PROFINET Protocol Security Whitepaper
PROFINET Protocol Security Whitepaper
The attention of adopters is directed to the possibility that compliance with or adoption of PI (PROFIBUS&PROFINET
International) specifications may require use of an invention covered by patent rights. PI shall not be responsible
for identifying patents for which a license may be required by any PI specification, or for conducting legal inquiries
into the legal validity or scope of those patents that are brought to its attention. PI specifications are prospective
and advisory only. Prospective users are responsible for protecting themselves against liability for infringement of
patents.
NOTICE:
The information contained in this document is subject to change without notice. The material in this document details a
PI specification in accordance with the license and notices set forth on this page. This document does not repre-
sent a commitment to implement any portion of this specification in any company's products.
WHILE THE INFORMATION IN THIS PUBLICATION IS BELIEVED TO BE ACCURATE, PI MAKES NO WAR-
RANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS MATERIAL INCLUDING, BUT NOT
LIMITED TO ANY WARRANTY OF TITLE OR OWNERSHIP, IMPLIED WARRANTY OF MERCHANTABILITY
OR WARRANTY OF FITNESS FOR PARTICULAR PURPOSE OR USE.
In no event shall PI be liable for errors contained herein or for indirect, incidental, special, consequential,
reliance or cover damages, including loss of profits, revenue, data or use, incurred by any user or any third
party. Compliance with this specification does not absolve manufacturers of PROFIBUS or PROFINET
equipment, from the requirements of safety and regulatory agencies (TÜV, BIA, UL, CSA, etc.).
PROFIBUS® and PROFINET® logos are registered trademarks. The use is restricted to
members of PROFIBUS & PROFINET International. More detailed terms for the use can be
found on the web page https://www.profibus.com/download/. Please select button
"Presentations & logos".
In this specification the following key words (in bold text) will be used:
may: indicates flexibility of choice with no implied preference.
should: indicates flexibility of choice with a strongly preferred implementation.
shall: indicates a mandatory requirement. Designers shall implement such mandatory
requirements to ensure interoperability and to claim conformance with this speci-
fication.
Publisher:
PROFIBUS Nutzerorganisation e.V.
Haid-und-Neu-Strasse 7
76131 Karlsruhe
Germany
Phone : +49 721 / 96 58 590
Fax: +49 721 / 96 58 589
E-mail: [email protected]
Web site: www.profibus.com
© No part of this publication may be reproduced or utilized in any form or by any means, electronic or
mechanical, including photocopying and microfilm, without permission in writing from the publisher.
Contents
1 Motivation ......................................................................................................................... 6
2 Purpose of this document ................................................................................................. 7
3 Current status PROFINET Security ................................................................................... 8
4 Procedure ........................................................................................................................ 8
5 Security requirements for PROFINET ............................................................................... 8
5.1 Security objectives/security measures ..................................................................... 9
5.2 Delineation of the requirements and of the actors .................................................. 10
5.3 Remaining requirements on the PROFINET protocol extension ............................. 11
6 Description of the concept for a PROFINET protocol security ......................................... 17
6.1 Object under consideration .................................................................................... 17
6.2 Definition of security classes ................................................................................. 18
6.3 Migration strategy .................................................................................................. 19
6.4 Fundamental description of the main concepts ...................................................... 20
6.4.1 Use of certificates ...................................................................................... 21
6.4.2 System power-up ....................................................................................... 22
6.4.3 Safeguarding the cyclic messages ............................................................. 23
6.5 Description of the measures for PROFINET ........................................................... 23
6.5.1 Module basics ........................................................................................... 24
6.5.2 RTA/RTC module ...................................................................................... 25
6.5.3 AR/RPC module ........................................................................................ 25
6.5.4 Trust module ............................................................................................. 25
6.5.5 Supervisor module ..................................................................................... 25
6.5.6 GSD module .............................................................................................. 25
6.5.7 Test module .............................................................................................. 26
6.5.8 Manufacturer/vendor module ..................................................................... 26
7 Summary and outlook ..................................................................................................... 27
8 List of references ............................................................................................................ 28
List of figures
Figure 1: Horizontal and vertical integration in a sample company .......................................... 6
Figure 2: Transformation of the system structures .................................................................. 6
Figure 3: Connection of several cells to a superimposed level ................................................ 7
Figure 4: Actors in the IT security process and the associated parts of IEC 62443 ................ 10
Figure 5: Delineation of product supplier and PI, primary tasks ............................................. 11
Figure 6: PROFINET example system ................................................................................... 17
Figure 7: Communication relations in the example system .................................................... 18
Figure 8: Components with certificates ................................................................................. 21
Figure 9: Authenticity verification of the public keys via certificates....................................... 21
Figure 10: Authenticity check of the devices by means of manufacturer certificate ................ 22
Figure 11: System power-up in two phases ........................................................................... 22
List of tables
Table 1: Security objectives of IT security ............................................................................... 9
Table 2: PROFINET-specific security-objectives ................................................................... 12
Table 3: PROFINET security classes for IT security .............................................................. 19
Table 4: Module categories for PROFINET security .............................................................. 24
Change history
Abstract
Within the scope of the far-reaching digitization of production processes, the IT security of pro-
duction plants is gaining in importance. The pervasive networking in companies, the vertical in-
tegration and the trend toward flatter system hierarchies require comprehensive approaches for
IT security in production. Previous concepts, which relied primarily on isolating the production
plants, must be supplemented with new concepts that make provision for the protection of com-
ponents.
PROFIBUS & PROFINET International (PI) recognized this necessity and tasked the CB/WG 10
Security working group with the development of a concept. This document provides an initial look
at the results of the work thus far. It is intended to serve as a starting point for a discussion with
manufacturers, integrators and users. The objective of this discussion is a coordinated and via-
ble concept that will make industrial communication with PROFINET fit for the requirements of
the future.
This document first describes the motivation and the procedure for the development of a security
concept. Next, the security requirements are determined and the actors in the security process
named and distinguished from one another. This document then discusses the necessary addi-
tions to the PROFINET protocol and the additional protocols required for the system startup. The
points at which changes will be necessary are described at the end. The document closes with a
list of the specifications that are going to be changed and an outlook for the further course of
action.
1 Motivation
Industrial communication with Industrial Ethernet protocols such as PROFINET, including in the
context of Industry 4.0, is growing in importance. Horizontal and vertical networking in compa-
nies will further increase in the future.
Figure 2 shows the transformation of the system structures and the elimination of hierarchies in
the automation network. Shown on the left side is a hierarchal structure, such as is found in,
e.g., PROFIBUS-based automation systems. Engineering and operator stations, as well as pro-
grammable logic controllers (PLCs), communicate via the automation network frequently via a
manufacturer-specific protocol. The programmable logic controllers communicate with the remote
IOs via PROFIBUS.
This means that different protocols are used at different levels of the network. The right side of
the picture shows a structure with a uniform protocol within a production cell, as used for Indus-
trial Ethernet systems such as PROFINET. All components are connected to a network and use
the PROFINET protocol, for example. Frequently, several such cells are connected to a higher-
level system (vertical integration) as shown in Figure 3.
In the future, intelligent field devices (e.g. temperature transmitters, pressure transmitters) will
also communicate directly via PROFINET and with higher-level systems.
The system structure with one unified protocol offers direct accessibility to all components in the
system. Network management is simplified. A connection to higher-level systems, but also direct
access to the components, is easily possible. This homogeneous structure does, however, pose
challenges with respect to the IT security. All components, including IO devices – a.k.a. remote
IOs and intelligent field devices – can be accessed by potential attackers directly via the net-
work. In the future, this will result in additional requirements on these devices in the event that
attackers penetrate the automation network or in the case of an internal attack on the network.
In a second step after publication and discussion with the manufacturers and users, the corre-
sponding specification documents are going to be created or existing specifications will be ex-
panded. This may lead to further changes with respect to this document. This document is there-
fore not normative in nature. Only the subsequently released specification documents are to be
considered decisive for an implementation.
The described security measures correspond to what is currently state of the art. Nevertheless,
further-reaching security measures will be necessary in the future. It must be noted here that
internal offenders are also an increasing risk to production plants [BSI2013]. The described se-
curity measures – which focus on isolation – are effective only to a limited degree against this
group of attackers. In addition, the user groups, e.g., from the process industry, demand further-
reaching protection [NE_153]. PROFIBUS and PROFINET International (PI) therefore decided to
protect the PROFINET protocol in the future through longer-reaching security measures on the
protocol level.
