element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Internet of Things
  • Technologies
  • More
Internet of Things
Forum How do you secure you private keys for signed updates
  • Blog
  • Forum
  • Documents
  • Quiz
  • Events
  • Polls
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Internet of Things to participate - click to join for free!
Actions
  • Share
  • More
  • Cancel
Forum Thread Details
  • Replies 9 replies
  • Subscribers 511 subscribers
  • Views 1863 views
  • Users 0 members are here
Related

How do you secure you private keys for signed updates

imagiko
imagiko over 5 years ago

I'm reading up on signed updates. Based on my understanding I could embed the public key on all my devices and then any new firmware needs to have a signed hash that I could check against. This is great for secure updates, but I'm wondering how one would securely store the private key. Say I built 1M units. All have this public key programmed. If this private key is lost, I basically lose the ability to update any of these devices. So while it's great for security, it also sounds like the jugular vein. Am I missing something?

  • Sign in to reply
  • Cancel

Top Replies

  • shabaz
    shabaz over 5 years ago +3
    Hi, I think you're asking "how do you secure your private key on the server'. That's an IT and Infosec topic and they would have policies on how to do this. The private key is encrypted with a password…
  • colporteur
    colporteur over 5 years ago in reply to Jan Cumps +3
    I worked for a ISP who's entire digital television system PKI infrastructure was taken offline when a Windows update of the certificate authority (CA) server went bad. Without the CA all lower certificate…
  • neilk
    neilk over 5 years ago in reply to shabaz +2
    So glad I am only managing 2 IOT devices, probably ultimately a maximum of 6 and they are all on my private network! I haven't implemented signed updates.
  • shabaz
    shabaz over 5 years ago

    Hi,

     

    I think you're asking "how do you secure your private key on the server'. That's an IT and Infosec topic and they would have policies on how to do this. The private key is encrypted with a password and backed up. As you suggest, it must not be lost, and therefore needs to be backed up.

    If it is lost, then one way out could be to have both the server and all the millions of devices to re-generate private and public keys. That has its own requirements, including how to get one-time passwords to do this into the millions of devices, and to do it without introducing a security hole could be difficult (but not impossible).

    In short, don't lose the keys, and if you do, consider the devices abandoned, never to be upgraded and may (should) even shut down. You've then got a massive corporate problem at a minimum, and will likely be sued, etc. So treat the keys as something of value that must be protected.

    • Cancel
    • Vote Up +3 Vote Down
    • Sign in to reply
    • Cancel
  • neilk
    neilk over 5 years ago in reply to shabaz

    So glad I am only managing 2 IOT devices, probably ultimately a maximum of 6 and they are all on my private network!

     

    I haven't implemented signed updates.

    • Cancel
    • Vote Up +2 Vote Down
    • Sign in to reply
    • Cancel
  • imagiko
    imagiko over 5 years ago in reply to shabaz

    Yes, question is related to storing private keys somewhere safe. It is related to IT, but the impact is on the devices, so any workarounds a potential key loss needs to be a part of the on-board software design (or may be not, security is paramount?).

    Thanks for painting that picture of corporate horror. Indeed, I imagine something like that going down.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Cancel
  • colporteur
    colporteur over 5 years ago

    What is being alluded to is key management. This includes, creation, distribution and revocation of keys. This is no small task and needs some careful development to avoid pitfalls.  shabaz described losing the key as one scenario but think about the consequences of the private key being compromised and it was not known.

     

    An interested exercise is to research what is required to have point of sale by accepting credit cards numbers. The overhead is considerable but card companies understand the risk and what the card collect to invest heavily to minimize it.

    • Cancel
    • Vote Up +2 Vote Down
    • Sign in to reply
    • Cancel
  • Jan Cumps
    Jan Cumps over 5 years ago in reply to colporteur

    It is a hard topic. Where in the past you had a breach when someone could get at your data, now you often have a breach when you or your staff are sloppy with private keys.

     

    And the importance of not being sloppy with keys isn't a habit yet. I've seen them mailed around by accident instead of the public key. In a backup dir of a commercial app after installation. Checked into version control. Placed on a sharepoint in a folder called Private Keys ...

     

    A second hard exercise is how to get keys into the secure storage of a microcontroller during production. I asked that here long time ago but no solutions for this common task:

    Where do you store/hide your AES keys used for embedded encypt and decrypt?

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Cancel
  • colporteur
    colporteur over 5 years ago in reply to Jan Cumps

    I worked for a ISP who's entire digital television system PKI infrastructure was taken offline when a Windows update of the certificate authority (CA) server went bad. Without the CA all lower certificate servers had a certificate time to live of 24hours. 65K subscribers would lose television if the CA was not back online in less than 24hours. The server was restored before TV service was lost but, all the recording customers had made on their PVR were rendered useless. A new CA could not validate the certificate from the old server. Try explaining to a customer why their whole series of Breaking Bad shows is available in their content but can't be displayed:)

     

    I established a PKI infrastructure for a telecommunication company. Months of planning and process development was required. How keys were requested, how keys were created, how keys were distributed, how keys were installed and how keys were revoked all had to be in place before the first key was issued.  This process is multiplied and modified depending on the type of certificate. Our certificate chain had to integrate with the parent company. It was a milestone project in my career. When completed keys could be available in less than 5 minutes. It took a minimum of one week to get a key before the system was established. 

     

    Speaking of keys, I just discovered ssh information from the key exchange on a session has changed in the known_hosts file. The IP address is no longer traceable. That is something new.

    • Cancel
    • Vote Up +3 Vote Down
    • Sign in to reply
    • Cancel
  • phoenixcomm
    phoenixcomm over 5 years ago

    Ok Great Question. First, you need to answer the first question.  What OS are you running?? Good Luck with windows as you are in very nasty company.  hopefully, you are running LINUX or better yet, OpenBSD. There are some great tools to use. My key pair are stored in a few places: OpenBSD but you have to bolt it down by running pf (packet filter) on a transparent bridge. This is the ONLY OS THAT HAS NOT BEEN HACKED. basically you will end up with 3 network ports the built-in one is for management, the other two ONLY HAVE MAC ADDRESS on them this is ware pf lives. I also keep copies on a dedicated fash drive, and paper copies in two places.

    ~~ Cris

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Cancel
  • daser
    daser over 5 years ago

    I prefer to use vpn tools for protecting my privacy

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Cancel
  • colporteur
    colporteur over 5 years ago

    As your metaphor suggests, private keys are a major blood vessel in the security of an organization. Protecting the private key of a key pair is critical if you which to leverage the security attributes provided from using PKI. Deployment should include a risk assessment and from that a clear security policy defining how it is to be accomplished.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube