SlideShare a Scribd company logo
1

Ramzi KAROUI,
Ph.D.

OpenSplice DDS Security

EMEA Technical
Manager

September 2013

Copyright © PrismTech Solutions Americas, Inc. 2008
Proprietary information – Distribution Without Expressed
Written Permission is Prohibited
OpenSplice DDS Security – Mission

Provide an enhanced version of OpenSplice DDS suitable for
applications with high Information Assurance (IA) requirements
Defense applications, e.g., combat management
Mission critical applications in various domains, e.g. air-traffic control,
SCADA, product automation
Provide a standards-based security solution for DDS
DDS Security is still an open space
No DDS Security standards, yet

PrismTech will be actively involved in the standardization process
See joint Thales & PrismTech submission to OMG C4I Tagging &
Labeling RFI
Main Goal: guarantee interoperability across vendors
In PT approach Portability will not be impacted.

Copyright © PrismTech 2009
Proprietary information – Distribution Without Expressed
Written Permission is Prohibited

2
OpenSplice DDS Security - Product Brief
Key Features
Transport Security providing confidentiality and integrity of data
exchanged between DDS network nodes.
Dedicated crypto channels can be setup for network partitions allowing for the
separation of information with different classification.

Dedicated Crypto channel

Data origin authentication using digital signatures on message streams.

Mandatory Access Control (MAC) supporting both inbound and
outbound access control for DDS nodes.
Outbound: Data from other nodes is rejected in Access rights does not match
Inbound: Data on local node is dropped PrismTech 2009
(don’t leave) in case Access does not match
Copyright ©
Proprietary information – Distribution Without Expressed

3
OpenSplice Transport Security Features
Seamless Integration of Transport Security with the existing
transport features of the OpenSplice networking service
No limitation of existing OpenSplice transport features
Can be used for “reliable” and “best effort” transport
Different priorities can be used for secure transport channels

Supports security for unicast AND multicast UDP messages
No additional processing overhead for sending messages to multiple
receivers or for resending reliable messages

Flexible configuration
Zero impact on the application code
XML based configuration at deployment time

Configuration of cipher algorithms and shared secret keys per “network
partition”
No data leakage in case of miss-configuration
Copyright © PrismTech 2009
Proprietary information – Distribution Without Expressed
Written Permission is Prohibited

4
OpenSplice Transport Security Features
(cont‘d)
Provide support for multiple pluggable crypto implementations
Reference implementation based on field proven OpenSSL crypto
library
A crypto API will be provided to integrate other crypto provider
with future releases of the product

Data confidentiality and integrity
Configurable cipher algorithms
AES & Blowfish supported with default crypto provider

Strong encryption by high performance symmetric ciphers
Integrity assurance by cryptographic hash algorithms (SHA1 & SHA256
supported with default crypto provider)

Dedicated Crypto channel

Copyright © PrismTech 2009
Proprietary information – Distribution Without Expressed
Written Permission is Prohibited

5
e.g Transport Encryption at Partition level
SecurityProfile Name=”SecureSectionProfile” Cipher="blowfish"
CipherKey="000102030405060708090a0b0c0d0e0f"/>
…
<PartitionMapping >
<DCPSPartitionTopics =“MyChiphredPartition.*”
NetworkPartition =“MyNetworkSecurePartition”
..
<NetworkPartitions>
<MyNetworkSecurePartition Address=“223.240.240.0"
SecurityProfile=“SecureSectionProfile"/>

Sub
Pub

Pub

MyCiphered
Partition

Sub

Clear
Partitions Sub

Pub

Sub

Sub

Pub

@1

@2

Physical
Network
Layer

Copyright © PrismTech 2009
Proprietary information – Distribution Without Expressed
Written Permission is Prohibited

DDS
Logical
Layer

6
OpenSplice Authentication & Access
Control Features
Data origin authentication
X509 Digital signatures are used for originator authentication
Messages from non-trusted nodes are dropped

Mandatory Access Control
Enforces confidentiality and Integrity requirements of information
flows using a policy model based on Bell La Padula & Biba
security models
XML based access control policy describes resources to be
accessed

Copyright © PrismTech 2009
Proprietary information – Distribution Without Expressed
Written Permission is Prohibited

7
Mandatory Access Control (MAC) Rules

8

Top Secret

No-Read-Up, No-Write-down
E.g Classified user can’t read Secret Data
and can’t write Unclassified data

Biba Integrity rules

Secret

Secret

Confidential

Conf

Public

Public

Unclassified

Bell-La-Padula Confidentiality rules:

Top
Secret

Unclas
sified

DDS
Node

No-Read-down, No-Write-Up
E.g Level_2 Subject can’t read Level_0 Data
and can’t write Level_3 Data.

Bell-La-Padula

Data
Object

Level-2

Level-2

Level-1

Level-1

Level-0

Level-0
Biba

Compartments rules
The need to know rule
The Data set Compartments is included in the
user set of compartments

Access is guaranteed if 3 rules apply
Compartment rule
Copyright © PrismTech 2009
Proprietary information – Distribution Without Expressed
Written Permission is Prohibited
MAC with OpenspliceDDS secure net service
In Opensplice the User* Granularity is the “Node”.
User*: publishing or receiving node
User Identity uses SSL X509 Certificate
User ID, Password certif will be considered in future

Data: At DDS topic or Partition levels

Currently, Access control is not enforced for Intra-node
communication
In Networking Secure Networking Service the following
control occurs
When Receiving data
Is data published by a trusted node
Is Receiving node allowed to read the data

When Sending data
Is the node authorised to publish the data
Copyright © PrismTech 2009
Proprietary information – Distribution Without Expressed
Written Permission is Prohibited

9
MAC configuration example
<resource>
…
<topic>AlertMessages</topic>

<user>

<classification> <!-- for MAC -->
<secrecyLevel>CONFIDENTIAL</secrecyLevel>
<integrityLevel>LEVEL_1</integrityLevel>
<compartments>
<compartment>FinnishArmy</compartment>
<compartment>Air Force</compartment>
</compartments>
</classification>

</resource>

10

<id>user1</id>
<clearance> <!-- for MAC -<secrecyLevel>CONFIDENTIAL</secrecyLevel>
<integrityLevel>LEVEL_2</integrityLevel>
<compartments>
<compartment> FinnishArmy</compartment>
<compartment>Air Force</compartment>
<compartment>Radar</compartment>
</compartments>
</clearance>
<authentication>
<x509Authentication>
<subject>DN</subject>
</x509Authentication>
</authentication>
</user>

Copyright © PrismTech 2009
Proprietary information – Distribution Without Expressed
Written Permission is Prohibited

More Related Content

PDF
OpenSplice Security Module
PDF
Introducing Vortex Lite
PDF
DDS Security
PDF
DDS: The IoT Data Sharing Standard
PDF
The Data Distribution Service
PDF
Deep Dive into the OPC UA / DDS Gateway Specification
PDF
DDS-Security Interoperability Demo - March 2018
PDF
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
OpenSplice Security Module
Introducing Vortex Lite
DDS Security
DDS: The IoT Data Sharing Standard
The Data Distribution Service
Deep Dive into the OPC UA / DDS Gateway Specification
DDS-Security Interoperability Demo - March 2018
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...

What's hot (20)

PDF
The Present and Future of DDS
PDF
OMG DDS Security Standard
PDF
Classical Distributed Algorithms with DDS
PDF
DDS Everywhere
PDF
The Data Distribution Service
PDF
Building IoT Applications with Vortex and the Intel Edison Starter Kit
PDF
PDF
OMG DDS Tutorial - Part I
PDF
DDS + Android = OpenSplice Mobile
PDF
Distributed Algorithms with DDS
PDF
DDS-TSN OMG Request for Proposals (RFP)
PDF
Reactive Data Centric Architectures with DDS
PDF
OMG Data-Distribution Service Security
PDF
OMG Data-Distribution Service (DDS) Tutorial - 2009
PDF
Implementation of De-Duplication Algorithm
PDF
Enabling Integrity for the Compressed Files in Cloud Server
PDF
Vortex II -- The Industrial IoT Connectivity Standard
PDF
Article data-centric security key to cloud and digital business
PPT
L4 vpn
The Present and Future of DDS
OMG DDS Security Standard
Classical Distributed Algorithms with DDS
DDS Everywhere
The Data Distribution Service
Building IoT Applications with Vortex and the Intel Edison Starter Kit
OMG DDS Tutorial - Part I
DDS + Android = OpenSplice Mobile
Distributed Algorithms with DDS
DDS-TSN OMG Request for Proposals (RFP)
Reactive Data Centric Architectures with DDS
OMG Data-Distribution Service Security
OMG Data-Distribution Service (DDS) Tutorial - 2009
Implementation of De-Duplication Algorithm
Enabling Integrity for the Compressed Files in Cloud Server
Vortex II -- The Industrial IoT Connectivity Standard
Article data-centric security key to cloud and digital business
L4 vpn
Ad

Viewers also liked (8)

PPTX
Week3 lecture
PDF
Label based Mandatory Access Control on PostgreSQL
PPTX
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...
PPTX
Access Control for Linked Data: Past, Present and Future
PPTX
FACE-ing Reality: Maintaining our Military Edge in the Modern World
PDF
Access Control Presentation
PDF
DDS In Action Part II
PDF
DDS in Action -- Part I
Week3 lecture
Label based Mandatory Access Control on PostgreSQL
Learn About the FACE Standard for Avionics Software and a Ready-to-Go COTS Pl...
Access Control for Linked Data: Past, Present and Future
FACE-ing Reality: Maintaining our Military Edge in the Modern World
Access Control Presentation
DDS In Action Part II
DDS in Action -- Part I
Ad

Similar to Open splice dds security (20)

PDF
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
PDF
The DDS Security Standard
PDF
Ciss previsionnotes
PPTX
Is Your Data Secure
PDF
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
PDF
DDS-Security Interoperability Demo - December 2017
PPTX
PPTX
Big Data Security: Facing the challenge
PDF
DDS and OPC UA Explained
PDF
DDS Interoperability Demo
PDF
DDS-Security 1.2 - What's New? Stronger security for long-running systems
PDF
Using DDS to Secure the Industrial Internet of Things (IIoT)
PDF
Secure Mobility from GGR Communications
PDF
The OpenSplice DDS Revolution -- Episode II
PDF
Object Oriented Secure Modeling using SELinux Trusted Operating System
PDF
Tuning and Troubleshooting OpenSplice DDS Applications
PDF
Implementing Application Security
PDF
Security and Usability: Designing Security Tooling That Roboticists Can Use
PPT
Design for security in operating system
PDF
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
The DDS Security Standard
Ciss previsionnotes
Is Your Data Secure
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
DDS-Security Interoperability Demo - December 2017
Big Data Security: Facing the challenge
DDS and OPC UA Explained
DDS Interoperability Demo
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Using DDS to Secure the Industrial Internet of Things (IIoT)
Secure Mobility from GGR Communications
The OpenSplice DDS Revolution -- Episode II
Object Oriented Secure Modeling using SELinux Trusted Operating System
Tuning and Troubleshooting OpenSplice DDS Applications
Implementing Application Security
Security and Usability: Designing Security Tooling That Roboticists Can Use
Design for security in operating system
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
1. Introduction to Computer Programming.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
A Presentation on Artificial Intelligence
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
1. Introduction to Computer Programming.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
A comparative analysis of optical character recognition models for extracting...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectroscopy.pptx food analysis technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A Presentation on Artificial Intelligence
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity

Open splice dds security

  • 1. 1 Ramzi KAROUI, Ph.D. OpenSplice DDS Security EMEA Technical Manager September 2013 Copyright © PrismTech Solutions Americas, Inc. 2008 Proprietary information – Distribution Without Expressed Written Permission is Prohibited
  • 2. OpenSplice DDS Security – Mission Provide an enhanced version of OpenSplice DDS suitable for applications with high Information Assurance (IA) requirements Defense applications, e.g., combat management Mission critical applications in various domains, e.g. air-traffic control, SCADA, product automation Provide a standards-based security solution for DDS DDS Security is still an open space No DDS Security standards, yet PrismTech will be actively involved in the standardization process See joint Thales & PrismTech submission to OMG C4I Tagging & Labeling RFI Main Goal: guarantee interoperability across vendors In PT approach Portability will not be impacted. Copyright © PrismTech 2009 Proprietary information – Distribution Without Expressed Written Permission is Prohibited 2
  • 3. OpenSplice DDS Security - Product Brief Key Features Transport Security providing confidentiality and integrity of data exchanged between DDS network nodes. Dedicated crypto channels can be setup for network partitions allowing for the separation of information with different classification. Dedicated Crypto channel Data origin authentication using digital signatures on message streams. Mandatory Access Control (MAC) supporting both inbound and outbound access control for DDS nodes. Outbound: Data from other nodes is rejected in Access rights does not match Inbound: Data on local node is dropped PrismTech 2009 (don’t leave) in case Access does not match Copyright © Proprietary information – Distribution Without Expressed 3
  • 4. OpenSplice Transport Security Features Seamless Integration of Transport Security with the existing transport features of the OpenSplice networking service No limitation of existing OpenSplice transport features Can be used for “reliable” and “best effort” transport Different priorities can be used for secure transport channels Supports security for unicast AND multicast UDP messages No additional processing overhead for sending messages to multiple receivers or for resending reliable messages Flexible configuration Zero impact on the application code XML based configuration at deployment time Configuration of cipher algorithms and shared secret keys per “network partition” No data leakage in case of miss-configuration Copyright © PrismTech 2009 Proprietary information – Distribution Without Expressed Written Permission is Prohibited 4
  • 5. OpenSplice Transport Security Features (cont‘d) Provide support for multiple pluggable crypto implementations Reference implementation based on field proven OpenSSL crypto library A crypto API will be provided to integrate other crypto provider with future releases of the product Data confidentiality and integrity Configurable cipher algorithms AES & Blowfish supported with default crypto provider Strong encryption by high performance symmetric ciphers Integrity assurance by cryptographic hash algorithms (SHA1 & SHA256 supported with default crypto provider) Dedicated Crypto channel Copyright © PrismTech 2009 Proprietary information – Distribution Without Expressed Written Permission is Prohibited 5
  • 6. e.g Transport Encryption at Partition level SecurityProfile Name=”SecureSectionProfile” Cipher="blowfish" CipherKey="000102030405060708090a0b0c0d0e0f"/> … <PartitionMapping > <DCPSPartitionTopics =“MyChiphredPartition.*” NetworkPartition =“MyNetworkSecurePartition” .. <NetworkPartitions> <MyNetworkSecurePartition Address=“223.240.240.0" SecurityProfile=“SecureSectionProfile"/> Sub Pub Pub MyCiphered Partition Sub Clear Partitions Sub Pub Sub Sub Pub @1 @2 Physical Network Layer Copyright © PrismTech 2009 Proprietary information – Distribution Without Expressed Written Permission is Prohibited DDS Logical Layer 6
  • 7. OpenSplice Authentication & Access Control Features Data origin authentication X509 Digital signatures are used for originator authentication Messages from non-trusted nodes are dropped Mandatory Access Control Enforces confidentiality and Integrity requirements of information flows using a policy model based on Bell La Padula & Biba security models XML based access control policy describes resources to be accessed Copyright © PrismTech 2009 Proprietary information – Distribution Without Expressed Written Permission is Prohibited 7
  • 8. Mandatory Access Control (MAC) Rules 8 Top Secret No-Read-Up, No-Write-down E.g Classified user can’t read Secret Data and can’t write Unclassified data Biba Integrity rules Secret Secret Confidential Conf Public Public Unclassified Bell-La-Padula Confidentiality rules: Top Secret Unclas sified DDS Node No-Read-down, No-Write-Up E.g Level_2 Subject can’t read Level_0 Data and can’t write Level_3 Data. Bell-La-Padula Data Object Level-2 Level-2 Level-1 Level-1 Level-0 Level-0 Biba Compartments rules The need to know rule The Data set Compartments is included in the user set of compartments Access is guaranteed if 3 rules apply Compartment rule Copyright © PrismTech 2009 Proprietary information – Distribution Without Expressed Written Permission is Prohibited
  • 9. MAC with OpenspliceDDS secure net service In Opensplice the User* Granularity is the “Node”. User*: publishing or receiving node User Identity uses SSL X509 Certificate User ID, Password certif will be considered in future Data: At DDS topic or Partition levels Currently, Access control is not enforced for Intra-node communication In Networking Secure Networking Service the following control occurs When Receiving data Is data published by a trusted node Is Receiving node allowed to read the data When Sending data Is the node authorised to publish the data Copyright © PrismTech 2009 Proprietary information – Distribution Without Expressed Written Permission is Prohibited 9
  • 10. MAC configuration example <resource> … <topic>AlertMessages</topic> <user> <classification> <!-- for MAC --> <secrecyLevel>CONFIDENTIAL</secrecyLevel> <integrityLevel>LEVEL_1</integrityLevel> <compartments> <compartment>FinnishArmy</compartment> <compartment>Air Force</compartment> </compartments> </classification> </resource> 10 <id>user1</id> <clearance> <!-- for MAC -<secrecyLevel>CONFIDENTIAL</secrecyLevel> <integrityLevel>LEVEL_2</integrityLevel> <compartments> <compartment> FinnishArmy</compartment> <compartment>Air Force</compartment> <compartment>Radar</compartment> </compartments> </clearance> <authentication> <x509Authentication> <subject>DN</subject> </x509Authentication> </authentication> </user> Copyright © PrismTech 2009 Proprietary information – Distribution Without Expressed Written Permission is Prohibited