4 Procedure
This document describes the work results of the PI working group CB/WG 10 Security. In previ-
ous work steps, a threat analysis was performed for PROFINET networks and the connected
components within the scope of a STRIDE analysis [SHO2014]. Security objectives were derived
from this and possible security measures considered. On this basis, technical solution scenarios
were then analyzed and verified using defined attack scenarios. A test from the perspective of
the user and a review for compliance with the fundamental requirements of IEC 62443 shall be
performed after the publication of this document. Based on this procedure, the developed con-
cept will now be presented in this document.
First a notice regarding the use of terminology: Various terms are used in documents than deal
with IT security or information security. Standard [ISO_27001] speaks of information security
whereas the German version of [DIN_IEC_62443-3-3] speaks of IT security. Other documents
also use terms such as OT security or cybersecurity. As this document primarily references the
IEC 62443 series of standards, the term IT security is used.
Integrity Property of a system for the High: Message packets must not be falsi-
protection against unauthor- fied as this could, for example, lead to the
ized data manipulation. unintentional activation of actuators or the
recording of incorrect measured values.
Authorization Enforce the permissions High: The usage control ensures that only
assigned to an authenticat- authorized users can intervene in the au-
ed user (human user, soft- tomation system.
ware process or device) that
allow him to perform the
required actions in the au-
tomation system and moni-
tor the use of those permis-
sions.
With the exception of the confidentiality and non-repudiation security objectives, it can be seen
that nearly all security objectives for PROFINET are assessed with the relevance of “high.” To
achieve these security objectives, security measures are necessary that are to be realized at
various locations and by various stakeholders. The objective of this paper is to identify those
security measures that can be achieved through changes or additions to the PROFINET protocol
and possibly to the communication-relevant hardware as well. Other security measures, e.g.,
organizational security measures, are not considered as they do not reside in the area of re-
sponsibility of the manufacturers or of PI and cannot be influenced by them or by PI. The follow-
ing chapter therefore deals with an assignment of the requirements to the actors to determine
the security measures that are relevant for this paper.
Figure 4: Actors in the IT security process and the associated parts of IEC 62443
The actors are: Operator, service provider (for maintenance), system integrator and product sup-
plier. Figure 4 shows these with the corresponding primary activities in the security process. It
can be seen that, to ensure the IT security of a production plant, the coordinated interaction of
all three actors is necessary to achieve a high security level.
The operator of the system is, according to [IEC_62443-2-1], responsible for the organization of
the IT security processes. This includes, e.g., the training of the personnel, the establishment of
guidelines, the management of access rights, the assurance of the physical and environment-
related security as well as the patch management according to [IEC_62443-2-3]. A full list of the
tasks can be found in the cited standards.
This document considers the requirements that the production suppliers are to fulfil. For this rea-
son, organizational and planning-related aspects are not considered further here. For these
points, please refer to [PNO2013].
In a subsequent step, the requirements for the product suppliers are now further broken down
into general requirements that are to be realized by the manufacturer and into PROFINET proto-
col-related requirements that apply independent of manufacturer and are defined by PI.
6 Opera- Availability The availability of re- medium The security concept must
tion dundancy functions, also include redundant
e.g., media redundancy, communication networks.
is to be ensured
9 Opera- Confiden- It must not be possible low Balance between the need
tion tiality to read out the network for network diagnostics
topology and protection against
spying on the network.
11 Opera- Availability The availability, confi- low The interface is used for
tion dentiality and integrity the connection of network
Confiden- of diagnostic data pro- management systems and
tiality vided by PROFINET is not relevant for real-time
components via the operation. The priority is
Integrity Simple Network Man- therefore low.
agement Protocol
(SNMP) has to be en-
sured.
13 Startup Integrity The integrity of the con- high Falsification of the config-
figuration data that are uration data could be used
transferred from an IO to transfer invalid data
controller to an IO de- from an IO device to the
vice is to be ensured. IO controller undetected.
24 Engi- Integrity/ The integrity and au- high Falsification of the GSD
neering authentici- thenticity of the data in could be used to transfer
ty the device master file invalid data from an IO
(GSD file) have to be device to the IO controller
ensured. undetected by the IO con-
troller. This also applies in
the opposite direction.
