blob: 5f1a0ca4b47de061992c7bf770d598b5bab6dc8d [file] [log] [blame]
.. _sensor-threat:
Sensor Device Threat Model
##########################
This document describes a threat model for an IoT sensor device.
Spelling out a threat model helps direct development effort, and can
be used to help prioritize these efforts as well.
This device contains a sensor of some type (for example temperature, or a
pressure in a pipe), which sends this data to an SoC running a
microcontroller. This microcontroller connects to a cloud service, and
relays this sensor data to this service. The cloud service is also able
to send configuration data to the device, as well as software update
images. A general diagram can be seen in Figure 1:
.. figure:: media/sensor-model.svg
Figure 1. Sensor General Diagram
In this sensor device, the sensor connects with the SoC via an SPI bus,
and the SoC has a network interface that it uses to communicate with the
cloud service. The particulars of these interfaces can impact the threat
model in unexpected ways, and variants on this will need to be
considered (for example, using a separate network interface SoC
connected via some type of bus).
This model also focuses on communicating via the MQTT-over-TLS protocol,
as this seems to be in wide use [1]_.
Assets
======
One aspect of the threat model to consider are assets involved in the
operation of the device. The following list enumerates the assets
included in this model:
1. **The bootloader**. This is a small code/data image contained in
on-device flash that is the first code to run. In order to establish
a root of trust, this image must be immutable. This model assumes
that the SoC provides a mechanism to protect a region of the flash
from future writes, and that this will be done after this image is
programmed into the device, early in production [th-imboot]_.
2. **The application firmware image**. This asset consists of the
remainder of the firmware run by the microcontroller. The distinction
is made because this part of the image will need to be updated
periodically as security vulnerabilities are discovered. Requirements
for updates to this image are:
a. The image shall only be replaced with an authorized image
[th-authrepl]_.
b. When an authorized replacement image is available, the update
shall be done in a timely manner [th-timely-update]_.
c. The image update shall be seen as atomic, meaning that when the
image is run, the flash shall contain either the update image in
its entirety, or the old image in its entirety
[th-atomic-update]_.
3. **Root certificate list**. In order to authenticate the cloud service
(server), the IoT device must have a list of root certificates that
are allowed to sign the certificate on the server. For cloud-provider
based services, this list will generally be provided by the service
provider. Because the root certificates can expire, and possibly be
revoked, this list will need to be periodically updated
[th-root-certs]_, [th-root-check]_.
4. **Client secrets**. To authenticate the client to the service, the
client must possess some kind of secret. This is generally a private
key, usually either an RSA key or an EC private key. When
establishing communication with the server, the device will use
this secret either as part of the TLS establishment, or to sign a
message used in the communication.
This secret is generally generated by the service provider, or by
software running elsewhere, and must be securely installed on the
device. Policy may dictate that this secret be replaced
periodically, which will require a way to update the client secret.
Typically, the service will allow two or three active keys to allow
this update to proceed while the old key is used.
These secrets must be protected from read, and the smallest amount
of code necessary shall have access to them. [th-secret-storage]_
5. **Current date/time**. TLS certificate verification requires
knowledge of the current date and time in order to determine if the
current time falls within the certificate's current validity time.
Also, token based client authentication will generally require the
client to sign a message containing a time window that the token is
valid. Certificate validation requires the device's notion of date and
time to be accurate within a day or so. Token generation generally
requires the time to be accurate within 5-10 minutes.
It may be possible to approximate secure time by querying an
external time server. Secure NTP is possibly beyond the
capabilities of an IoT device. The main risks of having incorrect
time are denial of service (the device rejects valid certificates),
and the generation of tokens with invalid times. It could be
possible to trick the device into generating tokens that are valid in
the future, but the attacker would also have to spoof the server's
certificate to be able to intercept this. [th-time]_
6. **Sensor data**. The data received from the sensor itself, and
delivered to the service shall be delivered without modification or
tampering.
7. **Device configuration**. Various configuration data, such as the
hostname of the service to connect to, the address of a time server,
frequency and parameters of when sensor data is sent to the service,
and other need to be kept by the device. This configuration data will
need to be updated periodically as the configuration changes. Updates
should be allowed only from authorized parties. [th-conf]_
8. **Logs**. In order to assist with analysis of security issues, the
device shall log information about security-pertinent events. IoT
devices generally have limited storage, and as such, these logs need
to be carefully selected. It may also be possible to send these log
events to the cloud service where they can be stored in a more
resource-available environment. Types of events that should be logged
include:
a. **Firmware image updates**. The system should log the download of
new images, and when an image is successfully updated.
b. **Client secret changes**. Changes and new client secrets should be
logged.
c. **Changes to the device configuration**.
[th-logs]_
Communication
=============
In addition to assets, the threat model also considers the locations
where data or assets are communicated between entities of the system.
1. **Flash contents**. The flash device contains several regions. The
contents of flash can be modified programmatically by the SoC's CPU.
a. **The bootloader**. As described in the Assets section, the
bootloader is a small section of the flash device containing the
code initially run. This section shall be written early in the
lifecycle of the device, and the flash device then configured to
permanently disallow modification of this section. This
configuration should also prevent modification via external
interfaces, such as JTAG or SWD debuggers.
The bootloader is responsible for verifying the signature of the
application image as well as updating the application image from
the update image when an update is needed.
The bootloader shall verify the signature of the update image
before installing it.
The bootloader shall only accept an update image with a newer
version number than the current image.
b. **The application image**. The application image contains the code
executed during normal operation of the device. Before running
this image, the bootloader shall verify a digital signature of the
image, to avoid running an image that has been tampered with. The
flash/system shall be configured such that after the bootloader
has completed, the CPU will be unable to write to the application
image.
c. **The update image**. This is an area of flash that holds a new
version of the application image. This image will be downloaded
and stored by the application during normal operation. When this
has completed, the application can trigger a reboot, and the
bootloader can install the new image.
d. **Secret storage**. An area of the flash will be used to store
client secrets. This area is written and read by a subset of the
application image. The application shall be configured to
protect this area from both reads and writes by code that does
not need to have access to it, giving consideration to possible
exploits found within a majority of the application code.
Revealing the contents of the secrets would allow the attacker
to spoof this device.
Initial secrets shall be placed in the device during a
provisioning activity, distinct from normal operation of the
device. Later updates can be made under the direction of
communication received over a secured channel to the service.
e. **Configuration storage**. There shall be an area to store other
configuration information. On resource-constrained devices, it is
allowed for this to be stored in the same region as the secret
storage, however, this adds additional code that has access to the
secret storage area, and as such, more code that must be
scrutinized.
f. **Log storage**. The device may have an area of flash where log
events can be written.
2. **Sensor/Actuator interface**. In this design, the sensor or actuator
communicates with the SoC via a bus, such as SPI. The hardware design
shall be made to make intercepting this bus difficult for an attack.
Required techniques depend on the sensitivity and use of the sensor
data, and can range from having the sensor mounted on the same PCB as
the MCU to epoxy potting the entire device.
3. **Communication with cloud service**. Communication between the
device, and the cloud service will be done over the general
internet. As such, it shall be assumed that an attacker can
arbitrarily intercept this channel and, for example, return spoofed
DNS results or attempt man-in-the-middle attacks
against communication with cloud services.
The device shall use TLS for all communication with the cloud
service [th-all-tls]_. The TLS stack shall be configured to use only cipher suites
that are generally considered secure [2]_, including forward
secrecy. The communication shall be secured by the following:
a. **Cipher suite selection**. The device shall only allow
communication with generally agreed secure cipher suites
[th-tls-ciphers]_.
b. **Server certificate verification**. The server presented by the
server shall be verified [th-root-check]_.
i. **Naming**. The certificate shall name the host and service
the cloud service server is providing.
`RFC6125 <https://tools.ietf.org/html/rfc6125>`__ describes
best practices for this. It is permissible for the device to
require the certificate to be more restrictive than as
described in this RFC, provided the service can use a
certificate that can comply.
ii. **Path validation**. The device shall verify that the
certificate chain has a valid signature path from a root
certificate contained within the device, to the certificate
presented by the service.
`RFC4158 <https://tools.ietf.org/html/rfc4158>`__ describes
this is general. The device is permitted to require a more
restricted path, provided the server certificate used
complies with this restriction.
iii. **Validity period**. The validity period of all presented
certificates shall be checked against the device's best
notion of the current time.
c. **Client authentication**. The client shall authenticate itself to
the service using a secret known only to that particular device.
There are several options, and the technique used is generally
mandated by the particular service provider being used
[th-tls-client-auth]_.
i. **TLS client certificates**. The TLS protocol allows the
client to present a certificate, and assert its knowledge of
the secret described by that certificate. Generally, these
certificates will be stored within the service provider. These
certificates can be self-signed, or signed by a CA. Since the
service provider maintains a list of valid certificates
(mapping them to a device identity), having these certificates
signed by a CA does not add any additional security, but may
be useful in the management of these certificates.
ii. **Token-based authentication**. It is also possible for the
client to authenticate itself using the *password* field of
the MQTT CONNECT packet. However, the secret itself must not
be transmitted in this packet. Instead, a token-based
protocol, such as
`RFC7519 <https://tools.ietf.org/html/rfc7519>`__\ 's JSON Web
Token (JWT) can be used. These tokens will generally have a
small validity period (e.g. 1 hour), to prevent them from
being reused if they are intercepted. The token shall not be
sent until the device has verified the identity of the server.
d. **Random/Entropy source**. Cryptograph communication requires the
generation of secure pseudorandom numbers. The device shall use a
modern, accepted cryptographic random-bit generator to generate
these random numbers. It shall use either a Non-Deterministic
Random Bit Generator (True RBG) implemented in hardware within the
SoC, or a Deterministic Random Bit Generator (Pseudo RBG) seeded
by an entropy source within the SoC. Please see NIST SP 800-90A
for information on approved RBGs and NIST SP 800-90B for
information on testing a device's entropy source [th-entropy]_.
4. **Communication with the time service**. Ideally, the device shall
contain hardware that maintains a secure time. However, most SoCs in
use do not have support for this, and it will be necessary to consult
an external time service.
`RFC4330 <https://tools.ietf.org/html/rfc4330>`__ and referenced RFCs
describe the Simple Network Time Protocol that can be used to query
the current time from a network time server.
5. **Device lifecycle**. An IoT device will have a lifecycle from
production to destruction and disposal of the device. Aspects of this
lifecycle that impact security include initial provisioning, normal
operation, re-provisioning, and destruction.
a. **Initial provisioning**. During the initial provisioning stage,
it is necessary to program the bootloader, an initial application
image, a device secret, and initial configuration data
[th-initial-provision]_. In
addition, the bootloader flash protection shall be installed. Of
this information, only the device secret needs to differ per
device. This secret shall be securely maintained, and destroyed in
all locations outside of the device once it has been programmed
[th-initial-secret]_.
b. **Normal operation**. Normal operation includes the behavior
described by the rest of this document.
c. **Re-provisioning**. Sometimes it is necessary to re-provision a
device, such as for a different application. One way to do this is
to keep the same device secret, and replace the configuration
data, as well as the cloud service data associated with the
device. It is also possible to program a new device secret, but if
this is done it shall be done securely, and the new secret
destroyed externally once programmed into the device
[th-reprovision]_.
d. **Destruction**. To prevent the device secret from being used to
spoof the device, upon decommissioning, the secret for a
particular device shall be rendered ineffective
[th-destruction]_. Possibilities include:
i. Hardware destruction of the device.
ii. Securely wiping the flash area containing the
secret [3]_.
iii. Removing the device identity and certificate from the
service.
Other Considerations
====================
In addition to the above, network connected devices generally will need
a way to configure them to connect to the network environment they are
placed in. There are numerous ways of doing this, and it is important
for these configuration methods to not circumvent the security
requirements described above.
Threats
=======
.. [th-imboot] Must boot with an immutable bootloader.
.. [th-authrepl] Application image shall only be replaced with an
authorized image.
.. [th-timely-update]
Application updates shall be done in a timely manner.
.. [th-atomic-update]
Application updates shall be atomic.
.. [th-root-certs]
TLS must have a list of trusted root certificates.
.. [th-root-check]
TLS must verify root certificate from server is valid.
.. [th-secret-storage]
There must be a mechanism to securely store client secrets. The
least amount of code necessary shall have access to these secrets.
.. [th-time]
System must have moderately accurate notion of the current
date/time.
.. [th-conf]
The system must receive, and keep configuration data.
.. [th-logs]
The system must log security-related events, and either store them
locally, or send to a service.
.. [th-all-tls]
All communications with the cloud service shall use TLS.
.. [th-tls-ciphers]
TLS shall be configured to allow only generally agreed cipher
suites (including forward secrecy).
.. [th-tls-client-auth]
The device shall authenticate itself with the cloud provider using
one of the methods described.
.. [th-entropy]
The TLS layer shall use a modern, accepted cryptographic random-bit
generator seeded by an entropy source within the SoC.
.. [th-initial-provision]
The device shall have a per-device secret loaded before deployment.
.. [th-initial-secret]
The initial secret shall be securely maintained, and destroyed in
any external location as soon as the device is provisioned.
.. [th-reprovision]
Reprovisioning a device shall be done securely.
.. [th-destruction]
Upon decommissioning, the device secret shall be rendered
ineffective.
Notes
=====
.. [1]
See https://www.slideshare.net/kartben/iot-developer-survey-2018. As
of this writing, the three major cloud IoT service providers, AWS
IoT, Google Cloud IoT, and Microsoft Azure IoT all provide MQTT over
TLS. Some feedback has suggested that some find difficulty with UDP
protocols and routing issues on various networks.
.. [2]
As new exploits are discovered, what is considered secure can
change.
Organizations such as https://www.ssllabs.com/ provide information on
current ideas of how TLS must be configured to be secure.
.. [3]
Note that merely erasing this flash area is unlikely to be
sufficient.