You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Adds provisioning security note to Security toolbox
section.
The BTM_ECDH_P256_CMAC_AES128_AES_CCM algorithm does not provide
protection against MITM attacks during provisioning if OOB public
keys are not used.
Signed-off-by: Stine Åkredalen <[email protected]>
* :kconfig:option:`CONFIG_BT_MESH_USES_TFM_PSA` - Enables use of the `Trusted Firmware M`_ PSA API based security toolbox (default option for platforms that support TF-M).
258
258
Zephyr's Mesh operates with open key values, including storing them in the persistent memory.
259
259
260
+
.. note::
261
+
For Bluetooth Mesh provisioning, authenticating with the BTM_ECDH_P256_CMAC_AES128_AES_CCM (0x00) algorithm does not provide protection against an active man-in-the-middle (MITM) attacker during the provisioning process if OOB public keys are not used.
262
+
260
263
The Bluetooth Mesh security toolbox based on the `PSA Certified Crypto API`_ does not operate with open key values.
261
264
After Bluetooth Mesh receives an open key value, it immediately imports the key into the crypto library and receives the unique key identifier.
262
265
The key identifiers are used in the security toolbox and stored in the persistent memory.
0 commit comments