Skip to content

Commit d911cb3

Browse files
akredalennordicjm
authored andcommitted
docs: bluetooth: mesh: Add provisioner authentication note
Adds provisioning security note to Security toolbox section. The BTM_ECDH_P256_CMAC_AES128_AES_CCM algorithm does not provide protection against MITM attacks during provisioning if OOB public keys are not used. Signed-off-by: Stine Åkredalen <[email protected]>
1 parent 23987f6 commit d911cb3

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

doc/nrf/protocols/bt/bt_mesh/configuring.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -257,6 +257,9 @@ Zephyr's Mesh security toolbox implementation uses third-party crypto library AP
257257
* :kconfig:option:`CONFIG_BT_MESH_USES_TFM_PSA` - Enables use of the `Trusted Firmware M`_ PSA API based security toolbox (default option for platforms that support TF-M).
258258
Zephyr's Mesh operates with open key values, including storing them in the persistent memory.
259259

260+
.. note::
261+
For Bluetooth Mesh provisioning, authenticating with the BTM_ECDH_P256_CMAC_AES128_AES_CCM (0x00) algorithm does not provide protection against an active man-in-the-middle (MITM) attacker during the provisioning process if OOB public keys are not used.
262+
260263
The Bluetooth Mesh security toolbox based on the `PSA Certified Crypto API`_ does not operate with open key values.
261264
After Bluetooth Mesh receives an open key value, it immediately imports the key into the crypto library and receives the unique key identifier.
262265
The key identifiers are used in the security toolbox and stored in the persistent memory.

0 commit comments

Comments
 (0)