-
Notifications
You must be signed in to change notification settings - Fork 215
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to import certificates on SIM7000 #71
Comments
@kaizoku-619 I am having the same issue. I have a feeling the commands aren't implemented yet through the AT interface. I have tried a few things, including copying certificates in using the QPST tool. There are folders on the device called 'cert', 'client-cert', 'client-key'. But have tried putting .pem formatted keys in there and trying the 'convert' with AT+CSSLCFG command, doesn't work. I also found some info in the QAPI docs, and tried converting the certs and keys using the SharkSSLParseCert.exe, and then uploading them using QPST again, still the same error. https://github.com/Thalhammer/simcom_dam/blob/master/docs/MQTT.md has tried secure MQTT through the QAPI functions and has been having problems too. |
Just see these AT command logs |
Thanks @botletics . Tested these last night and am able to connect to test.mosquitto.org on 8883 and 8884 (with and without client certificate). |
@tmcadam would you please share an end to end example with us. |
@captFuture Yes, happy to share. I was using a python script that runs on desktop and shoots off all the AT commands and can also upload the keys if required. I'll clean it up and share it asap (although a new baby here might mean it will take a day or two ;-) ). You can also copy the certificates into the device using the file manager in QPST tool. The trick is putting them in the right place, there are two file systems on the device, it needs to go in the secondary one, and into a folder already there called 'customer'. Keep the key names short and no special characters. I'll try and get a couple of screen shots of QPST if you need help with that method. |
Thanks a lot, the python approach sounds very promising. I was trying to do things with qpst but somehow can't connect the modem correctly and therefore i can't upload anything :( All the best |
I have been playing with this for a while now and using the B07 firmware from this repo managed to get the following. It seems that setting AT+SHSSL=1,"comodo.crt" to the certificate in the Alternate File System/customer directory as @tmcadam said then setting it to AT+SHSSL=1,"" allows the connection to go through otherwise it throws ERROR. The comodo.crt is the comodo root ca certificate put on by QPSF EFS Explorer then Alternate File System which is available on the repo under SIM7000-LTE-Shield/tree/master/SIM7000 Documentation/Firmware Updater Tool I am getting an error 400 but it has come via my apache server via SSL so it may be a configuration issue on there. My server uses SNI so I put the Host header in AT+SHAHEAD="Host","www.yourdomain.com" once that was in it returned the error 400 data I will try this on the B05 firmware and see if that makes any difference. I'm using the SIM7000E in the UK To use the AT commands I used putty on the serial connection to the relevant COM port Hope that helps someone AT+GMR OK +APP PDP: ACTIVE OK OK +SHREQ: "GET",400,434 +SHREAD: 434
Apache/2.4.7 (Ubuntu) Server at www.yourdomain.com Port 443 |
I'm late to the party, but really glad to find other people also working on this! Does anyone know if transferring certificates is possible over the AT command interface? I know that @tmcadam aluded to a fabled python script, but I haven't seen anything about how to upload certificates to the SIM7000 in the SIMCOM datasheets. I'm currently trying to deploy the SIM7000 into an IoT application with Azure IoT, which requires a client certificate as far as I can tell. Since the certificate I'm looking at has an expiration in 2025, I need some sort of game plan for updating the certificate with my MCU, which will only be able to interface with the SIM7000 over serial. |
@CoolNamesAllTaken I've uploaded my python script sim7000-tools. It's a work in progress and I have a bunch more commands that I am in the process of cleaning and adding. Anyway it has the uploading certs using AT and also has a working example using test.mosquitto.org using CA Cert and authenticating with client cert and key. I'm blocked using this module at the minute as I can't connect to AWS IoT. One guess is that even though we are specifying TLS1.2, it isn't happening under the hood. test.mosquitto.org supports all TLS versions (so works), while AWS needs version 1.2. If anyone gets this to work with AWS, please let me know!! @CoolNamesAllTaken Can you let us know how this works with Azure. |
Thanks Tom, I am having the AWS issue as well and am investigating. Managed to upload the certs using qpst and did a successful upload using c but unfortunately then destroyed my code because I thought it didn't work cause the certificates didn't load afterwards (found out later that the filename I used was too long and it got truncated ) Cheers |
@tmcadam your sim7000-tools library looks fantastic, I'll try generating some keys and I'll let you know how it goes! |
@tmcadam I was testing this a bit todayand when it comes to AT+CSSLCFG="convert",1,"awscert.crt", "awskeks.key" i just get a response +CME ERROR: operation not allowed |
I had this issue too, it's caused when the cert request and key pair is not an RSA key pair. Take a look at the issue on @tmcadam's repo that I posted. It has a log of me encountering the exact same error :p |
I can't seem to find the appropriate AT commands to import certificates to SIM7000
simcom documents only describe how to convert certificates on the SIM7000 and not how to import them on its file system.
The text was updated successfully, but these errors were encountered: