<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Secure DFU, how secure is it?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/19769/secure-dfu-how-secure-is-it</link><description>Hi, 
 We are expecting many of our devices to be in close proximity. How can we be certain that when a user initiates a buttonless DFU, that they are uploading to the correct device? 
 Could an attacker be listening for devices in DFU mode and attempt</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 21 Jun 2017 00:05:33 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/19769/secure-dfu-how-secure-is-it" /><item><title>RE: Secure DFU, how secure is it?</title><link>https://devzone.nordicsemi.com/thread/76868?ContentTypeID=1</link><pubDate>Wed, 21 Jun 2017 00:05:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ae121330-7d58-4a1a-8f13-3efb0e3d7e1c</guid><dc:creator>Paul</dc:creator><description>&lt;p&gt;The Nordic &amp;quot;Secure DFU&amp;quot; mode signs your firmware before uploading &lt;a href="https://devzone.nordicsemi.com/question/111803/dfu-signingencryption-security/"&gt;but does NOT encrypt it over the air.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This means a malicious party can still view your application over the wire, decompile, and analyze it for vulnerabilities / reverse proprietary features but they can not modify the firmware and upload it to the device.&lt;/p&gt;
&lt;p&gt;Provided your adversary does not have physical access to your users devices you have reasonable assurance they are running &amp;quot;legitimate&amp;quot; versions of your firmware. If your adversary does have physical access they can upload tampered firmware using a j-link programmer.&lt;/p&gt;
&lt;p&gt;In terms of &amp;quot;how secure&amp;quot;? The Secure DFU is 50% secure. Firmware is authenticated but not confidential. &lt;a href="https://k9mail.github.io/2016/11/24/OpenPGP-Considerations-Part-I.html"&gt;Others have made the case that signing without encrypting is actually a disservice&lt;/a&gt;. I wouldn&amp;#39;t go so far as to say that, but I do think it&amp;#39;s reasonable to define &amp;quot;secure&amp;quot; firmware as firmware which is both signed and encrypted and it is a misnomer to call Nordic&amp;#39;s implementation &amp;quot;secure DFU&amp;quot; - technically it is &amp;quot;signed DFU&amp;quot;.&lt;/p&gt;
&lt;p&gt;Others (ourselves included) implemented firmware encryption using elliptic curves independent of the Nordic tools to get full coverage. As &lt;a href="https://lacklustre.net/bluetooth/"&gt;has been demonstrated elsewhere&lt;/a&gt;, relying on Bluetooth&amp;#39;s built in &amp;quot;Link Layer Encryption&amp;quot; is not sufficient to meet the latter encryption requirement given the numerous ways in which it can be bypassed.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Secure DFU, how secure is it?</title><link>https://devzone.nordicsemi.com/thread/76867?ContentTypeID=1</link><pubDate>Fri, 17 Feb 2017 10:10:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5bd045a7-2631-4395-97c7-8c5817d1a5a3</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;Using directed advertising will prevent &amp;quot;DOS&amp;quot;-attacks, see &lt;a href="https://devzone.nordicsemi.com/question/70959/advertisment-directeddiscoverable/?answer=71073#post-id-71073"&gt;this&lt;/a&gt; answer for more info.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Secure DFU, how secure is it?</title><link>https://devzone.nordicsemi.com/thread/76866?ContentTypeID=1</link><pubDate>Thu, 16 Feb 2017 15:05:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7d3f7fb5-a035-40ea-9f1a-7dfa782f8315</guid><dc:creator>Wojtek</dc:creator><description>&lt;p&gt;Yes, that is possible, something like whitelisting could be some kind of solution for that, but that is not perfect of course. In general, advertising in connectable mode makes device vunerable for that &amp;quot;DOS&amp;quot; attack.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Secure DFU, how secure is it?</title><link>https://devzone.nordicsemi.com/thread/76865?ContentTypeID=1</link><pubDate>Thu, 16 Feb 2017 15:02:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:61673443-eb31-41d3-aa3e-eece4dded555</guid><dc:creator>parco</dc:creator><description>&lt;p&gt;Good, but what if the attacker continues to connect first and spam these uploads, could they essentially prevent the correct user from uploading?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Secure DFU, how secure is it?</title><link>https://devzone.nordicsemi.com/thread/76864?ContentTypeID=1</link><pubDate>Thu, 16 Feb 2017 14:58:20 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d28a01c8-1152-49dd-a050-95374a359594</guid><dc:creator>Wojtek</dc:creator><description>&lt;p&gt;Attacker can attempt to upload, but if you just use your own signing key, he will probably fail miserably. Unless he get access to Your private key.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>