-
Key: DDSSEC13-96
-
Status: open
-
Source: Real-Time Innovations ( Dr. Gerardo Pardo-Castellote, Ph.D.)
-
Summary:
Currently PSK secured messages can optionally use AAD. However if AAD is not used it would create a weakness that can be exploited to tamper with the RTPS header.
The proposed remediation is to force use of AAD if using PSK or Header Extension.
Proposed changes
In:
Table 80 – Actions undertaken by the operations of the builtin Cryptographic CryptoKeyTransform plugin
encode_rtps_message
1) Transformation when “Additional Authenticated Data (AAD)” is disabled.
Replace:
The SecureRTPSPrefixSubMsg PreSharedKeyFlag shall be set if encode_rtps_message was called with transform_with_psk=TRUE.
WithThe encode_rtps_message operation will fail if it is called with transform_with_psk=TRUE and AAD is disabled.
In
Table 80 – Actions undertaken by the operations of the builtin Cryptographic CryptoKeyTransform plugin
decode_rtps_message
2) If SecureRTPSPrefixSubMsg’s PreSharedKeyFlag is set:
[..]
Uses the PSK KeyMaterial to validate the authentication tags contained in the
SecureRTPSPostfixSubMsg.
AddThe SecureRTPSPrefixSubMsg’s AdditionalAuthenticatedDataFlag must be set. The decode_rtps_message operation will fail if it is called for a message that sets the PreSharedKeyFlag flag but not the AdditionalAuthenticatedDataFlag.
-
Reported: DDS-SECURITY 1.2 — Wed, 10 Dec 2025 15:56 GMT
-
Updated: Wed, 10 Dec 2025 19:16 GMT
DDSSEC13 — Force the use of AAD in PSK messages
- Key: DDSSEC13-96
- OMG Task Force: DDS Security 1.3 RTF