The PROFINET-specific security objectives in Table 2 are to be supplemented with further re-
quirements that cannot be allocated directly onto to the generic security objectives. These in-
clude the following:
• The real-time behavior of the PROFINET system must also to be ensured when security
measures are implemented. Note: As the planned cryptographic measures in the
PROFINET devices demand additional computing power, it has to be assumed that the
security measures could – when using the same hardware equipment – affect the cycle
time.
• The security measures that are used must be state of the art.
• Where possible, the security measures should be updatable via a software update when
they are not any longer state of the art.
• The security concept should take into account economic considerations. These include:
Cost for the implementation, cost for maintenance, time to market.
• The coexistence of PROFINET components with and without security measures must be
possible. An attacker must not be able to force unsecured operation, however.
• The replacement of defective devices during operation without the need to use an engi-
neering tool must still be possible.
• After a power failure, a system must be able to start up without connection to the Internet
(black start capability).
• During operation, there should be no need for additional permanently installed system
components. Additional components for startup of system (PKI, validation of certificates)
might be required.
• The existing PROFINET profiles, such as PROFIsafe, must be usable without restriction.
• The IT security solution that is to be defined should be scalable so that it can be adapted
to the requirements of various users.
• The solution to be defined must take into account the installed basis. Compatibility with
existing installations has to be ensured. The addition of components that are equipped
with activated IT security features must not endanger the operation of an existing system.
The appropriate security measures are derived from these requirements and the corresponding
prioritization in the next chapter.
The example system consists of an IO controller with two allocated IO devices and a switch. The
engineering station is used to configure the system. In addition, an IO supervisor is connected to
the system. Human users exist for both systems, to whom corresponding user roles can be as-
signed if required. This may be, e.g., an additional tool for commissioning or for the diagnosis of
the bus system. In many cases, the engineering tool simultaneously performs the function of the
IO supervisor. Although a separate switch is possibly not necessary in many systems because
the components are equipped with integrated switches, this is considered here as well. This is
necessary since the switch may also contain configuration data, e.g., with respect to virtual net-
works. A switch without PN functionality is used in the example system. In addition to its switch
functionality, this also features the properties of a PROFINET IO device. As a result, the switch
can transfer certain status information via the PROFINET protocol to the IO controller, to the
engineering station or to the IO supervisor.
Communication relations exist between the components of the systems shown in Figure 6. These
are shown in Figure 7.
In the following description of measures for safeguarding a PROFINET system, the explained
assets and the corresponding communication relations are used as a basis. The IO ARs and Sup
ARs are the focus of this document. The connection between Engineering and IO Controller
(Eng) is given consideration as well, but is the responsibility of the manufacturer.
The right column in Table 3 shows the typical areas of use for the three security classes.
Security class 1 provides short-term incremental improvements in relation to the current status
of PN security described in chapter 3.
Security class 2 is intended for installations that have a higher level of communication to areas
outside of the installation or in which access to the system can not be monitored as well. This
class is used if the operator has higher IT security requirements on the communication via
PROFINET. In this mode, the cyclic services are protected against unauthorized modifications.
At the same time, the trustworthiness, integrity and authenticity of the acyclic services are en-
sured.
Security class 3 ensures integrity, authenticity and confidentiality of all services. It is assumed
that security class 3 is only used in those cases where information about company secrets can
be obtained by reading cyclic IO data. Note: The acyclic communication services of security
class 2 offer an alternative for the transfer of confidential data, e.g., recipes.
Most applications are able to operate on the basis of security classes 1 and 2.
To introduce security class 2, hardware and software are required that meet the requirements for
providing the additional security functions. Thus, the assemblies generally require higher compu-
© Copyright PNO 2019 - All Rights Reserved Page 19 of 30 pages
PROFINET Protocol Security Version 1.05
ting power. It is to be assumed that it will not be possible to retrofit existing installations through
software updates in all cases. A change to security class 2 or 3 therefore generally occurs when
installations are replaced or expanded. Because mixed operation of components of all security
classes will be possible, old system parts with security class 1 can be operated in parallel with
system parts with security class 2 or 3 in the same network.
2. Ensuring the integrity of the communication through cryptographic measures, e.g., cryp-
tographic checksums. This security measure must include all communication channels of
the PROFINET node, consisting of IP communication, PROFINET real-time communica-
tion and communication for network management.
5. Ensuring the confidentiality of all acyclic data and of the configuration data. Additional
safeguarding of the confidentiality of cyclic data as optional function in security class 3.
Note here that the computing power for confidential communication (encryption) is signif-
icantly higher than for simple integrity protection, e.g., through a cryptographic check-
sum. Measured values for this can be found in [RUN2014b].
6. Ensuring the minimum requirements to protect against denial of service attacks. This as-
pect has already been realized acc. to [PNO2015] within the scope of netload tests. Dur-
ing the course of further work, it must be discussed whether a minimum requirement
higher than netload class I is required.
7. Protection of the integrity and authenticity of general station description files (GSD).
Further-reaching requirements, e.g., the integrity check GSDs in an engineering tool, secure
firmware and secure development process are, according to the delineation performed in chapter
5.2, to be implemented in a manufacturer-specific manner.
Furthermore, the fundamental mechanisms are described that allow secure communication to be
established in a PROFINET system.
Figure 8 on the left shows the delivery status of an IO component (IO Device, IO Controller) as
supplied by the manufacturer. A manufacturer certificate, shown in red in the picture, should be
stored in this component. This allows the operator to check the authenticity of the device. This
provides protection against unauthorized copying. When the operator takes over the component,
he must supplement his own operator certificate, shown in green in the figure. At the same time,
the operator can integrate the device into his own public key infrastructure (PKI) via his operator
certificate.
The certificate contains the public key of the component. As shown in Figure 9, the authenticity
of the public keys is verified using the certificates and digital signatures. In this case, the opera-
tor certificates are shown in the figure. The keys and device certificates can be managed via a
public key management function, such as is integrated in the engineering tool.
Based on this authentication, the symmetric keys are then created and exchanged.
As can be seen in Figure 10, the authenticity of the manufacturer certificates can be checked in
regular intervals. This check allows certificates to be revoked by the manufacturer if necessary.
Currently under discussion is whether PROFIBUS & PROFINET International (PI) will define the
mechanisms for the authenticity check.
The content of the data packet remains readable. If necessary, encryption can optionally be per-
formed to take into account the confidentiality security objective.
Category Description
RTA/RTC Safeguarding of the cyclic layer-2 PROFINET communication and the acyclic
layer-2-based alarm mechanisms.
Trust All functions that are necessary for identifying the communication partner and
establishing a trust relationship.
GSD Protection of the device description file that is supplied with an IO device.
Test Tests that are to be performed during the certification of the PROFINET devic-
es are to be ensured in order to satisfy the security requirements according to
the defined security classes, robustness and interoperability.
Manufacturer Tasks of the manufacturer. These tasks are listed for the sake of complete-
ness but are assigned to the manufacturer.
1. Safeguarding of the cyclic layer-2 PROFINET communication and the acyclic layer-2-
based alarm mechanisms via message authentication codes.
2. Protection against replay attacks by additional message counters or integrity protection of
the existing message counters.
3. Regular renewal of the symmetric key during running operation as protection against re-
verse calculation of the key.
4. Option for security class 3: Additional encryption of the message.
1. Setup of the application relation between IO controller and IO device or between IO su-
pervisor and IO device via the asymmetric key process described in chapter 6.4. (Phase
1 acc. to Figure 11). Is used for:
a. Establishing a connection including security handshake.
b. Negotiating the symmetric key for cyclic and acyclic communation.
c. Changing the symmetric key at runtime.
2. Operation of the connection using the symmetric key determined under point 1, also for
acyclic non-real-time communication (e.g. record services).
1. Authentication of the human user of the IO supervisor by means of user name and pass-
word or a centralized user management (single sign on) or with certificates as an option.
2. Integration of the IO supervisor in the secure establishment of a connection according to
Figure 11.
Component manufacturers
1. Establish a process for issuing and revoking manufacturer certificates.
2. Provide a secure storage location for key information for IO devices.
3. Establish processes for supporting a patch management system for software according to
[IEC_62443-2-3].
4. Take into account the development and documentation requirements oriented towards
[IEC_62443-4-1] and [IEC_62443-4-2].
5. Ensure the integrity of the software in IO devices, e.g., by signing the software, in combi-
nation with a secure boot if necessary.
System manufacturer
The corresponding working groups at PI will prepare the necessary changes and present them
for discussion within PI. The necessary technical detailing will then be performed as well. Fur-
thermore, prototyping is currently being discussed. Final results are not yet available.
In a next step, the specified security solutions will be mirrored on the basic requirements of the
IEC 62443 standard of series and verified. Due to time constraints, this examination cannot be
part of this paper.
8 List of references
[BSI2013] Bundesamt für Sicherheit in der Informationstechnik (BSI) [German Federal Office
for Information Security]:Industrial Control System Security: Internal offenders.
https://www.allianz-fuer-
cybersicherheit.de/ACS/DE/_downloads/techniker/risikomanagement/BSI-
CS_061.html, 29.07.2015.
[BSI2018] Bundesamt für Sicherheit in der Informationstechnik (BSI) [German Federal Office
for Information Security]:The Trusted Platform Module (TPM) and trustworthy in-
formation technology. https://www.bsi.bund.de/DE/Themen/Cyber-
Sicher-
heit/Aktivitaeten/TrustedComputing/TrustedPlatformModuleTPM/dastrustedplatfor
mmoduletpm_node.html.
[DHS2016] Department of Homeland Security: Recommended Practice: Improving Industrial
Control System Cybersecurity with Defense-in-Depth Strategies. https://ics-
cert.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-
CERT_Defense_in_Depth_2016_S508C.pdf.
[DIN_EN_62443-4-2] German Commission for Electrical, Electronic and Information Technolo-
gies of DIN and VDE, German Institute for Standardisation DIN EN 62443-4-
2:2017-10; VDE 0802-4-2:2017-10 - Draft: Industrial communication networks –
Security for industrial automation and control systems - Part 4-2: Technical securi-
ty requirements for IACS components (IEC 65/663/CDV:2017); German version
prEN 62443-4-2:2017. Beuth Verlag, 2017.
[DIN_IEC_62443-3-3] German Commission for Electrical, Electronic and Information Technolo-
gies of DIN and VDE, German Institute for Standardisation DIN IEC 62443-3-
3:2015-06; VDE 0802-3-3:2015-06 - Draft: Industrial communication networks –
Network and system security - Part 3-3: System security requirements and securi-
ty levels (IEC 62443-3-3:2013 + Cor.:2014). Beuth Verlag, Berlin, 2015.
[FDA2018] U. S. Food & Drug Administration: CFR - Code of Federal Regulations Title 21,
Part 11. https://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/
CFRSearch.cfm?CFRPart=11&showFR=1.
[IEC_62443-2-1] IEC- International Electrotechnical Commission IEC 62443-2-1-
2010: Industrial communication networks - Network and system security - Part 2-
1: Establishing an industrial automation and control system security program,
2010.
[IEC_62443-2-3] IEC- International Electrotechnical Commission IEC TR 62443-2-
3:2015: Security for industrial automation and control systems - Part 2-3: Patch
management in the IACS environment, 2015.
[IEC_62443-4-1] IEC- International Electrotechnical Commission IEC/NP 62443-4-
1: Industrial communication networks – Network and system security – Part 4-1:
Product development requirements, 2013.
[IEC_62443-4-2] IEC- International Electrotechnical Commission IEC/NP 62443-4-
2: Industrial communication networks – Network and system security – Part 4-2:
Technical security requirements for IACS components.
[ISO_27001] DIN German Institute for Standardisation DIN ISO/IEC 27001: Information tech-
nology – Security techniques – Information security management systems – Re-
quirements (ISO/IEC 27001:2013 + Cor. 1:2014), 2015.
[NE_153] NAMUR –User Association of Automation Technology in Process Industries NE
153: Automation Security 2020 – Design, Implementation and Operation of Indus-
trial Automation Systems, Leverkusen, 2015.
[NIST_197] NIST Computer Security Division (CSD): Announcing the Advanced Encryption
Standard (AES). Federal Information Processing Standards Publication 197.
https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.197.pdf.
[NIST198] NIST Computer Security Division (CSD): FIPS 198-1: The Keyed-Hash Message
Authentication Code (HMAC),
© Copyright by: