<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.3 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="pre5378Trust200902" docName="draft-moran-suit-architecture-02" category="info">

  <front>
    <title abbrev="IoT Firmware Update Architecture">A Firmware Update Architecture for Internet of Things Devices</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>Brendan.Moran@arm.com</email>
      </address>
    </author>
    <author initials="M." surname="Meriac" fullname="Milosch Meriac">
      <organization>Arm Limited</organization>
      <address>
        <email>Milosch.Meriac@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Arm Limited</organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>

    <date year="2018" month="March" day="02"/>

    <area>Security</area>
    <workgroup>SUIT</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Vulnerabilities with Internet of Things (IoT) devices have raised the need for a solid and secure firmware update mechanism that is also suitable for constrained devices. Incorporating such update mechanism to fix vulnerabilities, to update configuration settings as well as adding new functionality is recommended by security experts.</t>

<t>This document lists requirements and describes an architecture for a firmware update mechanism suitable for IoT devices. The architecture is agnostic to the transport of the firmware images and associated meta-data.</t>

<t>This version of the document assumes asymmetric cryptography and a public key infrastructure. Future versions may also describe a symmetric key approach for very constrained devices.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>When developing IoT devices, one of the most difficult problems to solve is how to update the firmware on the device. Once the device is deployed, firmware updates play a critical part in its lifetime, particularly when devices have a long lifetime, are deployed in remote or inaccessible areas or where manual intervention is cost prohibitive or otherwise difficult. The need for a firmware update may be to 
fix bugs in software, to add new functionality, or to re-configure the device.</t>

<t>The firmware update process has to ensure that</t>

<t><list style="symbols">
  <t>The firmware image is authenticated and attempts to flash a malicious firmware image are prevented.</t>
  <t>The firmware image can be confidentiality protected so that attempts by an adversary to recover the plaintext binary can be prevented. Obtaining the plaintext binary is often one of the first steps for an attack to mount an attack.</t>
</list></t>

</section>
<section anchor="conventions-and-terminology" title="Conventions and Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”,
“SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>

<t>This document uses the following terms:</t>

<t><list style="symbols">
  <t>Manifest: The manifest contains meta-data about the firmware image. The manifest is protected against modification and provides information about the author.</t>
  <t>Firmware Image: The firmware image is a binary that may contain the complete software of a device or a subset of it. The firmware image may consist of multiple images, if the device contains more than one microcontroller. The image may consist of a differential update for performance reasons. Firmware is the more universal term. Both terms are used in this document and are interchangeable.</t>
</list></t>

<t>The following entities are used:</t>

<t><list style="symbols">
  <t>Author: The author is the entity that creates the firmware image, signs and/or encrypts it and attaches a manifest to it. The author is most likely a developer using a set of tools.</t>
  <t>Device: The device is the recipient of the firmware image and the manifest. The goal is to update the firmware of the device.</t>
  <t>Untrusted Storage: Firmware images and manifests are stored on untrusted fileservers or cloud storage infrastructure. Some deployments may require storage of the firmware images/manifests to be stored on various entities before they reach the device.</t>
</list></t>

</section>
<section anchor="requirements" title="Requirements">

<t>The firmware update mechanism described in this specification was designed with the following requirements in mind:</t>

<t><list style="symbols">
  <t>Agnostic to how firmware images are distributed</t>
  <t>Friendly to broadcast delivery</t>
  <t>Uses state-of-the-art security mechanisms</t>
  <t>Rollback attacks must be prevented.</t>
  <t>High reliability</t>
  <t>Operates with a small bootloader</t>
  <t>Small Parsers</t>
  <t>Minimal impact on existing firmware formats</t>
  <t>Robust permissions</t>
</list></t>

<section anchor="agnostic-to-how-firmware-images-are-distributed" title="Agnostic to how firmware images are distributed">

<t>Firmware images can be conveyed to devices in a variety of ways, including USB, UART, WiFi, BLE, low-power WAN technologies, etc and use different protocols (e.g., CoAP, HTTP). The specified mechanism needs to be agnostic to the distribution of the firmware images and manifests.</t>

</section>
<section anchor="friendly-to-broadcast-delivery" title="Friendly to broadcast delivery">

<t>For an update to be broadcast friendly, it cannot rely on link layer, network layer, or transport layer security. In addition, the same message must be deliverable to many devices; both those to which it applies and those to which it does not without a chance that the wrong device will accept the update. Considerations that apply to network broadcasts apply equally to the use of third-party content distribution networks for payload distribution.</t>

</section>
<section anchor="uses-state-of-the-art-security-mechanisms" title="Uses state-of-the-art security mechanisms">

<t>End-to-end security between the author and the device, as shown in <xref target="architecture"/>, is used to ensure that the device can verify firmware images and manifests produced by authorized authors.</t>

<t>The use of post-quantum secure signature mechanisms, such as hash-based signatures, should be explored. A mandatory-to-implement set of algorithms has to be defined offering a key length of 112-bit symmetric key or security or more, as outlined in Section 20 of RFC 7925. This corresponds to a 233 bit ECC key or a 2048 bit RSA key.</t>

<t>If the firmware image is to be encrypted, it must be done in such a way that every intended recipient can decrypt it. The information that is encrypted individually for each device must be an absolute minimum.</t>

</section>
<section anchor="rollback-attacks-must-be-prevented" title="Rollback attacks must be prevented">

<t>A device presented with an old, but valid manifest and firmware must not be tricked into installing such firmware since a vulnerability in the old firmware image may allow an attacker gain control of the device.</t>

</section>
<section anchor="high-reliability" title="High reliability">

<t>A power failure at any time must not cause a failure of the device. A failure to validate any part of an update must not cause a failure of the device. One way to achieve this functionality is to provide a minimum of two storage locations for firmware and one bootable location for firmware. An alternative approach is to use a 2nd stage bootloader with build-in full featured firmware update functionality such that it is possible to return to the update process after power down.</t>

<t>Note: This is an implementation requirement rather than a requirement on the manifest format.</t>

</section>
<section anchor="operates-with-a-small-bootloader" title="Operates with a small bootloader">

<t>The bootloader must be minimal, containing only flash support, cryptographic primitives and optionally a recovery mechanism. The recovery mechanism is used in case the update process failed and may include support for firmware updates over serial, USB or even a limited version of Bluetooth Smart. Such a recovery mechanism must provide security at least at the same level as the full featured firmware update functionalities.</t>

<t>The bootloader needs to verify the received manifest and to install the bootable firmware image. The bootloader should not require updating since a failed update poses a risk in reliability. If more functionality is required in the bootloader, it must use a two-stage bootloader, with the first stage comprising the functionality defined above.</t>

<t>All information necessary for a device to make a decision about the installation of a firmware update must fit into the available RAM of a constrained IoT device. This prevents flash write exhaustion.</t>

<t>Note: This is an implementation requirement.</t>

</section>
<section anchor="small-parsers" title="Small Parsers">

<t>Since parsers are known sources of bugs they must be minimal. Additionally, it must be easy to parse only those fields which are required to validate at least one signature with minimal exposure.</t>

</section>
<section anchor="minimal-impact-on-existing-firmware-formats" title="Minimal impact on existing firmware formats">

<t>The design of the firmware update mechanism must not require changes to existing firmware formats.</t>

</section>
<section anchor="robust-permissions" title="Robust permissions">

<t>A device may have many modules that require updating individually. It may also need to trust several actors in order to authorize an update. For example, a firmware author may not have the authority to install firmware on a device in critical infrastructure without the authorization of a device operator. In this case, the device should reject firmware updates unless they are signed both by the firmware author and by the device operator. To facilitate complex use-cases such as this, updates require several permissions.</t>

</section>
</section>
<section anchor="claims" title="Claims">

<t>When a simple set of permissions fails to encapsulate the rules required for a device make decisions about firmware, claims can be used instead. Claims represent a form of policy. Several claims can be used together, when multiple actors should have the rights to set policies.</t>

<t>Some example claims are:</t>

<t><list style="symbols">
  <t>Trust the actor identified by the referenced public key.</t>
  <t>Three actors are trusted identified by their public keys. Signatures from at least two of these actors are required to trust a manifest.</t>
  <t>The actor identified by the referenced public key is authorized to create secondary policies</t>
</list></t>

<t>The baseline claims for all manifests are described in Appendix A. In summary, they are:</t>

<t><list style="symbols">
  <t>Do not install firmware with earlier metadata than the current metadata.</t>
  <t>Only install firmware with a matching vendor, model, hardware revision, software version, etc.</t>
  <t>Only install firmware that is before its best-before timestamp.</t>
  <t>Only install firmware with metadata signed by a trusted actor.</t>
  <t>Only allow an actor to exercise rights on the device via a manifest if that actor has signed the manifest.</t>
  <t>Only allow a firmware installation if all required rights have been met through signatures (one or more) or manifest dependencies (one or more).</t>
  <t>Use the instructions provided by the manifest to install the firmware.</t>
  <t>Any authorized actor may redirect any URI.</t>
  <t>Install any and all firmware images that are linked together with manifest dependencies.</t>
  <t>Choose the mechanism to install the firmware, based on the type of firmware it is.</t>
</list></t>

</section>
<section anchor="architecture" title="Architecture">

<t>We start the architectural description with the security model. It is based on end-to-end security. <xref target="e2e-figure"/> illustrates the security model where a firmware image and the corresponding manifest are created by an author and verified by the device. The firmware image is integrity protected and may be encrypted. The manifest is integrity protected and authenticated. When the author is ready to distribute the firmware image it is conveyed using some communication channel to the device, which will typically involve the use of untrusted storage. Examples of untrusted storage are FTP servers, Web servers or USB sticks.</t>

<figure title="End-to-End Security." anchor="e2e-figure"><artwork><![CDATA[
                            +-----------+
+--------+  Firmware Image  |           |   Firmware Image  +--------+
|        |  + Manifest      | Untrusted |   + Manifest      |        |
| Device |<-----------------| Storage   |<------------------| Author |
|        |                  |           |                   |        |
+--------+                  +-----------+                   +--------+
     ^                                                          *
     *                                                          *
     ************************************************************
                        End-to-End Security
]]></artwork></figure>

<t>Whether the firmware image and the manifest is pushed to the device or fetched by the device is outside the scope of this work and existing device management protocols can be used for efficiently distributing this information.</t>

<t>The following assumptions are made to allow the device to verify the received firmware image and manifest before updating software:</t>

<t><list style="symbols">
  <t>To accept an update, a device needs to decide whether the author signing the firmware image and the manifest is authorized to make the updates. We use public key cryptography to accomplish this. The device verifies the signature covering the manifest using a digital signature algorithm. The device is provisioned with a trust anchor that is used to validate the digital signature produced by the author.  This trust anchor is potentially different from the trust anchor used to validate the digital signature produced for other protocols (such as device management protocols). This trust anchor may be provisioned to the device during manufacturing or during commissioning.</t>
  <t>For confidentiality protection of firmware images the author needs to be in possession of the certificate/public key or a pre-shared key of a device.</t>
</list></t>

<t>There are different types of delivery modes, which are illustrates based on examples below.</t>

<t>There is an option for embedding a firmware image into a manifest. This is a useful approach for deployments where devices are not connected to the Internet and cannot contact a dedicated server for download of the firmware. It is also applicable when the firmware update happens via a USB stick or via Bluetooth Smart. <xref target="attached-firmware-figure"/> shows this delivery mode graphically.</t>

<figure title="Manifest with attached firmware." anchor="attached-firmware-figure"><artwork><![CDATA[
              /------------\                 /------------\
             /Manifest with \               /Manifest with \
             |attached      |               |attached      |
             \firmware image/               \firmware image/
              \------------/  +-----------+  \------------/
  +--------+                  |           |                 +--------+
  |        |<.................| Untrusted |<................|        |
  | Device |                  | Storage   |                 | Author |
  |        |                  |           |                 |        |
  +--------+                  +-----------+                 +--------+
]]></artwork></figure>

<t><xref target="online-firmware-figure"/> shows an option for remotely updating a device where the device fetches the firmware image from some file server. The manifest itself is delivery independently and provides information about the firmware image(s) to download.</t>

<figure title="Independent retrieval of the firmware image." anchor="online-firmware-figure"><artwork><![CDATA[
                              /------------\
                             /              \
                             |   Manifest   |
                             \              /
  +--------+                  \------------/                +--------+
  |        |<..............................................>|        |
  | Device |                                             -- | Author |
  |        |<-                                         ---  |        |
  +--------+  --                                     ---    +--------+
                --                                 ---
                  ---                            ---
                     --       +-----------+    --
                       --     |           |  --
        /------------\   --   | Untrusted |<-    /------------\
       /              \    -- | Storage   |     /              \
       |   Firmware   |       |           |     |   Firmware   |
       \              /       +-----------+     \              /
        \------------/                           \------------/
]]></artwork></figure>

<t>This architecture does not mandate a specific delivery mode but a solution must support both types.</t>

</section>
<section anchor="manifest" title="Manifest">

<t>In order for a device to apply an update, it has to make several decisions about the update:</t>

<t><list style="symbols">
  <t>Does it trust the author of the update?</t>
  <t>Has the firmware been corrupted?</t>
  <t>Does the firmware update apply to this device?</t>
  <t>Is the update older than the active firmware?</t>
  <t>When should the device apply the update?</t>
  <t>How should the device apply the update?</t>
  <t>What kind of firmware binary is it?</t>
  <t>Where should the update be obtained?</t>
  <t>Where should the firmware be stored?</t>
</list></t>

<t>The manifest encodes the information that devices need in order to make these decisions. It is a data structure that contains the following information:</t>

<t><list style="symbols">
  <t>information about the device(s) the firmware image is intented to be applied to,</t>
  <t>information about when the firmware update has to be applied,</t>
  <t>information about when the manifest was created,</t>
  <t>dependencies to other manifests,</t>
  <t>pointers to the firmware image and information about the format,</t>
  <t>information about where to store the firmware image,</t>
  <t>cryptographic information, such as digital signatures.</t>
</list></t>

<t>The manifest format is described in a companion document.</t>

</section>
<section anchor="example-flow" title="Example Flow">

<t>The following example message flow illustrates the
interaction for distributing a firmware image to a device
starting with an author uploading the new firmware to
untrusted storage and creating a manifest.</t>

<figure title="Example Flow for a Firmware Upate." anchor="example-figure"><artwork><![CDATA[
+--------+    +-----------------+      +------+
| Author |    |Untrusted Storage|      |Device|
+--------+    +-----------------+      +------+
  |                   |                     |
  | Create Firmware   |                     |
  |---------------    |                     |
  |              |    |                     |
  |<--------------    |                     |
  |                   |                     |
  | Upload Firmware   |                     |
  |------------------>|                     |
  |                   |                     |
  | Create Manifest   |                     |
  |----------------   |                     |
  |               |   |                     |
  |<---------------   |                     |
  |                   |                     |
  | Sign Manifest     |                     |
  |--------------     |                     |
  |             |     |                     |
  |<-------------     |                     |
  |                   |                     |
  | Upload Manifest   |                     |
  |------------------>|                     |
  |                   |                     |
  |                   |   Query Manifest    |
  |                   |<--------------------|
  |                   |                     |
  |                   |   Send Manifest     |
  |                   |-------------------->|
  |                   |                     |
  |                   |                     | Validate Manifest
  |                   |                     |------------------
  |                   |                     |                 |
  |                   |                     |<-----------------
  |                   |                     |
  |                   |  Request Firmware   |
  |                   |<--------------------|
  |                   |                     |
  |                   | Send Firmware       |
  |                   |-------------------->|
  |                   |                     |
  |                   |                     | Verify Firmware
  |                   |                     |---------------
  |                   |                     |              |
  |                   |                     |<--------------
  |                   |                     |
  |                   |                     | Store Firmware
  |                   |                     |--------------
  |                   |                     |             |
  |                   |                     |<-------------
  |                   |                     |
  |                   |                     | Reboot
  |                   |                     |-------
  |                   |                     |      |
  |                   |                     |<------
  |                   |                     |
  |                   |                     | Bootloader validates
  |                   |                     | Firmware
  |                   |                     |----------------------
  |                   |                     |                     |
  |                   |                     |<---------------------
  |                   |                     |
  |                   |                     | Bootloader activates
  |                   |                     | Firmware
  |                   |                     |----------------------
  |                   |                     |                     |
  |                   |                     |<---------------------
  |                   |                     |
  |                   |                     | Bootloader transfers
  |                   |                     | control to new Firmware
  |                   |                     |----------------------
  |                   |                     |                     |
  |                   |                     |<---------------------
  |                   |                     |
]]></artwork></figure>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document does not require any actions by IANA.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>Firmware updates fix security vulnerabilities and are considered to be an important building block in securing IoT devices. Due to the importance of firmware updates for IoT devices the Internet Architecture Board (IAB) organized a ‘Workshop on Internet of Things (IoT) Software Update (IOTSU)’, which took place at Trinity College Dublin, Ireland on the 13th and 14th of June, 2016 to take a look at the big picture. A report about this workshop can be found at <xref target="RFC8240"/>. This document (and associated specifications) offer a standardized firmware manifest format providing end-to-end security from the author to the device.</t>

<t>There are, however, many other considerations raised during the workshop. Many of them are outside the scope of standardization organizations since they fall into the realm of product engineering, regulatory frameworks, and business models. The following considerations are outside the scope of this document, namely</t>

<t><list style="symbols">
  <t>installing firmware updates in a robust fashion so that the update does not break the device functionality of the environment this device operates in.</t>
  <t>installing firmware updates in a timely fashion considering the complexity of the decision making process of updating devices, potential re-certification requirements, and the need for user’s consent to install updates.</t>
  <t>the distribution of the actual firmware update, potentially in an efficient manner to a large number of devices without human involvement.</t>
  <t>energy efficiency and battery lifetime considerations.</t>
  <t>key management required for verifying the digitial signature protecting the manifest.</t>
  <t>incentives for manufacturers to offer a firmware update mechanism as part of their IoT products.</t>
</list></t>

</section>
<section anchor="mailing-list-information" title="Mailing List Information">

<t>The discussion list for this document is located at the e-mail
address <eref target="mailto:suit@ietf.org">suit@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at <eref target="https://www1.ietf.org/mailman/listinfo/suit">https://www1.ietf.org/mailman/listinfo/suit</eref></t>

<t>Archives of the list can be found at:
<eref target="https://www.ietf.org/mail-archive/web/suit/current/index.html">https://www.ietf.org/mail-archive/web/suit/current/index.html</eref></t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>We would like to thank the following persons for their feedback:</t>

<t><list style="symbols">
  <t>Geraint Luff</t>
  <t>Amyas Phillips</t>
  <t>Dan Ros</t>
  <t>Thomas Eichinger</t>
  <t>Michael Richardson</t>
  <t>Emmanuel Baccelli</t>
  <t>Ned Smith</t>
  <t>David Brown</t>
  <t>Jim Schaad</t>
  <t>Carsten Bormann</t>
  <t>Cullen Jennings</t>
  <t>Olaf Bergmann</t>
  <t>Suhas Nandakumar</t>
  <t>Phillip Hallam-Baker</t>
  <t>Marti Bolivar</t>
  <t>Andrzej Puzdrowski</t>
  <t>Markus Gueller</t>
</list></t>

<t>We would also like to thank the WG chairs, Russ Housley, David Waltermire, 
Dave Thaler and the responsible security area director, Kathleen Moriarty, 
for their support and their reviews.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC8240" target='https://www.rfc-editor.org/info/rfc8240'>
<front>
<title>Report from the Internet of Things Software Update (IoTSU) Workshop 2016</title>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<date year='2017' month='September' />
<abstract><t>This document provides a summary of the Internet of Things Software Update (IoTSU) Workshop that took place at Trinity College Dublin, Ireland on the 13th and 14th of June, 2016.  The main goal of the workshop was to foster a discussion on requirements, challenges, and solutions for bringing software and firmware updates to IoT devices. This report summarizes the discussions and lists recommendations to the standards community.</t><t>Note that this document is a report on the proceedings of the workshop.  The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.</t></abstract>
</front>
<seriesInfo name='RFC' value='8240'/>
<seriesInfo name='DOI' value='10.17487/RFC8240'/>
</reference>


<reference anchor="STRIDE" >
  <front>
    <title>The STRIDE Threat Model</title>
    <author >
      <organization>Microsoft</organization>
    </author>
    <date year="2018" month="January"/>
  </front>
</reference>


    </references>


<section anchor="threat-model-user-stories-security-requirements-and-usability-requirements" title="Threat Model, User Stories, Security Requirements, and Usability Requirements">

<section anchor="threat-model" title="Threat Model">

<t>This appendix aims to provide information about the threats that were considered, the security requirements that are derived from those threats and the fields that permit implementation of the security requirements. This model uses the S.T.R.I.D.E. <xref target="STRIDE"/> approach. Each threat is classified according to:</t>

<t><list style="symbols">
  <t>Spoofing Identity</t>
  <t>Tampering with data</t>
  <t>Repudiation</t>
  <t>Information disclosure</t>
  <t>Denial of service</t>
  <t>Elevation of privilege</t>
</list></t>

</section>
<section anchor="threat-descriptions" title="Threat Descriptions">

<section anchor="threat-mft1-old-firmware" title="Threat MFT1: Old Firmware">

<t>Classification: Escalation of Privilege</t>

<t>An attacker sends an old, but valid manifest with an old, but valid firmware image to a device. If there is a known vulnerability in the provided firmware image, this may allow an attacker to exploit the vulnerability and gain control of the device.</t>

<t>Threat Escalation: If the attacker is able to exploit the known vulnerability, then this threat can be escalated to ALL TYPES.</t>

</section>
<section anchor="threat-mft2-mismatched-firmware" title="Threat MFT2: Mismatched Firmware">

<t>Classification: Denial of Service</t>

<t>An attacker sends a valid firmware image, for the wrong type of device, signed by an actor with firmware installation permission on both types of device. The firmware is verified by the device positively because it is signed by an actor with the appropriate permission. This could have wide-ranging consequences. For devices that are similar, it could cause minor breakage, or expose security vulnerabilities. For devices that are very different, it is likely to render devices inoperable.</t>

</section>
<section anchor="threat-mft3-offline-device-old-firmware" title="Threat MFT3: Offline device + Old Firmware">

<t>Classification: Escalation of Privilege</t>

<t>An attacker targets a device that has been offline for a long time and runs an old firmware version. The attacker sends an old, but valid manifest to a device with an old, but valid firmware image. The attacker-provided firmware is newer than the installed one but older than the most recently available firmware. If there is a known vulnerability in the provided firmware image then this may allow an attacker to gain control of a device. Because the device has been offline for a long time, it is unaware of any new updates. As such it will treat the old manifest as the most current.</t>

<t>Threat Escalation: If the attacker is able to exploit the known vulnerability, then this threat can be escalated to ALL TYPES.</t>

</section>
<section anchor="threat-mft4-the-target-device-misinterprets-the-type-of-payload" title="Threat MFT4: The target device misinterprets the type of payload">

<t>Classification: Denial of Service</t>

<t>If a device misinterprets the type of the firmware image, it may cause a device to install a firmware image incorrectly. An incorrectly installed firmware image would likely cause the device to stop functioning.</t>

<t>Threat Escalation: An attacker that can cause a device to misinterpret the received firmware image may gain escalation of privilege and potentially expand this to all types of threat.</t>

</section>
<section anchor="threat-mft5-the-target-device-installs-the-payload-to-the-wrong-location" title="Threat MFT5: The target device installs the payload to the wrong location">

<t>Classification: Denial of Service</t>

<t>If a device installs a firmware image to the wrong location on the device, then it is likely to break. For example, a firmware image installed as an application could cause a device and/or an application to stop functioning.</t>

<t>Threat Escalation: An attacker that can cause a device to misinterpret the received code may gain escalation of privilege and potentially expand this to all types of threat.</t>

</section>
<section anchor="threat-mft6-redirection" title="Threat MFT6: Redirection">

<t>Classification: Denial of Service</t>

<t>If a device does not know where to obtain the payload for an update, it may be redirected to an attacker’s server. This would allow an attacker to provide broken payloads to devices.</t>

</section>
<section anchor="threat-mft7-payload-verification-on-boot" title="Threat MFT7: Payload Verification on Boot">

<t>Classification: All Types</t>

<t>An attacker replaces a newly downloaded firmware after a device finishes verifying a manifest. This could cause the device to execute the attacker’s code. This attack likely requires physical access to the device. However, it is possible that this attack is carried out in combination with another threat that allows remote execution.</t>

</section>
<section anchor="threat-mft8-unauthenticated-updates" title="Threat MFT8: Unauthenticated Updates">

<t>Classification: All Types</t>

<t>If an attacker can install their firmware on a device, by manipulating either payload or metadata, then they have complete control of the device.</t>

</section>
<section anchor="threat-mft9-unexpected-precursor-images" title="Threat MFT9: Unexpected Precursor images">

<t>Classification: Denial of Service</t>

<t>An attacker sends a valid, current manifest to a device that has an unexpected precursor image. If a payload format requires a precursor image (for example, delta updates) and that precursor image is not available on the target device, it could cause the update to break.</t>

<t>Threat Escalation: An attacker that can cause a device to install a payload against the wrong precursor image could gain escalation of privilege and potentially expand this to all types of threat.</t>

</section>
<section anchor="threat-mft10-unqualified-firmware" title="Threat MFT10: Unqualified Firmware">

<t>Classification: Denial of Service, Escalation of Privilege</t>

<t>This threat can appear in several ways, however it is ultimately about interoperability of devices with other systems. The owner or operator of a network needs to approve firmware for their network in order to ensure interoperability with other devices on the network, or the network itself. If the firmware is not qualified, it may not work. Therefore, if a device installs firmware without the approval of the network owner or operator, this is a threat to devices and the network.</t>

<t>Example 1: 
We assume that OEMs expect the rights to create firmware, but that Operators expect the rights to qualify firmware as fit-for-purpose on their networks.</t>

<t>An attacker obtains a manifest for a device on Network A. They send that manifest to a device on Network B. Because Network A and Network B are different, and the firmware has not been qualified for Network B, the target device is disabled by this unqualified, but signed firmware.</t>

<t>This is a denial of service because it can render devices inoperable. This is an escalation of privilege because it allows the attacker to make installation decisions that should be made by the Operator.</t>

<t>Example 2:
Multiple devices that interoperate are used on the same network. Some devices are manufactured by OEM A and other devices by OEM B. These devices communicate with each other. A new firmware is released by OEM A that breaks compatibility with OEM B devices. An attacker sends the new firmware to the OEM A devices without approval of the network operator. This breaks the behaviour of the larger system causing denial of service and possibly other threats. Where the network is a distributed SCADA system, this could cause misbehaviour of the process that is under control.</t>

<t>Threat Escalation: If the firmware expects configuration that is present in Network A devices, but not Network B devices, then the device may experience degraded security, leading to threats of All Types.</t>

</section>
<section anchor="threat-mft11-reverse-engineering-of-firmware-image-for-vulnerability-analysis" title="Threat MFT11: Reverse Engineering Of Firmware Image for Vulnerability Analysis">

<t>Classification: All Types</t>

<t>An attacker wants to mount an attack on an IoT device. To prepare the attack he or she retrieves the provided firmware image and performs reverse engineering of the firmware image to analyze it for specific vulnerabilities.</t>

</section>
</section>
<section anchor="security-requirements" title="Security Requirements">

<t>The security requirements here are a set of policies that mitigate the threats described in the previous section.</t>

<section anchor="security-requirement-mfsr1-monotonic-sequence-numbers" title="Security Requirement MFSR1: Monotonic Sequence Numbers">

<t>Only an actor with firmware installation authority is permitted to decide when device firmware can be installed. To enforce this rule, Manifests MUST contain monotonically increasting sequence numbers. Manifests MAY use UTC epoch timestamps to coordinate monotonically increasting sequence numbers across many actors in many locations. Devices MUST reject manifests with sequence numbers smaller than any onboard sequence number.</t>

<t>N.B. This is not a firmware version. It is a manifest sequence number. A firmware version may be rolled back by creating a new manifest for the old firmware version with a later sequence number.</t>

<t>Mitigates: Threat MFT1</t>

</section>
<section anchor="security-requirement-mfsr2-vendor-device-type-identifiers" title="Security Requirement MFSR2: Vendor, Device-type Identifiers">

<t>Devices MUST only apply firmware that is intended for them. Devices MUST know with fine granularity that a given update applies to their vendor, model, hardware revision, software revision. Human-readable identifiers are often error-prone in this regard, so unique identifiers SHOULD be used.</t>

<t>Mitigates: Threat MFT2</t>

</section>
<section anchor="security-requirement-mfsr3-best-before-timestamps" title="Security Requirement MFSR3: Best-Before Timestamps">

<t>Firmware MAY expire after a given time. Devices MAY provide a secure clock (local or remote). If a secure clock is provided and the Firmware manifest has a best-before timestamp, the device MUST reject the manifest if current time is larger than the best-before time.</t>

<t>Mitigates: Threat MFT3</t>

</section>
<section anchor="security-requirement-mfsr4-signed-payload-descriptor" title="Security Requirement MFSR4: Signed Payload Descriptor">

<t>All descriptive information about the payload MUST be signed. This MUST include:</t>

<t><list style="symbols">
  <t>The location to store the payload</t>
  <t>The payload digest, in each state of installation (encrypted, plaintext, installed, etc.)</t>
  <t>The payload size</t>
  <t>The payload format</t>
  <t>Where to obtain the payload</t>
  <t>All instructions or parameters for applying the payload</t>
  <t>Any rules that identify whether or not the payload can be used on this device</t>
</list></t>

<t>Mitigates: Threats MFT5, MFT6, MFT7, MFT9</t>

</section>
<section anchor="security-requirement-mfsr5-cryptographic-authenticity" title="Security Requirement MFSR5: Cryptographic Authenticity">

<t>The authenticity of an update must be demonstrable. Typically, this means that updates must be digitally signed. Because the manifest contains information about how to install the update, the manifest’s authenticity must also be demonstrable. To reduce the overhead required for validation, the manifest contains the digest of the firmware image, rather than a second digitial signature. The authenticity of the manifest can be verified with a digital signature, the authenticity of the firmware image is tied to the manifest by the use of a fingerprint of the firmware image.</t>

<t>Mitigates: Threat MFT8</t>

</section>
<section anchor="security-requirement-mfsr6-rights-require-authenticity" title="Security Requirement MFSR6: Rights Require Authenticity">

<t>If a device grants different rights to different actors, exercising those rights MUST be accompanied by proof of those rights, in the form of proof of authenticity. Authenticity mechanisms such as those required in MFSR5 are acceptable but need to follow the end-to-end security model.</t>

<t>For example, if a device has a policy that requires that firmware have both an Authorship right and a Qualification right and if that device grants Authorship and Qualification rights to different parties, such as an OEM and an Operator, respectively, then the firmware cannot be installed without proof of rights from both the OEM and the Operator.</t>

<t>Mitigates: MFT10</t>

</section>
<section anchor="security-requirement-mfsr7-firmware-encryption" title="Security Requirement MFSR7: Firmware encryption">

<t>Firmware images must be encrypted to prevent third parties, including attackers, from reading the content of the firmware image and to reverse engineer the code.</t>

<t>Mitigates: MFT11</t>

</section>
</section>
<section anchor="user-stories" title="User Stories">

<t>User stories provide expected use cases. These are used to feed into usability requirements.</t>

<section anchor="use-case-mfuc1-installation-instructions" title="Use Case MFUC1: Installation Instructions">

<t>As an OEM for IoT devices, I want to provide my devices with additional installation instructions so that I can keep process details out of my payload data.</t>

<t>Some installation instructions might be:</t>

<t><list style="symbols">
  <t>Specify a package handler</t>
  <t>Use a table of hashes to ensure that each block of the payload is validate before writing.</t>
  <t>Run post-processing script after the update is installed</t>
  <t>Do not report progress</t>
  <t>Pre-cache the update, but do not install</t>
  <t>Install the pre-cached update matching this manifest</t>
  <t>Install this update immediately, overriding any long-running tasks.</t>
</list></t>

</section>
<section anchor="use-case-mfuc2-reuse-local-infrastructure" title="Use Case MFUC2: Reuse Local Infrastructure">

<t>As an Operator of IoT devices, I would like to tell my devices to look at my own infrastructure for payloads so that I can manage the traffic generated by firmware updates on my network and my peers’ networks.</t>

</section>
<section anchor="use-case-mfuc3-modular-update" title="Use Case MFUC3: Modular Update">

<t>As an OEM of IoT devices, I want to divide my firmware into frequently updated and infrequently updated components, so that I can reduce the size of updates and make different parties responsible for different components.</t>

</section>
<section anchor="use-case-mfuc4-multiple-authorisations" title="Use Case MFUC4: Multiple Authorisations">

<t>As an Operator, I want to ensure the quality of a firmware update before installing it, so that I can ensure a high standard of reliability on my network. The OEM may restrict my ability to create firmware, so I cannot be the only authority on the device.</t>

</section>
<section anchor="use-case-mfuc5-multiple-payload-formats" title="Use Case MFUC5: Multiple Payload Formats">

<t>As a OEM or Operator of devices, I want to be able to send multiple payload formats to suit the needs of my update, so that I can optimise the bandwidth used by my devices.</t>

</section>
<section anchor="use-case-mfuc6-ip-protection" title="Use Case MFUC6: IP Protection">

<t>As an OEM or developer for IoT devices, I want to protect the IP contained in the firmware image, such as the utilized algorithms. The need for protecting IP may have also been imposed on my due to the use of some third party code libraries.</t>

</section>
</section>
<section anchor="usability-requirements" title="Usability Requirements">

<t>The following usability requirements satisfy the user stories listed above.</t>

<section anchor="usability-requirement-mfur1" title="Usability Requirement MFUR1">
<t>It must be possible to write additional installation instructions into the manifest.</t>

<t>Satisfies Use-Case MFUC1</t>

</section>
<section anchor="usability-requirement-mfur2" title="Usability Requirement MFUR2">

<t>It must be possible to redirect payload fetches. This applies where two manifests are used in conjunction. For example, an OEM manifest specifies a payload and signs it, and provides a URI for that payload. An Operator creates a second manifest, with a dependency on the first. They use this second manifest to override the URIs provided by the OEM, directing them into their own infrastructure instead.</t>

<t>Satisfies Use-Case MFUC2</t>

</section>
<section anchor="usability-requirement-mfur3" title="Usability Requirement MFUR3">

<t>It MUST be possible to link multiple manifests together so that a multi-component update can be described. This allows multiple parties with different permissions to collaborate in creating a single update for the IoT device, across multiple components.</t>

<t>Satisfies Use-Case MFUC2, MFUC3</t>

</section>
<section anchor="usability-requirement-mfur4" title="Usability Requirement MFUR4">

<t>It MUST be possible to sign a manifest multiple times so that signatures from multiple parties with different permissions can be required in order to authorise installation of a manifest.</t>

<t>Satisfies Use-Case MFUC4</t>

</section>
<section anchor="usability-requirement-mfur5" title="Usability Requirement MFUR5">

<t>The manifest format MUST accommodate any payload format that an operator or OEM wishes to use. Some examples of payload format would be:</t>

<t><list style="symbols">
  <t>Binary</t>
  <t>Elf</t>
  <t>Differential</t>
  <t>Compressed</t>
  <t>Packed configuration</t>
</list></t>

