WARNING: This software is yet not ready for production.
tl;dr Let's Encrypt for IoT (with more bells and whistles).
The goals for WoTT Agent is to do two things:
- Simplify encryption of device communication
- Provide cryptographic identity of sender (such that the receiver can trust that the sender is who it claims to be)
The first build-block we need in order to facilitate encrypted communication between two peers is a cryptographic certificate [1]. This is provisioned automatically through the WoTT agent. At its core, this serves both as the means to enable encrypted communication, as well as each unique device’s identity.
With the certificate installed on the device, we’re able to establish connections to devices and services and cryptographically prove we are whom we claim to be [2]. It’s worth pointing out that this is different than how say your browser works. In such scenario, you as the client (i.e. the browser) verifies that the remote server (e.g. https://www.google.com) is indeed the being served from Google’s server and not an impersonator. There is however no way for Google to cryptographically know that you are who are (which is why you need to login in order to access your email). With WoTT however, we’re able to add this piece, which essentially means that there is no longer a need for username and passwords, since we can cryptographically prove that the client/user is indeed who he/she/it claims to be.
- [1] We do this by issuing an x509 certificate from our own Certificate Authority (CA).
- [2] This is done using something called Mutual TLS, or mTLS for short.
- A Raspberry Pi 2 or newer with Raspbian or Ubuntu Core
If you're using Raspbian, follow these instructions first to install snapd
.
Once you have snapd
installed (included if you are using Ubuntu Core), simply install the WoTT agent by running:
$ sudo snap install wott-agent
$ sudo snap start wott-agent
You can now find your device's WoTT ID by running:
$ sudo wott-agent.whoami
If you get an error try: sudo $(which wott-agent.whoami)
It's also worth noting that the certificates can be found on disk within the folder /var/snap/wott-agent/current
.
See Use Cases below for examples on how to use your agent.
The source code for the Snap can be found here.
While the recommended runtime environment is a Snap as illustrated above Alternative installation methods:
The certificates used for the WoTT agent can be use for a number of use cases. Here are some ideas to help you get started: