190 likes | 356 Views
Security WG: Report of the Fall 2005 Meeting. Atlanta GA September 16, 2004 Howard Weiss NASA/JPL/SPARTA. Planned Meeting Agenda. 14 September 2005 0900-0915 : Welcome, opening remarks, logistics, agenda bashing, 0915-0930 : Review results of Spring 2005 SecWG meeting in Athens Mtg Notes
E N D
Security WG:Report of the Fall 2005 Meeting Atlanta GA September 16, 2004 Howard Weiss NASA/JPL/SPARTA
Planned Meeting Agenda • 14 September 2005 • 0900-0915: Welcome, opening remarks, logistics, agenda bashing, 0915-0930: Review results of Spring 2005 SecWG meeting in Athens Mtg Notes • 0930-1000: RASDS Review wrt Security Architecture (Kenny telecon) • 1000-1030: coffee break • 1030-1200: Security Architecture Document Discussions (Kenny telecon) • 1200-1330: Lunch • 1330-1400:Review CNES Mission Security Req Development using EBIOS (Pechmalbec/Belbis) • 1400-1500: Encryption Algorithm Trade Study (Weiss) • 1500-1530: coffee break • 1530-1700: Authentication/Integrity Algorithm Trade Study (Weiss) • 15 September 2005 • 0900-1000: Key management discussion (Kenny) • 1000-1030: Coffee break • 1030-1100: Identity Management, Spacecraft IDs (Weiss) • 1100-1130: CNES Interconnection Rules (Pechmalbec/Belbis) • 1130-1300: Lunch • 1300-1400: CNES Security Development Process (Pechmalbec/Belbis) • 1400-1500: Security Policy Document/Common Criteria (Weiss)
Executive Summary • Attendees from CNES, BNSC (telecon), NASA/GSFC, NASA/ Langley (telecon), NASA/GRC, ESA/ESOC, DLR, and NASA/JPL. • First participation of an ESA/ESOC representative! • Mario Merri mentioned that ESA/ESOC would also provide another representative in time for the next meeting! • Discussed and revised the SecWG Security Architecture documents • Discussed and accepted proposals for CCSDS standards for: • Encryption (AES w/min 128-bit key, additional algorithms allowed) • Authentication/integrity (Digital Signature Standard for public key-based authentication, HMAC-SHA1 for MAC-based authentication) • Discussed CNES approach to developing security requirements and their use of the EBIOS tool • Discussed the development of: • Security Policy Framework • Information Security Planning Guide • Potential usage of Common Criteria to develop mission Protection Profiles • Discussed issues from NASA DSWG – identity management, SCID “exposure” on SANA.
Summary of Goals and Deliverables • Security Green Book revision is complete and has been submitted to the CESG – poll has just closed – awaiting review comments • Threat Document is completed and has been submitted to the CESG – poll has just closed – awaiting review comments. • Security Architecture document has undergone another revision taking into account the previous comments – to be sent out for WG review/comments. • Trade-off analysis of potential CCSDS encryption standards as a means of deciding on a recommendation was completed and WG recommends distributing as a Green Book for the Encryption Algorithm Blue Book. • Trade-off analysis of potential CCSDS authentication standards as a means of deciding on a recommendation was completed and WG recommends distributing as a Green Book for the Authentication Algorithm Blue Book. • CCSDS key management standard still in process – controversy regarding public key exchanges vs. shared, symmetric keys. • Policy Framework and Mission Planners Guides still in process. • Continue to work with other Areas and their WGs with respect to security.
Progress Achieved • Attended and participated in the High Rate Uplink BOF, CisLunar WG, and a splinter group of the SLS participants concerning how the Internet protocols work and can be used. • Reviewed the latest incarnation of the Security Architecture document and its relationship with the final version of the RASDS. Area of contention within the Security Architecture revolves around key management issues: architecture is heavily slanted towards public key technologies that may not be universally applicable. Also issues revolving around how to do emergency commanding. More review to occur. • Reviewed the security algorithm trade studies • Encryption: must use AES-128 w/128-bit key at min; additional algorithms may be used at mission/agency/govt discretion. • Authentication/Integrity: dual standards that must be used • Digital Signature Algorithm (DSA) for public key-based authentication • Hash-based Message Authentication Code (HMAC) using SHA-1 for shared secret-based authentication • Other hashing algorithms (e.g., MD5, SHA256, SHA384, UMAC) may be used • Discussed the beginning of the Security Policy Framework Guide – attempt a CCSDS re-write of the NIST Guide (800-47) and a starting point and re-affirmed the adaptation of the NIST document for CCSDS use. • Again discussed the potential use of the Common Criteria for development of mission Protection Profiles. CNES makes heavy use of the CC but does not produce full-blown PPs. The WG did not want to develop PPs (too much boilerplate, too large, too hard to read, etc) but did agree it makes sense to use the CC as a basis for developing mission security requirements and this will be introduced in the mission planners guide that remains to be written. • CNES described their level of security involvement in mission development. CNES has an independent security organization that works hand-in-hand with mission planners to develop the mission security requirements, the threat study, the trade studies, and the security life-cycle. They also discussed the risk analysis tool (available as open source), EBIOS, that they use to develop the mission security requirements. This needs to be examined for potential use by others and maybe to be introduced as a CCSDS recommended practice.
SEA Area MID-TERM REPORT SUMMARY TECHNICAL STATUS • Security WG • Goal: • Working Status: Active __X_ Idle ____ • Summary progress: Three documents actively being produced (Security Green Book, Security Architecture, Threat). All docs green. Green Book to CESG. • Progress since last meeting: Completed Green Book, completed Threat, completed Encryption and Authentication Trade Studies – agreed on algorithms • Problems and Issues: Resources – need to ensure continued participation from all member agencies
Open Issues • Key management white book • Public vs. symmetric keying • Number of round-trips required for public key negotiations • Caching of public keys if not on-line negotiation
Resource Problems • Resources are adequate to perform the current tasks. • Resources are increasing: • ESA/ESOC has provided a new SecWG participant and has promised an additional person by the Spring meeting.
Risk Management Update • Must ensure that the current trend of additional resources remains and that resources don’t shrink.
Cross Area WG / BOF Issues • Security is a cross-cutting discipline that needs to be included in many other Areas and WGs. In the plenary, we asked that the CESG be alerted that other Areas and WG should request support from the Security WG (in addition to the SecWG being proactive). We believe that the mandatory security section in documents will force the other Areas and WG to seek out help! • Met with high rate uplink BOF regarding security concerns. • Met with CisLunar • Maybe provide a SecWG overview briefing at the Spring meeting opening plenary to cover everyone at one time? • Security 101 and SecWG initiatives within CCSDS?
Resolutions to be Sent to CESG and Then to CMC • Several concerns: • SecWG is concerned with the lack of feedback from the CESG and CMC. For example, the SecWG sent a resolution up requesting that every CCSDS document contain a standard security section. The return flow indicated this was passed. More than a year later we learn that the language was changed (only blue books, resource problems allow provide a waiver, etc). We believe that the WG need a view into the outcome of the CESG and CMC meetings that does not appear to currently exist. • Clarify what the current security section resolution means, what is required, in what books, what waivers are allowed? • Standard security section resolution should be modified to include ALL CCSDS documents – not just Blue Books. Or at least Orange and Magenta books should be included and maybe also Green books.
New Working Items, New BOFs, etc. • Encryption algorithm blue book. • Authentication algorithm blue book. • Security Architecture red book. • Key Management red book. • Security Policy Framework based on NIST 800-47. • Mission Planning Guide.