Skip to content

Carrier Privileges #44

@ArpitxGit

Description

@ArpitxGit

By following these steps, Android ensures that only authorized carrier apps are allowed to manage eSIM profiles, maintaining security and integrity in the eSIM ecosystem:

  1. eSIM Profile Initialization: The eSIM profile is initialized on the device, containing information about the carrier, network settings, and certificates.
    ----- we will use downloadable eSIM Test Profiles and build a test suite for LPA functionality testing.
  2. Carrier App Installation: The carrier's app, also known as the Local Profile Assistant (LPA), is installed on the device. This app will manage the eSIM profile on behalf of the carrier.
    ------ Our LPA App.
  3. Signing the LPA APK: The LPA APK needs to be signed using a valid certificate. This ensures the integrity and authenticity of the app.
    ------- Certificates has been generated as mentioned in RSP Test Certificates Version 1.5 30 June 2021.
  4. Access Rule File (ARF) Configuration: The ARF file, which is located in the system partition of the Android device, contains access rules for the eSIM profile. This file specifies which apps are granted privileges to access the eUICC (Embedded Universal Integrated Circuit Card) APIs.
    ------ High Security Concern.
  5. Adding LPA Information to ARF: The signature of the public key of the LPA APK and the name of the LPA are added to the ARF file. This grants special privileges to the carrier's app, allowing it to interact with the eSIM APIs.
    ------ In future, this can be achieved and automated using modern cryptography data integrity focused protocols.
  6. eSIM Privilege Granting: Upon initialization or when changes are made to the ARF file, the eSIM reads the file and grants privileges to the specified apps, such as the LPA, to access the eUICC APIs.
    ------- High Security Concern.
  7. Root Access for ARF Modification: Accessing and modifying the ARF file typically requires root access to the device, as it is located in the system partition. This step is necessary for making any changes to the access rules if needed, although it's important to note that rooting a device may void its warranty and can introduce security risks.
    ------- High Security Concern.
  8. Locating ARF File: The exact location of the ARF file may vary depending on the Android version and device manufacturer. Commonly, it can be found in the /system/etc directory or subdirectories within it.
    ------- High Security Concern

Metadata

Metadata

Assignees

Labels

help wantedExtra attention is needed

Type

No type

Projects

Status

In Progress

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions