Vector Webinar Security Manager
Vector Webinar Security Manager
Webinar
V0.2 | 2021-10-22
Welcome to the Webinar
Testing of Security-Protected ECUs and Networks with the Security Manager
Part 3: Testing of Security-Protected ECUs and Networks With the Security Manager
> Date: 2021-10-26
Technical Notes
Feedback and Communication
Open and review the chat window to get all organizational messages of the hosts.
Use the „Q&A“ window instead of the chat window for questions during the webinar.
Post your questions to „All Panellists“. Questions are answered online during and after the presentation.
Slides and Presentation
Within 1-2 days after the webinar, you will receive a link to the slides and additional information
2
Agenda
3
Motivation
Vehicle network architecture today
Security
is
required !
4
Motivation
Security protects Features and Business Models
Security Goals:
Replay protection: Freshness Mechanism prevents replay of valid pairs of data and authentication
New challenges:
5
What about Tools?
Testing vehicles in the past
Security:
Data Integrity
Seed & Key Testing network communication
Reading network data
Stimulating
Replay recorded data
6
What about Tools?
Testing vehicles today
Security:
Integrity
Authentication Testing network communication
Encryption Reading network data
TLS Stimulating, Simulating and Testing
SecOC Replay recorded data
7
What about Tools?
Testing vehicles today
?
?
Security:
Integrity
Authentication Testing network communication
Encryption Reading network data
TLS Stimulating, Simulating and Testing
SecOC Replay recorded data
8
Security Mechanisms
Automotive Cyber Security in OSI Layers
Application Layer
AUTOSAR SecOC
Authenticity + freshness for various bus systems/networks
UDS Service UDS Service
7 SecOC
0x29 0x27 UDS Service 0x29, Authentication
More sophisticated method of authentication and authorization of a
Diagnostics Tester towards an ECU
UDS Service 0x27, Seed & Key
5 DTLS TLS
The legacy method of secure access of Diagnostics Tester towards an ECU
4 UDP TCP
TLS
may apply all security goals on layer 5 over Ethernet, end to end
IPsec DTLS
3 may apply all security goals on layer 5 over Ethernet, end to end
IPv4/v6
IPsec
MACsec may apply all security goals on layer 3 over Ethernet, end to end
2 Ethernet MAC +VLAN
MACsec
may apply security goals on layer 2, i.e. for one Ethernet link, done by
1 Ethernet PHY
hardware
AUTOSAR Automotive Open System Architecture
TLS Transport Layer Security
DTLS Datagramm Transport Layer Security
UDS Unified Diagnostic Services
SecOC Secure On-board Communication
9
Challenges
Diversity of security implementation, e.g. SecOC
OEM 2
Trip-based freshness
SipHash
Keys in secured container
OEM 3
Time-based freshness
Challenge-Response
CMAC
Default key in development
10
Challenges
Management of different security implementations
OEM 1
Managing different security algorithms
CMAC
Sip Hash
OEM 2
Different freshness models
Time-based
Trip-based
OEM specific variants OEM 3
11
Challenges
Security in a vehicle's life cycle
Test tools have to manage security depending on the vehicle's life cycle.
