
)*+,,*
-./
!
))0+)01++,
=!
)(+
42!
*,20
STLF-NA-TRD-REQ-2630 The key identifiers negotiated during the sign-on phase, shall as minimum
deliver:
· or one key for the unicast stream and one key for several (or even all)
multicast services
· one key for the unicast stream and one key per multicast service
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2640 The security signaling protocol composed by security MAC messages are
defined in the DVB-RCS framework. The transport of security messages over
IP using the same protocol stack as the traffic and management planes. Two
pairs of requests/response messages are defined, one aiming at negotiating
security parameters, the other allowing to agree on session keys as well as to
authenticate RCSTs. The following table details the roles played by each pair
of messages: Requests messages are sent by the NCC to the RCSTs and
response messages are sent by the RCSTs to the NCC.
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2650 The security messages over the return path shall be transported using DULM
(section 6.6.2 of [ref DVB RCS]
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2660 The security messages over the forward path shall be transported using a
well known PID.
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2670 As transport mechanism for security messages UDP could be selected. This
avoid the usage of DULM or specific PVC, coherent with IP management
stack, and assured the ability to group several security messages in the
same UDP packet allowing better use of satellite bandwidth
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2680 The security solution shall be compliant with security part 9.4 of [9]. T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2690 The authenticity of the RCST shall be checked by the NCC during the key
exchange step and during a re-keying procedure
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2700 During logon, the RCST shall indicate its encryption/security capability to the
NCC on the CSC burst (RCST Capability field) and the NCC shall
communicate on the logon initialise descriptor whether security shall be
used.
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2710 If security is used, the NCC shall then start the security connection procedure
with the negotiation step by sending as many Sign On request messages as
the data streams required by the RCST
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2720 For Sign On request messages related to multicast forward MPE streams,
the NCC shall select only one encryption algorithm in its proposal, as the
cryptographic context shall be shared by all the RCSTs of the network
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
STLF-NA-TRD-REQ-2730 The RCST shall then reply to each message issuing a Sign On response
message including its choices.
T STLF_IF_RCST_MGMT_AUTH STLF_IO_SEC_RCST
STLF_IO_SEC_RSGW
Comentarios a estos manuales