-
Key: DDSSEC11-54
-
Status: closed
-
Source: Real-Time Innovations ( Dr. Gerardo Pardo-Castellote, Ph.D.)
-
Summary:
The DDS-SECURITY specification is not specifying the endianness to use in the ciphertext. This can lead to interoperability issues.
In particular:
- "9.5.3.3.4.1 Format of the SecureDataHeader Submessage Element" and "9.5.3.3.4.3 Format of the SecureDataTag Submessage Element".
- Should use the submessage endianness.
- Section 9.5.3.3.4.2 Format of the SecureDataBody Submessage Element
- When this is the content of the BODY submessage, the endianness should be the one in the submessage.
- When this is an encrypted payload, the specification should define a default endianness. Proposal: big endian.
EDIT
After the discussion in the comments below, we decided to specify the endianness for the submessage elements to be Big Endian. - "9.5.3.3.4.1 Format of the SecureDataHeader Submessage Element" and "9.5.3.3.4.3 Format of the SecureDataTag Submessage Element".
-
Reported: DDS-SECURITY 1.0 — Thu, 23 Feb 2017 23:22 GMT
-
Disposition: Resolved — DDS-SECURITY 1.1
-
Disposition Summary:
Specify Endianness to be Used in Submessage Elements
Define changes according to the discussion under
DDSSEC11-54. -
Updated: Tue, 19 Dec 2017 20:03 GMT
DDSSEC11 — Specify Endianness to be Used in Ciphertext
- Key: DDSSEC11-54
- OMG Task Force: DDS Security 1.1 RTF