FMS/TR-069 File Download Security Source: QUALCOMM Incorporated Contact(s): Anand Palanigounder Yinian Mao

Slides:



Advertisements
Similar presentations
Binding of cdma2000 access subscription with specific device(s) 3GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Advertisements

Use cases for Device Binding 3GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Page 1 Title: Traffic Detection Function Extensions for cdma2000 1x and HRPD Networks Sources: Qualcomm Contact: George Cherian
Mobile IPv4 FA CoA Support in WLAN Interworking Raymond Hsu Qualcomm Inc. Notice: QUALCOMM Incorporated grants a free, irrevocable license.
Dynamic HA Assignment for MIPv4 in WLAN Interworking Raymond Hsu, Qualcomm Inc., Wing C. Lau, Qualcomm Inc., Notice:
MIP6-HA-Local-Assignment-Capability indication to MS Contributors grant a free, irrevocable license to 3GPP2 and its Organization Partners.
XHRPD Example Scenario for MSS Masa Shirota Qualcomm Inc. July 15, GPP2 Dalian Meeting Recommendation: FYI Notice QUALCOMM Incorporated grants a.
3GPP2 A r0 3GPP2 C xxxr0 TSG-A WG3 and TSG-C WG2 Title: HRPD Redirect on EPC Unavailable Source: Mike DolanAlcatel-Lucent Dave.
HRPD Femto Local IP Access: Overview Peerapol Tinnakornsrisuphap Qualcomm October 27 th, GPP2 Seoul,
1 IP Service Authorization Support and Mobility Selection for X.S0011-E Source: QUALCOMM Inc.: Masa Shirota, George Cherian, Jun Wang,
Proposed High Level Solution for Device Binding 3GPP2 TSG-SX WG4 SX Source: Qualcomm Incorporated and Alcatel-Lucent Contact(s): Anand Palanigounder,
1 UATI-IP address mapping Peerapol Tinnakornsrisuphap David Ott Qualcomm.
1 May 14, 2007 Zhibi Wang, Simon Mizikovsky – Alcatel-Lucent Vidya Narayanan, Anand Palanigounder – QUALCOMM ABSTRACT: Access authentication architecture.
1 cdma2000® Data Service Transition to NULL Support Jun Wang Ravi Patwardhan June 5, 2003 Recommendation -
1x Device Binding Framework Overview to TSG-AC 3GPP2 TSG-AC AC Source: TSG-SX WG4 Contact(s): Anand Palanigounder,
Revised Solution for Device Binding Revised from S GPP2 TSG-SX WG4 SX Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Broadcast Area Based Management for BCMCS Quanzhong Gao Weidong Wu 04/05/2005.
Security Framework for (e)HRPD 1 S GPP2 TSG-S WG4 Source: QUALCOMM Incorporated Contact(s): Anand Palanigounder
1 IPsec-based MIP6 Security Qualcomm Inc. Starent Inc. Notice: Contributors grant free, irrevocable license to 3GPP2 and its Organization Partners to incorporate.
Authentication Profile for UICC- less eHRPD Terminals QUALCOMM Incorporated Contact(s): Anand Palanigounder Jun Wang.
The contributing companies grant a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
Broadcast/Multicast Priority List JUNHYUK SONG SAMSUNG Incorporated grants a free, irrevocable license to 3GPP2 and its Organization Partners to incorporate.
QUALCOMM PROPRIETARY 3GPP2 Network Evolution Architecture Dec. 04, 2006 Lucent Technologies Nortel Networks Qualcomm Inc. Hitachi, Ltd Huawei Technologies.
1 A13 Proxy for supporting HRPD Handout from femto AP to macro AN Peerapol Tinnakornsrisuphap David Ott
1 Flow Mobility Support QUALCOMM Inc. George Cherian, Jun Wang, Masa Shirota
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
1 SeGW Certificate profile (Revised) 3GPP2 TSG-S WG4 /TSG-X WG5 (PDS) S X xx Source: QUALCOMM Incorporated Contact(s): Anand.
Page 1 January 16, 2008 Source: 3GPP2 TSG-S WG4 (Security) Contacts: Anand Palanigounder, Chair, TSG-S WG4 ( Zhibi Wang,
Proposed 1x Device Binding Solution Based on SX & SX GPP2 TSG-SX WG4 SX Source(s): Qualcomm Incorporated.
80-VXXX-X A July 2008 Page 1 QUALCOMM Confidential and Proprietary PCC Support for cdma2000 QUALCOMM Inc. Jun Wang, George Cherian, Masa Shirota
Proposed Solution for Device Binding 3GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
May 12, 2008 Alcatel Lucent, Cisco, Motorola, Nortel, Verizon ABSTRACT: Proposed is additional key hierarchy and derivation for EPS access over eHRPD.
Introduction to ICCID Integrated Circuit Card Identifier Axalto grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate.
1 Title: eHRPD offline charging proposal Sources: China Telecom Contact: CT: Peirong Wenyi ZTE:
Mobility Management in WLAN IW Inma Carrion, Vijay DevarapalliNokia Raymond HsuQualcomm Inc. Pete McCann, Frank AlfanoLucent Serge ManningSprint Notice:
5 November Overview of Proposed Femtocell Architecture Alternatives presented at the 3GPP2 Femto Workshop Airvana 5 November 2007 cdma2000® is the.
1 Authentication and User Profile April 24, 2007 Jun Wang QUALCOMM Inc. Notice Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
HRPD Connection Layer Protocols for Inter-technology Handoff March 31 st, 2008 Peerapol Tinnakornsrisuphap
Jun Wang Anand Palanigounder Peerapol Tinnakornsrisuphap
Background Both RoHCv1 and RoHC v2 are supported in 3GPP LTE R8 and R9
HRPD Network Load Balance ZTE grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable material.
Supporting Local Breakout in HRPD Femto Peerapol Tinnakornsrisuphap Qualcomm Doug Knisely
August 25, 2008 Alcatel Lucent ABSTRACT: 1x System Reliability is important in the face of major events, such as an earthquake. There are several ways.
Jun Wang Anand Palanigounder Peerapol Tinnakornsrisuphap
3GPP2 Network Evolution: UMB->HRPD Handoff October 16, 2007 Qualcomm Inc. Contact: Jun Wang Notice Contributors grant a free, irrevocable license to 3GPP2.
Remote access to Local IP network via Femto Peerapol Tinnakornsrisuphap Anand Palanigounder
10/27/2008X xx-0021 Femto Initialization Aspects: Femto AP Auto- configuration procedures Source: QUALCOMM Inc Chandru Sundarrman
X xxx ZTE Discussion on cdma2000 Charging with PCC Title: Inter-RAT RAN information management protocol Stack Sources: NSN Contact: Scott Marin,
Page 1 Notice © All rights reserved. Qualcomm Incorporated grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate.
Comment to Limited Idle Mode Nortel Networksgrants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable.
1 Remote IP Access - Stage 2 Architecture proposal for adoption Peerapol Tinnakornsrisuphap Anand.
Jun Wang Anand Palanigounder Peerapol Tinnakornsrisuphap
EHRPD-LTE Inter Technology Spectrum Optimization Source: Qualcomm Incorporated Contact: Jun Wang/George Cherian September 9, 2013 Notice ©2013. All rights.
Tunneling Protocol Structures for UMB to HRPD Interworking Linhai He Peerapol Tinnakornsrisuphap
1 MAPSUP in eHRPD: Data forwarding Tunnel Sources: ZTE Contact: Bi YiFeng Rajesh Bhalla
X xx CT+ZTE PCC for cdma2000 MS Init Call Flows 1 1 Title: PCC for cdma2000 – MS-Init Call Flow Example Sources: CTC, ZTE Contact: CHINA TELECOM.
1 Title: Performance of Default Parameters for 1xEV-DO RTCMAC Source: Christopher Lott, QUALCOMM Incorporated , Date: Februrary.
1 Subject:Draft Responses to BBF Comments re. cdma2000 MO Preview Date: 25 January 2010 Source: Doug Knisely TSG-X FMOAHG Co-chair, BBF Liaison Contact:
Adding LTE-1x CSFB IOS specification in 3GPP2 Sources: China Telecom, Contact: Li Wenyi ABSTRACT: This contribution is to analyze the.
1 On 3GPP2 Femto Security Anand Palanigounder Qualcomm Inc. Notice: Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
1 OMP for Dual Rx AT in LTE tunneled mode Contributors grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text.
C August 19, 2003 Page 1 SMS Push Teleservice Nobuyuki Uchida QUALCOMM Incorporated Notice ©2003 QUALCOMM Incorporated. All rights reserved.QUALCOMM.
Benefits of eBS for UMB Qualcomm Inc. January 08, 2007 Notice Contributors grant a free, irrevocable license to 3GPP2 and its Organization Partners.
1 MSI (Multiple Service Instances) Ravindra Patwardhan QUALCOMM Incorporated Review and approve for D Notice QUALCOMM.
WLAN IW Enhancement for Multiple Authentications Support QUALCOMM Inc.: Raymond Hsu, QUALCOMM Inc.: Masa Shirota,
Clarifications on Work Split among TSG-X/A for 3GPP2 Network Evolution March 26, 2007 Airvana/Alcatel-Lucent/CTC/Fujitsu/ Hitachi/KDDI/NEC/Qualcomm/ZTE.
1 IP Service Authorization Support and Mobility Selection Source: QUALCOMM Inc.: Masa Shirota, George Cherian, Jun Wang,
C R1 1 3GPP2 TSG-C WG3 TITLE : FL BRCH Full Buffer Simulation Results in AWGN for Calibration SOURCE: KDDI Corporation Toshihiko Komine,
Source: Qualcomm Incorporated Contact: Jun Wang, George Cherian March 1, 2010 Page 1 3GPP2 Femtocell Phase II Femto Access Control Enhancement Notice ©
Presentation transcript:

FMS/TR-069 File Download Security Source: QUALCOMM Incorporated Contact(s): Anand Palanigounder Yinian Mao Recommendation: Discuss and adopt Notice QUALCOMM Incorporated grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable material contained in the contribution and any modifications thereof in the creation of 3GPP2 publications; to copyright and sell in Organizational Partner’s name any Organizational Partner’s standards publication even though it may include all or portions of this contribution; and at the Organizational Partner’s sole discretion to permit others to reproduce in whole or in part such contribution or the resulting Organizational Partner’s standards publication. QUALCOMM Incorporated is also willing to grant licenses under such contributor copyrights to third parties on reasonable, non-discriminatory terms and conditions for purpose of practicing an Organizational Partner’s standard which incorporates this contribution. This document has been prepared by QUALCOMM Incorporated to assist the development of specifications by 3GPP2. It is proposed to the Committee as a basis for discussion and is not to be construed as a binding proposal on QUALCOMM Incorporated. QUALCOMM Incorporated specifically reserves the right to amend or modify the material contained herein and nothing herein shall be construed as conferring or offering licenses or rights with respect to any intellectual property of QUALCOMM Incorporated other than provided in the copyright statement above. S

TR-069 Architecture Managing CPE using remote ACS Layered Architecture CPE/ACS Management Application SOAP HTTP RPC Methods SSL/TLS TCP

TR-069 File Transfer RPC methods define a mechanism to facilitate file downloads or (optionally) uploads File Transfer protocols – Unicast: HTTP/HTTPS (mandatory), FTP, SFTP and TFTP – Multicast: FLUTE and DSM-CC Download Options – (1) ACS initiated, providing location or file to be transferred – (2) CPE initiated, CPE first request, then follow (1) – (3) Initiated by an external event, e.g. announce firmware – (4) Signed Package Format for download

TR-069 RPC “Download” Used by the ACS to cause the CPE to download a specified file from the designated location. Example Command arguments – CommandKey string(32) – FileType string(64): 1-Firmware Upgrade Image, 2-Web Content, 3-Vendor Configuration File – URL string(256), FileSize unsignedInt – Username string(256), Password string(256) This command can be issued by ACS over a secure channel (e.g., TLS) and/or using Signed Package Format (see later slide)

File Transfer Connection Options When File Transfer is Initiated During a Session – (1) The CPE MAY send the HTTP GET/PUT over the already established connection. – (2) The CPE MAY open a second connection over which to transfer the file, while maintaining the session to the ACS. – (3) The CPE MAY terminate the session to the ACS and then perform the transfer. – (2) & (3) are not necessarily HTTP based Requirements for HTTP based transfer – CPE shall support TLS for (2) and (3), and use TLS when the download URL is HTTPS

TR-069 Signed Package Format

TR-069 Command Types

TR-069 Signature Field A content block using PKCS#7 format Uses “SignedData” type in PKCS#7 – PKCS#7 typically have data and signature together – Data part can be empty, and the signature is for “external” content – certificates is a set of extended certificates in X.509 certificate format. The certificate can contain chain of trust. – Hash of payload included in commands An Example SignedData format: SignedData ::= SEQUENCE { version Version, digestAlgorithms DigestAlgorithmIdentifiers, contentInfo ContentInfo, certificates [0] IMPLICIT ExtendedCertificatesAndCertificates OPTIONAL,0 crls [1] IMPLICIT CertificateRevocationLists OPTIONAL,1 signerInfos SignerInfos }

Conclusion When the FMS is inside operator’s core network: – Many FMS-FAP operations can be secured using IPSec (between the FAP and SeGW) and the use of TLS for FAP-FMS interface – The FAP can download files from the FMS or from other locations indicated by the FMS If file download location indicated is not inside of SeGW, then Signed Package format shall be used When the FMS is outside operator’s core network – TLS shall be used for FAP – FMS operations – The FAP can download files from the FMS or from other locations indicated by the FMS If location indicated is not inside of SeGW, then Signed Package format shall be used If location indicated for file download is outside of SeGW, the following security requirements shall be met: – The downloaded file shall be in the Signed Package Format according to TR-069 Ammendment 2. – The signature field in the Signed Package Format shall contain at least one signature signed by a trusted entity, together with a certificate or a certificate chain that can be verified by the FAP. – The FAP shall verify both the certificate(s) and the signature of the downloaded file before taking any action using the file. – If signature verification fails, the FAP shall discard the downloaded file and report to FMS. – In order to provide additional security, it is proposed that WG4 also require the use of Signed Package Format even when the FMS/file download server is located inside operator’s network – This is required to prevent certain attacks – e.g., an attacker hacking into the FAP and installing unsigned software by making it appear as though the file is from a server inside operator’s network

Proposal Incorporate the conclusion/requirements for FMS/File Download security in the S.P0132-0