AWS Device Qualifications Fails

Hi guys,


We are building an IoT device on nRF9160

The main protocol is MQTT and we are using AWS IoT Core as a Cloud provider.

MQTT client is based on nRF Connect SDK 2.5.0 mqtt_helper library.

We want to use AWS Device Adviser (https://docs.aws.amazon.com/iot/latest/developerguide/device-advisor.html) in our tests.

Most of the supported tests are green, but we are facing a problem with TLS Expired Server Certificate test (https://docs.aws.amazon.com/iot/latest/developerguide/device-advisor-tests-tls.html#expired-server) The test always fails, that means the device can connect to a server with an expired certificate.

I've attached the test log from AWS Device Adviser

Any thoughts on what can be wrong? Missed config options?

BR,

Alexey

log-events-viewer-result.csv

Parents Reply Children
  • Hi Alexey,

    According to our modem development team, this feature has infrastructure available inside modem, but it needs the correct time and date source as input for validity check. This source is not decided yet, and it could be GNSS or LTE network or others, but this will increase memory usage and power consumption, so we put this feature as a limitation by now.

    Modem's TLS stack keep server certificates in internal memory of the modem, so application cannot access them. If application want to access server certificates, TLS stack must be on application side. In this case, the application would open TCP socket and pass TLS records between application side TLS stack and modem TCP socket. Application must have knowledge of time and date in this case.

    I also notice from the screenshot that the server certificate chain size is about 5K. This is beyond another limitation in release notes. 

    - Maximum server certificate chain size has a limit of 4kB.

    Overall, due to limited resource and low power requirement as cellular IoT device, nRF91 Modem has several limitations may affect your application development.

    Best regards,

    Charlie

  • Thank you a lot for such a great explanation. I think it is ok for now and thank you for the tip on how it can be overcome with SSL on the app side.

    BR,
    Alexey

Related