[][src]Module ublox_cellular::command::device_data_security

26 - Device and data security

SSL/TLS provides a secure connection between two entities using TCP socket for communication (i.e. HTTP/ FTP server and HTTP/FTP client). The SSL/TLS with digital certificates support provides different connection security aspects:

  • Server authentication: use of the server certificate verification against a specific trusted certificate or a trusted certificates list;
  • Client authentication: use of the client certificate and the corresponding private key;
  • Data security and integrity: data encryption and Hash Message Authentication Code (HMAC) generation.

The security aspects used in the current connection depend on the SSL/TLS configuration and features supported by the communicating entities. u-blox cellular modules support all the described aspects of SSL/TLS security protocol with these AT commands:

  • AT+USECMNG: import, removal, list and information retrieval of certificates or private keys;
  • AT+USECPRF: configuration of USECMNG (u-blox SECurity MaNaGement) profiles used for an SSL/TLS connection.

The USECMNG provides a default SSL/TLS profile which cannot be modified. The default USECMNG profile provides the following SSL/TLS settings:

SettingValueMeaning
Certificates validation levelLevel 0The server certificate will not be checked or verified.
Minimum SSL/TLS versionAnyThe server can use any of the TLS1.0/TLS1.1/TLS1.2 versions for the connection.
Cipher suiteAutomaticThe cipher suite will be negotiated in the handshake process.
Trusted root certificate internal name"" (none)No certificate will be used for the server authentication.
Expected server host-name"" (none)No server host-name is expected.
Client certificate internal name"" (none)No client certificate will be used.
Client private key internal name"" (none)No client private key will be used.
Client private key password"" (none)No client private key password will be used.
Pre-shared key"" (none)No pre-shared key key password will be used.

Notes:

  • The secure re-negotiation and the SSL/TLS session resumption are currently not supported, and if mandated by the server the SSL/TLS connection will fail with an Generic SSL/TLS handshake alert.

Modules

responses

Responses for Device and data security Commands

types

Argument and parameter types used by Device and data security Commands and Responses

Structs

PrepareSecurityDataImport

26.1.2 SSL/TLS certificates and private keys manager +USECMNG

SecurityProfileManager

26.1.3 SSL/TLS security layer profile manager +USECPRF

SendSecurityDataImport