The Signalling Programme Fjernbane Infrastructure East/West BAFO Tender Document / Appendix 3.1 Att 11 Online Key Management System Concept Banedanmark The Signalling Programme Amerika Plads 15 DK-2100 Copenhagen E Denmark Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Author: Fjernbane Signalling System Project Mail: Fjernbane@bane.dk Phone: +45 8234 0000 www.banedanmark.dk Att 11 OKMS Concept Page 2 of 12 Att 11 OKMS Concept Table of Contents 1 Change Log 2 2.1 2.1.1 2.1.2 Introduction Goals and prerequisites Concept Description KMS Delivery Fjernbane Infrastructure East/West Document1 Page 4 Tender Document / Appendix 3.1 Version 2.0 5 5 7 11 Att 11 OKMS Concept Page 3 of 12 1 Change Log Made by Version SODE/ 2.0 Commented Approved by Status by Issued to Tenderers for BAFO 27.06.2011 Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Att 11 OKMS Concept Page 4 of 12 2 Introduction Introduction The security in the message flow in ERTMS Level2 signalling systems is based on the use of a secret key that must be known by both the train and the infrastructure. The distribution of these secret keys (KMACs) is a problem due to the fact that KMACs -as per current practise described in the UNISIG subset - are to be installed “manually” during service periods in trains, and infrastructure. This has lead to praxis in specific Level2 networks to simplify the KMAC usage by having only one KMAC common for many trains and large infrastructure areas. This has both Security and Safety implications because a secret shared by many parties is effectively not a secret. A mismanaged KMAC can easily be compromised and thereby potentially compromise the security of the railway network which in turn compromises safety of operations.1 The large number of ETCS elements in the Signalling Programme that is supposed to enclose the whole country makes it even more demanding to create an enhanced system for handling and distributing KMACs. In the following the “Online Key Management System Concept” (OKMS) for the Danish infrastructure describes a Key Management System as a combination of a Key Managemnet Centre and an online Key Distribution System. The aim is to keep the basic functionalities of the current specifications as they are while enhancing the security of using secret key pairs by enhancing the possibility to renew KMACs for entities in the Danish domain. It is our belief that OKMS will solve the security as well as the safety issues mentioned and that the established system will be able to manage a large ERTMS Level2 infrastructure cost effectively. 2.1 Goals and prerequisites The main goals for the OKMS concept are the following: 1. To implement a Key Management Centre that is: o Interoperable The secret key – the KMAC - is regarded as an obvious target for hackers and others that might want to introduce threats, denial of service attacks or catastrophic events on the rail traffic. As the railway infrastructure turns more and more towards IP based solutions threats are to be found in new types of communities. 1 Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Att 11 OKMS Concept Page 5 of 12 o provides the management interface for: Creating Renewing Disabling of KMACs 2. To implement a secure online service for the Danish domain entities based on “Commercial Off The Shelf” products for IP based systems. 3. To implement an online distribution system for KMACs for the Danish domain entities2 covering as both visiting trains and roaming trains. Prerequisites The prerequisites of the requirements are the following strategic decisions taken by the Signalling Programme: 1. The Danish ERTMS infrastructure and OBUs must be enabled for packet switched mobile data access (GPRS/EDGE) and thus consists of IP enabled entities. 2. The security of transmission based on the Euroradio protocol must be enhanced without impacting the protocol by allowing changing the security keys on a regular basis or on request. 3. The KMAC distribution concept should be based on “One Unique KMAC per OBU” in order to make it easy to revoke compromised KMACs. 4. Use of an asymmetric key (Private- and Public- Key) based online distribution system for secured online data exchange instead of symmetric KTRANS keys, to provide authenticity, integrity and confidentiality on distribution of files containing KMACs. 