Bluetooth v4.1 On Pronto 1.4.1 Overview: Confidential and Proprietary - Qualcomm Technologies, Inc
Bluetooth v4.1 On Pronto 1.4.1 Overview: Confidential and Proprietary - Qualcomm Technologies, Inc
Bluetooth v4.1 On Pronto 1.4.1 Overview: Confidential and Proprietary - Qualcomm Technologies, Inc
1 Overview
80-NM498-1 A
PAGE 2 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Revision History
PAGE 3 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Contents
PAGE 4 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Multislot ACL with Synchronous Link
PAGE 5 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Why Multislot ACL with Synchronous Link
PAGE 6 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
BR/EDR Secure Connections
PAGE 7 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Abbreviations
Acronym Definition
PAGE 8 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Why BR/EDR Secure Connections
PAGE 9 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Feature Summary
PAGE 10 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Bluetooth Security Model
Pairing – The process for creating a shared secret key, i.e., the link key
Bonding – The act of storing the link key created during pairing for use in
subsequent connections in order to form a trusted device pair
Device authentication – Verification that the two devices have the same
link key
Encryption – Message confidentiality
Message integrity – Protects against message forgeries
PAGE 11 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Security Mechanisms
Pairing (key E21 and E22 algorithm P-192 ECDH P-256 ECDH
generation) based on SAFER+ HMAC-SHA-256 HMAC-SHA-256
(FIPS-approved (FIPS-approved
algorithms) algorithms)
PAGE 12 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Authentication
PAGE 13 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Legacy Authentication
PAGE 14 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
MSC – Authentication Requested (Legacy)
PAGE 15 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Secure Authentication
PAGE 16 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
MSC – Authentication Requested (Secure Connections)
PAGE 17 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Encryption
PAGE 18 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
MIC
PAGE 20 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Enabling Secure Connections
To enable BR/EDR secure connections, the host must use the HCI_Write_
Secure_Connections_Host_Support command, set to Enabled.
This command must be sent before any connections are created.
Firmware checks whether both the devices have support for secure
connections at both the controller and host levels and uses the secure
connections.
PAGE 21 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Authenticated Payload Timeout
PAGE 22 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
New HCI Commands and Events
Commands
Read Secure Connections Host Support
Write Secure Connections Host Support
Read Authenticated Payload Timeout
Write Authenticated Payload Timeout
Read Local OOB Extended Data
Added to read both P-192 and P-256 local OOB data
Simple pairing hash and randomizer values
Remote OOB Extended Data Request Reply
Shares the remote device P-192 and P-256 OOB data to controller on request
Write Secure Connections Test Mode
Events
Authenticated Payload Timeout Expired
PAGE 23 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Updated HCI Commands
PAGE 24 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Updated HCI Commands (cont.)
PAGE 25 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Updated HCI Events
Encryption Change
On Set Connection Encryption Command, if both devices support secure
connections, the controller responds with the Encryption Change event with
parameter Encryption_enabled = 0x02 on successfully enabling the AES-CCM.
Link Key Notification
The Key Type value is updated to indicate whether the key is generated using
P-256.
Remote OOB Data Request
If both the Host and Controller support Secure Connections, the Host shall
respond with the Remote OOB Extended Data Request Reply command.
PAGE 26 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
LE Link Layer Topology
PAGE 27 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Motivation
PAGE 28 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Feature Summary
PAGE 29 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Dual Mode Topology
PAGE 30 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Link Layer Topology
Enables mechanisms in the controller that will enable more complex link
layer topologies and mitigates scheduling conflicts
Slaves connecting to multiple masters
Masters that can also be slaves
Scatternets
Provides ability for slaves to move anchor points
PAGE 31 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Feature Exchange
Local Feature Set should be updated so that all the new link layer features
would be masked in:
Connection parameters request procedure
Extended reject indication
Slave-initiated features exchange
Slave-initiated features exchange is initiated by the LE Read Remote
Supported Features HCI command.
Host A LL A LL B Host B
(master) (master) (slave) (slave)
PAGE 32 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Connection Update
Host A LL A LL B Host B
(master) (master) (slave) (slave)
Step 1 – Device A and B are in a connection. Host A wishes to change the connection parameters
LE Connection Update
Command Status
LL_CONNECTION_UPDATE_REQ
Step 1 – Host A wishes to change the connection parameters. Host B accepts. Step 1 – Host B wishes to change the connection parameters. Host A accepts.
LE_CONNECTION_PARAM_RSP
LL_CONNECTION_UPDATE_REQ
LL_CONNECTION_UPDATE_REQ
PAGE 34 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Summary
Motivation
Part of a larger improvement to security for LE (LE Secure Connections)
Only part of LE secure connections in the controller
Released in ver 4.1 to speed time-to-market for LE Secure Connections
New link layer sequence forces remote link layer to send a packet
containing a MIC
For use cases where data is only being sent intermittently, many packets sent
may not contain any data and will thus lack a MIC. This could be exploited by an
attacking device to pretend to be the target device when only Acks and Nacks
are being sent over the air. This is known as a “forged ack attack.”
Time between pings is configurable (TLE_Authenticated_Payload) by the
upper stack/application
PAGE 35 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Ping Timer
Host A LL A LL B Host B
Command Complete
PAGE 36 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Related HCI Commands and Events
PAGE 37 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Ping Procedure 1
Either link layer can authenticate the remote device using the LE Ping
procedure even if the remote device does not support the LE Ping feature.
This procedure can also be used for soliciting a packet from the remote
device containing a valid MIC. LL A may be a master or a slave.
Host A LL A LL B Host B
Link is encrypted
TLE_Authenticated_Payload
nearly expired
LL_PING_REQ
LL_PING_RSP or
LL_UNKNOWN_RSP
PAGE 38 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Ping Procedure 2
When a packet with a valid MIC has not been received within the LE
Authenticated Payload Timeout, the Host is notified that the timer has
expired.
Host A LL A LL B Host B
Link is encrypted
TLE_Authenticated_Payload
nearly expired
LL_PING_REQ
TLE_Authenticated_Payload
expired
Authenticated Payload
Timeout Expired Event
Procedure response
timeout expired
Disconnection Complete
Ref. Document
Qualcomm Technologies
Q1 Application Note: Software Glossary for Customers CL93-V3077-1
Standards
PAGE 40 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION
Questions?
https://support.cdmatech.com
PAGE 41 80-NM498-1 A Feb 2014 Confidential and Proprietary – Qualcomm Technologies, Inc. | MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION