The Advanced Security component (CcspAdvSecurity) provides TR-181 parameter management interface for network security features on RDK-B devices. The component serves as the middleware interface for advanced security services, coordinating with the advanced security agent that implements device fingerprinting, safe browsing protection, network flow monitoring, and parental controls to deliver real-time threat detection and network protection capabilities.
The component operates as a critical security layer in the RDK-B middleware stack, providing TR-181 parameter management for various security features while the advanced security agent handles actual threat detection and mitigation. The component enables management and configuration of device identification, malicious website blocking, network traffic analysis, and advanced parental control functionalities through a unified TR-181 interface.
At the module level, the Advanced Security component implements a plugin-based architecture with separate DML modules providing TR-181 parameter support for Device Fingerprinting (network device identification and classification), Safe Browsing (malicious URL detection and blocking), Softflowd (network flow monitoring), and Advanced Parental Control (content filtering and access control). The actual implementation of these security features is performed by the advanced security agent. The component also provides WebConfig integration for remote configuration management and RFC (Remote Feature Control) support for enabling/disabling security features dynamically.
graph LR
subgraph "External Systems"
RemoteMgmt["Remote Management"]
LocalUI["Local Web UI"]
end
subgraph "RDK-B Platform"
subgraph "Remote Management Agents"
ProtocolAgents["TR-069/WebPA/TR-369<br/>Protocol Agents"]
end
AdvSec["CcspAdvSecurity<br/>(Advanced Security)"]
subgraph "RDK-B Core Components"
PSM["PSM"]
CR["Component Registrar"]
WebConfig["WebConfig"]
DeviceMgr["Device Manager"]
end
SecurityAgent["Advanced Security Agent<br/>(Security Enforcement)"]
subgraph "System Layer"
Netfilter["Netfilter/iptables"]
Linux["Linux Kernel"]
end
end
RemoteMgmt -->|TR-069/WebPA| ProtocolAgents
LocalUI -->|HTTP/HTTPS| ProtocolAgents
ProtocolAgents -->|IPC| AdvSec
AdvSec -->|IPC| PSM
AdvSec -->|IPC| CR
AdvSec -->|IPC| WebConfig
AdvSec -->|IPC| DeviceMgr
AdvSec <-->|IPC/Sockets| SecurityAgent
SecurityAgent <-->|Policy| Netfilter
SecurityAgent <-->|System Calls| Linux
classDef external fill:#fff3e0,stroke:#ef6c00,stroke-width:2px;
classDef advSec fill:#e3f2fd,stroke:#1976d2,stroke-width:3px;
classDef rdkbComponent fill:#e8f5e8,stroke:#2e7d32,stroke-width:2px;
classDef system fill:#fce4ec,stroke:#c2185b,stroke-width:2px;
class RemoteMgmt,LocalUI external;
class AdvSec advSec;
class ProtocolAgents,PSM,CR,WebConfig,DeviceMgr rdkbComponent;
class SecurityAgent,Netfilter,Linux system;
Key Features & Responsibilities:
- Device Fingerprinting Interface: Provides TR-181 parameter interface to control network device identification and classification capabilities implemented by the advanced security agent
- Safe Browsing Protection Interface: Provides TR-181 parameter interface to control malicious website detection and blocking functionality implemented by the advanced security agent
- Network Flow Monitoring (Softflowd) Interface: Provides TR-181 parameter interface to enable/disable network traffic analysis and flow monitoring capabilities implemented by the advanced security agent
- Advanced Parental Controls Interface: Provides TR-181 parameter interface to control content filtering and access control features implemented by the advanced security agent
- RFC Feature Management: Provides Remote Feature Control capabilities for dynamically enabling/disabling security features through centralized configuration management without requiring device restarts
- WebConfig Integration: Supports remote configuration management through WebConfig framework, enabling cloud-based security policy updates and configuration synchronization
- TR-181 Data Model Interface: Implements comprehensive TR-181 parameter support for security feature management, providing standardized access to security configuration and status information
- Security Agent Coordination: Coordinates with the advanced security agent for configuration changes, status monitoring, and feature control through IPC mechanisms
The Advanced Security component follows a layered modular design that separates policy management from enforcement mechanisms. The core design principle centers around providing a standardized TR-181 interface for security feature configuration while the advanced security agent handles actual security processing and enforcement. This separation allows for flexible deployment while maintaining consistent management interfaces across various RDK-B device types.
The component implements a plugin-based architecture where each security feature (Device Fingerprinting, Safe Browsing, Softflowd, Parental Controls) is handled by dedicated DML modules with well-defined TR-181 parameter interfaces. The design ensures loose coupling between components while providing centralized configuration management and event coordination. The architecture supports both synchronous parameter operations (get/set) and asynchronous event-driven processing for real-time security responses.
North-bound interactions are handled through RBus/DBus messaging for integration with other RDK-B components, WebConfig framework for cloud-based configuration management, and direct TR-181 parameter access for management systems. South-bound interactions utilize IPC mechanisms (sockets, shared memory) for communication with the advanced security agent, system calls for kernel module management, and file-based configuration for persistent settings.
IPC mechanisms are designed based on platform capabilities, with RBus being the preferred method for component-to-component communication on newer platforms, while maintaining DBUS compatibility for legacy systems. The design includes fail-safe mechanisms ensuring that security features degrade gracefully when the advanced security agent is unavailable, and configuration changes are validated before commitment to prevent system instability.
Data persistence is achieved through a combination of syscfg for persistent configuration storage, temporary files for runtime state management, and WebConfig framework for cloud-synchronized settings. The component manages configuration versioning and provides rollback capabilities for failed configuration updates.
graph LR
subgraph "External Systems"
SecurityAgent["Advanced Security Agent<br/>(Security Enforcement)"]
end
subgraph "CcspAdvSecurity"
subgraph "Core Engine"
SSPMain[SSP Main Engine]
DMLHandler[DML Handler]
WebConfigInteg[WebConfig Handler]
end
subgraph "Security Features"
Fingerprint[Device Fingerprinting]
SafeBrowsing[Safe Browsing]
Softflowd[Softflowd]
ParentalCtrl[Parental Controls]
end
end
subgraph "RDK-B Components"
PSM[(PSM Storage)]
CR[Component Registrar]
WebConfig[WebConfig Framework]
end
SecurityAgent <-->|IPC Sockets| Fingerprint
SecurityAgent <-->|IPC Sockets| SafeBrowsing
SecurityAgent <-->|IPC Sockets| Softflowd
SecurityAgent <-->|IPC Sockets| ParentalCtrl
SSPMain --> DMLHandler
DMLHandler --> Fingerprint
DMLHandler --> SafeBrowsing
DMLHandler --> Softflowd
DMLHandler --> ParentalCtrl
WebConfigInteg --> DMLHandler
SSPMain -->|IPC| CR
DMLHandler -->|Config Storage| PSM
WebConfigInteg -->|Cloud Config| WebConfig
classDef external fill:#fff3e0,stroke:#ef6c00,stroke-width:2px;
classDef core fill:#e3f2fd,stroke:#1976d2,stroke-width:2px;
classDef features fill:#c8e6c9,stroke:#388e3c,stroke-width:2px;
classDef rdkbComp fill:#e8f5e8,stroke:#2e7d32,stroke-width:2px;
class SecurityAgent external;
class SSPMain,DMLHandler,WebConfigInteg core;
class Fingerprint,SafeBrowsing,Softflowd,ParentalCtrl features;
class PSM,CR,WebConfig rdkbComp;
Build-Time Flags and Configuration:
| Configure Option | DISTRO Feature | Build Flag | Purpose | Default |
|---|---|---|---|---|
--enable-unitTestDockerSupport |
N/A | UNIT_TEST_DOCKER_SUPPORT |
Enable Docker support for unit testing | Disabled |
--with-ccsp-arch={arm,atom,pc,mips} |
N/A | CCSP_ARCH |
Specify the CCSP board CPU platform | None (must be specified) |
--enable-wifidcl |
N/A | WIFI_DATA_COLLECTION |
Enable WiFi data collection for advanced security agent | Disabled |
--enable-downloadmodule |
N/A | DOWNLOADMODULE |
Enable downloadable module support | Disabled |
RDK-B Platform and Integration Requirements
- RDK-B Components: PSM (Parameter Storage Manager), Component Registrar (CR), WebConfig Framework, Device Manager, System Info component
- HAL Dependencies: Platform HAL for network interface management, minimum version supporting netfilter integration
- Systemd Services: CcspCrSsp.service, CcspPsmSsp.service must be active before advanced security starts; network.target dependency for network availability
- Hardware Requirements: Minimum 256MB RAM for agent operation, netfilter kernel support, network interface access capabilities
- Message Bus: RBus registration for "eRT.com.cisco.spvtg.ccsp.advsecurity" namespace (newer platforms) or DBUS com.cisco.spvtg.ccsp.advsecurity (legacy platforms)
- TR-181 Data Model: Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.* and Device.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity.* parameter support
- Configuration Files: /usr/ccsp/advsec/TR181-AdvSecurity.xml data model definition, /tmp/advsec/ runtime configuration directories
- Startup Order: Must initialize after PSM, CR, and WebConfig components; coordinates with advanced security agent after component initialization
Threading Model:
The Advanced Security component implements a lightweight multi-threaded architecture with event-driven processing for security feature management and agent coordination. Unlike components with extensive threading models, Advanced Security focuses on minimal threading while maintaining responsive parameter operations and agent communication.
| Thread & Function | Purpose | Cycle/Timeout | Synchronization |
|---|---|---|---|
Main Threadmain() / ssp_main() |
Component initialization, TR-181 parameter processing, daemon lifecycle management | Event-driven message loop, signal handling, component registration, configuration loading | pthread signals for termination, SSP lifecycle callbacks |
Logger Threadadvsec_logger_th() |
Device fingerprinting logging and periodic system monitoring | Configurable logging period (default 1440 minutes), health monitoring cycles | logMutex mutex, logCond condition variable for timeout control |
Sysevent Handler Threadadvsec_sysevent_handler_th() |
System event processing and bridge mode detection | Continuous event listening, 2-second polling intervals, event-driven responses | Event-based synchronization, sysevent file descriptor monitoring |
| WebConfig Processing Integrated in main thread |
Cloud configuration updates and synchronization | WebConfig framework callbacks, asynchronous processing | WebConfig framework internal synchronization |
Initialization to Active State
The Advanced Security component follows a structured initialization sequence ensuring proper dependency resolution and secure agent coordination. The component validates system prerequisites, loads configuration from persistent storage, establishes IPC connections, and coordinates with the advanced security agent lifecycle management before transitioning to active operational state.
sequenceDiagram
participant System
participant AdvSec as Advanced Security
participant PSM as PSM Storage
participant Agent as Advanced Security Agent
System->>AdvSec: Start Component
AdvSec->>AdvSec: Initialize Logging & Resources
AdvSec->>PSM: Load Configuration
PSM-->>AdvSec: Configuration Data
AdvSec->>AdvSec: Register TR-181 Parameters
AdvSec->>System: Connect to RBus/DBUS
System-->>AdvSec: IPC Established
AdvSec->>Agent: Coordinate with Agent
Agent-->>AdvSec: Agent Ready
AdvSec->>System: Initialization Complete
loop Runtime
AdvSec->>AdvSec: Process TR-181 Requests
AdvSec->>Agent: Send Commands
Agent->>AdvSec: Status Updates
end
Runtime State Changes and Context Switching
The component supports dynamic feature activation/deactivation based on RFC (Remote Feature Control) settings and user configuration changes. State transitions occur when security features are enabled/disabled, when the advanced security agent requires restart due to configuration changes, or when the system enters/exits bridge mode.
State Change Triggers:
- RFC parameter changes requiring agent reconfiguration (triggers agent restart with new settings)
- Bridge mode activation/deactivation (disables/enables security features as network topology changes)
- Advanced security agent crashes or becomes unresponsive (triggers automatic restart procedures)
- WebConfig updates from cloud services (triggers validation and application of new security policies)
- Memory pressure conditions (triggers agent hibernation to preserve system resources)
Context Switching Scenarios:
- Bridge Mode Context: Component disables all security features when device operates in bridge mode, preserving configuration for later restoration
- Agent Recovery Context: When advanced security agent fails, component maintains TR-181 parameter access while attempting agent restart in background
- Configuration Update Context: During WebConfig updates, component validates new configuration before committing changes and restarting affected services
Initialization Call Flow:
sequenceDiagram
participant Init as Initialization
participant AdvSec as CcspAdvSecurity
participant Deps as Dependencies
Init->>AdvSec: Start Component
AdvSec->>AdvSec: Load Configuration
AdvSec->>Deps: Register TR-181 & Connect
Deps-->>AdvSec: Ready
AdvSec->>Deps: Coordinate with Agent
Deps-->>AdvSec: Agent Active
AdvSec->>Init: Component Active
Request Processing Call Flow:
The most critical flow involves TR-181 parameter operations that trigger security feature configuration changes and agent interactions.
sequenceDiagram
participant Client as Management Client
participant AdvSec as Advanced Security
participant Agent as Advanced Security Agent
Client->>AdvSec: Set Parameter (SafeBrowsing.Enable)
AdvSec->>AdvSec: Validate Parameter
AdvSec->>Agent: Apply Configuration
Agent-->>AdvSec: Configuration Applied
AdvSec-->>Client: Success
Agent->>AdvSec: Feature Status Update
AdvSec->>AdvSec: Update Internal State
The Advanced Security component implements vendor-specific TR-181 parameters under the Device.DeviceInfo.X_RDKCENTRAL-COM namespace, providing comprehensive management interfaces for advanced security features. The implementation follows BBF TR-181 specification guidelines for parameter structure, access controls, and data validation while extending functionality for RDK-B specific security requirements.
Device.
βββ DeviceInfo.
βββ X_RDKCENTRAL-COM_DeviceFingerPrint.
β βββ Enable (boolean, R/W)
β βββ LoggingPeriod (unsignedInt, R/W)
β βββ EndpointURL (string, R/W)
β βββ LogLevel (unsignedInt, R/W)
βββ X_RDKCENTRAL-COM_AdvancedSecurity.
β βββ Data (string, W)
β βββ SafeBrowsing.
β β βββ Enable (boolean, R/W)
β β βββ ConfigVersion (unsignedInt, R/W)
β β βββ RouterIP (string, R)
β β βββ DNSServerIP (string, R)
β β βββ Blockpage (string, R)
β β βββ Warnpage (string, R)
β β βββ Cacheurl (string, R)
β β βββ OtmDedupFqdn (string, R)
β βββ Softflowd.
β β βββ Enable (boolean, R/W)
β βββ RabidFramework.
β βββ MacCacheSize (unsignedInt, R/W)
β βββ DnsCacheSize (unsignedInt, R/W)
βββ X_RDKCENTRAL-COM_RFC.
βββ Feature.
β βββ AdvancedParentalControl.
β β βββ Enable (boolean, R/W)
β βββ PrivacyProtection.
β β βββ Enable (boolean, R/W)
β βββ DeviceFingerPrintICMPv6.
β β βββ Enable (boolean, R/W)
β βββ WSDiscoveryAnalysis.
β β βββ Enable (boolean, R/W)
β βββ AdvancedSecurityOTM.
β β βββ Enable (boolean, R/W)
β βββ AdvancedSecurityUserSpace.
β β βββ Enable (boolean, R/W)
β βββ AdvancedSecurityCujoTracer.
β β βββ Enable (boolean, R/W)
β βββ AdvancedSecurityCujoTelemetry.
β β βββ Enable (boolean, R/W)
β βββ AdvancedSecurityWiFiDataCollection.
β β βββ Enable (boolean, R/W)
β βββ AdvancedSecurityLevl.
β β βββ Enable (boolean, R/W)
β βββ AdvancedSecurityAgent.
β β βββ Enable (boolean, R/W)
β βββ AdvancedSecuritySafeBrowsing.
βββ Enable (boolean, R/W)
Core Parameters:
| Parameter Path | Data Type | Access | Default Value | Description | BBF Compliance |
|---|---|---|---|---|---|
Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.Enable |
boolean | R/W | false |
Enables or disables device fingerprinting functionality. When enabled, the system analyzes network traffic patterns to identify and classify connected devices automatically. Valid values: true (enabled), false (disabled). | TR-181 Issue 2 |
Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.LoggingPeriod |
unsignedInt | R/W | 1440 |
Specifies the logging period in minutes for device fingerprinting data collection. Range: 60-2880 minutes (1-48 hours). Controls frequency of fingerprinting data uploads to cloud services. | TR-181 Issue 2 |
Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.EndpointURL |
string | R/W | "" |
Defines the endpoint URL for device fingerprinting data uploads. Must be a valid HTTPS URL. Used for sending collected device classification data to cloud analytics services. | TR-181 Issue 2 |
Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.LogLevel |
unsignedInt | R/W | 3 |
Controls logging verbosity for device fingerprinting module. Valid values: 1 (Error), 2 (Warning), 3 (Info), 4 (Verbose). Higher values produce more detailed logging output. | TR-181 Issue 2 |
Device.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity.SafeBrowsing.Enable |
boolean | R/W | false |
Enables or disables safe browsing protection. When enabled, system blocks access to malicious websites and provides warning pages for suspicious content. Requires active security agent. | TR-181 Issue 2 |
Device.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity.Softflowd.Enable |
boolean | R/W | false |
Enables or disables network flow monitoring via softflowd daemon. When enabled, collects network flow statistics for security analysis and anomaly detection. | TR-181 Issue 2 |
Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.AdvancedParentalControl.Enable |
boolean | R/W | false |
RFC parameter controlling advanced parental control features. When enabled, allows content filtering and access restrictions based on device, time, and content category policies. | Custom Extension |
The Advanced Security component consists of several specialized modules that handle different aspects of security functionality. Each module operates independently while sharing common infrastructure for configuration management and agent communication. The DML (Data Model Library) modules handle TR-181 parameter operations, while the SSP (Service Support Provider) module manages component lifecycle and IPC communications.
| Module/Class | Description | Key Files |
|---|---|---|
| AdvSecurityDml | Core TR-181 parameter handling and security feature management. Implements all DML functions for device fingerprinting, safe browsing, and parental controls. Handles parameter validation, persistence, and agent coordination. | cosa_adv_security_dml.c, cosa_adv_security_dml.h |
| AdvSecuritySsp | Service Support Provider for component lifecycle management. Handles process initialization, RBus/DBUS registration, message bus interface, and component shutdown procedures. | ssp_main.c, ssp_messagebus_interface.c, ssp_global.h |
| WebConfigModule | WebConfig framework integration for cloud-based configuration management. Handles remote configuration updates, version management, and configuration validation for security features. | cosa_adv_security_webconfig.c, cosa_adv_security_webconfig.h |
| InternalHelpers | Utility functions for security operations including parameter validation, URL checking, security agent communication, and system state management. | cosa_adv_security_internal.c, cosa_adv_security_internal.h, advsecurity_helpers.c |
| PluginMain | Plugin initialization and function registration interface. Registers all DML callback functions with the COSA framework and manages plugin lifecycle. | plugin_main.c, plugin_main.h |
| AgentInterface | Interface module for communication with the advanced security agent. Handles command sending, status monitoring, and agent lifecycle management. | cujoagent_dcl_api.c, cujoagent_dcl_api.h |
The Advanced Security component maintains extensive interactions with both RDK-B middleware components and system-level services. It serves as a bridge between high-level security policy management and low-level security enforcement, coordinating with the advanced security agent while providing standardized TR-181 interfaces for management systems.
| Target Component/Layer | Interaction Purpose | Key APIs/Endpoints |
|---|---|---|
| RDK-B Middleware Components | ||
| PSM (Parameter Storage Manager) | Persistent parameter storage and retrieval, configuration backup/restore | PSM_Set_Record_Value2(), PSM_Get_Record_Value2() |
| Component Registrar (CR) | Component registration, namespace reservation, capability announcement | CcspBaseIf_registerCapabilities(), CcspBaseIf_unregisterComponent() |
| WebConfig Framework | Remote configuration management, cloud policy updates | webconfig_subdoc_register(), webconfig_apply_config() |
| Device Manager | Device information queries, TR-069 parameter forwarding | RBus method calls: Device.DeviceInfo.* |
| System & HAL Layers | ||
| Advanced Security Agent | Security enforcement, threat detection, policy application | IPC sockets: /var/run/cujo/wifi.sock or /tmp/wifi.sock, agent control commands |
| syscfg Configuration | Persistent configuration storage and system settings | syscfg_get(), syscfg_set(), syscfg_commit() |
| systemd Services | Service lifecycle management, dependency control | systemctl start/stop/restart CcspAdvSecurity |
Events Published by Advanced Security Component:
| Event Name | Event Topic/Path | Trigger Condition | Subscriber Components |
|---|---|---|---|
| Security Feature Status | Device.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity |
Feature enable/disable state changes | WebUI, Device Manager, Telemetry |
| Agent Status Update | eRT.com.cisco.spvtg.ccsp.advsecurity.agent.status |
Security agent startup/shutdown, health status changes | System Monitor, Telemetry Agent |
| Configuration Change | eRT.com.cisco.spvtg.ccsp.advsecurity.config |
TR-181 parameter modifications, RFC feature toggles | PSM, Configuration Management |
| Security Event | eRT.com.cisco.spvtg.ccsp.advsecurity.security |
Threat detection, policy violations | Logging, Telemetry, Notification Service |
Primary IPC Flow - TR-181 Parameter Operation:
sequenceDiagram
participant Client as Management Client
participant AdvSec as Advanced Security
participant PSM as PSM Storage
participant Agent as Advanced Security Agent
Client->>AdvSec: SetParameterValues (RBus)
AdvSec->>AdvSec: Validate & Access Control
AdvSec->>PSM: Store Parameter
PSM-->>AdvSec: Stored
AdvSec->>Agent: Apply Config (IPC Socket)
Agent-->>AdvSec: Applied
AdvSec-->>Client: Success
Event Notification Flow:
sequenceDiagram
participant Agent as Advanced Security Agent
participant AdvSec as Advanced Security
participant Subs as Subscribers
Agent->>AdvSec: Security Event (IPC)
AdvSec->>AdvSec: Process Event
AdvSec->>Subs: RBus Event Notification
Subs-->>AdvSec: Ack
The Advanced Security component primarily operates at the middleware layer and does not directly integrate with traditional HAL APIs. Instead, it relies on system-level interfaces and external security agents for hardware interaction. The component uses standard Linux system calls and library functions for network interface management and configuration access.
Core System APIs:
| System API | Purpose | Implementation File |
|---|---|---|
syscfg_get/syscfg_set |
Configuration parameter persistence and retrieval | cosa_adv_security_dml.c |
socket() family |
IPC communication with security agents | cosa_adv_security_internal.c |
pthread_* |
Multi-threading support for concurrent operations | ssp_main.c |
-
State Machine Engine: The component implements a feature-based state machine where each security feature (Device Fingerprinting, Safe Browsing, Softflowd, Parental Controls) maintains independent state transitions based on configuration changes and agent status.
- Main implementation in
cosa_adv_security_dml.cwhere DML handlers manage feature state transitions - State transition handlers in
cosa_adv_security_internal.cfor coordinating between multiple security features
- Main implementation in
-
Event Processing: Events are processed through the advanced security agent interface, which monitors network traffic and system events to detect security threats and policy violations.
- Advanced security agent communication through IPC sockets for real-time event processing
- Event queue management using pthread condition variables for asynchronous processing
- Asynchronous event processing through dedicated worker threads for non-blocking operation
-
Error Handling Strategy: Comprehensive error handling ensures system stability even when the advanced security agent fails or becomes unresponsive.
- Agent failure detection through periodic health checks and IPC timeout mechanisms
- Recovery mechanisms include automatic agent restart and graceful feature degradation
- Timeout handling and retry logic with exponential backoff for agent communication failures
-
Logging & Debugging: Multi-level logging system provides detailed information for troubleshooting security feature issues.
- Security feature state transition logging with configurable verbosity levels
- Agent communication tracing for debugging IPC interaction issues
- Debug hooks for runtime troubleshooting including memory usage monitoring and performance metrics
| Configuration File | Purpose | Override Mechanisms |
|---|---|---|
/usr/ccsp/advsec/TR181-AdvSecurity.xml |
TR-181 data model definition and parameter registration | Version-controlled through build system, no runtime override |
/tmp/advsec/ |
Runtime configuration and state files directory | Managed by component logic, cleared on restart |
/tmp/advsec_config_params/ |
Device configuration parameters (MODEL, MANUFACTURER, FWVER, etc.) | Populated during initialization from device properties |
/tmp/safebro.json |
Safe browsing configuration file | Generated by start_adv_security.sh script |
/etc/systemd/system/CcspAdvSecurity.service |
systemd service definition | systemd override files in /etc/systemd/system/CcspAdvSecurity.service.d/ |