NOTE: This publish covers an necessary announcement associated to renewal of Symantec Server Intermediate Certificates Authority (ICA) and an upcoming swap of AWS IoT Core – management airplane endpoints and newly supported AWS IoT Core buyer endpoints to TLS1.2 specification.
Overview
On this publish, we focus on upcoming adjustments to Symantec Server Intermediate Certificates Authority (ICA) and switching on TLS 1.2 by default for management airplane endpoints. We may also share suggestions on how you can use customized area and configurable endpoint options of AWS IoT Core. Moreover, you’ll study methods to make use of client-side customized certificates (self-signed certificates) for units connecting to a single trusted endpoint, thus eradicating uncertainties related to public CAs.
Change #1: updating Symantec Server ICA
To allow prospects to make the most of the newest security measures by default, we are going to swap AWS IoT Core – management airplane endpoints and newly created buyer endpoints to TLS1.2 and we could have a brand new server certificates that’s primarily based on the VeriSign Class 3 Public Major Certification Authority – G5. Moreover, for backwards compatibility causes, we’re leaving all present buyer endpoints at their present TLS model and settings. We suggest prospects migrate present buyer endpoints to TLS1.2 or TLS 1.3 at their very own comfort through AWS IoT Core configurable endpoint characteristic.
Replace of Symantec Server ICA (Intermediate Certificates Authority)
Present Symantec Server ICA expires on thirty first October 2023 and a renewed Symantec Server ICA can be used to difficulty all Symantec Server-side certificates.
Server certificates chain of belief (Symantec)
Determine 1.0
This modification is just for data-plane and applies solely to Symantec endpoints. Prospects utilizing Amazon Belief Providers (ATS) endpoints gained’t be affected. AWS recommends that you just don’t use certificates pinning as a result of it introduces an availability threat. Nevertheless, in case your use case requires certificates pinning, AWS recommends that you just pin to an ATS signed Amazon Root CA 1 or Amazon Root CA 3 as an alternative of an intermediate CA or leaf certificates. Your units can proceed to connect with AWS IoT Core in the event you had initially pinned to Symantec Root CA (VeriSign Class 3 Public Major Certification Authority – G5).
Actions / suggestions:
- Present Symantec Server Intermediate Certificates Authority (ICA) certificates expires on thirty first Oct and we’re slowly rolling out a brand new server ICA certificates that’s primarily based on the VeriSign Class 3 Public Major Certification Authority – G5. AWS is rigorously monitoring the method and as we detect incompatible units, we are going to attain out to our prospects. Must you discover modified machine habits or lack of ability of your machine to speak with AWS IoT Core, please contact buyer help or your Technical Account Supervisor (TAM).
- We strongly counsel eradicating any hard-coded affiliation to those distrusted Symantec Server ICA certificates and use publicly trusted Root CA (similar to ATS signed Amazon Root CA 1 or Amazon Root CA 3), to make sure your functions stay safe and appropriate.
- Use Amazon Belief Providers (ATS) endpoints and replace firmware to confirm full certificates chains towards the ATS Root from right here. Put no less than Amazon Root CA 1 and Amazon Root CA 3 within the machine. Put all 5 within the retailer for max future compatibility you probably have machine capability.
- In case you have pinned to the Symantec Server Intermediate Certificates Authority (ICA) certificates and expertise a connection failure after an replace, please replace your firmware to confirm full certificates chains towards the Symantec Root CA (VeriSign Class 3 Public Major Certification Authority – G5). You will discover this certificates right here.
- Use customized area and configurable endpoints.
- Configurable endpoints let you management the TLS coverage utilized to your units, and once more, this may be accomplished incrementally by creating an endpoint with new coverage, and transferring units to it when they’re prepared.
- It is strongly recommended to have two separate endpoints: one for cellular apps utilizing Public CA, and one other particularly for units utilizing a non-public CA (or self-signed) certificates, and be absolutely conscious of your TLS safety insurance policies.
- Don’t restrict certificates dimension on the client-side. Public CAs require server certificates to be renewed frequently. The addition of OCSP responder URLs and different choices can enhance the dimensions of a server certificates over time. We suggest including enough buffer to deal with future server certificates. You’ll be able to confirm your machine’s compatibility with massive server certificates through AWS IoT Core System Advisor.
Utilizing Amazon Belief Providers (ATS) signed Root CA
Listed below are steps to replace your units to make use of an ATS signed Root CA:
- Establish the Root CA that your units are at present utilizing. You are able to do this by wanting on the server certificates chain offered when your units hook up with AWS IoT Core.
- Obtain the ATS signed Root CA from the AWS IoT documentation.
- Set up the ATS signed Root CA within the belief retailer to your units. The precise steps for doing this can differ relying on the kind of machine you might be utilizing.
- Check your units to make it possible for they’ll hook up with AWS IoT Core utilizing the ATS signed Root CA.
