AUTOSAR FO RS IPsecProtocol
AUTOSAR FO RS IPsecProtocol
AUTOSAR FO R23-11
Disclaimer
This work (specification and/or software implementation) and the material contained in
it, as released by AUTOSAR, is for the purpose of information only. AUTOSAR and the
companies that have contributed to it shall not be liable for any use of the work.
The material contained in this work is protected by copyright and other types of intel-
lectual property rights. The commercial exploitation of the material contained in this
work requires a license to such intellectual property rights.
This work may be utilized or reproduced without any modification, in any form or by
any means, for informational purposes only. For any other purpose, no part of the work
may be utilized or reproduced, in any form or by any means, without permission in
writing from the publisher.
The work has been developed for automotive applications only. It has neither been
developed, nor tested for non-automotive applications.
The word AUTOSAR and the AUTOSAR logo are registered trademarks.
Contents
1 Scope of Document 4
2 Conventions to be used 5
2.1 Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3 Acronyms and abbreviations 6
4 Requirements Specification 7
4.1 Functional Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
5 Requirements Tracing 16
6 References 17
1 Scope of Document
This document defines requirements of IPsec in the AUTOSAR Foundation. The mo-
tivation is to ensure interoperability of IPsec within Adaptive platforms and between
Adaptive and Classic configurations.
2 Conventions to be used
The acronyms/abbreviations and terms not provided in tables above are included in the
AUTOSAR Glossary [2].
4 Requirements Specification
This chapter describes all requirements driving the work to define the IPsecProtocol.
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00006]{DRAFT} If encryption is used in IPsec, authentication shall
be used as well d
4
Dependencies: [RS_IPSEC_00001]
Use Case: In-vehicle secure communication
Supporting IETF RFC 8221 [10]
Material:
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00008] Pre-shared keys (PSK) shall not be used for directly setting
up IPsec security associations (SAs) d
Pre-shared keys (PSK) shall not be used for directly setting up IPsec security
Description:
associations (SAs). See IETF RFC 8221 section 3
Using PSKs to set up SAs directly would break many security features like
Rationale:
perfect forward secrecy and make replay attacks easier
Dependencies: [RS_IPSEC_00001]
Use Case: In-vehicle secure communication
Supporting IETF RFC 8221 [10]
Material:
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00009] Counter mode encryption algorithms shall not be used in
combination with pre-shared keys when setting up SAs directly d
c(RS_Main_00280, RS_Main_00510)
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00012] IKEv2 shall gracefully delete all SAs on shutdown and rebuild
the deleted SAs immediately after the next startup d
IKEv2 shall gracefully delete all SAs on shutdown according to IETF RFC 7296
Description:
section 1.4.1 and rebuild the deleted SAs immediately after the next startup.
Rationale: To keep the stateless properties of IPsec while minimizing service interruptions
Dependencies: [RS_IPSEC_00004]
Use Case: In-vehicle secure communication
Supporting IETF RFC 7296 [8]
Material:
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00013] IKEv2 shall support dead peer detection d
IKEv2 shall use dead peer detection according to IETF RFC 7296 section 2.4.
Description:
IETF RFC 3706 may be supported.
Rationale: Bandwidth management, to avoid sending data to dead peers
Dependencies: [RS_IPSEC_00004]
5
4
Use Case: In-vehicle secure communication
Supporting IETF RFC 7296 [8], IETF RFC 3706 [12]
Material:
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00014] IKEv2 shall support authentication based on X.509v3 certifi-
cates with digital signatures d
IPsec shall support the following encryption algorithm: AES in Counter with
Description: CBC-Mac Mode (EN CR_AES_CCM _16) with 256 bit keys and an integrity
check value (ICV) of 16 octets according to IETF RFC 4309
Rationale: Support industry security standard
Dependencies: [RS_IPSEC_00003], [RS_IPSEC_00004]
Use Case: In-vehicle secure communication
Supporting IETF RFC 4309 [17]
Material:
All algorithms which are classified as "MUST" in IETF RFC 8247 shall be
Description: supported by IKEv2. Algorithms classified as "MUST-" or lower may be
supported.
Rationale: Support industry security standard
Dependencies: [RS_IPSEC_00004]
Use Case: In-vehicle secure communication
Supporting IETF RFC 8247 [19]
Material:
IPsec’s Security Policy Database (SPD) shall be configurable for IPs, IP ranges,
Description:
protocols, ports and port ranges according to IETF RFC 4301 section 4.4.1.1.
Rationale: Support industry security standard
Dependencies: [RS_IPSEC_00001]
Use Case: In-vehicle secure communication
Supporting IETF RFC 4301 [5]
Material:
c(RS_Main_00280, RS_Main_00510)
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00024] IPsec shall not be used to protect the following ports:
500/UDP and 4500/UDP: used by IKEv2 d
IPsec shall not be used to protect the following ports: 500/UDP and 4500/UDP:
Description:
used by IKEv2
Rationale: Support industry security standard
Dependencies: [RS_IPSEC_00001]
Use Case: In-vehicle secure communication
Supporting –
Material:
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00025] IPsec’s Peer Authorization Database (PAD) shall be config-
urable for use with X.509v3 d
IPsec’s Peer Authorization Database (PAD) shall be configurable for use with
Description:
X.509v3 certificates according to IETF RFC 4301 section 4.4.3.
Rationale: Support industry security standard
Dependencies: [RS_IPSEC_00001], [RS_IPSEC_00004]
Use Case: In-vehicle secure communication
Supporting IETF RFC 4301 [5]
Material:
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00026] IPsec’s Peer Authorization Database (PAD) shall be config-
urable for use with pre-shared keys (PSK) d
IPsec’s Peer Authorization Database (PAD) shall be configurable for use with
Description:
pre-shared keys (PSK)
Rationale: Support industry security standard
5
4
Dependencies: [RS_IPSEC_00004]
Use Case: In-vehicle secure communication
Supporting
Material:
c(RS_Main_00280, RS_Main_00510)
[RS_IPSEC_00027] It shall be possible to define the priority order of the algo-
rithms used by IKEv2 during the IKE_INIT negotiations d
IKEv2 will be used to negotiate which algorithms are used during the IKEv2
Description: INIT phase. It shall be possible, but not required, to set a priority ordering of the
algorithms which can be used.
Rationale: Support industry security standard
Dependencies: [RS_IPSEC_00004]
Use Case: In-vehicle secure communication
Supporting
Material:
c(RS_Main_00280, RS_Main_00510)
5 Requirements Tracing
The following table references the features specified in [20] and links to the fulfillments
of these.
Requirement Description Satisfied by
[RS_Main_00280] Standardized Automotive [RS_IPSEC_00001] [RS_IPSEC_00002]
Communication Protocols [RS_IPSEC_00003] [RS_IPSEC_00004]
[RS_IPSEC_00005] [RS_IPSEC_00006]
[RS_IPSEC_00007] [RS_IPSEC_00008]
[RS_IPSEC_00009] [RS_IPSEC_00010]
[RS_IPSEC_00011] [RS_IPSEC_00012]
[RS_IPSEC_00013] [RS_IPSEC_00014]
[RS_IPSEC_00015] [RS_IPSEC_00016]
[RS_IPSEC_00017] [RS_IPSEC_00018]
[RS_IPSEC_00019] [RS_IPSEC_00020]
[RS_IPSEC_00021] [RS_IPSEC_00022]
[RS_IPSEC_00023] [RS_IPSEC_00024]
[RS_IPSEC_00025] [RS_IPSEC_00026]
[RS_IPSEC_00027]
[RS_Main_00510] Secure Onboard Communication [RS_IPSEC_00001] [RS_IPSEC_00002]
[RS_IPSEC_00003] [RS_IPSEC_00004]
[RS_IPSEC_00005] [RS_IPSEC_00006]
[RS_IPSEC_00007] [RS_IPSEC_00008]
[RS_IPSEC_00009] [RS_IPSEC_00010]
[RS_IPSEC_00011] [RS_IPSEC_00012]
[RS_IPSEC_00013] [RS_IPSEC_00014]
[RS_IPSEC_00015] [RS_IPSEC_00016]
[RS_IPSEC_00017] [RS_IPSEC_00018]
[RS_IPSEC_00019] [RS_IPSEC_00020]
[RS_IPSEC_00021] [RS_IPSEC_00022]
[RS_IPSEC_00023] [RS_IPSEC_00024]
[RS_IPSEC_00025] [RS_IPSEC_00026]
[RS_IPSEC_00027]
[RS_Main_00514] System Security Support [RS_IPSEC_00001] [RS_IPSEC_00002]
[RS_IPSEC_00003] [RS_IPSEC_00004]
[RS_IPSEC_00006] [RS_IPSEC_00010]
[RS_IPSEC_00014] [RS_IPSEC_00015]
[RS_IPSEC_00016] [RS_IPSEC_00017]
[RS_IPSEC_00018] [RS_IPSEC_00019]
[RS_IPSEC_00020] [RS_IPSEC_00021]
6 References
AUTOSAR_CP_RS_Features
none
none
none