12
Security Manager
Use Cases - Security Manager
Secured
SecOC Diagnostics
Cryptographic
Functions
TLS
MACsec* Secret
Management
* planned
13
Security Manager
Vector Security Manager concept
14
Security Manager
Security Configuration and Management
15
Security Manager
Using Security - Tool Interface
Interface
Reusable Freshness Manager models:
Counter / time stamp Network
Trip Counter based
OEM specific variants
16
Security Manager
Supported Tools
CANoe • SecOC
• Diagnostics
• Authentication
• Variant Coding
• Transport Layer Security (TLS)
• Simulation of Client and Server, CAPL API available
• TLS Observer using Master Secret (direct configuration,extracting special UDP
frame)
• DoIP over TLS
• IPSec
• IKEv2 support ( Certificate based peer authentication, Dead Peer Detection, IKE
Fragmentation and IKE Rekeying)
• Import of StrongSwan IPsec configurations
• Full control of Security Policy Database
CANape • Diagnostics
• Authentication
• Variant Coding
Indigo • Diagnostics
• Authentication
vFlash • Diagnostics
• Authentication
17
Secure On Board Communication (SecOC)
Basics – Cipher-based Message Authentication Code (CMAC)
Secret Key
> Key must be known at sender and receiver side
> Key can be derived on demand if key generation
mechanism is known
Local Freshness
> ECU has to be synced to the freshness used in the
network
Result:
The Message Authentication Code (MAC) is copied to the
Secured-I-PDU
Both values (MAC, freshness) can be truncated for data
reduction
18
Secure On Board Communication (SecOC)
Basics – Cipher-based Message Authentication Code (CMAC)
Secured I PDU
Mechanism is applied on Secured-I-PDUs from AR database
Payload Counter Signature
Data and Authenticator in one secured PDU (Data Security PDU)
> Counter: position and length are configurable
Data PDU
Data and Authenticator in separate PDUs Payload Counter
(Data + Cryptographic PDU)
> Counter: value must be identical in both messages
Cryptographic PDU
Signature Counter
19
Secure On Board Communication (SecOC)
Concepts of Freshness
20
Secure On Board Communication (SecOC)
Basics - Freshness
Goal of Freshness:
Prevention of secured data replay
21
Secure On Board Communication (SecOC)
Demo – CANoe simulation with 2 nodes
22
Secure Diagnostics – UDS 0x29
Authenticity for diagnostic services
Tester
…
Service m
23
Secure Diagnostics – UDS 0x29
Unified Diagnostic Services (UDS): Service 2916
Authentication (2916)
Authentication with
Authentication with
PKI Certificate
Challenge-Response
Exchange
Introduced with “Note: AUTOSAR Dcm only implements the authentication via PKI
AUTOSAR 4.4.0 certificated exchange. Authentication with challenge-response
(ACR) is out of scope of AUTOSAR. If it is required it needs a full
custom implementation using existing Dcm callouts for custom
service processing.” Source: SWS_Dcm_01559 (CP R4.4.0)
24
Secure Diagnostics – UDS 0x29
Service 29: Authentication with PKI certificate exchange
ARP Description
02 Authentication with PKI
Certificate Exchange (APCE)
(Will be supported by DEXT and
AUTOSAR)
69 08 ARP
03 Authentication with Challenge-
Response (ACR) and asymmetric
cryptography
Tester ECU 04 Authentication with Challenge-
Response (ACR) and symmetric
cryptograph
25
Secure Diagnostics – UDS 0x29
Service 29: Authentication with PKI certificate exchange
…
Signature
Private Key
26
Secure Diagnostics – UDS 0x29
Service 29: Authentication with PKI certificate exchange
Tester ECU
ECU sends challenge to tester
27
Secure Diagnostics – UDS 0x29
Service 29: Authentication with PKI certificate exchange
Tester ECU
ECU sends challenge to tester
Tester computes a signature
using the certificate‘s private
29 03
Proof of Ownership key and the received challenge
Tester Certificate
28
Secure Diagnostics – UDS 0x29
Service 29: Authentication with PKI certificate exchange
Tester ECU
ECU sends challenge to tester
Tester computes a signature
using the certificate‘s private
29 03
Proof of Ownership key and the received challenge
Tester Certificate
ECU verifies signature with
public key of tester‘s certificate
Tester has proven that it has
ownership of a certificate that
was signed by a higher level
69 03 12
certificate authority
29
Secure Diagnostics – UDS 0x29
Authentication with PKI certificate exchange and OEM backend
Diagnostic
http Certificate
Diagnostic
29 01 00 Certificate
69 01 11 ECU Challenge
Proof of Ownership
29 03 Diagnostic Certificate
69 03 12
30
Secure Diagnostics – UDS 0x29
Demo – CANoe simulation with Tester and ECU
Certificate source
File based in Security Manager
Optional with OEM specific backend
> OEM Security Add-On implements the access and communication
31
Vector Academy
New Remote Training available…
Do you want to know how the Security Manager works together with CANoe?
32
Summary
Testing of Security-Protected ECUs and Networks with the Security Manager
33
Questions & Answers
Questions about topic?
!
?
34
For more information about Vector
and our products please visit
www.vector.com
Author:
Markus Fischer
Vector Germany
35 © 2017. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V0.2 | 2021-10-22