[Sls-sea-dls] SDLS Extended Prcocedures Red Book Draft 1.3
Daniel.Fischer at esa.int
Daniel.Fischer at esa.int
Wed Apr 12 08:49:10 UTC 2017
Dear all,
I have finished the update of the SDLS Extended Procedures Draft Red Book.
Please find it attached.
Updates included:
- Definition of managed parameters for Key Management
- Definition of managed parameters for SU Management and Control
- Inclusion of Key Management and SU Management and Control PDUs in the
PICS
- Completed Security Section
- Updated Baseline Mode (DK comments, Inclusion of CRC definition provided
by Gilles (D 4.3))
Please note: This is a HUGE document. I am pretty sure there are still a
not of small problems in it. If you have some time, could you please check
the document for things like this?
I am afraid we are not ready for Red Book Status yet. In recent
discussions on the mailing list and also with industry a number of
questions popped up that need to be clarified first.
1) SA Management Discussion
It was pointed out that the way how keys can be changed on a running SA
may not be practicable. At the moment, this requires four SA procedures to
be executed. (1) Stoop SA, (2) Expire SA (3) Rekey SA (4) Start SA.
However, it may be preferable to be able to change the keys "on the fly"
without having to shut down the SA. This would make key changing much
simpler.
2) OTAR/Key Verification Procedures Discussion
The rationale for us to introduce the CRC check was to be able to execute
the Key Verification without having to start the lifetime of the key that
is being checked. Industry however pointed out that (1) These kind of
checks are usually done by the spacecraft anyway on its memory and (2)
That a CRC is not secure and will not guarantee that keys cannot be
modified onboard the spacecraft. Instead they suggested to go back to the
old Challenge/Response concept but only execute that prior to activating
the session key for operations anyway. In this way, the start of the key
lifetime is not a problem.
3) Use of Master Keys
We have specified which procedures are considered sensitive. Industry
pointed out that it is still not clear which procedures requires
protection under a master key (so far only the OTAR specifies that
directly) and in general what the master keys are being used for. Some of
this is in the Symmetric Key Management Book however we should think about
if we want to have other procedures especially protected under the use of
a master key.
4) Association of ARC to Key instead of SPI
Industry suggested to associate the ARC to a key rather than an SPI. They
argue that is is a more natural connection since a new key would also
start a new ARC (TBD). I personally disagree with this but I think its
worth discussing this in the group.
5) Frame Security Report
Industry appreciates the concept but has argued that the inclusion of
additional error sources (and thus more flags and reduced bits from SN)
should be included such as (a) bad MAC, (b) invalid Key/SA state, (c)
invalid frame length. For me this makes sense.
6) Unique Identification of Sender and Receiver VCs.
David has raised the point once more that sender and receiver VCs can
currently not be distinguished (since the GVCID is not unique for up and
downlinks). A discussion with SLS should take place in the meeting to find
a solution for this since it does not only touch the Extended Procedures.
Small things to be approved by the WG:
- There seems to be a possible misunderstanding regarding the reserved
SPIs. Industry thought that it always has to be exactly the two reserved
ones for EP and no more. We may want to add a clarification.
- Discussion on the extend to which the security log is specified in the
Extended procedures. Ed suggested the global definition of a GVCIDS and
GVCIDR which I personally find a good solution.
While this looks like a lot of discussion material, I think we will
actually be able to finalise the discussions in the next meeting and then
publish the Red Book afterwards.
Cheers,
Daniel
Dr. Daniel Fischer
Head of the Engineering Support Section, OPS-GES
Ground Systems Engineering Department
Directorate of Operations
ESA - ESOC
Robert-Bosch-Str. 5, D-64392 Darmstadt, Germany
Tel. +49 6151 90 2718 | E-mail: Daniel.Fischer at esa.int
Disclaimer
This message and any attachments are intended for the use of the addressee
or addressees only. The unauthorized disclosure, use, dissemination or
copying (either in whole or in part) of its content is not permitted. If
you received this message in error, please notify the sender and delete it
from your system. Emails can be altered and their integrity cannot be
guaranteed by the sender. Please consider the environment before printing
this email.
Disclaimer
This message and any attachments are intended for the use of the addressee
or addressees only. The unauthorized disclosure, use, dissemination or
copying (either in whole or in part) of its content is not permitted. If
you received this message in error, please notify the sender and delete it
from your system. Emails can be altered and their integrity cannot be
guaranteed by the sender. Please consider the environment before printing
this email.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.ccsds.org/pipermail/sls-sea-dls/attachments/20170412/c2d7177e/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: SDLS Extended Procedures Red 1 v3_no track.docx
Type: application/octet-stream
Size: 1537666 bytes
Desc: not available
URL: <http://mailman.ccsds.org/pipermail/sls-sea-dls/attachments/20170412/c2d7177e/attachment.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 11010 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://mailman.ccsds.org/pipermail/sls-sea-dls/attachments/20170412/c2d7177e/attachment.bin>
More information about the SLS-SEA-DLS
mailing list