ACP-WG S-7/WP-XX International Civil Aviation Organization 13/06/15 WORKING PAPER AERONAUTICAL COMMUNICATIONS PANEL (ACP) SEVENTH MEETING OF THE WORKING GROUP S (Surface) Montreal, Canada 22 – 23 June, 2015 Agenda Item xx: Xxx TOPICS OF X.509 CERTIFICATE POLICY CONSIDERATIONS FOR AERONAUTICAL MOBILE AIRPORT COMMUNICATIONS SYSTEM (AEROMACS) AND THE IMPORTANCE OF A PKI POLICY AUTHORITY (Presented by Rich Hawkins, WiMAX Forum) SUMMARY The WiMAX Forum Aviation Working Group PKI Task Group is comprised of subject matter experts from the aviation industry and security providers. Leveraging this combined experience, this group has developed some recommendations and guidelines that could be used to define requirements for an AeroMACS PKI Certificate Policy and Certificate Practices Statement ACTION Consider and evaluate the finding of the WiMAX Forum AWG PKI Task Group in defining the AeroMACS PKI Certificate Policy & Practices requirements for inclusion in the ICAO IPS Technical Manual and Guidance Material 1. INTRODUCTION 1.1 WiMAX Forum has an established robust Public Key Infrastructure (“PKI”) Program. The WiMAX PKI is described in the Governing Documents of the WiMAX Forum and is operated under the supervision of the WiMAX Policy Authority. The existing WiMAX PKI provides a mechanism that permits Authorized Users to obtain Public Key Certificates (“PKCs”) through Certificate Authorities (“CA”) which are entities that the WiMAX Policy Authority has authorized to issue PKCs to unrelated third-party customers or users. The current authorized CA is Symantec. WiMAX Certificate Authority (8 pages) Document1 ACP-WGW S-7/WPXX -2- (CA) provides hosting of the WiMAX Public Key Infrastructure (PKI) hierarchy and supplies device and server certificates for use in WiMAX networks. 1.2 The WiMAX Forum Aviation Working Group (AWG) formed a PKI Task Group to leverage the experience of the Forum, Symantec and subject matter experts from the aviation community to identify topics of consideration for determining the policy practices for issuing certificates to the various devices and servers in the AeroMACS ecosystem. 1.3 With the next generation of “connected aircraft” and the need to propel towards increased efficiency and interoperability, there have been extensive requirements for external interaction of the various systems in the aerospace industry. As the number of intelligent devices rises, the potential damage that could be caused by lack of security will continue to increase. It is important to note that such advancements in technology highly demand proper security framework in place. The purpose of this paper is to share the finding of the AWG PKI Task Group in hopes that we can provide guidance to WGS in defining the requirements of an AeroMACS PKI ecosystem for the secure electronic transfer of information related to AeroMACS applications and services. 1.4 Whether it is an Airline subscriber station or a Service Provider subscriber substation that aims to join the airport operations network, great care must be taken to ensure that only legitimate communication or “information transfer” is occurring between these devices. The concept of the ability to identify and authenticate individual components, to a high level of assurance, is extremely important to the security of the aircraft and its operating environment. 1.5 To satisfy such security requirements around identity assurance, AeroMACS can enforce the data integrity requirements of the civil aviation industry through deployment of identity management solutions, based on Public Key Infrastructure (PKI) technology with a “chain of trust” to a Certificate Authority (CA) 2. 2.1 DISCUSSION Definition 2.1.1 Public Key Infrastructure is a set of policies, practices, and technologies used to create a trust framework in such large private ecosystems as AeroMACS, for securing digital data and authenticating digital identities. Generally speaking, the benefits of PKI in a variety of applications can be best expressed in terms of confidentiality, message integrity, and user authentication. These benefits can protect a secured system against electronic fraud and other threats such as data tampering, eavesdropping, and masquerading. 2.1.2 To give an example, a Subscriber substation in next generation AeroMACS framework tries to securely connect to the ATC network, the digital Certificate associated with the server asserts the identity of that server to authenticate it to the network safely. To prevent forgery of these certificates, each Digital Certificate is cryptographically signed by the governing root of trust. The model works only because the CA’s “Roots of Trust” have been configured to allow for trust by the device ahead of time. Without CAs acting as middlemen in the trust transaction, there is no way for a client to be sure of the identity of the server to which it is communicating. A “self-signed” certificate issued without the verification of a CA can claim to represent anyone, a claim that can’t be confirmed or denied. With “Roots of Trust” pushed to the client devices and server, the subscriber (such as the device or server) can -3- ACP-WGW S-7/WPXX use a root to authenticate itself to the network only if the “chain of trust” for validation by the device is established. 2.2 PKI Policy Authority: When a PKI supports a complex ecosystem of interdependent elements as in the AeroMACS ecosystem, sound practices are essential to establish trust. A PKI Policy Authority should be established. The AeroMACS PKI Policy Authority plays an instrumental role in defining policies that form the basis of interoperability of multiple domains. If the expectation in an AeroMACS network is for the certificates to be used and relied upon by an open community of users, it is recommended that a public-accessible Certificate Policy (CP) and Certificate Practices Statement (CPS) is written to inform the community of users about AeroMACS certificate policy and practices. One or more self-signed root CAs may be created under the name of this Policy Authority. 2.3 Main Topics of Certificate Policy Considerations 2.3.1 Single global root of trust versus multiple CI (Certificate Issuer) model SINGLE GLOBAL ROOT OF TRUST MODEL SINGLE GLOBAL CI Technical Pros Cons Simplicity: One root certificate across the entire infrastructure. Clear hierarchical roles and relationships between the root CA, intermediate policy CAs, the CAs that issue end entity certificates (if any), and the endentity certificates themselves Security: Compromise of the Root CA, single trust anchor and everyone’s trust point results in a compromise of the entire PKI. Path Discovery and Validation: Certification paths are easy to develop because the paths are unidirectional. This results in a simple, obvious and deterministic path from a device’s certificate back to the trust point. However, a Certificate Authority can diminish this threat to a great extent with best implementation around PKI practices and stringent technical, facility and security controls for key protection Shorter Path Length: The path lengths for validation are relatively smaller than that in a cross certification model. The longest path is equal to the depth of the hierarchy plus one: a CA certificate for each subordinate CA plus the device certificate. Offline Root: Does not require any run-time connectivity for path validation Operational Interoperability: Uses basic PKI constructs, widely Retrofit: Cannot be added to existing PKI domains without distributing the -4- ACP-WGW S-7/WPXX supported by even the simplest PKI software stacks Scalability: To incorporate a new community or ecosystem, the root CA can easily establish a trust relationship with that global Root CA in one location. SINGLE GLOBAL CI new root CA to all relying party Devices and issuing/cross certifying member operator CAs It may be commercially and operationally challenging to identify and work with single organization that can serve the Single Global Root of Trust. Policy Authority: Policy controls are introduced in a topdown fashion Root CA can control the policy of subordinate CAs including whether additional CAs can be added to the hierarchy by subordinate CAs Policy Since single root CA is anchor of trust or all devices and CAs within the hierarchy, maximum physical security policies and practices are required only for the Root CA, rather than all CAs within the hierarchy. MULTIPLE CERTIFICATE ISSUER MODEL -5- ACP-WGW S-7/WPXX Pros 2.3.2 Cons Distribution: Multiple Root CAs need to be distributed down to the devices Complexity: Multiple CI model results in a more complex path validation due to cross certification Compatibility: Certificate-validation software on devices must consider each organization's hierarchical trust relationships as well as the crosscertification trust relationships between multiple CAs. Technical Resource Constraints: Validation software on devices with limited resources may not be able to handle traversing the path lengths efficiently. AIA pointers can be used to traverse the hierarchy, but it is not always populated correctly, nor are most relying party clients equipped to do this correctly. Speed and efficiency: Increased network traffic due to the extended length of the certificate chain. Multiple CI Scalability: Issue can be possibly resolved with a natural grouping. Operational Scalability: Overhead unprecedented even for a relatively small number of organizations Compatibility: Relying parties must retrieve AIA extension CAIssuers bundle at runtime (or cache) which could be huge resource overhead Policy Overhead: Policy Considerations 1. Need to establish initial and continuing audit policies and practices to ensure all CIs follow stringent set of policies and procedures for certificate issuance 2. AeroMACS Policy Authority to audit policies for each member’s PKI including: 3. - Pre-issuance identity vetting policies, - private-key protection policies, - CA and directory infrastructure operational policies. -6- ACP-WGW S-7/WPXX 2.3.3 Device Certificates: ATA Spec 42 defines these as certificates that are used for identifying physical hardware, such as webservers, VPN servers, wireless access points, aircraft, ground stations, or other nonperson items. 2.3.3.1 Server Certificates: The AeroMACS Certificate policy needs to document and call out the requirements for a Server and a Device certificate profile distinctly. It is necessary to understand the validity/lifetime/method of certificate issuance for these Server certificates. 2.3.3.2 Device Certificates: Standards (ATA Spec 42 lists) mention that 3 years to be the validity of the device certificate. 2.3.4 Device Vetting Requirements: The ATA DSWG Certificate Policies state, as a basic requirement, that no unvalidated information shall be included in a certificate. Currently, for device and aircraft entities, the information listed below is endorsed by the ATA DSWG CP, and this list is available to system designers for use in defining the identities of the systems. This information must be verifiable by the Certificate Authority. For instance, if an IETF DNS Fully Qualified Domain Name (FQDN) is used, the Certificate Authority may require that they be able to resolve the FQDN by means of a DNS lookup, or by validating with the relevant whois database. The following name forms are suggested to be used by System Designers as the values for the “Subject” Distinguished Name commonName field: For devices other than aircraft: Character ATA/IATA Address context of the Certificate Authority's PKI. For aircraft: -GABC, N-12345) -bit ICAO Address For the various entities leveraging the AeroMACS technology, a complete set of guidelines such as the above need to be established for the systems designers to allow their system identification in the network. These guidelines need to be published as part of the Certificate Policy. The certificate policy also needs to identify the process for any system designer that wishes to use a custom attribute/identifier and a mechanism whereby the Certificate Authority may verify that the applicant is entitied to the use of that identifier. The Ceritifcate Policy should provide minimum requirements that makes a certificate valid and fit for use in the AeroMACS ecosystem. For example: -7- ACP-WGW S-7/WPXX - The certificate does not contain any extension marked critical that the application does not understand; - The certificate is fit for purpose (i.e. has the correct keyUsage, extendedKeyUsage, and fits within the policy constraints of the application); 2.3.5 Certification Revocation mechanism: The mechanism for checking certificate validity will depend on the client software, however, generally speaking the Certificate Policy should define the options for revocation mechanism to provide guidelines for the system implementers. The following means of revocation are available: 2.3.5.1 CRL: Certificate Revocation List Each CA maintains a public list of certificates it has issued that have been revoked. Each certificate that is conformant to the AeroMACS Certificate profiles, contains a link to the CRL of the issuing CA. It is the relying party's responsibility to retrieve the issuing CA's CRL and check whether a certificate being evaluated is listed as revoked. 2.3.5.2 OCSP: OCSP is useful when a CRL grows too large to be feasibly retrievable. OCSP Stapling: The other alternative to OCSP is OCSP Stapling. In OCSP stapling, the Web server obtains the OCSP response from the CA. When a browser comes to the site, the OCSP response is stapled to the SSL handshake. This means there is no extra connection to the CA’s OCSP service. The result is less latency and a faster response. System designers that want to consider implementing OCSP Stapling will need to find out if their server supports OCSP Stapling. Verification of each of these requires an “on-line” connection to the global internet, Checking of CRL and/or OSCP. The AeroMACS certificate policy will need to define the preferred/desirable entities where validation is deemed important. For example: It can be considered highly desirable to perform validation for the ground based side of the communications and verifications systems. It however may not be simple / feasible to perform validation for “on-board” systems. 2.3.6 Key Zeroization: The Certificate Policy should determine next steps for when a device changes ownership to avoid an unknown party posing itself as the old keyholder. When certificate revocation is applicable, zeroization may be less important, however the CP should still provide guidelines on how and if, system implementers should consider key zeroization in addition to certificate revocation. For those devices where certificate revocation is not applicable, how/and should the private keys be destroyed/erased if the device changes ownership. Guidelines along these also to be documented. 2.3.7 Key Generation: For those devices that cannot generate their own keys, the certificate policy needs to define acceptable procedures for installing keys on this type of equipment. For example, for aircraft equipment, the keys may need to be generated elsewhere and CP needs to define the delivery, maintenance and change of ownership processes. ACP-WGW S-7/WPXX -8- The Certificate Policy must also provide guidelines to the system implementers for the key generation. Card Management System: For Devices that are not able to generate their own keys, how are the keys to be generated? Are these certificates to be issued on Smartcards that will then be manually installed by a technician onto the aircraft device? If so, would there be a requirement for individual certificates (non-device certificates)? 2.3.8 References to Certipath/FAA: The CertiPath Bridge offers a secure and efficient means of exchanging information, eliminating the costly and complex process of individually mapping PKI/hardware tokens and issuing project-specific credentials for every new customer, supplier, or partner. CertiPath’s trust community extends beyond its own enterprise members to the U.S. Federal government via a Bridge-to-Bridge trust relationship between CertiPath and the U.S. Federal Bridge, which operates its own hub-spoke peer-to-peer environment for the U.S. Federal agencies. This hub-to-hub relationship enables inter-organizational trust between the members of the two Bridges. Hence, in the U.S.A. is cross certifications with the Certipath Bridge a mandatory or an optional requirement? 2.3.9 Signing Algorithm: Certificate profiles for Self Signed Root CA reflect ECC, Elliptic Curve Cryptography, a family of public- key algorithms that can provide shorter key lengths, one of the first practical public-key cryptosystems and is widely used for secure data transmission where the encryption key is public and differs from the decryption key which is kept secret. AeroMACS needs to finalize on; whether a single Root CA should be adopted and then the associated signing algorithm (other aviation security standards either already specify or are moving in the direction-of using ECC as the root). If both algorithms are needed, two primary self-signed roots must be created. 3. ACTION BY THE MEETING 3.1 The ACP WG-S is invited to: 3.1.1 Consider and evaluate the finding of the WiMAX Forum AWG PKI Task Group in defining the AeroMACS PKI Certificate Policy requirements for inclusion in the ICAO IPS Technical Manual and Guidance Material and elaborate the items partially mentioned in section 2.2 of this Working Paper. 3.1.2 requirements. experience Provide input on Questions that remain to be answered in an effort to better define In some cases we have provided recommendations based on the LKI Task Groups 3.1.3 Consider future collaboration with the WiMAX Forum Aviation Working Group to further this effort
© Copyright 2026 Paperzz