View Issue Details

IDProjectCategoryView StatusLast Update
0004067Compliance Test Tool (CTT) Unified Architecture3 - Feature Requestpublic2019-08-16 15:13
ReporterLiam Power Assigned ToAlexander Allmendinger  
PrioritynormalSeveritymajorReproducibilityN/A
Status closedResolutionfixed 
Target Version1.03Fixed in Version1.03.341.381 
Summary0004067: Breaking change in OPCF ANSI C Stack caused by faithful implementation of Part 6
Description

For SecurityPolicyNone the Matrikon FLEX SDK (Server) provides an application instance certificate in the OpenSecureChannel response when the userTokenPolicy requires signing or encrypting. This is a deviation from spec. as the certificate is only required to be provided in the CreateSessionResponse in this use case.

This was never an issue before as all stacks simply ignored the OpenSecureChannel certificate for SecurityPolicyNone. The OPCF ANSI C Client stack has been changed and now abandons a connection attempt where a Server certificate is provided during OpenSecureChannel.

Given that it is of no consequence if a Server certificate is provided during OpenSecureChannel for SecurityPolicyNone, we request that the spec. text be made more permissive to allow the certificate to be present, but to state that it should be ignored (as it is not required). If this is not done it becomes a defacto breaking change for us.

Specifically in Part6 - Table 27 we would like to change:
"This field shall be null if the Message is not signed."
to:
"This field shall be ignored if the Message is not signed."

TagsNo tags attached.
Files Affected

Activities

Liam Power

2017-11-22 19:55

reporter   ~0008742

This is related to issue 4068 as a text change is required in Part 4 also.

Jim Luth

2017-11-28 17:05

administrator   ~0008755

Discussed in today's telecon.

Liam explained the problem he encountered with the CTT which uses the latest ANSI-C stack. After additional review by Liam, he concluded that all versions of the UA specs have been clear that Servers were not expected to return the certificates when security mode is NONE. The “change” that causes the IOP issue is the latest ANSI-C stack when used in a Client refuses to connect to a Server that mistakenly returns the cert. We discussed and agreed there is no spec issue, but to aid interop with non-conforming servers the ANSI-C stack should not refuse to connect when a cert is returned by a server – moving this issue to the ANSI-C stack project and the CTT project.

Bernd Edlinger

2018-03-15 15:01

reporter   ~0008926

Ok, the AnsiC stack got fixed.
Please update to the current master Revision.

Alexander Allmendinger

2018-07-31 17:33

developer   ~0009234

Updated stack version in CTT

Paul Hunkar

2019-08-16 15:13

administrator   ~0010784

Reviewed in CMP call

Issue History

Date Modified Username Field Change
2017-11-22 19:51 Liam Power New Issue
2017-11-22 19:55 Liam Power Note Added: 0008742
2017-11-28 17:05 Jim Luth Note Added: 0008755
2017-11-28 17:08 Jim Luth Project 10000-006: Mappings => Compliance Test Tool (CTT) Unified Architecture
2017-11-28 17:08 Jim Luth Category Spec => Api Change
2017-12-01 15:22 Paul Hunkar Assigned To => Bernd Edlinger
2017-12-01 15:22 Paul Hunkar Status new => assigned
2017-12-01 15:26 Paul Hunkar Category Api Change => Feature Request
2017-12-01 15:26 Paul Hunkar Target Version => 1.03
2018-03-15 15:01 Bernd Edlinger Note Added: 0008926
2018-03-15 15:01 Bernd Edlinger Assigned To Bernd Edlinger =>
2018-03-15 15:02 Bernd Edlinger Assigned To => Alexander Allmendinger
2018-07-31 17:33 Alexander Allmendinger Note Added: 0009234
2018-07-31 17:33 Alexander Allmendinger Status assigned => resolved
2018-07-31 17:33 Alexander Allmendinger Fixed in Version => 1.03.341.381
2018-07-31 17:33 Alexander Allmendinger Resolution open => fixed
2019-01-28 14:14 Paul Hunkar Category Feature Request => 3 - Feature Request
2019-08-16 15:13 Paul Hunkar Status resolved => closed
2019-08-16 15:13 Paul Hunkar Note Added: 0010784