec->>PSM: Store Parameter
    PSM-->>AdvSec: Stored
    AdvSec->>Agent: Apply Config (IPC Socket)
    Agent-->>AdvSec: Applied
    AdvSec-->>Client: Success

Event Notification Flow:

sequenceDiagram
    participant Agent as Advanced Security Agent
    participant AdvSec as Advanced Security
    participant Subs as Subscribers

    Agent->>AdvSec: Security Event (IPC)
    AdvSec->>AdvSec: Process Event
    AdvSec->>Subs: R-BusEvent Notification
    Subs-->>AdvSec: Ack

Implementation Details

Major HAL APIs Integration

The Advanced Security component primarily operates at the middleware layer and does not directly integrate with traditional HAL APIs. Instead, it relies on system-level interfaces and external security agents for hardware interaction. The component uses standard Linux system calls and library functions for network interface management and configuration access.

Core System APIs:

System APIPurposeImplementation File
syscfg_get/syscfg_setConfiguration parameter persistence and retrievalcosa_adv_security_dml.c
socket() familyIPC communication with security agentscosa_adv_security_internal.c
pthread_*Multi-threading support for concurrent operationsssp_main.c

Key Implementation Logic

  • State Machine Engine: The component implements a feature-based state machine where each security feature (Device Fingerprinting, Safe Browsing, Softflowd, Parental Controls) maintains independent state transitions based on configuration changes and agent status.
    • Main implementation in cosa_adv_security_dml.c where DML handlers manage feature state transitions
    • State transition handlers in cosa_adv_security_internal.c for coordinating between multiple security features
  • Event Processing: Events are processed through the advanced security agent interface, which monitors network traffic and system events to detect security threats and policy violations.
    • Advanced security agent communication through IPC sockets for real-time event processing
    • Eventueue management using pthread condition variables for asynchronous processing
    • Asynchronous event processing through dedicated worker threads for non-blocking operation
  • Error Handling Strategy: Comprehensive error handling ensures system stability even when the advanced security agent fails or becomes unresponsive.
    • Agent failure detection through periodic health checks and IPC timeout mechanisms
    • Recovery mechanisms include automatic agent restart and graceful feature degradation
    • Timeout handling and retry logic with exponential backoff for agent communication failures
  • Logging & Debugging: Multi-level logging system provides detailed information for troubleshooting security feature issues.
    • Security feature state transition logging with configurable verbosity levels
    • Agent communication tracing for debugging IPC interaction issues
    • Debug hooks for runtime troubleshooting including memory usage monitoring and performance metrics

Key Configuration Files

Configuration FilePurposeOverride Mechanisms
/usr/ccsp/advsec/TR181-AdvSecurity.xmlTR-181 data model definition and parameter registrationVersion-controlled through build system, no runtime override
/tmp/advsec/Runtime configuration and state files directoryManaged by component logic, cleared on restart
/tmp/advsec_config_params/Device configuration parameters (MODEL, MANUFACTURER, FWVER, etc.)Populated during initialization from device properties
/tmp/safebro.jsonSafe browsing configuration fileGenerated by start_adv_security.sh script
/etc/systemd/system/CcspAdvSecurity.servicesystemd service definitionsystemd override files in /etc/systemd/system/CcspAdvSecurity.service.d/
Go To Top