17
Presented to: By: Date: Enabling GRAIN ATIEC 2019 Rob Segers, NextGen ISS Architect Securing against Man in the Middle attacks

Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Presented to:

By:

Date:

Enabling GRAIN

ATIEC 2019

Rob Segers,

NextGen ISS Architect

Securing against Man in

the Middle attacks

Page 2: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Enabling Global Resilient Aviation Information

Network (GRAIN)

• The cost of fit for purpose networks and the use of

protected spectrum limits the ability to grow the network

connectivity, bandwidth and worldwide ATM automation

integration required to grow aviation capacity and the

integration of Unmanned Areal systems

• The use of ubiquitous network peering across commercial

networks including unprotected spectrum will require end

to end information integrity between information producer

and consumer to assure network trust and safety

Page 3: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Fit for purpose network evolution to GRAIN

Page 4: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Man in the Middle (MITM) Attacks: a GRAIN

Trust Threat

• Man-in-the-middle(MITM) attacks occur when the attacker manages to position themselves between the legitimate parties to a conversation

• The attacker spoofs the opposite legitimate party so that all parties believe they are actually talking to the expected party

• A MITM attack allows the attacker to eavesdrop on the conversation between the parties, or to actively intervene in the conversation to achieve some illegitimate end

• A MITM attack can also occur by

modifying information at rest (e.g.

stored on a cloud server)

Page 5: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Limited MITM protection with traditional controls

DHS Internet protection

“Trusted Internet Connection”

(TIC) protection

NAS Enterprise Gateway

protection

Virtual Private Networks

protection

Malware, Software, system

configuration protection•Signing as a

Service (Sa2)

•End to End security

Page 6: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Two distinct technical approaches:

Connection vs. Message oriented exchangeConnection oriented exchange –

application security

• Two applications negotiate a connection over the network.

• The applications can perform mutual authentication

• The applications can verify each others identity

• The applications can verify the integrity of the exchanged information

Message oriented exchange –

Information security

• The Producer application of the information doesn’t know the consumer application

• The Producer can add a security header to the information, authenticating itself and protecting the integrity of the information

• The consumer can verify the authenticity and integrity of the information

Page 7: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Signing as a Service (Sa2) and Verifying as a

Service (Va2) for message oriented exchange

Signing as a Service (Sa2)

• Adds the identification of the

producer to the information

• Adds a cryptographically

secure signature to the

information, protecting the

integrity of the information

• Acts on behalf of the producer

or is integrated in the producer

Verifying as a Service (Va2)

• Verifies the trust worthiness of

the producer identification

• Verifies that the information has

not been modified between the

producer and the consumer

• Acts on behalf of the consumer

or is integrated with the

consumer

Page 8: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Sa2 and Va2 SWIM JMS Scenario

8

EMS

Producer Consumer

SignedPayload

Hash

Producer Security Adapter

ConsumerSecurity Adapter

Create message hash and place in header

Authenticate producer and verify message integrity

Enterprise Messaging

Service(e.g. NEMS)

UnsignedMessage

SignedPayload

Hash

Integrity Checked Message

Page 9: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Connection oriented exchange: Datagram

Transport Layer Security (DTLS) for DataCom

• DTLS is a standard IETF protocol supported by Internet

Protocol Services

• DTLS creates a secure communication session between

two applications

• DTLS performs mutual authentication using public key

infrastructure

• DTLS supports low overhead symmetrical encryption of

integrity signatures without payload encryption

• DTLS can support payload encryption if needed

Page 10: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

DTLS for DataCom

Gro

un

d

Aircraft Policy Domain

Ground Application Policy Domain

Application Layer

B1, B2 APPs

FANS1/A APPs

AOCNative IP

APPs

OSI/IPSAdaptation

ACARSConvergence

IP/DS | ATNPKT

Datagram Transport Layer Security

AOC Convergence

Application Layer

Ground

B1, B2 APPs

FANS1/A APPs

AOCNative IP

APPs

OSI/IPSAdaptation

ACARSConvergence

IP/DS | ATNPKT

Datagram Transport Layer Security

AOC Convergence

Network

Common Certificate Management and Validation (CCMV)

Secu

re P

riva

te K

ey

Sto

rage

Trus

t A

ncho

r St

ora

ge

Ce

rtif

ica

te S

tora

ge

Storage Management

CertificateValidation

SCVP Client

Common Certificate Management and Validation (CCMV)

Secu

re P

riva

te K

ey

Sto

rage

Tru

st A

nch

or

Sto

rage

Cer

tifi

cate

Sto

rage

Storage Management

CertificateValidation

SCVP Client

Bri

dge

CA

Aircraft Root CA

Aircraft SCVPserverAircraft OCSP

server

Signed

Ground Root CA

Ground SCVPserver

Ground OCSPserverSigned

BridgeOCSPserver

Signed

Air

Page 11: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Authentication in an international context• Traditionally each organization and each country issues their

own digital identities

• The issuance of the digital identity requires a sufficient level of

vetting and proofing of the person or sponsor (device identity)

• In order for mutual or origin authentication to work, different

organizations and countries must recognize and trust each

others digital identities

• The ICAO global Trust Framework will provide the legal, policy

and governance framework to ensure that members of the

trust framework can recognize and trust each others digital

identities

Page 12: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Common Need Across the Ecosystem…

Establishing Trust and Maintaining Trust

Page 13: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

•Trust Framework Entity/Org

13

ICAO Domain Trust Framework

•Service Agreements

•Trust Framework

•State A,B..N

•Credential Service

Providers

•Attribute Providers

•Multi-Lateral Trust &

Operating Agreement

•Criteria & Methodology

for Cross Certification

•Technical Specifications

•Identity Policy Certification

Policy/Practice Statement

•Bridge Service Certificate

Policy

•Common Operating

Rules

•Accreditation Certification & Audit Process•Domain Operational

Trust Framework

•Domain Governance Trust Framework

Federation Trust Operational Documents •Service and Relying Parties

•Relying Parties

•Identity Providers

•Federated Trust Bridge & Credential

Exchange

•Attribute

Exchange

•Service Catalogs

•Resilient Network

Specifications

•Cyber Security

•Specifications

•Network

•Service Providers

•Criteria for Networks to

Connect

ICAO Global Trust Framework

Page 14: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

International interoperable digital identities

• The ICAO Global trust framework provides the ability to

exchange and trust identities across organizations and

countries

• The actual implementation of the global trust needs to be

established through a trust anchor allowing relying parties

to establish trust and verify the validity of the exchanged

identities

– Use of a Bridge Certificate Authority with Server Certificate Validation

Protocol (SCVP) servers

– Use of Trust lists, per domain stored in a SCVP server

Page 15: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

15

ASTM F-38 Secure Remote ID through Sa2 and Va2

Operator Manufacturer

4. Sell drone & profile to Operator (Resellers)

5. Register drone on website (Enter in Operator PII, Profile and

Drone ID information)

•3. MFR assigns UAS Unique IDs and

stores into drone structure profile

8. Associate Operator to Drone ID

update FAA Aircraft Registry Function

•(Operator ID/Cert CRL/Whitelist

•FAA Directory Services)

6. Perform identity proofing of Operator

(TF 3rd Party Attribute Providers)

9. Operator receives UniqueID (ID) after registration is completed

5. Notify FAA Aircraft Registry Function

Device Profile goes into Registry

•(UAS ID & profile data)

ANSP (FAA)

•Federated

Aircraft

•Registry

Trust Framework

CAs

7. CA sends combined (Drone ID / Operator cert)

CAs

Federated

Aircraft

•Registry

Certificate

Path Validation

•MRF

Certificate

12.

10. Remote ID

2. Once approved ensure Remote ID

interoperability with Verifier Service

1. Request approval for MFR Remote ID

Security Solution•Federated

Aircraft

•Registry

•Verifier Certificate

•Operator Certificate

•Law Enforcement Cert

•Operator

Certicate

•MFR

Certificate

•Profile

•Security

Verification

Registry

Validation

•ICAO Global

Trust Framework

•11. Remote ID Integrity Verification

•Security

•Solution

Page 16: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

ASTM F-38 Secure Remote ID (continued)

• Enables law enforcement to distinguish “Friend” from “Foe”

• Each manufacturer can provide their own solution without the

standard dictating what algorithm to use

• Algorithms can evolve without breaking the concept

• Standardized API guarantees interoperability and future

compatibility

• The Globally federated aircraft registry provides a secure

international digital trust anchor for pilot, operator, owner and

aircraft within the ICAO Global trust framework for UAS and

traditional aviation

16

Page 17: Enabling GRAIN - Federal Aviation Administration · DHS Internet protection “Trusted Internet Connection” (TIC) protection NAS Enterprise Gateway ... •DTLS is a standard IETF

Questions

17