5. The Danish enhancements to the ERTMS standard must follow or be compatible with ERA specifications. That applies particularly for the usage of packet switching in ETCS (CR741) and the evolving specifications and recommandations for off-line Key Management (SUBSET 114 and SUBSET 038). 2 Danish domain includes Danish Radio Block Centres (RBCs) and Danish OnBoard Units (OBUs) Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Att 11 OKMS Concept Page 6 of 12 2.2 Concept Description The goals and prerequisites lead to the following subdivision of the OKMS concept: 2.2.1 Key Management Centre (KMC).3 Infrastructure for secure online distribution (PKI). Key Distribution Centre functionality (KDC). OnBoard enhancements for Online Key Distribution (OBU+). Key Management Centre The concept for the Management of KMACs in the Signalling Programme domain is basically the same as in any other KMC: It must be interoperable it must provide the security consistent with the domain it must provide access management for trains visiting the domain and for own OBUs that need to roam to foreign ERTMS domains “Neighbouring KMC” domains EAST and WEST is and option in the Danish infrastructure. If OPT 10 is chosen ther will be only one KMC in Denmark. 3 Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Att 11 OKMS Concept Page 7 of 12 The basic ERTMS KMC functionality of the KMC is to manage the secret key usage (KMAC) in the domain of the KMC and to provide interface for KMACs that are to be exchanged with foreign KMCs. The KMC controls the use KMAC keys in the domain for as well domain OBUs and RBCs as for visitors in the domain. The KMC is also managing foreign KMACs to be used by national trains that need to visit foreign domains (roamers)4. The user interface of the KMC should support creation of “secret key racks” for OBUs and RBCs in the domain and be able to issue “immediate” and coordinated renewal of “secret key racks” in security/safety critical situations. According to the evolving SUBSET 114 it may also be required to handle lifetime confined KMACs in RBCs – these and other details should be defined during the “Joint Design” process. The KMC should be able to establish and update a “Domain” view of the KMAC usage. The figure below is an example of how such a “domain view” may look5: 4 5 Roaming needs to be prearranged and secret kys exchanged in advance by the KMCs KMACs to be used in RBC-RBC handovers should be specified seperately. Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Att 11 OKMS Concept Page 8 of 12 DOMAIN TRAFFIC NATIONAL TRAFFIC RBCy.se RBCx.de RBCy.de Remarks KM1.dk KM1.dk KM1.dk KM1.dk KM1.dk KM1.dk KM1.dk KMx.de KMy.de DSB example KM2.dk KM2.dk KM2.dk KM3.dk KM2.dk KM3.dk KM2.dk KM2.dk KM2.dk KMx.de KMy.de KMx.dk KM2.dk ... KMx.dk KMx.dk KMx.dk KMx.se KMy.se KMx.dk KMy.dk KMx.nl KMx.nl KMx.se KMy.se KMx.dk KMy.dk KMx.nl KMx.nl KMx.se KMy.se KMx.dk KMæ.dk KMz.de KMø.dk KMæ.dk KMå.dk KMø.dk RBCz.se RBCx.se RBC-RBC KMACK Left RBC-RBC KMACK Rigth RBCx.dk VISITOR TRAFFIC OBU x.se OBU y.se OBU x.de OBU y.de OBU x.nl OBU y.nl .. .. RBC3.dk OBU 2.dk OBU 3.dk . . OBU x.dk National OBU´s in foreign Domains RBC2.dk 2) 1) RBC1.dk OBUid/RBCid KMAC OBU 1.dk FOREIGN DOMAIN (ROAMING) TOC example KM2.dk KM2.dk KMx.de KMy.de TOC example 1) RBC secret key rack 2) OBU secret key rack KMx.dk KMx.nl KMx.nl KMx.se KMå.dk RBCs uses KMAC Euroradio over IP during domain RBC-RBC HO RBCs uses KMAC Euroradio over a joint design connection during borderline RBC-RBC HO KMC-KMC KTRANS SE KMC-KMC KTRANS DE KMC-KMC KTRANS NL KMC-KMC KTRANS BE " " Figur 1 Domain view Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Att 11 OKMS Concept Page 9 of 12 The table shows “OBU secret key rack”s in rows and “RBC secret key rack”s in columns. The yellow and the green area shows the KMAC references to be used by domain OBUs inside (yellow) the home domain and outside (green) in foreign domains. The extensions of the KMAC references KMx.dk or .se or .de are denoting the origin or the KMC that have issued the KMAC. The example reflects the possibility to have “one KMAC per train” within the home domain and either having exported or imported KMACs when roaming. The blue area shows foreign OBUs that need to have access to the domain either using imported keys in the KMC or keys issued by BDK to be used foreign trains. 2.2.2 PKI infrastructure for secure online distribution As online distribution of KMACs and other online communications e.g. between Hand Held Terminals and TMS, are containing safety critical data, special measures need to be taken to communicate data securely. It is envisaged that there is a need to set up a Public key Infrastructure server and to take advantage of the TCP/IP protocol suite in order to secure authentication, integrity and confidentiality on online communications. 2.2.3 The PKI should be using a de facto standardised hybrid-cryptosystem including mutual authentication. It is recommended that the system should be based on TLS6 as it provides a high level of security and is well-known IP technology. Key Distribution Centre (KDC) functionality. The functionality of the KDC is to establish a distribution server for “secret key rack” /KMAC data produced in the KMC to be delivered to domain OBUs and RBCs. The KDC shall have access to KMC data and utilize the secure PKI infrastructure to connect domain OBUs and RBCs and manage a download processes of the “secret key rack”s. The aim of current draft UNISIG SUBSET 114 is to specify an offline distribution standard for KMAC data between KMC and OBU. Therefore the joint design process should take SUBSET 114 into consideration. 6 Transport Layer Security (TLS) standardised by IETF in RFC 5246 Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Att 11 OKMS Concept Page 10 of 12 The KDC shall be able to send a “semaphore” to let an OBU/RBC know that an immediate “secret key rack” update is necessary. The semaphore might be sent via SMS for triggering the OBUs to look for new keys. The fact that the KDC and the RBCs are IP connected makes it fast and easy to revoke a compromised key from the infrastructure and thereby mitigate the risk of masquerading MAs. As the OBUs are not aways online seen form the KDC a “network first” migration strategy should be preferred also in case of a normal frequent key renewal procedure. RBCs should accept both “current and new” KMACs over a migration period large enough for all OBUs to be updated. 2.2.4 OnBoard Online Key Management enhanced functionality In order to provide support for Online Key Management a Danish domain OBU must include special software to support the following key management process: The EVC should activate an ”update secret key rack” procedure before the Euroradio protocol is activated during the “open desk procedure”.7 or The EVC should activate at any time the ”update secret key rack” procedure caused be “a semaphore request” received e.g. via SMS . The procedure8 should establish a TLS based session to the KDC and download new versions of “secret key rack” tables. When the procedure has taken place the normal procedure should be continued. Note: When OBUs are travelling in GSM-R networks that do not support GPRS/EDGE it will not be possible for the OBU to contact the home domain KDC. As a consequence the OBU sw should not activate the update process if the ETCS variable for GPRS support is not “true” (i.e. last ETCS session balise read). 2.3 OKMS Delivery For the Fjernbane Infrastructure and On-board Contracts the Suppliers will be asked to deliver an online Key Management System encompassing both ETCS Infrastructure, Onboard Units and other relevant parts of the Signalling System like TMS and Handheld Terminals. On-line secured solutions as mentioned above are commonly used in client server solutions IP based solutions. The Customer will work for the timely specification of On7 The key update procedure must not conflict with interoperability ie be finalised before SoM is initiated. 8 The protocol vher the OBU present its EVC-id and current ”key rack version” and eventually downloads a new version (joint design issue). Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Att 11 OKMS Concept Page 11 of 12 line Key Management for ERTMS in the framework of the ERTMS Users Group and the Fjernbane Infrastructure and On-board Suppliers will be expected to jointly drive the work on UNISIG side. Requirements not covered by the evolving ERTMS specifications for Key Management will be defined during the “Joint Design Phase” of the Signalling Programme. Fjernbane Infrastructure East/West Document1 Tender Document / Appendix 3.1 Version 2.0 Att 11 OKMS Concept Page 12 of 12