<t>Satisfies Use-Case MFUC5</t>

</section>
</section>
<section anchor="manifest-fields" title="Manifest Fields">

<t>Each manifest field is anchored in a security requirement or a usability requirement. The manifest fields are described below and justified by their requirements.</t>

<section anchor="manifest-field-timestamp" title="Manifest Field: Timestamp">

<t>A monotonically increasing sequence number</t>

<t>Implements: Security Requirement MFSR1.</t>

</section>
<section anchor="manifest-field-vendor-id-condition" title="Manifest Field: Vendor ID Condition">

<t>Vendor IDs MUST be unique. This is to prevent similarly, or identically named entities from different geographic regions from colliding in their customer’s infrastructure. Recommended practice is to use type 5 UUIDs with the vendor’s domain name and the UUID DNS prefix. Other options include type 1 and type 4 UUIDs.</t>

<t>Implements: Security Requirement MFSR2, MFSR4.</t>

</section>
<section anchor="manifest-field-class-id-condition" title="Manifest Field: Class ID Condition">

<t>Class Identifiers MUST be unique within a Vendor ID. This is to prevent similarly, or identically named devices colliding in their customer’s infrastructure. Recommended practice is to use type 5 UUIDs with the model, hardware revision, etc. and use the Vendor ID as the UUID prefix. Other options include type 1 and type 4 UUIDs. A device “Class” is defined as any device that can run the same firmware without modification. Classes MAY be implemented in a more granular way. Classes MUST NOT be implemented in a less granular way. Class ID can encompass model name, hardware revision, software revision. Devices MAY have multiple Class IDs.</t>

<t>Implements: Security Requirement MFSR2, MFSR4.</t>

</section>
<section anchor="manifest-field-precursor-image-digest-condition" title="Manifest Field: Precursor Image Digest Condition">

<t>When a precursor image is required by the payload format, a precursor image digest condition MUST be present in the conditions list.</t>

<t>Implements: Security Requirement MFSR4</t>

</section>
<section anchor="manifest-field-best-before-timestamp" title="Manifest Field: Best-Before timestamp">

<t>This field tells a device the last application time. This is only usable in conjunction with a secure clock.</t>

<t>Implements Security Requirement MFSR3</t>

</section>
<section anchor="manifest-field-payload-format" title="Manifest Field: Payload Format">

<t>The format of the payload must be indicated to devices is in an unambiguous way. This field provides a mechanism to describe the payload format, within the signed metadata.</t>

<t>Implements Security Requirement MFSR4, Usability Requirement MFUR5</t>

</section>
<section anchor="manifest-field-storage-location" title="Manifest Field: Storage Location">

<t>This field tells the device which component is being updated. The device can use this to establish which permissions are necessary and the physical location to use.</t>

<t>Implements Security Requirement MFSR4</t>

</section>
<section anchor="manifest-field-uris" title="Manifest Field: URIs">

<t>This field is a list of weighted URIs that the device uses to select where to obtain a payload.</t>

<t>Implements Security Requirement MFSR4</t>

</section>
<section anchor="manifest-field-digests" title="Manifest Field: Digests">

<t>This field is a map of digests, each for a separate stage of installation. This allows the target device to ensure authenticity of the payload at every step of installation.</t>

<t>Implements Security Requirement MFSR4</t>

</section>
<section anchor="manifest-field-size" title="Manifest Field: Size">

<t>The size of the payload in bytes.</t>

<t>Implements Security Requirement MFSR4</t>

</section>
<section anchor="manifest-field-signature" title="Manifest Field: Signature">

<t>This is not strictly a manifest field. Instead, the manifest is wrapped by a standardised authentication container, such as a COSE or CMS signature object. The authentication container MUST support multiple actors and multiple authentications.</t>

<t>Implements Security Requirement MFSR5, MFSR6, MFUR4</t>

</section>
<section anchor="manifest-field-directives" title="Manifest Field: Directives">

<t>A list of instructions that the device should execute, in order, when installing the payload.</t>

<t>Implements Usability Requirement MFUR1</t>

</section>
<section anchor="manifest-field-aliases" title="Manifest Field: Aliases">

<t>A list of URI/Digest pairs. A device should build an alias table while paring a manifest tree and treat any aliases as top-ranked URIs for the corresponding digest.</t>

<t>Implements Usability Requirement MFUR2</t>

</section>
<section anchor="manifest-field-dependencies" title="Manifest Field: Dependencies">

<t>A list of URI/Digest pairs that refer to other manifests by digest. The manifests that are linked in this way must be acquired and installed simultaneously in order to form a complete update.</t>

<t>Implements Usability Requirement MFUR3</t>

</section>
<section anchor="manifest-field-content-key-distribution-method" title="Manifest Field: Content Key Distribution Method">

<t>Encrypting firmware images requires symmetric content encryption keys. Since there are several methods to protect or distribute the symmetric content encryption keys, the manifest contains a field for the Content Key Distribution Method. One examples for such a Content Key Distribution Method is the usage of Key Tables, pointing to content encryption keys, which themselves are encrypted using the public keys of devices.</t>

<t>Implements: Security Requirement MFSR7.</t>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

