<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Protect modem certificate</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/82553/protect-modem-certificate</link><description>Hi, 
 
 I have the following issue, maybe I have an error in thinking: 
 For Access MQTT the Device has a Certificate in a storage slot, lets say 20. If now someone can gain access to the device, knows about the endpoints and the commands and also finds</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 28 Jan 2022 08:22:13 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/82553/protect-modem-certificate" /><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/350121?ContentTypeID=1</link><pubDate>Fri, 28 Jan 2022 08:22:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:03277715-301a-4745-b253-2379d5ccbb51</guid><dc:creator>&amp;#216;yvind</dc:creator><description>&lt;p&gt;Daniel, sounds good! Let us know if you have any issues with this solution.&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;br /&gt;Øyvind&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/349974?ContentTypeID=1</link><pubDate>Thu, 27 Jan 2022 12:45:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7b3ff651-6ad6-4cbe-9215-9d1174d22051</guid><dc:creator>danielboe</dc:creator><description>&lt;p&gt;Thanks for the response and investigation. We will consider this for our final product to close this attack weak point.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;best regards&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;daniel&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/349939?ContentTypeID=1</link><pubDate>Thu, 27 Jan 2022 11:09:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:eb6fa678-6b35-4e7d-8715-2ba8e26fc632</guid><dc:creator>&amp;#216;yvind</dc:creator><description>&lt;p&gt;Hello again Daniel,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;First of all, thank you for bringing this to our attention. The PSIRT team has assessed your PSIRT report. They write that the &amp;quot;&lt;span&gt;&lt;em&gt;official response to the DevZone request is to configure eraseprotect to mitigate this attack vector&lt;/em&gt;&amp;quot;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The team&amp;nbsp;acknowledges the scenario, and will discuss further measures to counter similar scenarios in the future products. That said the ERASPROTECT should be the countermeasure to use in your scenario as this will prevent others from erasing the device and thus programming another custom FW.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Let me know if you have any further questions.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Kind regards,&lt;br /&gt;Øyvind&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/347225?ContentTypeID=1</link><pubDate>Tue, 11 Jan 2022 15:22:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bd156bdf-63b9-4b42-935a-b8a7a5ec05f4</guid><dc:creator>&amp;#216;yvind</dc:creator><description>&lt;p&gt;Hi Daniel,&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Yes, I believe that is the next step. Please link to this ticket as well.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thank you!&lt;br /&gt;&lt;br /&gt;Kind regards,&lt;br /&gt;Øyvind&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/347207?ContentTypeID=1</link><pubDate>Tue, 11 Jan 2022 14:35:56 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2df9d522-e267-459a-aba1-e460b323264e</guid><dc:creator>danielboe</dc:creator><description>&lt;p&gt;Okay good we have a final answer here. Still I see this as a big security issue on device level. What is next? Is it usefull to open a ticket here:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.nordicsemi.com/About-us/PSIRT"&gt;https://www.nordicsemi.com/About-us/PSIRT&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Best regards&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Daniel&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/346958?ContentTypeID=1</link><pubDate>Mon, 10 Jan 2022 13:33:29 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:98045a31-9705-4f5b-9178-3b7e09dfb5f6</guid><dc:creator>&amp;#216;yvind</dc:creator><description>&lt;p&gt;Hello,&amp;nbsp;&lt;br /&gt;&lt;br /&gt;This is the answer I got from one of our certificate experts:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;br /&gt;&lt;span&gt;&amp;nbsp;The certificate is stored in the modem domain and the modem only acts based on commands it receives from the application. Modem does not validate the application, so even if the application is changed, the modem still responds to the commands it receives. Neither has the modem any way of detecting application ERASEALL.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Kind regards,&lt;br /&gt;Øyvind&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/346833?ContentTypeID=1</link><pubDate>Mon, 10 Jan 2022 07:34:51 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b5bd18cf-1f8a-4904-bb5d-8ec244e3e775</guid><dc:creator>danielboe</dc:creator><description>&lt;p&gt;Hi, are there any Ideas here how I can protect the certificate slot agains re-usage?. It would be great to close this door, even if its not that big&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/344111?ContentTypeID=1</link><pubDate>Fri, 17 Dec 2021 10:04:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a0be903c-cf65-49e9-82ee-11d8af36b9a8</guid><dc:creator>danielboe</dc:creator><description>&lt;p&gt;Yep this works but I can recover the chip and then I can gain access to the certificate slot again and use it for auth with a new firmware. That is my &amp;quot;issue&amp;quot; I see&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/344091?ContentTypeID=1</link><pubDate>Fri, 17 Dec 2021 09:05:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ce3f4aea-2d48-417f-9a53-c30652bc7fcf</guid><dc:creator>&amp;#216;yvind</dc:creator><description>&lt;p&gt;Daniel,&amp;nbsp;&lt;br /&gt;have a look at the&amp;nbsp;&lt;a href="https://infocenter.nordicsemi.com/topic/nan_041/APP/nan_production_programming/approtect_eraseprotect_enabled.html"&gt;APPROTECT and ERASEPROTECT are enabled chapter in nAN41&lt;/a&gt;, the &lt;a href="https://infocenter.nordicsemi.com/topic/ps_nrf9160/chapters/dif/ctrl-ap.html"&gt;Control Access Port chapter in the nRF9160 Product Specification&lt;/a&gt;, and the &lt;a href="https://infocenter.nordicsemi.com/topic/ps_nrf9160/dif.html"&gt;Debug and Trace chapter&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If Approtect is enabled it&amp;nbsp;&lt;span&gt;will block all debugger access, both secure and non-secure, and the secureapprotect will prevent debug on secure domain only.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Kind regards,&lt;br /&gt;Øyvind&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/343841?ContentTypeID=1</link><pubDate>Thu, 16 Dec 2021 10:29:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:657eaa4e-b291-416e-a1fb-68f52464a8a6</guid><dc:creator>danielboe</dc:creator><description>&lt;p&gt;jep exactly. I tried&amp;nbsp;APPROTECT and after the needed wipe the certificate is still in the modem memory. Can it may work with&amp;nbsp;SECUREAPPROTECT? but this sounds for me like a smaler version of&amp;nbsp;APPROTECT and secure is included in&amp;nbsp;APPROTECT ? Or am I wrong?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/343597?ContentTypeID=1</link><pubDate>Wed, 15 Dec 2021 10:35:29 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:05b6aeba-715f-4744-a266-71e6d7e6bbd3</guid><dc:creator>&amp;#216;yvind</dc:creator><description>&lt;p&gt;Hi Daniel, thanks for clarifying.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Have you looked at the &lt;a href="https://infocenter.nordicsemi.com/topic/nan_041/APP/nan_production_programming/device_protection.html"&gt;Enabling device protection chapter in the&amp;nbsp;application note: nAN41 - nRF9160 Production Programming&lt;/a&gt;?&amp;nbsp;&lt;br /&gt;This describes how to enable . Access Port Protection (APPROTECT), Erase Protection (ERASEPROTECT), and Secure Access Port Protection (SECUREAPPROTECT).&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;br /&gt;Øyvind&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/343378?ContentTypeID=1</link><pubDate>Tue, 14 Dec 2021 11:31:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:609d5d0b-e380-4ced-b54c-ed6f3be61fb8</guid><dc:creator>danielboe</dc:creator><description>&lt;p&gt;Hi, thanks for the response. I am not talking about reading the content. I am talking about using them. In my case I have a cloud certificate for AWS IoT. Even if I wipe the complete device because it is read protected it does not wipe the certificate. So everybody can flash a new firmware, only needs the certificate slot and can connect to my endpoint and send custom messages. This is the scenario I have in mind.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;best regards&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Protect modem certificate</title><link>https://devzone.nordicsemi.com/thread/342827?ContentTypeID=1</link><pubDate>Fri, 10 Dec 2021 07:54:44 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:669e932e-7ee6-4f1e-ba2a-ded9549f1d98</guid><dc:creator>&amp;#216;yvind</dc:creator><description>&lt;p&gt;Hello Daniel,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Are you referring to the &lt;a href="https://infocenter.nordicsemi.com/topic/ref_at_commands/REF/at_commands/security/cmng_set.html"&gt;modem credential storage management&lt;/a&gt;? If so, the following are not readable after configuration:&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;1 – Client certificate (ASCII text).
2 – Client private key (ASCII text).
3 – PSK (ASCII text in hexadecimal string format).&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Also, the read command is only available when modem is in offline mode.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;br /&gt;Øyvind&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>