View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0004373 | 10000-004: Services | Spec | public | 2018-08-20 14:54 | 2021-03-10 17:48 |
| Reporter | Christian Haas | Assigned To | Matthias Damm | ||
| Priority | normal | Severity | minor | Reproducibility | N/A |
| Status | closed | Resolution | fixed | ||
| Summary | 0004373: How to re-use session after certificate renewal | ||||
| Description | Part 12 and the usage of a GDS for certificate management is supposed to minimize disruption in case of certificate renewal. If one wants to keep a session alive after certificate change the session should be activated on a new secure channel (with new certificate). Yet, Part 4 states: Subsequent calls to ActivateSession may be associated with different SecureChannels. If this is the case then the Server shall verify that the Certificate the Client used to create the new SecureChannel is the same as the Certificate used to create the original SecureChannel. This is kind of preventing the re-usage of an exisiting session on a new secure channel, right ? Maybe it would be good to explicitly describe the procedure how to act as a server/client after certificates are rewnewed. | ||||
| Tags | No tags attached. | ||||
| Commit Version | |||||
| Fix Due Date | |||||
| related to | 0006607 | closed | Matthias Damm | 5.6.3 ActivateSession |
|
|
Clarify in Part 4 expected behavior when a Cert is renewed. |
|
|
Needs 1.04 Errata. |
|
|
Just a comment on your discussion to my issue: Part 12 states for applyChanges If the Server Certificate has changed, Secure Channels using the old Certificate will eventually be interrupted. The only leeway the Server has is with the timing. In the best case, the Server can close the TransportConnections for the affected Endpoints and leave any Subscriptions intact. This should appear no different than a network interruption from the perspective of the Client. The Client should be prepared to deal with Certificate changes during its reconnect logic. How can the subscriptions be kept intact if we have to kill the session ? |
|
|
Need to recommend that client certificate changes should behave like a redundant client failover where a new session is created and the subscriptions are transferred. |
|
|
The problem is that TransferSubscription is optional and only works if the user is the same (does not work with anonymous used with headless clients) ActivateSession: TransferSubscription: |
|
|
For ActivateSession it does not help to allow new certificates with the same ApplicationInstanceUri since there is also a signature check for a signature created by the client with the private key and checked with the public key provided in CreateSession. This check fails as soon as the client changes the private key. This is recomended when creating new certificates. The only option I can see at the moment is an additional method that allows the change of the Client Certificate on an existing Session. The only possible short term enhancement is the descibed clarification for TransferSubscription to make this more reliable. |
|
|
If the client certificate is replaced, a new Session is required. There is no way around this. Added following clarification to 5.13.7 TransferSubscriptions Added: |
|
|
Agreed to changes in Dallas meeting. |
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2018-08-20 14:54 | Christian Haas | New Issue | |
| 2018-08-28 15:26 | Jim Luth | Project | 10000-012: Discovery => 10000-004: Services |
| 2018-08-28 15:27 | Jim Luth | Note Added: 0009321 | |
| 2018-08-28 15:27 | Jim Luth | Assigned To | => Matthias Damm |
| 2018-08-28 15:27 | Jim Luth | Status | new => assigned |
| 2018-08-28 15:32 | Jim Luth | Note Added: 0009323 | |
| 2018-09-21 12:56 | Christian Haas | Note Added: 0009398 | |
| 2018-12-05 16:53 | Randy Armstrong | Note Added: 0009671 | |
| 2018-12-14 17:55 | Matthias Damm | Note Added: 0009708 | |
| 2018-12-14 17:56 | Matthias Damm | Assigned To | Matthias Damm => Randy Armstrong |
| 2019-01-02 13:40 | Matthias Damm | Assigned To | Randy Armstrong => Matthias Damm |
| 2019-01-03 16:37 | Matthias Damm | Note Added: 0009772 | |
| 2020-03-04 15:40 | Matthias Damm | Status | assigned => resolved |
| 2020-03-04 15:40 | Matthias Damm | Resolution | open => fixed |
| 2020-03-04 15:40 | Matthias Damm | Note Added: 0011648 | |
| 2020-03-04 22:10 | Jim Luth | Status | resolved => closed |
| 2020-03-04 22:10 | Jim Luth | Fixed in Version | => 1.05 |
| 2020-03-04 22:10 | Jim Luth | Note Added: 0011672 | |
| 2020-12-06 14:30 | Matthias Damm | Relationship added | has duplicate 0006279 |
| 2020-12-06 14:37 | Matthias Damm | Relationship deleted | has duplicate 0006279 |
| 2021-03-10 17:48 | Randy Armstrong | Relationship added | related to 0006607 |