Skip to content

Latest commit

 

History

History
107 lines (77 loc) · 6.86 KB

README.md

File metadata and controls

107 lines (77 loc) · 6.86 KB

FITSec - The ETSI TS 103 097 implementation

Overview

The library provides the security envelop to be used for the Intelligent Transport Systems G5 communication based on ETSI EN 302 636-4-1. The library is fully conformed to ETSI TS 103 097 v1.2.1 with optional support of non-published v1.2.5. The new version ETSI TS 103 097 v1.3.1 is published at October 2017. It is ASN.1 based and the library is not (yet?) compatible with it.

The library is written in plain C in cross-platform manner and has been compiled and tested in Linux(gcc) and Windows(mingw32,cygwin and Visual C 13) environments.

It implements the plugin interface to use various crypto engines. For the moment, only the OpenSSL engine is implemented, but support of HSM (Hardware Security Module) is in the plan. Please see the fitsec_openssl.c for the example of plugin implementation.

User API

The main API is defined in the fitsec.h header. I really invite you to have a look into this file to understand the meaning of various parameters.

Initialization

  1. First of all, the instance of the engine must be created using the FitSec_New. This function takes a configuration strucutre as a parameter. This configuration strucure can be initialized using the FitSecConfig_InitDefault.

  2. Install all necessary certificates using function FitSec_InstallCertificate. All certificates installed by this function will be considered as trusted. Any types of certificates can be installed. Authorization tickets shall be followed by the correspondent private keys. (Note: This behavior will be changed in order to support HSM).

Outgoing Messages

Processing of outgoing messages is splitted to two stages:

  • preparation of the message header
  • signing and/or encryption of the message

In order to optimize the memory manipulatoin efforts, all operations are done directly in the buffer provided by the facility layer. This buffer can be passed later to the transport layer. The size of the buffer shall be well enough to contain all security headers, certificates and the payload of the message. The GeoNetworking Security Header takes place between Basic Header and Common Header elements in GeoNetworking message strucure. So, to send a secured GN message, facylity layer shall perform following actions:

  • prepare Basic GN Header
  • call FitSec_PrepareMessage to prepare Security header
  • fill the payload buffer with the payload data, starting from Common GN Header, update the payload size field in message information structure. (Note: Please don't spend too much time in this stage because it can violate the CAM signing rules.)
  • call FitSec_SignMessage to encrypt and/or sign the message.

Please see the fitsec.h for function descriptions.

Preparation of message header

As soon as GeoNetworking layer prepared the Basic Header, it can call FitSec_PrepareMessage to create the Security Header element and to put it into outgoing buffer. This function must be called with following parameters:

  • buffer and maximum buffer length. This parameter shall point to the outgoing memory buffer right after the Basic Header element.
  • message information strucuture, containing:

The function creates the ITS Security Header in the provided buffer and fill the message information structure with:

  • payload offset - the pointer to the memory buffer where facility layer can put the payload
  • max payload size - the maximum size of payload buffer. Facility layer shall put the actual payload size there
  • certificate to be used - it takes into account provided ITS AID, SSP, timestamp and location
  • signer type (certificate, digest, chain).

The function can override the payload type if it is required by the security profile. The CAM and DENM security profile requires the payload to be signed but not encrypted.

The data in the message information strucure will be used on the next stage, so please keep it unchanged, excepting of payload size.

The function returns the offset in the buffer to copy the payload or -1 if case of some error. The error id and error description are provided in the message information strucure.

Please see the fitsec.h for function descriptions.

Preparing of payload

The GeoNetworking layer needs to create the Common Header and, optionally the Extended Header elements, and to put the facility layer payload into the outgoing buffer.

The total length of these elements shall be set in the payload size field in the message information strucure.

Signing and/or encrypting of the message

When payload creation is well done, the message could be encrypted and/or signed, depending of the payload type. The GN layer must call FitSec_SignMessage to perform these tasks. This functions takes same parameters as the FitSec_PrepareMessage.

Note: encryption is not implemented yet. See Limitations section

The function returns the full size of secured packet or -1 in case of error. The error id and error description are provided in the message information strucure.

Incoming Messages

The function FitSec_Verify can be used to verify the incoming message signature.

It will fill the content of the message information structure:

  • payload, payload size and payload type
  • position and generation time
  • signer info type and signing certificate (if any)
  • Application ID and SSP bits of certificate.

Function verifies the message signature, returns true or false and fill the error id and the error description elements in the message information structure.

It is up to facility layer to check the conformance of the incoming message with correspondent SSP bitfield and to take or doesn't take it into account.

The function FitSec_Decrypt will be implemented soon to be able to use encrypted messages.

Limitations

  • The library doesn't support encryption for the moment.

Author

The library was created in 2015-2016 by Denis Filatov (danya.filatov()gmail.com) in order to validate the ETSI's ITS security test suite. The library is free for non-commercial and not-for-profit usage, otherwise please contact the author.