[Ovmsdev] SSL Support

Mark Webb-Johnson mark at webb-johnson.net
Thu Feb 13 15:26:47 HKT 2020


And #2 now done. To add to the trusted CA list we can now add the CA into firmware (like the 3 already there), or put the PEM formatted certificate in /store/trustedca on the module itself. A set of commands (like ’tls trusted reload’, ’tls trusted list’, etc) are also now provided to help management.

I’ve also added a short document to the user guide to explain this.

Regards, Mark.

> On 12 Feb 2020, at 3:25 PM, Mark Webb-Johnson <mark at webb-johnson.net> wrote:
> 
> I managed to get quite a lot done last night, and just committed my changes. Current status:
> 
> #1 is done. An extension had to be made to mongoose to support this, so please update submodules. I’ve added the trusted CAs for openvehicles, dexters (letsencrypt) and pushover.
> 
> #3 is done. A couple of lines of code. It is enabled by ‘config set server.v2 tls yes’.
> 
> #4 is done. A couple of lines of code. It is enabled by ‘config set server.v3 tls yes’.
> 
> #5 is done, and live on api.openvehicles.com <http://api.openvehicles.com/>.
> 
> #8 can start when ready. Have a look at the ovms_server_v[23] code for an example - it is literally a couple of lines to be added.
> 
> I did find a few servers that didn’t support the segment size negotiation option in SSL that we were relying on (including mosquitto!). So had to change my sdkconfig to:
> 
> CONFIG_MBEDTLS_SSL_MAX_CONTENT_LEN=16384
> 
> I suggest you do the same for best compatibility.
> 
> The rest is pending. I will work on #2 next, then move on to the iOS App.
> 
> Regards, Mark.
> 
>> On 10 Feb 2020, at 11:24 AM, Mark Webb-Johnson <mark at webb-johnson.net <mailto:mark at webb-johnson.net>> wrote:
>> 
>> 
>> Given that we use the mongoose library for most of our stuff, adding SSL support should not be hard. This would finally bring strong encryption and server side authentication. Given the number of attacks now on IoT devices that would not be a bad thing.
>> 
>> I think what we need is:
>> 
>> A set of helper functions to make it easier for components to use SSL. Build on top of mongoose.
>> 
>> A way to manage a list of trusted Certificate Authorities, including adding to the trusted list via:
>> Components providing Certificate Authorities in firmware.
>> Certificate Authorities in configuration.
>> 
>> Extensions to ovms_server_v2 to support an SSL connection option.
>> 
>> Extensions to ovms_server_v3 to support an SSL connection option.
>> 
>> Extensions to the Ovms Server v2 code to support an SSL connection listener.
>> 
>> Extensions to the iOS App to support an SSL connection option.
>> 
>> Extensions to the Android App to support an SSL connection option.
>> 
>> Migration of any components already supporting SSL to this new standardised approach.
>> 
>> Then we can open up the discussion of the whole thing of passwords. We have far too many of these at the moment (user account+password, vehicle ID, server password, module password, hologram account+password, etc). Once we have an encrypted connection, we don’t need to use the password for encryption, but merely for authentication. That simplifies things, as we can perhaps just use the user account+password for most things (giving access to all vehicles registered under that user account - in a similar way to MQTT does it already for ovms_server_v3).
>> 
>> I will take on the majority of this project. I can do #1, #2, #3, #4, #5, and #6).
>> 
>> If anyone has any feedback on requirements, please let me know.
>> 
>> Regards, Mark.
>> 
>> _______________________________________________
>> OvmsDev mailing list
>> OvmsDev at lists.openvehicles.com <mailto:OvmsDev at lists.openvehicles.com>
>> http://lists.openvehicles.com/mailman/listinfo/ovmsdev
> 
> _______________________________________________
> OvmsDev mailing list
> OvmsDev at lists.openvehicles.com
> http://lists.openvehicles.com/mailman/listinfo/ovmsdev

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openvehicles.com/pipermail/ovmsdev/attachments/20200213/e108ec95/attachment.html>


More information about the OvmsDev mailing list