-
Notifications
You must be signed in to change notification settings - Fork 5
Open
Labels
help wantedExtra attention is neededExtra attention is needed
Description
By following these steps, Android ensures that only authorized carrier apps are allowed to manage eSIM profiles, maintaining security and integrity in the eSIM ecosystem:
- eSIM Profile Initialization: The eSIM profile is initialized on the device, containing information about the carrier, network settings, and certificates.
----- we will use downloadable eSIM Test Profiles and build a test suite for LPA functionality testing. - Carrier App Installation: The carrier's app, also known as the Local Profile Assistant (LPA), is installed on the device. This app will manage the eSIM profile on behalf of the carrier.
------ Our LPA App. - Signing the LPA APK: The LPA APK needs to be signed using a valid certificate. This ensures the integrity and authenticity of the app.
------- Certificates has been generated as mentioned in RSP Test Certificates Version 1.5 30 June 2021. - Access Rule File (ARF) Configuration: The ARF file, which is located in the system partition of the Android device, contains access rules for the eSIM profile. This file specifies which apps are granted privileges to access the eUICC (Embedded Universal Integrated Circuit Card) APIs.
------ High Security Concern. - Adding LPA Information to ARF: The signature of the public key of the LPA APK and the name of the LPA are added to the ARF file. This grants special privileges to the carrier's app, allowing it to interact with the eSIM APIs.
------ In future, this can be achieved and automated using modern cryptography data integrity focused protocols. - eSIM Privilege Granting: Upon initialization or when changes are made to the ARF file, the eSIM reads the file and grants privileges to the specified apps, such as the LPA, to access the eUICC APIs.
------- High Security Concern. - Root Access for ARF Modification: Accessing and modifying the ARF file typically requires root access to the device, as it is located in the system partition. This step is necessary for making any changes to the access rules if needed, although it's important to note that rooting a device may void its warranty and can introduce security risks.
------- High Security Concern. - Locating ARF File: The exact location of the ARF file may vary depending on the Android version and device manufacturer. Commonly, it can be found in the /system/etc directory or subdirectories within it.
------- High Security Concern
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
help wantedExtra attention is neededExtra attention is needed
Type
Projects
Status
In Progress