Package LocalDeviceConnectivity
URI: LocalDeviceConnectivity
Description: Model of local device connectivity (USB and Bluetooth).
Bluetooth mesh routing is disabled in device Gateway, preventing it routing between its Bluetooth connections from FromHost to ToHost. This strategy does not represent a contingency plan, but a permanent restriction introduced by design or in accordance with an operational policy or user preference. It also triggers threats representing side effects that would be caused by such a restriction. The default configuration for most Bluetooth enabled hosts is to have mesh routing disabled, but the model must assume it is enabled unless the control is selected, or potential threats may be overlooked. |
|
Tethering (or reverse tethering) is disabled between device Host and IP subnet LogicalSubnet via the USB/Bluetooth connection with device Gateway, so cannot be used by attackers. This strategy does not represent a contingency plan, but a permanent restriction introduced by design or in accordance with an operational policy or user preference. It also triggers threats representing side effects that would be caused by such a restriction. The default configuration for most devices is for tethering disabled, but the model must assume it is enabled unless controls are selected to signify otherwise, or potential threats may be overlooked. |
|
Simple Secure Pairing (SSP) is used between RemoteHost and Host, following the Numeric Comparison or PassKey association model, in which the connection is confirmed by the user by entering a shared key or confirming successful sharing of such a key by the two devices. |
|
Simple Secure Pairing (SSP) is used between RemoteHost and Host, following the Just Works association model with user confirmation at Host. This is effective in preventing spoofing in insecure locations, but depends on there being one secure location where the numerical comparison can be made safely, and then the result stored for subsequent use. |
|
Simple Secure Pairing (SSP) is used between RemoteHost and Host, following the Just Works association model with user confirmation at RemoteHost. This is effective in preventing spoofing in insecure locations, but depends on there being one secure location where the numerical comparison can be made safely, and then the result stored for subsequent use. |
Prevents a gateway supporting mesh routing (i.e. ad hoc peer-to-peer networking) over Bluetooth connections. This is the default situation for most devices, but because it may be used, the model must include the connection and so requires a control to indicate its status. |
|
Signifies that routing between a device and an IP network via a USB/Bluetooth connection is disabled. The reference to tethering is because these routes are normally switched off by default in most devices, but are activated when mobile devices use tethering to share access to cellular (or sometimes other) network uplinks. Because such routes can be used the domain model must include them and use a control to signify their status. |
|
Applies to a device with Bluetooth connectivity, and indicates that the device is capable of displaying or confirming a numerical code or key in one of the simple secure pairing association mechanisms. |
A subnet representing the connection between paired hosts. |
|
A non-IP subnet representing a connection between paired hosts. |
|
A device that can be plugged into a USB Host. |
|
A host that has USB connectors into which USB devices may be plugged. |
|
A subnet representing the connection between paired hosts. |
Represents the communication capability established when two devices are paired over a Bluetooth connection. Inferred where there is a pairsWithBluetooth relationship between devices. |
|
An L1Subnet is one that connects paired hosts directly, with no addressing as such used within the subnet. Used as a base class for USB and Bluetooth connections. |
|
Route through a gateway Host between two devices paired with that Host by Bluetooth connections. Modelled as a type of Open Segment because the message source does not need to be obfuscated in transit through the gateway Host. In most devices, mesh routing is disabled by default, but SSM must assume it may be enabled so potential threats are not overlooked. |
|
Route through a gateway Host from a connected USB/BT device to an IP network. Modelled as a type of NAT Segment because the message source is obfuscated in transit through the Host. This is not SNAT because the source is not connected to the gateway via an IP network, but the effect is similar as the message acquires a source address of the gateway on the destination network. |
|
Route through a gateway Host to a connected USB/BT device from an IP network. Modelled as a type of Open Segment because the message source does not need to be obfuscated in transit through the gateway Host. |
|
A USBClient is a device designed to be connected to other hosts via a USB link. |
|
A USB Host is one to which a USB device can be connected. |
|
Represents the communication capability established when two devices are paired over a USB connection. Inferred where there is a pairsWithUSB relationship between devices. |