DICOM PS3.15 2020c - Security and System Management Profiles

B.10 Non-Downgrading BCP 195 TLS Secure Transport Connection Profile

An implementation that supports the Non-Downgrading BCP 195 TLS Profile shall utilize the framework and negotiation mechanism specified by the Transport Layer Security protocol. It shall comply with [BCP 195] from the IETF with the additional restrictions enumerated below.

Note

  1. A device may support multiple different TLS profiles. DICOM does not specify how such devices are configured in the field or how different TLS profile-related rules are specified. The site will determine what configuration is appropriate.

  2. The DICOM profiles for TLS describe the capabilities of a product. Product configuration may permit selection of a particular profile and/or additional negotiation rules. The specific ciphersuite used is negotiated by the TLS implementation based on these rules.

The following additions are made to [BCP 195] requirements. They change some of the "should" recommendations in the RFC into requirements.

TCP ports on which an implementation accepts TLS connections, or the mechanism by which these port numbers are selected or configured, shall be stated in the Conformance Statement. The TCP ports on which an implementation accepts TLS connections for DICOMweb shall be different from those on which an implementation accepts TLS connections for DIMSE. The HTTP/HTTPS connection for DICOMweb can be shared with other HTTP/HTTPS traffic.

The Conformance Statement shall also indicate what mechanisms the implementation supports for Key Management.

Note

It is recommended that systems supporting the Non-Downgrading BCP 195 TLS Profile use the registered port number "2762 dicom-tls" for the DICOM Upper Layer Protocol on TLS. If both the Non-Downgrading BCP 195 TLS Profile and the BCP 195 TLS Profile are supported, it is recommended that they use the well known port numbers on different IP addresses.

The Conformance Statement shall indicate what mechanisms the implementation supports for Key Management.

When an integrity check fails, the connection shall be dropped per the TLS protocol, causing both the sender and the receiver to issue an A-P-ABORT indication to the upper layers with an implementation-specific provider reason. The provider reason used shall be documented in the Conformance Statement.

DICOM PS3.15 2020c - Security and System Management Profiles