Change #2: updating the TLS configuration
As a part of our continued dedication to safety, we’re happy to announce that AWS IoT Core – management airplane endpoints and newly created buyer endpoints will now default to TLS 1.2 or above specs. This improve ensures that you just profit from the newest safety requirements and enhancements within the business. We additionally need to carry to consideration that AWS can be updating the TLS configuration for all AWS service API endpoints to a minimal of model TLS 1.2.
Actions / suggestions
- Management airplane endpoints: If you’re utilizing TLS 1.0/1.1 then you have to to begin utilizing TLS 1.2 or greater for these connections.
- Information airplane endpoints: Units connecting to AWS IoT Core utilizing TLS 1.0 / 1.1 will proceed to function as regular, however we recommend updating these units to help minimal model of TLS 1.2 for safety future-proofing functions.
Migrating your endpoints
To facilitate a seamless migration, we’ve got launched configurable endpoints that allow you to transition your present buyer endpoints to TLS 1.2 or TLS 1.3 at your comfort. This flexibility lets you tailor the migration course of in keeping with your particular necessities and schedule. You’ll be able to observe detailed directions in our earlier weblog publish.
Setup customized domains and configurable endpoints
To setup customized domains and configurable endpoints in AWS IoT Core to have larger management over your server certificates and handle the behaviors of your knowledge endpoints. You’ll be able to observe detailed directions in our earlier weblog publish. Keep in mind to at all times check your configurations totally earlier than deploying them in manufacturing environments.
Conclusion
On this weblog publish, we mentioned two necessary bulletins that may assist future-proof your IoT deployments.
We bid farewell to Symantec Server ICA certificates, acknowledging their previous service, whereas additionally recognizing the necessity for stronger safety measures with our advice to make use of ATS signed certificates and ATS endpoints. By migrating to trendy SSL/TLS server certificates from trusted Certificates Authorities (CAs) similar to ATS, you’ll be able to fortify your functions towards superior cyber threats and guarantee compatibility with the newest browsers and units.
Secondly, we embraced the newest TLS 1.2 requirements as default, transitioning away from TLS 1.0/1.1 and defaulting to TLS 1.2 onwards for AWS IoT Core’s management airplane and newly created buyer endpoints.
Lastly, we recommend to make the most of customized domains and configurable endpoints, providing you with larger management over your server certificates and managing the behaviors of your knowledge endpoints.
Continuously Requested Questions
Q1: How do I do know if I’m affected?
A: If you’re utilizing ATS Server certificates there are not any adjustments. For Symantec Server certificates, confirm that your machine’s TLS implementation doesn’t pin the ICA, wherein case you’re good. We will’t give generic directions on how to do that, however one factor we might doubtlessly counsel is to have a look at all of the certificates baked into your machine code, and see if there’s one which expires in 2023. Or you possibly can verify the baked in certs are Amazon Root CA 1 and Amazon Root CA 3 for ATS and Symantec VeriSign Class 3 Public Major Certification Authority – G5.
Q2: What if I discover a change in machine communication habits with AWS IoT Core?
A: Must you discover modified machine habits or lack of ability of your machine to speak with AWS IoT Core, please contact buyer help or your Technical Account Supervisor (TAM).
The place can I get assist?
In case you have questions, contact AWS Assist or your technical account supervisor (TAM), or begin a brand new thread on the AWS re:Submit AWS IoT Discussion board.
Study Extra
To study extra about the advantages of TLS 1.2 and TLS 1.3 help in AWS IoT Core and how you can make the transition, we invite you to go to our documentation:
- AWS IoT Core – management airplane endpoints: Hyperlink
- AWS IoT Core – knowledge airplane endpoints: Hyperlink
- Configurable endpoint characteristic: Hyperlink
- TLS 1.2 for all AWS API endpoints: Hyperlink
- AWS IoT Core transport safety: Hyperlink
- Issuing and managing certificates: Hyperlink
- Making ready for AWS Certificates Authority: Hyperlink
- Migrating machine fleets to AWS IoT Customized Domains: Hyperlink
- AWS IoT ECC Assist: Hyperlink
- How AWS IoT Core is Serving to Prospects Navigate the Upcoming Mistrust of Symantec Certificates Authorities: Hyperlink
- DigiCert Root certificates: Exterior Hyperlink
Concerning the Creator
![]() Syed Rehan is a Sr. IoT Cybersecurity Specialist at Amazon Net Providers (AWS), primarily based in London and dealing inside the AWS IoT Core Safety Foundations staff. He serves a worldwide buyer base, collaborating with safety specialists, builders, and safety decision-makers to advertise the adoption of AWS IoT providers. Possessing in-depth information of cybersecurity, IoT, and cloud applied sciences, Syed assists prospects starting from startups to massive enterprises, enabling them to assemble safe IoT options inside the AWS ecosystem. |