You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

57 lines
5.2 KiB

8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
  1. \subsection{The update mechanism}
  2. The update mechanism is split into four main phases: checking for updates, reprogramming the device, calculating and verifying the cryptographic signature of the updated firmware, and - assuming that the update was successful - reconfiguring the boot process to use the new firmware.
  3. \subsubsection{Checking for updates}
  4. In order to inform the IoT devices of the availability of a new firmware version, the update server provides a file for each device type containing meta-information about the latest available firmware version.
  5. The meta-information file has a simple line oriented ASCII format, which is easy to generate and efficient to parse within the limited constraints of the embedded device.
  6. It consists of the version identifier and the cryptographic signatures of both of the firmware binaries.
  7. The version identifier can be an arbitrary string as the content is not interpreted semantically but only compared to the version identifier used during build time.
  8. The other two lines in the meta-information file provide the hexadecimal representation of the cryptographic signatures, one line for each firmware binary file.
  9. These meta-information files are provided by the update server using \textit{HTTP 1.1} \cite{HTTP_1.1} under the following path pattern: \texttt{\$\{DEVICE\}.version} (whereas \texttt{\$\{DEVICE\}} gets replaced by the device type name).
  10. Each device queries the update server regularly for the currently available firmware version.
  11. It uses the \texttt{UPDATER\_URL} option to identify the update server.
  12. After the meta-information file has been downloaded successfully, the version identifier is extracted and compared to the version identifier of the running firmware.
  13. If the version identifiers differ, the update process is initialized.
  14. In cases where the download fails, the update server or network connection is not available, or any other error occurres, another attempt will be made automatically at the next regular interval.
  15. In addition to the interval, a special \textit{MQTT} topic shared by all devices is subscribed on device startup: \texttt{\$\{MQTT\_REALM\}/update}.
  16. Every time a message is received on this topic, a fetch attempt for the meta-information file is triggered and the process restarts.
  17. This allows faster roll-outs of updates and finer control for manual maintenance.
  18. \subsubsection{Reprogramming the device}
  19. The firmware files provided on the update server are the exact same ones as used to initially flash the chip for the according version.
  20. Using the same files for flashing and updating allows better debugging by eliminating errors related to the update process itself and eases development and initial installation.
  21. Figure~\ref{lst:choosing_rom} shows the algorithm used to determine the download address and reconfigure the bootloader.
  22. The update server provides these files in the exact same way as it provides the meta-information files, but the path pattern differs: the suffixes \texttt{.rom\{0,1\}} are used to provide the firmware image files for the first and second slot respectively.
  23. For installing a firmware update, the new firmware image file is downloaded using an \textit{HTTP 1.1} \texttt{GET} request.
  24. \begin{figure}[htbp]
  25. \begin{lstlisting}[basicstyle=\ttfamily\scriptsize]
  26. #define URL_ROM(slot) (( URL "/" DEVICE ".rom" slot ))
  27. // Select rom slot to flash
  28. const auto& bootconf = rboot_get_config();
  29. if (bootconf.current_rom == 0) {
  30. updater.addItem(bootconf.roms[1], URL_ROM("1"));
  31. updater.switchToRom(1);
  32. } else {
  33. updater.addItem(bootconf.roms[0], URL_ROM("0"));
  34. updater.switchToRom(0);
  35. }
  36. \end{lstlisting}
  37. \caption{Configuring the updater to download the right firmware image and update the booloader accordingly.}
  38. \label{lst:choosing_rom}
  39. \end{figure}
  40. \subsubsection{Verifying the cryptographic signature}
  41. While the image is being downloaded, each chunk received in the download stream is used to update the \textit{SHA256} hash before it is written to the flash.
  42. When the write has been finished, the next chunk is received and the process continues until all chunks have been processed.
  43. After downloading the new firmware image has been finished successfully, the calculated hash is checked against the signature of the according firmware image.
  44. Therefore, the cryptographically signed hash, which was provided in the meta-information file triggering the update, is verified against the \textit{Curve25519} public key stored as a constant in the running firmware.
  45. Only if the checksum matches the provided signature, the firmware is considered valid and the process is continued.
  46. \subsubsection{Reconfiguring the boot process}
  47. For the bootloader, \textit{rBoot}\cite{rBoot} has been choosen as it is integrated within the \textit{Sming} framework and allows to boot to multiple ROM slots.
  48. For configuration, an \textit{rBoot} specific structure is placed in the flash at a well-known location directly after the space reserved for the bootloader code.
  49. This structure contains, among other things, the target offsets for all known ROM slots and the number of the ROM slot to boot on next startup.
  50. To switch to the updated ROM slot after successful installation, the number ROM slot to boot on startup is changed in the configuration section and the device is restarted.