OCF 2.3 RBSTG: Bridging Security Editorial Cleanup Sec WG CR Legal Disclaimer

Similar documents
OCF 2.0 Clarify 10 parts on Section 7 SecWG CR2473. Legal Disclaimer

OCF Cleveland release Device Management SVR part security firmware update - Security WG CR Legal Disclaimer

OCF Security Specification

OIC SECURITY SPECIFICATION V1.1.1

OCF 2.0 Semantic Tagging ATG CR1970. Legal Disclaimer

OCF 2.0 Constrained Device Support OIC 1.1 Core Technology WG CR Legal Disclaimer

OCF Core Specification Extension

OCF 2.0 Clarify OCF CPLAttributes Extension, Section X, add Security OIDs, remove credid, update security profiles - Security WG CR 2529/2549

OCF 2.3 New Resources for Gas Consumption DMWG CR Legal Disclaimer

The Open Protocol for Access Control Identification and Ticketing with PrivacY

Internet Engineering Task Force (IETF) ISSN: January Suite B Profile for Transport Layer Security (TLS)

AN12120 A71CH for electronic anticounterfeit protection

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore

IoTivity Big Picture. MyeongGi Jeong Software R&D Center

IoTivity: The Open Connectivity Foundation and the IoT Challenge

ECMA-409. NFC-SEC-02: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM. 2 nd Edition / June Reference number ECMA-123:2009

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

Apple Inc. Certification Authority Certification Practice Statement

This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification.

Document Number Document Name: Date: Abstract:

Encrypted Object Extension

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)

PKCS #15: Conformance Profile Specification

ETSI GS MEC 016 V1.1.1 ( )

Intended status: Standards Track January 13, 2015 Expires: July 17, 2015

ONEM2M TECHNICAL SPECIFICATION

Security Association Creation

August, Actividentity CTO Office

Connecting Securely to the Cloud

Provisioning IoT with Web NFC. Zoltan Kis Intel

ONEM2M TECHNICAL SPECIFICATION

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

ENVIRONMENTAL SENSING PROFILE

ETSI TS V ( )

Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv!

Internet Engineering Task Force (IETF) Request for Comments: 7518 Category: Standards Track May 2015 ISSN:

1 scons --debug=explain VERBOSE=true RELEASE=false TARGET_TRANSPORT=IP DRAFT

Device Provisioning Protocol Specification

ISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory: Procedures for distributed operation

ISO/IEC INTERNATIONAL STANDARD

FIPS Security Policy

Certification Report

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

ETSI TS V1.1.1 ( )

onem2m-ts-0008-coap Protocol Binding-V CoAP Protocol Binding Technical Specification

Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing

Wireless Innovation Forum Contribution

Draft ETSI EN V ( )

ETSI GS MEC 014 V1.1.1 ( )

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification

ISO/IEC INTERNATIONAL STANDARD

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Internet Engineering Task Force (IETF) Request for Comments: 5754 Updates: 3370 January 2010 Category: Standards Track ISSN:

TECHNICAL SPECIFICATION

RUNNING SPEED AND CADENCE SERVICE

OCF Core Specifiation

ISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

ETSI TS V ( )

WiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic

ETSI TS V7.0.0 ( ) Technical Specification. Smart Cards; Extensible Authentication Protocol support in the UICC (Release 7)

Bluetooth low energy security, how good is it? Petter Myhre Bluetooth World, San Jose March 2017

Delegated Access Control Extension

Credential Management for Internet of Things Devices

INTERNATIONAL STANDARD

Summary of Updates CPS Revision 7 (Amendment from CPS Revision 6) 15 June 2018

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013

ETSI TS V ( )

TELIA MOBILE ID CERTIFICATE

ISO/IEC INTERNATIONAL STANDARD

NEXT DST CHANGE SERVICE

ONEM2M TECHNICAL SPECIFICATION

CI Plus ECP Specification v1.0 ( )

ETSI GS MEC 026 V2.1.1 ( )

ETSI TS V1.2.1 ( ) Technical Specification

JSON Web Algorithms (JWA) draft-ietf-jose-json-web-algorithms-01

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017

This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification.

SONERA MOBILE ID CERTIFICATE

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6160 Category: Standards Track April 2011 ISSN:

Certification Report

QPP Proprietary Profile Guide

This document is a preview generated by EVS

ISO/IEC INTERNATIONAL STANDARD. Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology

SSL Certificates Certificate Policy (CP)

Worksheet for the Application Software

ISO INTERNATIONAL STANDARD. Health informatics Harmonized data types for information interchange

UnionPay QuickPass Terminal Product Certification Rules

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

ISO/IEC INTERNATIONAL STANDARD

Power of open source communities to onem2m

This document is a preview generated by EVS

ETSI GS ZSM 006 V1.1.1 ( )

Using EAP-TLS with TLS 1.3 draft-mattsson-eap-tls IETF 101, EMU, MAR John Mattsson, MOHIT sethi

Hypori Virtual Mobile Infrastructure Platform Android Cloud Environment Client Common Criteria Assurance Activities Report

Policy for Certification of Private Label Products Within the Cradle to Cradle Certified Certification Scheme. Version 1.0.

ETSI TS V ( )

ISO/IEC INTERNATIONAL STANDARD

Transcription:

Template version: 1.2 page 1 2.3 RBSTG: Bridging Security Editorial Cleanup Sec WG CR 2685 Legal Disclaimer THIS IS A DRAFT SPECIFICATION DOCUMENT ONLY AND HAS NOT BEEN ADOPTED BY THE OPEN CONNECTIVITY FOUNDATION. THIS DRAFT DOCUMENT MAY NOT BE RELIED UPON FOR ANY PURPOSE OTHER THAN REVIEW OF THE CURRENT STATE OF THE DEVELOPMENT OF THIS DRAFT DOCUMENT. THE OPEN CONNECTIVITY FOUNDATION AND ITS MEMBERS RESERVE THE RIGHT WITHOUT NOTICE TO YOU TO CHANGE ANY OR ALL PORTIONS HEREOF, DELETE PORTIONS HEREOF, MAKE ADDITIONS HERETO, DISCARD THIS DRAFT DOCUMENT IN ITS ENTIRETY OR OTHERWISE MODIFY THIS DRAFT DOCUMENT AT ANY TIME. YOU SHOULD NOT AND MAY NOT RELY UPON THIS DRAFT DOCUMENT IN ANY WAY, INCLUDING BUT NOT LIMITED TO THE DEVELOPMENT OF ANY PRODUCTS OR SERVICES. IMPLEMENTATION OF THIS DRAFT DOCUMENT IS DONE AT YOUR OWN RISK AMEND AND IT IS NOT SUBJECT TO ANY LICENSING GRANTS OR COMMITMENTS UNDER THE OPEN CONNECTIVITY FOUNDATION INTELLECTUAL PROPERTY RIGHTS POLICY OR OTHERWISE. IN CONSIDERATION OF THE OPEN CONNECTIVITY FOUNDATION GRANTING YOU ACCESS TO THIS DRAFT DOCUMENT, YOU DO HEREBY WAIVE ANY AND ALL CLAIMS ASSOCIATED HEREWITH INCLUDING BUT NOT LIMITED TO THOSE CLAIMS DISCUSSED BELOW, AS WELL AS CLAIMS OF DETRIMENTAL RELIANCE. The logo is a trademark of Open Connectivity Foundation, Inc. in the United States or other countries. *Other names and brands may be claimed as the property of others. Copyright 2018 Open Connectivity Foundation, Inc. All rights reserved. Copying or other form of reproduction and/or distribution of these works are strictly prohibited.

Template version: 1.2 page 2 **** Section 2 Normative References **** Z-Wave Plus Device Type Specification https://www.silabs.com/documents/login/miscellaneous/sds11847-z-wave-plus-device-type- Specification.pdf Z-Wave Plus Role Type Specification https://www.silabs.com/documents/login/miscellaneous/sds14224-z-wave-plus-v2-device-type- Specification.pdf Zigbee 053474, Zigbee Specification, August 2015 http://www.zigbee.org/zigbee-for-developers/zigbee-3-0/ ****** Section 3.1 Terms and Definitions ****** 3.1.y Bridge Note 1 to entry: The details are defined in Bridging Specification. 3.1.X Bridging Platform Note 1 to entry: The details are defined in Bridging Specification ****** Section 3.2 Acronyms and Abbreviations ******

Template version: 1.2 page 3 Symbol Description AC Access Control ACE Access Control Entry ACL Access Control List AES Advanced Encryption Standard. See NIST FIPS 197, "Advanced Encryption Standard (AES)" AMS Access Management Service CMS Credential Management Service CRUDN CREATE, RETREIVE, UPDATE, DELETE, NOTIFY CSR Certificate Signing Request CVC Code Verification Certificate ECC Elliptic Curve Cryptography ECDSA Elliptic Curve Digital Signature Algorithm EKU Extended Key Usage EPC Embedded Platform Credential EPK Embedded Public Key DOTS Device Ownership Transfer Service DPKP Dynamic Public Key Pair ID Identity/Identifier JSON JavaScript Object Notation. See Core Specification. JWE JSON Web Encryption. See IETF RFC 7516, "JSON Web Encryption (JWE)" JWS JSON Web Signature. See IETF RFC 7515, "JSON Web Signature (JWS)" KDF Key Derivation Function MAC Message Authentication Code MITM Man-in-the-Middle NVRAM Non-Volatile Random-Access Memory OC Owner Credential OCSP Online Certificate Status OBT Onboarding Tool Open Connectivity Foundation. See Core Specification. OID Object Identifier OOB Out Of Band OTM Owner Transfer Method OWASP Open Web Application Security Project. See https://www.owasp.org/ PE Policy Engine PIN Personal Identification Number PPSK PIN-authenticated pre-shared key PRF Pseudo Random Function PSI Persistent Storage Interface PSK Pre Shared Key RAML RESTful API Modeling Language. See Core Specification. RBAC Role Based Access Control RM Resource Manager RNG Random Number Generator SACL Signed Access Control List SBAC Subject Based Access Control SEE Secure Execution Environment SRM Secure Resource Manager SVR Security Resource SW Software

Template version: 1.2 page 4 UAID Unique Authenticable Identifier URI Uniform Resource Identifier. See Core Specification. VOD Device. See Bridging Specification Table 1 Acronyms and abbreviations ****** Section Z (introduced in CR 2595) ****** Z.1 Bridging Security Z.1.1 Universal Requirements for Bridging to another Ecosystem The Bridge shall go through ownership transfer as any other onboardee would. The software of an Bridge shall be field updatable. (This requirement need not be tested but can be certified via a vendor declaration.) Each VOD shall be onboarded by an OBT. Each Device should be provisioned as appropriate in the. In other words, VODs and Devices are treated the same way as physical Devices. They are entities that have to be provisioned in their network. Each VOD shall implement the behaviour required by the Core Specification and the Security Specification. Each VOD shall perform authentication, access control, and encryption according to the security settings it received from the OBT. Each Device shall implement the security requirements of the. In addition, in order to be considered secure from an perspective, the Bridge Platform shall use appropriate ecosystem-specific security options for communication between the Devices instantiated by the Bridge and Devices. This security shall include mutual authentication, and encryption and integrity protection of messages in the bridged ecosystem. A VOD may authenticate itself to the DOTS using the Manufacturer Certificate Based OTM (see section 7.3.6) with the Manufacturer Certificate and corresponding private key of the Bridge which instantiated that VOD. A VOD may authenticate itself to the Cloud (see Section 10.4.1) using the Manufacturer Certificate and corresponding private key of the Bridge which instantiated that VOD.

Template version: 1.2 page 5 Z.1.2 Additional Security Requirements specific to s Z.1.2.1 Additional Security Requirements specific to the AllJoyn For AllJoyn translator, an OBT shall be able to block the communication of all Devices with all Devices that don t communicate securely with the Bridge, by using the Bridge Device s oic.r.securemode Resource specified in the Bridging Specification. Z.1.2.2 Additional Security Requirements specific to the Bluetooth LE An Bridge shall block the communication of all Devices with all Devices that Z.1.2.3 Additional Security Requirements specific to the onem2m s The Bridge shall implement onem2m application access control as specified in the onem2m Security Specification. An Bridge shall block the communication of all Devices with all Devices that Z.1.2.4 Additional Security Requirements specific to the U+ An Bridge shall block the communication of all Devices with all Devices that Z.1.2.5 Additional Security Requirements specific to the Z-Wave An Bridge shall block the communication of all Devices with all Devices that Z.1.2.6 Additional Security Requirements specific to the Zigbee An Bridge shall block the communication of all Devices with all Devices that

Template version: 1.2 page 6 ****** Change to Annex AAA.2 (BLE) ****** Figure 1 shows how communications in both ecosystems of -BLE Bridge Platform are secured by their own security. -BLE Bridge Platform BLE Bridging Function BLE GATT BLE BLE GATT Secured by Security (e.g. CoAP over DTLS) Secured by BLE GAP security mode (e.g. mode 1 level 3) Figure 1 Security in -BLE Bridge ****** Change to Annex AAA.5 (Z-Wave) ****** Figure 3 presents how and Z-Wave communicate based upon their own security. g in -Z-Wave rid Bridge nplatform B Za v e c tio n -W F u Z-Wave Z-Wave Z-Wave Secured by Security Secured by Z-Wave Security Class (S2 Unauthenticated or higher) Figure 2 Security between and Z-Wave

Template version: 1.2 page 7 ****** Change to Annex AAA.6 (Zigbee) ****** Figure 3 shows how communications in both ecosystems of -Zigbee Bridge Platform are secured by their own security. -Zigbee ebridge Platform n b Z ig c tio n g F u 3g in.0 rid B Zigbee 3.0 Zigbee 3.0 Zigbee 3.0 Secured by Security Secured by Zigbee 3.0 Security (nwksecuritylevel>0x04) Figure 3 Security for and Zigbee 3.0