{"id":226904,"date":"2024-10-19T14:45:00","date_gmt":"2024-10-19T14:45:00","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-19-30373648-dc\/"},"modified":"2024-10-25T08:43:14","modified_gmt":"2024-10-25T08:43:14","slug":"bsi-19-30373648-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-19-30373648-dc\/","title":{"rendered":"BSI 19\/30373648 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
5<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Figures <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Tables <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | INTRODUCTION SCSI standards family <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3 Terms and definitions, symbols, abbreviations, and conventions 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 3.2 Abbreviations and symbols 3.2.1 Abbreviations <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 3.2.2 Symbols 3.2.3 Mathematical operators 3.3 Keywords <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 3.4 Conventions <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 3.5 Numeric and character conventions 3.5.1 Numeric conventions <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 3.5.2 Units of measure <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 3.5.3 Byte encoded character strings conventions 3.6 Bit and byte ordering <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 4 Security features model common to all device types 4.1 Security features for SCSI devices 4.1.1 Security associations 4.1.1.1 Principles of SAs <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 4.1.1.2 SA parameters <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 4.1.1.3 Creating an SA <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 4.1.2 Key derivation functions 4.1.2.1 KDFs overview 4.1.2.2 IKEv2-based iterative KDF <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 4.1.2.3 HMAC-based KDFs <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 4.1.2.4 AES-XCBC-PRF-128 IKEv2-based iterative KDF <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 4.1.3 Using IKEv2-SCSI to create an SA 4.1.3.1 Overview <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 4.1.3.2 IKEv2-SCSI Protocol summary <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 4.1.3.3 IKEv2-SCSI Authentication 4.1.3.3.1 Overview <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 4.1.3.3.2 Pre-shared key authentication 4.1.3.3.3 Digital signature authentication 4.1.3.3.3.1 Overview <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 4.1.3.3.3.2 Certificates and digital signature authentication 4.1.3.3.3.3 Example of certificate use for digital signature authentication <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 4.1.3.3.3.4 Handling of the Certificate Request payload and the Certificate payload 4.1.3.3.4 Constraints on skipping the Authentication step <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 4.1.3.4 Summary of IKEv2-SCSI shared keys nomenclature and shared key sizes <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 4.1.3.5 Device Server Capabilities step <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 4.1.3.6 IKEv2-SCSI Key Exchange step 4.1.3.6.1 Overview 4.1.3.6.2 Key Exchange step SECURITY PROTOCOL OUT command <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 4.1.3.6.3 Key Exchange step SECURITY PROTOCOL IN command <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 4.1.3.6.4 Key Exchange step completion 4.1.3.6.5 After the Key Exchange step 4.1.3.7 IKEv2-SCSI Authentication step 4.1.3.7.1 Overview <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 4.1.3.7.2 Authentication step SECURITY PROTOCOL OUT command <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 4.1.3.7.3 Authentication step SECURITY PROTOCOL IN command <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 4.1.3.8 Generating shared keys 4.1.3.8.1 Overview <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 4.1.3.8.2 Generating shared keys when the Authentication step is skipped 4.1.3.8.3 Generating shared keys when the Authentication step is processed 4.1.3.8.4 Initializing shared key generation 4.1.3.8.4.1 Initializing for SA creation shared key generation <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 4.1.3.8.4.2 Initializing for generation of shared keys used by the created SA 4.1.3.8.5 Generating shared keys used for SA management <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 4.1.3.8.6 Generating shared keys for use by the created SA <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 4.1.3.9 IKEv2-SCSI SA generation <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 4.1.3.10 Abandoning an IKEv2-SCSI CCS <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 4.1.3.11 Deleting an IKEv2-SCSI SA 4.1.4 Security progress indication <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 4.1.5 ESP-SCSI encapsulations for parameter data 4.1.5.1 Overview 4.1.5.2 ESP-SCSI required inputs <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 4.1.5.3 ESP-SCSI data format before encryption and after decryption <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 4.1.5.4 ESP-SCSI outbound data descriptors 4.1.5.4.1 Overview <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 4.1.5.4.2 ESP-SCSI CDBs or Data-Out Buffer parameter lists including a descriptor length 4.1.5.4.2.1 Initialization vector absent <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 4.1.5.4.2.2 Initialization vector present <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 4.1.5.4.3 ESP-SCSI Data-Out Buffer parameter lists for externally specified descriptor length 4.1.5.4.3.1 Initialization vector absent <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 4.1.5.4.3.2 Initialization vector present 4.1.5.5 ESP-SCSI Data-In Buffer parameter data descriptors 4.1.5.5.1 Overview <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 4.1.5.5.2 ESP-SCSI Data-In Buffer parameter data including a descriptor length 4.1.5.5.2.1 Initialization vector absent <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 4.1.5.5.2.2 Initialization vector present <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 4.1.5.5.3 ESP-SCSI Data-In Buffer parameter data for externally specified descriptor length 4.1.5.5.3.1 Initialization vector absent <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 4.1.5.5.3.2 Initialization vector present <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 4.1.6 Security algorithm codes <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 4.2 Secure random numbers <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 5 Security protocol parameters for all device types 5.1 Security protocol information description 5.1.1 Overview 5.1.2 CDB description <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 5.1.3 Supported security protocols list description <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 5.1.4 Certificate data description 5.1.4.1 Certificate overview 5.1.4.2 Public Key certificate description 5.1.4.3 Attribute certificate description <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 5.1.5 Security compliance information description 5.1.5.1 Security compliance information overview <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 5.1.5.2 Compliance descriptor overview <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 5.1.5.3 FIPS 140 compliance descriptor <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 5.2 SA creation capabilities 5.2.1 Overview 5.2.2 SA creation capabilities CDB description <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 5.2.3 SA creation capabilities parameter data formats 5.2.3.1 Supported device server capabilities formats parameter data format <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 5.2.3.2 IKEv2-SCSI device server capabilities parameter data format 5.3 IKEv2-SCSI 5.3.1 Overview <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 5.3.2 IKEv2-SCSI SECURITY PROTOCOL IN CDB description <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 5.3.3 IKEv2-SCSI SECURITY PROTOCOL OUT CDB description <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 5.3.4 IKEv2-SCSI parameter data format <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 5.3.5 IKEv2-SCSI payloads 5.3.5.1 IKEv2-SCSI payload format <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 5.3.5.2 No Next payload <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 5.3.5.3 Key Exchange payload <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 5.3.5.4 Identification \u2013 Application Client payload and Identification \u2013 Device Server payload <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 5.3.5.5 Certificate payload <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 5.3.5.6 Certificate Request payload <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 5.3.5.7 Authentication payload <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 5.3.5.8 Nonce payload <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 5.3.5.9 Notify payload <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 5.3.5.10 Delete payload <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 5.3.5.11 Encrypted payload 5.3.5.11.1 Combined mode encryption <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 5.3.5.11.2 Encrypted payload introduction <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 5.3.5.11.3 IKEv2-SCSI AAD <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 5.3.5.11.4 Processing a received Encrypted payload <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 5.3.5.12 IKEv2-SCSI SA Creation Capabilities payload <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 5.3.5.13 IKEv2-SCSI SA Cryptographic Algorithms payload <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 5.3.5.14 IKEv2-SCSI SAUT Cryptographic Algorithms payload <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 5.3.5.15 IKEv2-SCSI Timeout Values payload <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 5.3.6 IKEv2-SCSI cryptographic algorithm descriptors 5.3.6.1 Overview <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 5.3.6.2 ENCR IKEv2-SCSI cryptographic algorithm descriptor <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 5.3.6.3 PRF IKEv2-SCSI cryptographic algorithm descriptor <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 5.3.6.4 INTEG IKEv2-SCSI cryptographic algorithm descriptor <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 5.3.6.5 D-H IKEv2-SCSI cryptographic algorithm descriptor <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 5.3.6.6 IKEv2-SCSI authentication algorithm IKEv2-SCSI cryptographic algorithm descriptor <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 5.3.7 Errors in IKEv2-SCSI security protocol commands <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 5.3.8 Errors in IKEv2-SCSI security protocol parameter data 5.3.8.1 Overview 5.3.8.2 Errors with high denial of service attack potential <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 5.3.8.3 Errors with low denial of service attack potential 5.3.9 Translating IKEv2 errors <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | Annex A Security goals and threat model A.1 Introduction A.2 Security goals <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | A.3 Threat model A.4 Types of attacks <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | A.5 SCSI security considerations <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | Annex B Variations between this document and equivalent security protocols B.1 IKEv2 protocol details and variations for IKEv2-SCSI <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | B.2 ESP protocol details and variations for ESP-SCSI <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | BIBLIOGRAPHY <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS EN IEC 62868-1. Organic light emitting diode (OLED) Light sources for general lighting. Safety – Part 1. General requirements and tests<\/b><\/p>\n |