Skip to content

ESP-IDF WiFi Password Protection #842

@bakerstu

Description

@bakerstu

Need to audit the ways in which WiFi passwords are passed around memory and what level of protection we can provide.

At the moment, WiFi passwords are held in volatile arrays. Conceivably these can be leaked over the PSRAM interface at startup. This could be particularly problematic when the product reaches end of life and is discarded. A militous actor could gain physical access and the expose the WiFi passwords by monitoring the PSRAM interface.

One possible "easy" mitigation is to ensure that passwords are only ever stored in encrypted FLASH or internal SRAM. It is not impossible that a hacker could exploit a bug to inject code which can still expose the password from internal SRAM, but at least preventing it from being exposed over the PSRAM interface raises the barrier for a hacker considerably.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions