Radically Improving MQTT Security easily
Mosquitoes are not just bugs

Radically Improving MQTT Security easily

Message Queuing Telemetry Transport or as it is widely known MQTT, has become a staple IoT messaging solution for many industries including Automotive, Transportation and the Energy sector for a quarter of a century.

MQTT provides a publish subscribe model for communications between clients of a centralized broker service running on a server. It's a classic hub and spoke model, the broker being the hub and clients being the spokes.

The model has been highly successful, and the protocol itself has become an industry standard, client software is lightweight, and the protocol has minimal overheads.

However, there are still improvements to be made in the architecture. The first being that you have to trust the broker as it gets all the messages in the clear and there is no easy way to have end to end encrypted communication between clients.?

The second issue is authentication of clients, this used to be simple - usernames and passwords - but we all know the issues associated with them. So many people have migrated to using certificates. Certificates are better but notoriously painful to manage, especially at scale. Imagine having to manage certificates on remote IoT devices with certificates that have a lifespan of a few months.?

The last major challenge is one that is an underlying problem of TCP/IP - the protocol that MQTT uses. TCP/IP, like MQTT, is a client server protocol, which means the broker has to be listening on an open port. An open port is an open door for attackers, and if your broker is on the Internet that’s an open door from the Internet directly to your broker software. At this point many decide that they do not want to have to manage that and use cloud-based brokers, but the problem does persist - there is an open door - even if not directly to your environment.

Let's look at these issues in reverse order using Atsign’s technology stack. By using NoPorts from Atsign it is now possible to have no open doors to the Internet but still provide access to authenticated connections to the broker software. Using NoPorts also removes the need to manage certificates on the clients, instead clients cut their own cryptographic keys (phew!).

The last issue is that of end-to-end encrypted messaging, Atsign provides a mechanism to clients to privately share cryptographic keys and so MQTT messages can be encrypted, sent, received and then decrypted. This means that you can use a broker run by a third party, or perhaps your own IT team, and although they can see the messages, they cannot decrypt them! End-to-end encryption has been available for MQTT for years but not many people (if any?) use it as it is difficult to manage and distribute those keys, using Atsign to distribute the keys makes life simpler.

A couple of last bonus features, if you use MQTT to manage something at home then Atsign also makes all those problems with network address translation, firewall rules, and dynamic DNS a thing of the past. Finally, the MQTT TCP/IP traffic is end-to-end encrypted with a new key for each connection and so negating the need for TLS and certificates.

?If you use MQTT and are seeing these issues and want to solve them, take a look at our MQTT Solutions page.

要查看或添加评论,请登录

Colin Constable的更多文章

  • LLM does not equal Ai

    LLM does not equal Ai

    LLM does not equal Ai and we are a very long way from AGI. Ignore the hype! But, there is a strong signal amongst the…

    3 条评论
  • What most aligns to your current thinking on Ai?

    What most aligns to your current thinking on Ai?

    A week ago, I posed my LinkedIn connections a question with a choice of four answers. The question was simple, “What…

    4 条评论
  • Fortify Your DMZ Right Now

    Fortify Your DMZ Right Now

    At the edge of your enterprise network, whether on-premises or in the cloud, there will be a DMZ. You may have heard…

    1 条评论
  • Addressing - a problem across time and space

    Addressing - a problem across time and space

    “What is your name and address?” has to be one of the most enduring questions over the last century. But behind the…

    6 条评论
  • Impossible network technology

    Impossible network technology

    The Internet Protocol (IP) is the lingua franca for any modern network, and it also shapes both the risks and the…

    1 条评论
  • Accountability

    Accountability

    Before we officially started Atsign, there was one conversation that shaped so much of what we wanted to create. That…

  • It's a Trap!

    It's a Trap!

    It seems almost impossible, but it is true: We landed people on the moon before we put wheels on luggage. Neil…

    1 条评论
  • 100 Times Faster Internet

    100 Times Faster Internet

    Pradeep Sindhu founded Juniper Networks in 1996 with a game-changing idea: Separate the control plane and the data…

    3 条评论
  • Zero Trust Sockets

    Zero Trust Sockets

    Zero Trust Architecture is the current mantra of security papers and government organizations like NIST in the USA. The…

  • VPN's Dirty Little Secret

    VPN's Dirty Little Secret

    Every day I hear trusted YouTubers give all sorts of reasons why I should be running a VPN to protect myself. My…

    1 条评论

社区洞察

其他会员也浏览了