+ All Categories
Home > Documents > Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC...

Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC...

Date post: 21-Mar-2019
Category:
Upload: phungnhi
View: 228 times
Download: 0 times
Share this document with a friend
20
V1.00.02 | 2018-10-09 2018 IEEE Standards Association (IEEE-SA) Ethernet & IP @ Automotive Technology Day Making gPTP Capable for Secure Time Synchronization
Transcript
Page 1: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

V1.00.02 | 2018-10-09

2018 IEEE Standards Association (IEEE-SA) Ethernet & IP @ Automotive Technology Day

Making gPTP Capable for Secure Time Synchronization

Page 2: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Making gPTP Capable for Secure Time Synchronization

Overview

gPTP is facing the same security threats like any other Ethernet protocol

Attack scenarios, such as Man-in-the-Middle Attacks, Replay Attacks, Spoofing Attacks and Denial of Service Attacks, will also affect time synchronization acc. to gPTP, used in many automotive Ethernet applications.

Attacks, that might utilize an unprotected gPTP will be analyzed and the appropriate requirements are derived. An analyzing phase shows, which requirements are already fulfilled by the specification and how open security threats are solved.

2/20

Page 3: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Contents

Overview

Analyze which specification item is vulnerable by which attack scenario

Man In The Middle Attack

Denial of Service (DoS) Attack

Time Source Attack

Analysis

Specify countermeasures to solve open threats

Integrated Timesync protocol security check using Message Authentication Codes (MAC)

Message gap check

Countermeasures

Identify relevant open threats

Authentication of a Time Master [clock identity]

Protection against Denial of Service (DoS)

Open Threats

Analyze which threats are covered by existing countermeasures

Protocol Integrity checks

CRC

Coverage

3/20

Page 4: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Approach

Analysis

Effect

Wrong Time

Time Accuracy

DoS

Threat

Attack Group

AUTOSAR SWS 676

“Time Synchronization over Ethernet”

IEEE 802.1AS-2011

“Timing and Synchronization for Time-Sensitive Applications”

IETF RFC 7384

“Time Protocol Security Requirements”

Analysis Automotive time synchronization is realized acc. to AUTOSAR which references gPTP acc. to IEEE.

This analysis focusses on AUTOSAR SWS 676 (ETHTSYN), because automotive extensions and limitations as well as protocol and software interfaces are specified in detail.

RFC 7384 helps to group the threats and to categorize the effects.

Each threat leads to at least one out of the given effects.

Confidentiality is not a focus because the Time Base is a public source.

4/20

Page 5: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

… of Timesync Specifications Against Time Protocol Security Requirements

Analysis

By intercepting and removing of valid Timesync messages

By manipulation of Timesync messages

By delaying legitimate Timesync messages

Man in the Middle Attack

Corruption of the external clock sources used by the Global Time Master, e.g. GPS fraud

Corruption of the internal global time reference clock

Time Source Attack

Let nodes believe a time from the wrong Time Master

Master Selection Attack

Denial of Service Attack

By overloading the cryptographic components

On network at layer 2, e.g. message flooding

By overloading of Timesyncmessages

By Masquerading as a legitimate participant in the Timesync protocol

Spoofing Attack

Of legitimate Timesyncmessages

Replay Attack

By attacking exploits of Timesync protocol design and implementation vulnerabilities

Vulnerability Attack

By using Timesync messages to identify addresses / latencies to figure out the topology

Network Backtracking

Analyze which specification item is vulnerable by which attack scenario

Man In The Middle Attack

Denial of Service (DoS) Attack

Time Source Attack

Analysis

5/20

Page 6: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Approach

Coverage

Check, whether a threat is already covered or not.

Uncovered threats are marked with an X.

Effect

Wrong Time

Time Accuracy

DoS

Threat

Attack Group

Analyze which threats are covered by existing countermeasures

Protocol Integrity checks

CRC

Coverage

6/20

Page 7: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

By intercepting and removing of valid Timesync messages

By manipulation of Timesync messages

By delaying legitimate Timesync messages

By overloading the cryptographic components

On network at layer 2, e.g. message flooding

By overloading of Timesync messages

Corruption of the external clock sources used by the Global Time Master, e.g. GPS fraud

Corruption of the internal global time reference clock

By Masquerading as a legitimate participant in the Timesync protocol

Of legitimate Timesyncmessages

Let nodes believe a time from the wrong Time Master

By using Timesync messages to identify addresses / latencies to figure out the topology

Protocol Integrity Checks

CRC

Timeout Detection

Time Leap Check

… Regarding Already Supported Protection Against Vulnerability

Coverage

Man in the Middle Attack

Denial of Service Attack

Time Source Attack

Spoofing Attack

Replay Attack

Master Selection Attack

Network Backtracking

Threat coverage by existing specification

Coverage

X

X

X

X

X

XX

X

X

By attacking exploits of Timesync protocol design and implementation vulnerabilities

Vulnerability Attack

7/20

Page 8: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Approach

Open Threats

Certain threats cannot be solved on protocol-level

These threats are out of scope of this security concept.

Mark them with an X.

Define focus items.

Effect

Wrong Time

Time Accuracy

DoS

Threat

Attack Group

Open Threats

Identify relevant open threats

Authentication of a Time Master [clock identity]

Protection against Denial of Service (DoS)

8/20

Page 9: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

By intercepting and removing of valid Timesync messages

By manipulation of Timesync messages

By delaying legitimate Timesync messages

By overloading the cryptographic components

On network at layer 2, e.g. message flooding

By overloading of Timesyncmessages

Corruption of the external clock sources used by the Global Time Master, e.g. GPS fraud

Corruption of the internal global time reference clock

By Masquerading as a legitimate participant in the Timesync protocol

Of legitimate Timesyncmessages

Let nodes believe a time from the wrong Time Master

By attacking exploits of Timesync protocol design and implementation vulnerabilities

By using Timesync messages to identify addresses / latencies to figure out the topology

Protocol Integrity Checks

CRC

Timeout Detection

Time Leap Check

By overloading the cryptographic components

By overloading of Timesync messages

Let nodes believe a time from the wrong Time Master

By Masquerading as a legitimate participant in the Timesync protocol

… With Given Focus Points

Open Threats

Man in the Middle Attack

Denial of Service Attack

Time Source Attack

Spoofing Attack

Replay Attack

Master Selection Attack

Vulnerability Attack

Network Backtracking

Define threats as focus items to prepare the countermeasure phase

Open Threats

X

X

X

X

X

9/20

Page 10: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Approach

Countermeasures

At least one of the given countermeasures solves the threat.

Reminder:Confidentiality is not a focus because the Time Base is a public source.

Countermeasures

Authentication of a Time Master [clock identity]

Ensure integrity of Timesync messages

Prevention of Spoofing Attacks

Protection against Denial of Service (DoS)

Protection against Replay Attacks

State- and time-based refresh of cryptographic keys

Ensure high performance of Timesync protocol and SW

Protection against Timesync message delay and interception

Allow operation in a mixed secure and non-secure environment

Confidentiality of time synchronization message data X

OR

1=OK0=NOK

Threat

Attack Group

Countermeasures

Specify countermeasures to solve open threats

Integrated Timesync protocol security check using Message Authentication Codes (MAC)

Message gap check

10/20

Page 11: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

By intercepting and removing of valid Timesync messages

By manipulation of Timesync messages

By delaying legitimate Timesync messages

By overloading the cryptographic components

On network at layer 2, e.g. message flooding

By overloading of Timesyncmessages

Corruption of the external clock sources used by the Global Time Master, e.g. GPS fraud

Corruption of the internal global time reference clock

By Masquerading as a legitimate participant in the Timesync protocol

Of legitimate Timesyncmessages

Let nodes believe a time from the wrong Time Master

By attacking exploits of Timesync protocol design and implementation vulnerabilities

By using Timesync messages to identify addresses / latencies to figure out the topology

Protocol Integrity Checks

CRC

Timeout Detection

Time Leap Check

Message Gap Check

Message Gap Check

Authentication

Authentication

… to Increase the Protection Against Vulnerability

Countermeasures

Man in the Middle Attack

Denial of Service Attack

Time Source Attack

Spoofing Attack

Replay Attack

Master Selection Attack

Vulnerability Attack

Network Backtracking

Countermeasures

Specify countermeasures to solve open threats

Integrated Timesync protocol security check using Message Authentication Codes (MAC)

Message gap check

X

X

X

X

X

CRC Authentication

11/20

Page 12: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Authentication

Countermeasures

Countermeasures

Specify countermeasures to solve open threats

Integrated Timesync protocol security check using Message Authentication Codes (MAC)

Message gap check

(T)*MAC will be placed at the end of an AUTOSAR TLV**which is a part of the Follow_Up message.

*truncated **Type Length ValueFollow_Up Message Header

AUTOSAR TLV Header with organizationId 0x1A75FB

IEEE TLV with organizationId 0x0080C2

Follow_Up Message Fields

preciseOriginTimestamp

Type = 0x30

Length = 16

TmacByte_0

TmacByte_[…]

TmacByte_15

Sub-TLV [Time]

Sub-TLV [Status]

Sub-TLV [UserData]

Sub-TLV [OFS]

Sub-TLV […]

Sub-TLV [TMAC]

Calc

12/20

Page 13: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

… Denial of Service Protection

Countermeasures

Time Master and Time Slave are checking whether a gPTP message has been received earlier than a minimum allowed time span.

If so, the message will be dropped.

Countermeasures

Specify countermeasures to solve open threats

Integrated Timesync protocol security check using Message Authentication Codes (MAC)

Message gap check

Timesync Cycle Timesync Cycle

t

TMinMsgGap

Cyclic Timesync Message

Unexpected Timesync Message

Asynchronous Timesync Message

13/20

Page 14: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Use Case:

1. Initial Secure Global Time

Secure Global Time The DCM triggers the modification of secured Time Bases by the diagnostic tester via SWC.

The updated time will be distributed to the network.

Implementation in Software on Example of AUTOSAR

Outlook

RTE

COM

Application

DCM

STBM

CDD

CANTSYN FRTSYN ETHTSYN

FRCAN

SWC

SYS DIAG

CRYPTO

ETH

gPTP

14/20

Page 15: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Use Case:

2. Authentic Global Time

Secure Global Time ETHTSYN implements gPTP with TMAC support.

The STBM calculates/verifies the TMAC by using the keys given by the KEYM and the methods provided by the CSM.

The SECOC generates freshness values for secure on-board communication by using the synchronized monotonously increasing time value.

Implementation in Software on Example of AUTOSAR

Outlook

RTE

COM

CSM

Application

SECOC

STBM

CDD

ETHTSYN

FRCAN

SYS DIAG

KEYM

ETH

CRYPTO

gPTP

15/20

Page 16: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Use Case:

3. Secure Time Services

Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

The SEM logs events along to a secure Time Base.

Implementation in Software on Example of AUTOSAR

Outlook

RTE

COM

Application

SEM

STBM

CDDFRCAN

SYS DIAG

ETH

CRYPTO

16/20

Page 17: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Use Case:

4. Global CertificateExpiration Time

Secure Global Time The KEYM verifies the certificate expiration time against the secure Time Base.

Implementation in Software on Example of AUTOSAR

Outlook

RTE

COM

Application

STBM

CDDFRCAN

SYS DIAG

ETH

CRYPTO

KEYM

17/20

Page 18: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Making gPTP Capable for Secure Time Synchronization

Summary

gPTP is facing the same security threats like any other Ethernet protocol

Some of those threats are already caught by the current specification.

Especially the usage of an authenticated Time Base increases robustness of the gPTP.

Nevertheless, making gPTP secure is an ongoing process.

A Layer 2 Firewall helps to increase the protection level.

18/20

Page 19: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Making gPTP Capable for Secure Time Synchronization

Questions?

19/20

Page 20: Making gPTP Capable for Secure Time Synchronization · Secure Global Time The STBM logs TMAC calculation/verification events to the SEM.

© 2018. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00.02 | 2018-10-09

Author:Jesse, BerndVector Germany

For more information about Vectorand our products please visit

www.vector.com


Recommended