Unified Provisioning
Overview
The unified provisioning support in the ESP-IDF provides an extensible mechanism to the developers to configure the device with the Wi-Fi credentials and/or other custom configuration using various transports and different security schemes. Depending on the use case, it provides a complete and ready solution for Wi-Fi network provisioning along with example iOS and Android applications. The developers can choose to extend the device-side and phone-app side implementations to accommodate their requirements for sending additional configuration data. The followings are the important features of this implementation:
Extensible Protocol
The protocol is completely flexible and it offers the ability for the developers to send custom configuration in the provisioning process. The data representation is also left to the application to decide.
Transport Flexibility
The protocol can work on Wi-Fi (SoftAP + HTTP server) or on Bluetooth LE as a transport protocol. The framework provides an ability to add support for any other transport easily as long as command-response behavior can be supported on the transport.
Security Scheme Flexibility
It is understood that each use case may require different security scheme to secure the data that is exchanged in the provisioning process. Some applications may work with SoftAP that is WPA2 protected or Bluetooth LE with the "just-works" security. Or the applications may consider the transport to be insecure and may want application-level security. The unified provisioning framework allows the application to choose the security as deemed suitable.
Compact Data Representation
The protocol uses Google Protobufs as a data representation for session setup and Wi-Fi provisioning. They provide a compact data representation and ability to parse the data in multiple programming languages in native format. Please note that this data representation is not forced on application-specific data and the developers may choose the representation of their choice.
Typical Provisioning Process
Deciding on Transport
The unified provisioning subsystem supports Wi-Fi (SoftAP+HTTP server) and Bluetooth LE (GATT based) transport schemes. The following points need to be considered while selecting the best possible transport for provisioning:
The Bluetooth LE-based transport has the advantage of maintaining an intact communication channel between the device and the client during the provisioning, which ensures reliable provisioning feedback.
The Bluetooth LE-based provisioning implementation makes the user experience better from the phone apps as on Android and iOS both, the phone app can discover and connect to the device without requiring the user to go out of the phone app.
However, the Bluetooth LE transport consumes about 110 KB memory at runtime. If the product does not use the Bluetooth LE or Bluetooth functionality after provisioning is done, almost all the memory can be reclaimed and added into the heap.
The SoftAP-based transport is highly interoperable. However, there are a few considerations:
The device uses the same radio to host the SoftAP and also to connect to the configured AP. Since these could potentially be on different channels, it may cause connection status updates not to be reliably received by the phone
The phone (client) has to disconnect from its current AP in order to connect to the SoftAP. The original network will get restored only when the provisioning process is complete, and the softAP is taken down.
The SoftAP transport does not require much additional memory for the Wi-Fi use cases.
The SoftAP-based provisioning requires the phone-app user to go to
System Settings
to connect to the Wi-Fi network hosted by the device in the iOS system. The discovery (scanning) as well as connection APIs are not available for the iOS applications.
Deciding on Security
Depending on the transport and other constraints, the security scheme needs to be selected by the application developers. The following considerations need to be given from the provisioning-security perspective:
The configuration data sent from the client to the device and the response have to be secured.
The client should authenticate the device that it is connected to.
The device manufacturer may choose proof-of-possession (PoP), a unique per-device secret to be entered on the provisioning client as a security measure to make sure that only the user can provision the device in their possession.
There are two levels of security schemes, of which the developer may select one or a combination, depending on requirements.
Transport Security
For SoftAP provisioning, developers may choose WPA2-protected security with unique per-device passphrase. Unique per-device passphrase can also act as a proof-of-possession. For Bluetooth LE, the "just-works" security can be used as a transport-level security after assessing its provided level of security.
Application Security
The unified provisioning subsystem provides the application-level security (Security 1 Scheme) that provides data protection and authentication through PoP, if the application does not use the transport-level security, or if the transport-level security is not sufficient for the use case.
Device Discovery
The advertisement and device discovery is left to the application and depending on the protocol chosen, the phone apps and device-firmware application can choose appropriate method for advertisement and discovery.
For the SoftAP+HTTP transport, typically the SSID (network name) of the AP hosted by the device can be used for discovery.
For the Bluetooth LE transport, device name or primary service included in the advertisement or a combination of both can be used for discovery.
Architecture
The below diagram shows the architecture of unified provisioning:
It relies on the base layer called Protocol Communication (protocomm) which provides a framework for security schemes and transport mechanisms. The Wi-Fi Provisioning layer uses protocomm to provide simple callbacks to the application for setting the configuration and getting the Wi-Fi status. The application has control over implementation of these callbacks. In addition, the application can directly use protocomm to register custom handlers.
The application creates a protocomm instance which is mapped to a specific transport and specific security scheme. Each transport in the protocomm has a concept of an "end-point" which corresponds to the logical channel for communication for specific type of information. For example, security handshake happens on a different endpoint from the Wi-Fi configuration endpoint. Each end-point is identified using a string and depending on the transport internal representation of the end-point changes. In case of the SoftAP+HTTP transport, the end-point corresponds to URI, whereas in case of Bluetooth LE, the end-point corresponds to the GATT characteristic with specific UUID. Developers can create custom end-points and implement handler for the data that is received or sent over the same end-point.
Security Schemes
At present, the unified provisioning supports the following security schemes:
Security 0
No security (No encryption).
Security 1
Curve25519-based key exchange, shared key derivation and AES256-CTR mode encryption of the data. It supports two modes :
Authorized - Proof of Possession (PoP) string used to authorize session and derive shared key.
No Auth (Null PoP) - Shared key derived through key exchange only.
Security 2
SRP6a-based shared key derivation and AES256-GCM mode encryption of the data.
Note
The respective security schemes need to be enabled through the project configuration menu. Please refer to Enabling Protocomm Security Version for more details.
Security 1 Scheme
The Security 1 scheme details are shown in the below sequence diagram:
Security 2 Scheme
The Security 2 scheme is based on the Secure Remote Password (SRP6a) protocol, see RFC 5054.
The protocol requires the Salt and Verifier to be generated beforehand with the help of the identifying username I
and the plaintext password p
. The Salt and Verifier are then stored on ESP32-P4.
The password
p
and the usernameI
are to be provided to the Phone App (Provisioning entity) by suitable means, e.g., QR code sticker.
Details about the Security 2 scheme are shown in the below sequence diagram:
Sample Code
Please refer to Protocol Communication and Wi-Fi Provisioning for API guides and code snippets on example usage.
Application implementation can be found as an example under provisioning.
Provisioning Tools
Provisioning applications are available for various platforms, along with source code:
- Android:
Source code on GitHub: esp-idf-provisioning-android.
- iOS:
Source code on GitHub: esp-idf-provisioning-ios.
Linux/macOS/Windows: tools/esp_prov, a Python-based command line tool for provisioning.
The phone applications offer simple UI and are thus more user centric, while the command-line application is useful as a debugging tool for developers.