Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How do we address the security issues introduced by the use of aftermarket ECUs? #200

Open
jhdalek55 opened this issue Dec 22, 2020 · 13 comments
Milestone

Comments

@jhdalek55
Copy link
Contributor

jhdalek55 commented Dec 22, 2020

First introduced at our industry workshop in May, this issue opens discussion on the complicated topic of how the use of aftermarket equipment and services impacts security systems. Aftermarket companies refurbish and reuse equipment following end-of-life support from OEMs. This means introducing ECUs to a vehicle that the OEM has no control over. In addition, because aftermarket suppliers may not have access to the original design, they often reverse engineer the parts to figure out how it works. Such an approach perhaps keeps these suppliers from being able to glean all relevant design information about the ECU.

This is admittedly a broad topic. When introduced at the workshop, several specific points were raised that could each be broken into separate issues:

  • How do we deal with aftermarket ECUs that do not have their own Primary? Can they leverage an OEMs Director repository?
  • If an aftermarket ECU does have its own Primary, is each capable of controlling a mutually exclusive set of
  • Could ownership of Director be delegated to a third party or owner?

I'm opening up this issue so we can begin a dialogue on these and other issues.

@iramcdonald
Copy link

iramcdonald commented Dec 22, 2020 via email

@jhdalek55
Copy link
Contributor Author

Thanks for opening up this discussion, @iramcdonald

@jhdalek55
Copy link
Contributor Author

Can someone with the right privileges flag the milestone for this issue. Let's make it 2.0.0 for now.

@pattivacek pattivacek added this to the Uptane 2.0.0 milestone Jan 5, 2021
@jhdalek55
Copy link
Contributor Author

At our 3/16 meeting,, it was suggested that we add a mention of these issues to the Deployment pages for our V.1.2.0.

@jhdalek55
Copy link
Contributor Author

jhdalek55 commented Apr 26, 2021

At our 4/13 meeting, it was agreed we should add an "Emerging Issues" page to Deployment Best Practices that would address topics like this one where no definitive solution is on the horizon. PR # 104 opened a file for this page and @jhdalek55 will draft some initial text. In addition to this issue, the text will address Issues #162, #201, and Issue #86 on the Deployment pages.

@jhdalek55
Copy link
Contributor Author

At our 8/3 meeting, the suggested action was "some text about this issue may be added to the Deployment pages. This will focus only on the problems and will not put forward any solutions." If we are adding this text, we need a volunteer to draft such text.

@jhdalek55
Copy link
Contributor Author

I can probably cobble together a rough draft for this, based on what we included in the first whitepaper, as long as several people agree to review the content. I'll try to get this done later in the week.

@jhdalek55
Copy link
Contributor Author

Addressed in part by Deployment PR #116

@jhdalek55
Copy link
Contributor Author

jhdalek55 commented Nov 5, 2021

Since this issue cannot be resolved at this time, can we make a new label, perhaps PENDING, for issues like this for which cannot say when they answered? I would prefer we did not leave issues like this (#162 #198) labeled "2.0.0" on the repo as it gives the appearance that we did not completed these on-time. Failing that can we leave it posted without a version label at all?

@mnm678 mnm678 modified the milestones: Uptane 2.0.0, Future Nov 23, 2021
@jhdalek55
Copy link
Contributor Author

Information added to Deployment via PR #116, which was merged on 12/17. Issue remains open however as we monitor pending developments.

@jhdalek55
Copy link
Contributor Author

jhdalek55 commented Oct 11, 2022

During the 10/11 Uptane Standards meeting, we affirmed that while we cannot propose a solution till V.3.0.0 at the earliest (as this would be a major change and possibly a breaking one), we should review the existing text on this topic in the Deployment Best Practices to ensure it is sufficiently clear and current. The current text can be found at https://github.com/uptane/deployment-considerations/blob/master/exceptional_operations.md#aftermarket-ecus

@jhdalek55
Copy link
Contributor Author

jhdalek55 commented Jan 31, 2023

[At the 1/31/22 Uptane Standards meeting, we agreed to tentatively mark this for 2.2.0. The whitepaper on this topic is scheduled to be released at the end of the year and can serve as a precursor to whatever changes are to be integrated here. Can someone change the milestone?

@jhdalek55
Copy link
Contributor Author

@mnm678 or @trishankatdatadog ---I can't change version numbers on the Standard. Can someone milestone this for V.2.2.0

@mnm678 mnm678 modified the milestones: Future, 2.2.0 Apr 5, 2023
@tkfu tkfu modified the milestones: 2.2.0, Future Mar 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants