auditing iot communications with tls-rar · 9/18/2015  · auditing the iot is important, but not...

64
Auditing IoT Communications with TLS-RaR Judson Wilson, Henry Corrigan-Gibbs, Riad S. Wahby, Keith Winstein, Philip Levis, Dan Boneh Stanford University

Upload: others

Post on 28-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Auditing IoT Communicationswith TLS-RaR

Judson Wilson, Henry Corrigan-Gibbs, Riad S. Wahby,Keith Winstein, Philip Levis, Dan Boneh

Stanford University

Page 2: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Auditing Standard Devices

MITM

Used for:● security audit● automated exfiltration

detection● automated intrusion

detection

Page 3: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

IoT is Different

MITM

Page 4: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Troubling Facts

1) We have no way to audit IoT communications, so we must trust companies to do what they claim.

Page 5: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Troubling Facts

1) We have no way to audit IoT communications, so we must trust companies to do what they claim.

2) Respected Companies Have Misrepresented Their Actions

Google“Google's iPhone Tracking, Web Giant, Others Bypassed Apple Browser Settings for Guarding Privacy.” WSJ, Feb. 17, 2012.

Volkswagen“Volkswagen Admits to Cheating on U.S. Emissions Tests,” Bloomberg, Sept. 18, 2015

Page 6: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

MITM does have problems.

MITMAttack!Attack!

Page 7: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

MITM does have problems.

MITM

Page 8: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Overview● Setting● Technical Problem● Our Scheme: TLS RaR

– Main Idea– Corner Cases

● Secure Key Release● Clean Shutdown

● Evaluation● Related Work● Conclusions

Page 9: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Different Parties, Different Concerns

Potential concerns of IoT device company:● Prevent tampering, back doors● Prevent usage of device on other services● Solution that is easy to incorporate.● Protecting customer data

Customer's concerns:● Desire an accurate audit, as good as MITM● Preserve privacy

Page 10: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Compromise: Replace MITM with passive, read only auditors.

Audit Box

Audit Box

Enable:● security audit● automated exfiltration

detection● automated intrusion

detection

Main Channel

Page 11: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

The Technical Problem:

Create a method for passive, read only auditing of TLS-protected communication,to replace the man in the middle method.

In other words: Remove the TLS barrierfrom a communications audit.

Page 12: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Overview● Setting● Technical Problem● Our Scheme: TLS RaR

– Main Idea– Corner Cases

● Secure Key Release● Clean Shutdown

● Evaluation● Conclusions

Page 13: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

TLS-RaR: Rotate and Release

Page 14: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Device to Cloud TLS

Time

Handshake

Begin TCPConnection

Enter TLSSession

Encrypted Session

AES-GCM

Page 15: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Time

Handshake Handshake

Begin TCPConnection

Enter TLSSession

TLS 1.2: Renegotiate or ResumeTLS 1.3: KeyUpdate

Device to Cloud TLS

AES-GCM AES-GCM

Page 16: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Time

Handshake AES-GCM AES-GCM

Epoch 0 Epoch 1

Device to Cloud TLSWith a Twist

Rotate KeysReconnect,Renegotiate,Resumeor KeyUpdate

Page 17: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Time

Handshake

Release Previous Epoch (0) Key

Device to Cloud TLSWith a Twist

AES-GCM AES-GCM

Epoch 0 Epoch 1

Rotate KeysReconnect,Renegotiate,Resumeor KeyUpdate

Page 18: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

● Audit box's decryption yields the same stream ofdata as endpoints' SSL_read() calls, but delayed➔ Audit matches what was received

Nice Properties

Page 19: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

● Audit box's decryption yields the same stream ofdata as endpoints' SSL_read() calls, but delayed➔ Audit matches what was received

● Format of TLS on the wire is not changed➔ Easy to reason about security of the protocol➔ Easy to adopt

Nice Properties

Page 20: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

● Audit box's decryption yields the same stream ofdata as endpoints' SSL_read() calls, but delayed➔ Audit matches what was received

● Format of TLS on the wire is not changed➔ Easy to reason about security of the protocol➔ Easy to adopt

● For some existing servers no change is necessary➔ Really easy to adopt

Nice Properties

Page 21: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

● Audit box's decryption yields the same stream ofdata as endpoints' SSL_read() calls, but delayed➔ Audit matches what was received

● Format of TLS on the wire is not changed➔ Easy to reason about security of the protocol➔ Easy to adopt

● For some existing servers no change is necessary➔ Really easy to adopt

● Minimal change to OpenSSL on the device➔ Easy to reason about security of the implementation➔ Easy to adopt

Nice Properties

Page 22: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Overview● Setting● Technical Problem● Our Scheme: TLS RaR

– Main Idea– Corner Cases

● Secure Key Release● Clean Shutdown

● Evaluation● Conclusions

Page 23: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Audit Box A

Audit Box B

Audit Box C

Device simply distributes key to Audit Boxes.

Device

Key Release Procedure:Straw Man

Page 24: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Key Release Procedure:Straw Man

Audit Box B

Audit Box CEvil Audit Box

Device

Src: IoT DeviceDst: Server

“SUSPICIOUS DATA”

Page 25: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Audit Box A

Audit Box B

Audit Box C

Cryptographic Hashes and Signatures ensure integrity to the auditors.

Device

Sealed-History Key Release

h = Hash(records)σ = Sign(epoch, key, h)

h, σ

h, σ

h, σ

Page 26: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Overview● Setting● Technical Problem● Our Scheme: TLS RaR

– Main Idea– Corner Cases

● Secure Key Release● Clean Shutdown

● Evaluation● Conclusions

Page 27: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Connection Shutdown:Straw Men

1) Device naively releases key after disconnecting

Page 28: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Connection Shutdown:Straw Men

1) Device naively releases key after disconnecting

Attack: Auditors use key to append data to IoT device-to-server stream.

Page 29: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Connection Shutdown:Straw Men

1) Device naively releases key after disconnecting

Attack: Auditors use key to append data to IoT device-to-server stream.

2) Device doesn't release key after disconnecting

Page 30: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Connection Shutdown:Straw Men

1) Device naively releases key after disconnecting

Attack: Auditors use key to append data to IoT device-to-server stream.

2) Device doesn't release key after disconnecting

Problem: Auditor can't decrypt the last epoch.

Page 31: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Clean Connection Shutdown

Clean shutdown: IoT application ensures the last key encrypting data is not useful (e.g. authenticated acknowledgment), then securely releases the key.

TLS's close_notify is probably good enough.

Page 32: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Clean Connection Shutdown

Clean shutdown: IoT application ensures the last key encrypting data is not useful (e.g. authenticated acknowledgment), then securely releases the key.

TLS's close_notify is probably good enough.

Unclean shutdown results in unauditable final epoch.

Page 33: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Clean Connection Shutdown

Clean shutdown: IoT application ensures the last key encrypting data is not useful (e.g. authenticated acknowledgment), then securely releases the key.

TLS's close_notify is probably good enough.

Unclean shutdown results in unauditable final epoch.

Note: Unclean shutdown can be caused by hardware/network failure or actions by IoT device, cloud server, and unauthenticated third parties.

Page 34: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Overview● Setting● Technical Problem● Our Scheme: TLS RaR

– Main Idea– Corner Cases

● Secure Key Release● Clean Shutdown

● Evaluation● Conclusions

Page 35: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Alexa Top 1,000,000Compatibility Survey

Fraction of Servers*

Rotation by Reconnect 54.2%

Rotation by Renegotiation 12.2%

Rotation by Resume (requires heartbeat) 0.5%

*Includes only the ≈400,000 servers that support HTTPS and keep-alive, January, 2016.

Page 36: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Performance Impact

Completion time for 1000 simulated sequential downloads of a 100kB resource, over a 24 Mbps link with 100 ms latency:

Takeaway: In the worst case scenario (unlikely in IoT), epoch lengths can be chosen for minimal impact.

Page 37: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Overview● Setting● Technical Problem● Our Scheme: TLS RaR

– Main Idea– Corner Cases

● Secure Key Release● Clean Shutdown

● Evaluation● Conclusions

Page 38: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Conclusions● Auditing the IoT is important, but not presently possible.

Page 39: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Conclusions● Auditing the IoT is important, but not presently possible.

● Allowing a read only audit is a potential compromise.

Page 40: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Conclusions● Auditing the IoT is important, but not presently possible.

● Allowing a read only audit is a potential compromise.

● TLS RaR is a technical solution with these nice properties:– SSL_read() returns same data for all trusted viewers– format of TLS on the wire is not changed– no changes for some servers– minimal change to OpenSSL on the device

Page 41: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Conclusions

Judson [email protected]

Questions?

● Auditing the IoT is important, but not presently possible.

● Allowing a read only audit is a potential compromise.

● TLS RaR is a technical solution with these nice properties:– SSL_read() returns same data for all trusted viewers– format of TLS on the wire is not changed– no changes for some servers– minimal change to OpenSSL on the device

Page 42: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Backup Slides

Page 43: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

● Present-Moment Integrity➔ Main channel's end-to-end integrity is preserved

● Present-Moment Secrecy➔ Auditors can't decrypt traffic until after a key release.

Security Properties

Page 44: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

● Present-Moment Integrity➔ Main channel's end-to-end integrity is preserved

● Present-Moment Secrecy➔ Auditors can't decrypt traffic until after a key release.

● Past Auditability➔ Auditors can decrypt previously observed records for

which they have the key, or return “fail.”

Security Properties

Page 45: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

● Present-Moment Integrity➔ Main channel's end-to-end integrity is preserved

● Present-Moment Secrecy➔ Auditors can't decrypt traffic until after a key release.

● Past Auditability➔ Auditors can decrypt previously observed records for

which they have the key, or return “fail.”

● Audit Robustness➔ Auditors cannot be convinced that a forgery (possibly

from another auditor) came from one of the endpoints.

Security Properties

Page 46: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

● Covert Channels➔ TLS-RaR cannot prevent secret communication

between endpoints.

● Denial of Service

● Incompatible Application-Layer Authentication➔ Auditors may see and replay all plaintext, including

cookies, passwords, and tickets.

➔ Remedy: Use TLS client certificates

Unmitigated Threats

Page 47: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Two-Phase Key Release Procedure

Device

Audit Box A

Audit Box B

Audit Box C

1) Device requests auditors' permission to release key protecting TCP data sequence numbers x through y.

Range: x-yOK?

Range: x-yOK?

Range: x-yOK?

Page 48: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Two-Phase Key Release Procedure

Audit Box A

Audit Box B

Audit Box C

2) Audit Boxes acknowledge after they are ready for other Audit Boxes to receive the key.

Range: x-yACK

Range: x-yACK

ACKDevice

Page 49: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Two-Phase Key Release Procedure

Audit Box A

Audit Box B

Audit Box C

ACK ACKACKDevice

3) Device waits for all Audit Boxes to respond. (May time out and notify Audit Boxes.)

Page 50: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Two-Phase Key Release Procedure

Audit Box A

Audit Box B

Audit Box C

4) Device distributes key to Audit Boxes.

Device

Page 51: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Overview● Setting● Technical Problem● Our Scheme: TLS RaR

– Main Idea– Corner Cases

● Secure Key Release● Clean Shutdown

● Evaluation● Related Work● Conclusions

Page 52: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Related Work

mcTLS [Naylor et. al. 2015]● targets several problems, including read only

middleboxes which could be auditors● different approach: uses multiple MACs

Page 53: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Related Work

mcTLS [Naylor et. al. 2015]● targets several problems, including read only

middleboxes which could be auditors● different approach: uses multiple MACs

BlindBox [Sherry et. al. 2015]● solves the opposite problem, a “blind” inspection● different trust model

Page 54: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Rotation Policy

Device attempts to limit Epoch length by:● Age of data under new key: 60 seconds● Amount of data protected by new key: 10 MB

Auditor logs when:● Age of data under new key: 5 minutes● Amount of data protected by new key: 50 MB

Page 55: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

client_random, server_random: random data (nonces) from client/serverpre_master_secret: shared secret from client or Diffie-Hellman key exchange.

master_secret = PRF(pre_master_secret, "master secret", client_random + server_random)

key_block = PRF(master_secret, "key expansion", server_random + client_random);

key_block { client_write_MAC_secret[hash_size] server_write_MAC_secret[hash_size] client_write_key[key_material_length] server_write_key[key_material_length] client_write_IV[IV_size] server_write_IV[IV_size]}

Inputs:

Computations:

Outptuts:

TLS 1.2 Key Generation (RFC 5246)

Page 56: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

A Different Idea:

TLS-in-TLS Tunneling

Page 57: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

TLS-in-TLS

IP

TCP

Encrypted TLS

NULL TLS

Encrypted TLS

Application

Ethernet, etc.

NULL TLS● Unencrypted● End to end integrity

and Authenticity.

Encrypted TLS● Auditor has full access,

either by proxy or client releasing the keys.

Page 58: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

TLS-in-TLS

Benefits:– TLS is still intact.

– No renegotiation.

– Auditor has instantaneous access to data.

Problems:– Incompatible with existing web servers, load balancers, SSL

terminators.

– Creates a new layer of cryptography where auditor is not trusted.

– NULL ciphers are unsupported, meant as a debug tool.

– Potential attacks between auditors.

Page 59: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

http://www.zytrax.com/tech/survival/ssl.htmlSurvival guides - TLS/SSL and SSL (X.509) Certificates

Page 60: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

– SSL_read() returns same data for all parties.

– Format of TLS on the wire is not changed.

– No changes for some servers.

– Minimal change to OpenSSL.

Same Nice Properties?Blin

dBox

m

cTLS

NoNo

??

?

N/A

No

No

Page 61: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Threat Model ExclusionsWe exclude the following threats from our model:

● Malicious parties, including the IoT device and cloud server, may communicate by covert channels.

● A malicious auditor may leak private data or keys.

● Malicious auditors may collude to produce the same incorrect audit record.

Page 62: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Threat ModelAn attacker may attempt anything from the TLS threat model, such as passive eavesdropping, replay and masquerading.

Page 63: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Threat ModelAn attacker may attempt anything from the TLS threat model, such as passive eavesdropping, replay and masquerading.

A malicious audit box may try to:● tamper with the communications that are being audited● falsify their audit record and not be detected● masquerade as the device or cloud server to modify the

decrypted cleartext in other auditors' records

Page 64: Auditing IoT Communications with TLS-RaR · 9/18/2015  · Auditing the IoT is important, but not presently possible. Allowing a read only audit is a potential compromise. TLS RaR

Threat ModelAn attacker may attempt anything from the TLS threat model, such as passive eavesdropping, replay and masquerading.

A malicious audit box may try to:● tamper with the communications that are being audited● falsify their audit record and not be detected● masquerade as the device or cloud server to modify the

decrypted cleartext in other auditors' records

A malicious IoT device and/or cloud server may try to make an audit record different from the data sent (ignoring covert channels).