ua_server_binary.c 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816
  1. /* This Source Code Form is subject to the terms of the Mozilla Public
  2. * License, v. 2.0. If a copy of the MPL was not distributed with this
  3. * file, You can obtain one at http://mozilla.org/MPL/2.0/.
  4. *
  5. * Copyright 2014-2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
  6. * Copyright 2014-2016 (c) Sten Grüner
  7. * Copyright 2014-2015, 2017 (c) Florian Palm
  8. * Copyright 2015-2016 (c) Chris Iatrou
  9. * Copyright 2015-2016 (c) Oleksiy Vasylyev
  10. * Copyright 2016 (c) Joakim L. Gilje
  11. * Copyright 2016-2017 (c) Stefan Profanter, fortiss GmbH
  12. * Copyright 2016 (c) TorbenD
  13. * Copyright 2017 (c) frax2222
  14. * Copyright 2017 (c) Mark Giraud, Fraunhofer IOSB
  15. */
  16. #include "ua_util.h"
  17. #include "ua_server_internal.h"
  18. #include "ua_services.h"
  19. #include "ua_securechannel_manager.h"
  20. #include "ua_session_manager.h"
  21. #include "ua_types_generated_encoding_binary.h"
  22. #include "ua_transport_generated.h"
  23. #include "ua_transport_generated_handling.h"
  24. #include "ua_transport_generated_encoding_binary.h"
  25. #include "ua_types_generated_handling.h"
  26. #include "ua_securitypolicy_none.h"
  27. #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
  28. // store the authentication token and session ID so we can help fuzzing by setting
  29. // these values in the next request automatically
  30. UA_NodeId unsafe_fuzz_authenticationToken = {
  31. 0, UA_NODEIDTYPE_NUMERIC, {0}
  32. };
  33. #endif
  34. #ifdef UA_DEBUG_DUMP_PKGS_FILE
  35. void UA_debug_dumpCompleteChunk(UA_Server *const server, UA_Connection *const connection, UA_ByteString *messageBuffer);
  36. #endif
  37. /********************/
  38. /* Helper Functions */
  39. /********************/
  40. /* This is not an ERR message, the connection is not closed afterwards */
  41. static UA_StatusCode
  42. sendServiceFault(UA_SecureChannel *channel, const UA_ByteString *msg,
  43. size_t offset, const UA_DataType *responseType,
  44. UA_UInt32 requestId, UA_StatusCode error) {
  45. UA_RequestHeader requestHeader;
  46. UA_StatusCode retval = UA_RequestHeader_decodeBinary(msg, &offset, &requestHeader);
  47. if(retval != UA_STATUSCODE_GOOD)
  48. return retval;
  49. UA_STACKARRAY(UA_Byte, response, responseType->memSize);
  50. UA_init(response, responseType);
  51. UA_ResponseHeader *responseHeader = (UA_ResponseHeader*)response;
  52. responseHeader->requestHandle = requestHeader.requestHandle;
  53. responseHeader->timestamp = UA_DateTime_now();
  54. responseHeader->serviceResult = error;
  55. // Send error message. Message type is MSG and not ERR, since we are on a securechannel!
  56. retval = UA_SecureChannel_sendSymmetricMessage(channel, requestId, UA_MESSAGETYPE_MSG,
  57. response, responseType);
  58. UA_RequestHeader_deleteMembers(&requestHeader);
  59. UA_LOG_DEBUG(channel->securityPolicy->logger, UA_LOGCATEGORY_SERVER,
  60. "Sent ServiceFault with error code %s", UA_StatusCode_name(error));
  61. return retval;
  62. }
  63. typedef enum {
  64. UA_SERVICETYPE_NORMAL,
  65. UA_SERVICETYPE_INSITU,
  66. UA_SERVICETYPE_CUSTOM
  67. } UA_ServiceType;
  68. static void
  69. getServicePointers(UA_UInt32 requestTypeId, const UA_DataType **requestType,
  70. const UA_DataType **responseType, UA_Service *service,
  71. UA_InSituService *serviceInsitu,
  72. UA_Boolean *requiresSession, UA_ServiceType *serviceType) {
  73. switch(requestTypeId) {
  74. case UA_NS0ID_GETENDPOINTSREQUEST_ENCODING_DEFAULTBINARY:
  75. *service = (UA_Service)Service_GetEndpoints;
  76. *requestType = &UA_TYPES[UA_TYPES_GETENDPOINTSREQUEST];
  77. *responseType = &UA_TYPES[UA_TYPES_GETENDPOINTSRESPONSE];
  78. *requiresSession = false;
  79. break;
  80. case UA_NS0ID_FINDSERVERSREQUEST_ENCODING_DEFAULTBINARY:
  81. *service = (UA_Service)Service_FindServers;
  82. *requestType = &UA_TYPES[UA_TYPES_FINDSERVERSREQUEST];
  83. *responseType = &UA_TYPES[UA_TYPES_FINDSERVERSRESPONSE];
  84. *requiresSession = false;
  85. break;
  86. #ifdef UA_ENABLE_DISCOVERY
  87. # ifdef UA_ENABLE_DISCOVERY_MULTICAST
  88. case UA_NS0ID_FINDSERVERSONNETWORKREQUEST_ENCODING_DEFAULTBINARY:
  89. *service = (UA_Service)Service_FindServersOnNetwork;
  90. *requestType = &UA_TYPES[UA_TYPES_FINDSERVERSONNETWORKREQUEST];
  91. *responseType = &UA_TYPES[UA_TYPES_FINDSERVERSONNETWORKRESPONSE];
  92. *requiresSession = false;
  93. break;
  94. # endif
  95. case UA_NS0ID_REGISTERSERVERREQUEST_ENCODING_DEFAULTBINARY:
  96. *service = (UA_Service)Service_RegisterServer;
  97. *requestType = &UA_TYPES[UA_TYPES_REGISTERSERVERREQUEST];
  98. *responseType = &UA_TYPES[UA_TYPES_REGISTERSERVERRESPONSE];
  99. *requiresSession = false;
  100. break;
  101. case UA_NS0ID_REGISTERSERVER2REQUEST_ENCODING_DEFAULTBINARY:
  102. *service = (UA_Service)Service_RegisterServer2;
  103. *requestType = &UA_TYPES[UA_TYPES_REGISTERSERVER2REQUEST];
  104. *responseType = &UA_TYPES[UA_TYPES_REGISTERSERVER2RESPONSE];
  105. *requiresSession = false;
  106. break;
  107. #endif
  108. case UA_NS0ID_CREATESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  109. *service = NULL; //(UA_Service)Service_CreateSession;
  110. *requestType = &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST];
  111. *responseType = &UA_TYPES[UA_TYPES_CREATESESSIONRESPONSE];
  112. *requiresSession = false;
  113. *serviceType = UA_SERVICETYPE_CUSTOM;
  114. break;
  115. case UA_NS0ID_ACTIVATESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  116. *service = NULL; //(UA_Service)Service_ActivateSession;
  117. *requestType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST];
  118. *responseType = &UA_TYPES[UA_TYPES_ACTIVATESESSIONRESPONSE];
  119. *serviceType = UA_SERVICETYPE_CUSTOM;
  120. break;
  121. case UA_NS0ID_CLOSESESSIONREQUEST_ENCODING_DEFAULTBINARY:
  122. *service = (UA_Service)Service_CloseSession;
  123. *requestType = &UA_TYPES[UA_TYPES_CLOSESESSIONREQUEST];
  124. *responseType = &UA_TYPES[UA_TYPES_CLOSESESSIONRESPONSE];
  125. break;
  126. case UA_NS0ID_READREQUEST_ENCODING_DEFAULTBINARY:
  127. *service = NULL;
  128. *serviceInsitu = (UA_InSituService)Service_Read;
  129. *requestType = &UA_TYPES[UA_TYPES_READREQUEST];
  130. *responseType = &UA_TYPES[UA_TYPES_READRESPONSE];
  131. *serviceType = UA_SERVICETYPE_INSITU;
  132. break;
  133. case UA_NS0ID_WRITEREQUEST_ENCODING_DEFAULTBINARY:
  134. *service = (UA_Service)Service_Write;
  135. *requestType = &UA_TYPES[UA_TYPES_WRITEREQUEST];
  136. *responseType = &UA_TYPES[UA_TYPES_WRITERESPONSE];
  137. break;
  138. case UA_NS0ID_BROWSEREQUEST_ENCODING_DEFAULTBINARY:
  139. *service = (UA_Service)Service_Browse;
  140. *requestType = &UA_TYPES[UA_TYPES_BROWSEREQUEST];
  141. *responseType = &UA_TYPES[UA_TYPES_BROWSERESPONSE];
  142. break;
  143. case UA_NS0ID_BROWSENEXTREQUEST_ENCODING_DEFAULTBINARY:
  144. *service = (UA_Service)Service_BrowseNext;
  145. *requestType = &UA_TYPES[UA_TYPES_BROWSENEXTREQUEST];
  146. *responseType = &UA_TYPES[UA_TYPES_BROWSENEXTRESPONSE];
  147. break;
  148. case UA_NS0ID_REGISTERNODESREQUEST_ENCODING_DEFAULTBINARY:
  149. *service = (UA_Service)Service_RegisterNodes;
  150. *requestType = &UA_TYPES[UA_TYPES_REGISTERNODESREQUEST];
  151. *responseType = &UA_TYPES[UA_TYPES_REGISTERNODESRESPONSE];
  152. break;
  153. case UA_NS0ID_UNREGISTERNODESREQUEST_ENCODING_DEFAULTBINARY:
  154. *service = (UA_Service)Service_UnregisterNodes;
  155. *requestType = &UA_TYPES[UA_TYPES_UNREGISTERNODESREQUEST];
  156. *responseType = &UA_TYPES[UA_TYPES_UNREGISTERNODESRESPONSE];
  157. break;
  158. case UA_NS0ID_TRANSLATEBROWSEPATHSTONODEIDSREQUEST_ENCODING_DEFAULTBINARY:
  159. *service = (UA_Service)Service_TranslateBrowsePathsToNodeIds;
  160. *requestType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSREQUEST];
  161. *responseType = &UA_TYPES[UA_TYPES_TRANSLATEBROWSEPATHSTONODEIDSRESPONSE];
  162. break;
  163. #ifdef UA_ENABLE_SUBSCRIPTIONS
  164. case UA_NS0ID_CREATESUBSCRIPTIONREQUEST_ENCODING_DEFAULTBINARY:
  165. *service = (UA_Service)Service_CreateSubscription;
  166. *requestType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONREQUEST];
  167. *responseType = &UA_TYPES[UA_TYPES_CREATESUBSCRIPTIONRESPONSE];
  168. break;
  169. case UA_NS0ID_PUBLISHREQUEST_ENCODING_DEFAULTBINARY:
  170. *requestType = &UA_TYPES[UA_TYPES_PUBLISHREQUEST];
  171. *responseType = &UA_TYPES[UA_TYPES_PUBLISHRESPONSE];
  172. break;
  173. case UA_NS0ID_REPUBLISHREQUEST_ENCODING_DEFAULTBINARY:
  174. *service = (UA_Service)Service_Republish;
  175. *requestType = &UA_TYPES[UA_TYPES_REPUBLISHREQUEST];
  176. *responseType = &UA_TYPES[UA_TYPES_REPUBLISHRESPONSE];
  177. break;
  178. case UA_NS0ID_MODIFYSUBSCRIPTIONREQUEST_ENCODING_DEFAULTBINARY:
  179. *service = (UA_Service)Service_ModifySubscription;
  180. *requestType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONREQUEST];
  181. *responseType = &UA_TYPES[UA_TYPES_MODIFYSUBSCRIPTIONRESPONSE];
  182. break;
  183. case UA_NS0ID_SETPUBLISHINGMODEREQUEST_ENCODING_DEFAULTBINARY:
  184. *service = (UA_Service)Service_SetPublishingMode;
  185. *requestType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODEREQUEST];
  186. *responseType = &UA_TYPES[UA_TYPES_SETPUBLISHINGMODERESPONSE];
  187. break;
  188. case UA_NS0ID_DELETESUBSCRIPTIONSREQUEST_ENCODING_DEFAULTBINARY:
  189. *service = (UA_Service)Service_DeleteSubscriptions;
  190. *requestType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSREQUEST];
  191. *responseType = &UA_TYPES[UA_TYPES_DELETESUBSCRIPTIONSRESPONSE];
  192. break;
  193. case UA_NS0ID_CREATEMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  194. *service = (UA_Service)Service_CreateMonitoredItems;
  195. *requestType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSREQUEST];
  196. *responseType = &UA_TYPES[UA_TYPES_CREATEMONITOREDITEMSRESPONSE];
  197. break;
  198. case UA_NS0ID_DELETEMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  199. *service = (UA_Service)Service_DeleteMonitoredItems;
  200. *requestType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSREQUEST];
  201. *responseType = &UA_TYPES[UA_TYPES_DELETEMONITOREDITEMSRESPONSE];
  202. break;
  203. case UA_NS0ID_MODIFYMONITOREDITEMSREQUEST_ENCODING_DEFAULTBINARY:
  204. *service = (UA_Service)Service_ModifyMonitoredItems;
  205. *requestType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSREQUEST];
  206. *responseType = &UA_TYPES[UA_TYPES_MODIFYMONITOREDITEMSRESPONSE];
  207. break;
  208. case UA_NS0ID_SETMONITORINGMODEREQUEST_ENCODING_DEFAULTBINARY:
  209. *service = (UA_Service)Service_SetMonitoringMode;
  210. *requestType = &UA_TYPES[UA_TYPES_SETMONITORINGMODEREQUEST];
  211. *responseType = &UA_TYPES[UA_TYPES_SETMONITORINGMODERESPONSE];
  212. break;
  213. #endif
  214. #ifdef UA_ENABLE_METHODCALLS
  215. case UA_NS0ID_CALLREQUEST_ENCODING_DEFAULTBINARY:
  216. *service = (UA_Service)Service_Call;
  217. *requestType = &UA_TYPES[UA_TYPES_CALLREQUEST];
  218. *responseType = &UA_TYPES[UA_TYPES_CALLRESPONSE];
  219. break;
  220. #endif
  221. #ifdef UA_ENABLE_NODEMANAGEMENT
  222. case UA_NS0ID_ADDNODESREQUEST_ENCODING_DEFAULTBINARY:
  223. *service = (UA_Service)Service_AddNodes;
  224. *requestType = &UA_TYPES[UA_TYPES_ADDNODESREQUEST];
  225. *responseType = &UA_TYPES[UA_TYPES_ADDNODESRESPONSE];
  226. break;
  227. case UA_NS0ID_ADDREFERENCESREQUEST_ENCODING_DEFAULTBINARY:
  228. *service = (UA_Service)Service_AddReferences;
  229. *requestType = &UA_TYPES[UA_TYPES_ADDREFERENCESREQUEST];
  230. *responseType = &UA_TYPES[UA_TYPES_ADDREFERENCESRESPONSE];
  231. break;
  232. case UA_NS0ID_DELETENODESREQUEST_ENCODING_DEFAULTBINARY:
  233. *service = (UA_Service)Service_DeleteNodes;
  234. *requestType = &UA_TYPES[UA_TYPES_DELETENODESREQUEST];
  235. *responseType = &UA_TYPES[UA_TYPES_DELETENODESRESPONSE];
  236. break;
  237. case UA_NS0ID_DELETEREFERENCESREQUEST_ENCODING_DEFAULTBINARY:
  238. *service = (UA_Service)Service_DeleteReferences;
  239. *requestType = &UA_TYPES[UA_TYPES_DELETEREFERENCESREQUEST];
  240. *responseType = &UA_TYPES[UA_TYPES_DELETEREFERENCESRESPONSE];
  241. break;
  242. #endif
  243. default:
  244. break;
  245. }
  246. }
  247. /*************************/
  248. /* Process Message Types */
  249. /*************************/
  250. /* HEL -> Open up the connection */
  251. static UA_StatusCode
  252. processHEL(UA_Server *server, UA_Connection *connection,
  253. const UA_ByteString *msg, size_t *offset) {
  254. UA_TcpHelloMessage helloMessage;
  255. UA_StatusCode retval = UA_TcpHelloMessage_decodeBinary(msg, offset, &helloMessage);
  256. if(retval != UA_STATUSCODE_GOOD)
  257. return retval;
  258. /* Parameterize the connection */
  259. connection->remoteConf.maxChunkCount = helloMessage.maxChunkCount; /* zero -> unlimited */
  260. connection->remoteConf.maxMessageSize = helloMessage.maxMessageSize; /* zero -> unlimited */
  261. connection->remoteConf.protocolVersion = helloMessage.protocolVersion;
  262. connection->remoteConf.recvBufferSize = helloMessage.receiveBufferSize;
  263. if(connection->localConf.sendBufferSize > helloMessage.receiveBufferSize)
  264. connection->localConf.sendBufferSize = helloMessage.receiveBufferSize;
  265. connection->remoteConf.sendBufferSize = helloMessage.sendBufferSize;
  266. if(connection->localConf.recvBufferSize > helloMessage.sendBufferSize)
  267. connection->localConf.recvBufferSize = helloMessage.sendBufferSize;
  268. UA_String_deleteMembers(&helloMessage.endpointUrl);
  269. if(connection->remoteConf.recvBufferSize == 0) {
  270. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  271. "Connection %i | Remote end indicated a receive buffer size of 0. "
  272. "Not able to send any messages.",
  273. connection->sockfd);
  274. return UA_STATUSCODE_BADINTERNALERROR;
  275. }
  276. connection->state = UA_CONNECTION_ESTABLISHED;
  277. /* Build acknowledge response */
  278. UA_TcpAcknowledgeMessage ackMessage;
  279. ackMessage.protocolVersion = connection->localConf.protocolVersion;
  280. ackMessage.receiveBufferSize = connection->localConf.recvBufferSize;
  281. ackMessage.sendBufferSize = connection->localConf.sendBufferSize;
  282. ackMessage.maxMessageSize = connection->localConf.maxMessageSize;
  283. ackMessage.maxChunkCount = connection->localConf.maxChunkCount;
  284. UA_TcpMessageHeader ackHeader;
  285. ackHeader.messageTypeAndChunkType = UA_MESSAGETYPE_ACK + UA_CHUNKTYPE_FINAL;
  286. ackHeader.messageSize = 8 + 20; /* ackHeader + ackMessage */
  287. /* Get the send buffer from the network layer */
  288. UA_ByteString ack_msg;
  289. UA_ByteString_init(&ack_msg);
  290. retval = connection->getSendBuffer(connection, connection->localConf.sendBufferSize,
  291. &ack_msg);
  292. if(retval != UA_STATUSCODE_GOOD)
  293. return retval;
  294. /* Encode and send the response */
  295. UA_Byte *bufPos = ack_msg.data;
  296. const UA_Byte *bufEnd = &ack_msg.data[ack_msg.length];
  297. retval = UA_TcpMessageHeader_encodeBinary(&ackHeader, &bufPos, bufEnd);
  298. if(retval != UA_STATUSCODE_GOOD) {
  299. connection->releaseSendBuffer(connection, &ack_msg);
  300. return retval;
  301. }
  302. retval = UA_TcpAcknowledgeMessage_encodeBinary(&ackMessage, &bufPos, bufEnd);
  303. if(retval != UA_STATUSCODE_GOOD) {
  304. connection->releaseSendBuffer(connection, &ack_msg);
  305. return retval;
  306. }
  307. ack_msg.length = ackHeader.messageSize;
  308. return connection->send(connection, &ack_msg);
  309. }
  310. /* OPN -> Open up/renew the securechannel */
  311. static UA_StatusCode
  312. processOPN(UA_Server *server, UA_SecureChannel *channel,
  313. const UA_UInt32 requestId, const UA_ByteString *msg) {
  314. /* Decode the request */
  315. size_t offset = 0;
  316. UA_NodeId requestType;
  317. UA_StatusCode retval = UA_STATUSCODE_GOOD;
  318. UA_OpenSecureChannelRequest openSecureChannelRequest;
  319. retval |= UA_NodeId_decodeBinary(msg, &offset, &requestType);
  320. retval |= UA_OpenSecureChannelRequest_decodeBinary(msg, &offset, &openSecureChannelRequest);
  321. /* Error occurred */
  322. if(retval != UA_STATUSCODE_GOOD ||
  323. requestType.identifier.numeric != UA_TYPES[UA_TYPES_OPENSECURECHANNELREQUEST].binaryEncodingId) {
  324. UA_NodeId_deleteMembers(&requestType);
  325. UA_OpenSecureChannelRequest_deleteMembers(&openSecureChannelRequest);
  326. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  327. "Could not decode the OPN message. Closing the connection.");
  328. UA_SecureChannelManager_close(&server->secureChannelManager, channel->securityToken.channelId);
  329. return retval;
  330. }
  331. UA_NodeId_deleteMembers(&requestType);
  332. /* Call the service */
  333. UA_OpenSecureChannelResponse openScResponse;
  334. UA_OpenSecureChannelResponse_init(&openScResponse);
  335. Service_OpenSecureChannel(server, channel, &openSecureChannelRequest, &openScResponse);
  336. UA_OpenSecureChannelRequest_deleteMembers(&openSecureChannelRequest);
  337. if(openScResponse.responseHeader.serviceResult != UA_STATUSCODE_GOOD) {
  338. UA_LOG_INFO_CHANNEL(server->config.logger, channel, "Could not open a SecureChannel. "
  339. "Closing the connection.");
  340. UA_SecureChannelManager_close(&server->secureChannelManager,
  341. channel->securityToken.channelId);
  342. return openScResponse.responseHeader.serviceResult;
  343. }
  344. /* Send the response */
  345. retval = UA_SecureChannel_sendAsymmetricOPNMessage(channel, requestId, &openScResponse,
  346. &UA_TYPES[UA_TYPES_OPENSECURECHANNELRESPONSE]);
  347. UA_OpenSecureChannelResponse_deleteMembers(&openScResponse);
  348. if(retval != UA_STATUSCODE_GOOD) {
  349. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  350. "Could not send the OPN answer with error code %s",
  351. UA_StatusCode_name(retval));
  352. UA_SecureChannelManager_close(&server->secureChannelManager,
  353. channel->securityToken.channelId);
  354. }
  355. return retval;
  356. }
  357. static UA_StatusCode
  358. processMSG(UA_Server *server, UA_SecureChannel *channel,
  359. UA_UInt32 requestId, const UA_ByteString *msg) {
  360. /* At 0, the nodeid starts... */
  361. size_t offset = 0;
  362. /* Decode the nodeid */
  363. UA_NodeId requestTypeId;
  364. UA_StatusCode retval = UA_NodeId_decodeBinary(msg, &offset, &requestTypeId);
  365. if(retval != UA_STATUSCODE_GOOD)
  366. return retval;
  367. if(requestTypeId.namespaceIndex != 0 ||
  368. requestTypeId.identifierType != UA_NODEIDTYPE_NUMERIC)
  369. UA_NodeId_deleteMembers(&requestTypeId); /* leads to badserviceunsupported */
  370. /* Store the start-position of the request */
  371. size_t requestPos = offset;
  372. /* Get the service pointers */
  373. UA_Service service = NULL;
  374. UA_InSituService serviceInsitu = NULL;
  375. const UA_DataType *requestType = NULL;
  376. const UA_DataType *responseType = NULL;
  377. UA_Boolean sessionRequired = true;
  378. UA_ServiceType serviceType = UA_SERVICETYPE_NORMAL;
  379. getServicePointers(requestTypeId.identifier.numeric, &requestType,
  380. &responseType, &service, &serviceInsitu, &sessionRequired, &serviceType);
  381. if(!requestType) {
  382. if(requestTypeId.identifier.numeric == 787) {
  383. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  384. "Client requested a subscription, " \
  385. "but those are not enabled in the build");
  386. } else {
  387. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  388. "Unknown request with type identifier %i",
  389. requestTypeId.identifier.numeric);
  390. }
  391. return sendServiceFault(channel, msg, requestPos, &UA_TYPES[UA_TYPES_SERVICEFAULT],
  392. requestId, UA_STATUSCODE_BADSERVICEUNSUPPORTED);
  393. }
  394. UA_assert(responseType);
  395. /* Decode the request */
  396. UA_STACKARRAY(UA_Byte, request, requestType->memSize);
  397. UA_RequestHeader *requestHeader = (UA_RequestHeader*)request;
  398. retval = UA_decodeBinary(msg, &offset, request, requestType,
  399. server->config.customDataTypesSize,
  400. server->config.customDataTypes);
  401. if(retval != UA_STATUSCODE_GOOD) {
  402. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  403. "Could not decode the request");
  404. return sendServiceFault(channel, msg, requestPos, responseType, requestId, retval);
  405. }
  406. /* Prepare the respone */
  407. UA_STACKARRAY(UA_Byte, responseBuf, responseType->memSize);
  408. void *response = (void*)(uintptr_t)&responseBuf[0]; /* Get around aliasing rules */
  409. UA_init(response, responseType);
  410. UA_Session *session = NULL; /* must be initialized before goto send_response */
  411. /* CreateSession doesn't need a session */
  412. if(requestType == &UA_TYPES[UA_TYPES_CREATESESSIONREQUEST]) {
  413. Service_CreateSession(server, channel,
  414. (const UA_CreateSessionRequest *)request,
  415. (UA_CreateSessionResponse *)response);
  416. #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
  417. // store the authentication token and session ID so we can help fuzzing by setting
  418. // these values in the next request automatically
  419. UA_CreateSessionResponse *res = (UA_CreateSessionResponse *)response;
  420. UA_NodeId_copy(&res->authenticationToken, &unsafe_fuzz_authenticationToken);
  421. #endif
  422. goto send_response;
  423. }
  424. #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
  425. // set the authenticationToken from the create session request to help fuzzing cover more lines
  426. UA_NodeId_deleteMembers(&requestHeader->authenticationToken);
  427. if(!UA_NodeId_isNull(&unsafe_fuzz_authenticationToken))
  428. UA_NodeId_copy(&unsafe_fuzz_authenticationToken, &requestHeader->authenticationToken);
  429. #endif
  430. /* Find the matching session */
  431. session = (UA_Session*)UA_SecureChannel_getSession(channel, &requestHeader->authenticationToken);
  432. if(!session && !UA_NodeId_isNull(&requestHeader->authenticationToken))
  433. session = UA_SessionManager_getSessionByToken(&server->sessionManager,
  434. &requestHeader->authenticationToken);
  435. if(requestType == &UA_TYPES[UA_TYPES_ACTIVATESESSIONREQUEST]) {
  436. if(!session) {
  437. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  438. "Trying to activate a session that is " \
  439. "not known in the server");
  440. UA_deleteMembers(request, requestType);
  441. return sendServiceFault(channel, msg, requestPos, responseType,
  442. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  443. }
  444. Service_ActivateSession(server, channel, session,
  445. (const UA_ActivateSessionRequest*)request,
  446. (UA_ActivateSessionResponse*)response);
  447. goto send_response;
  448. }
  449. /* Set an anonymous, inactive session for services that need no session */
  450. UA_Session anonymousSession;
  451. if(!session) {
  452. if(sessionRequired) {
  453. UA_LOG_WARNING_CHANNEL(server->config.logger, channel,
  454. "Service request %i without a valid session",
  455. requestType->binaryEncodingId);
  456. UA_deleteMembers(request, requestType);
  457. return sendServiceFault(channel, msg, requestPos, responseType,
  458. requestId, UA_STATUSCODE_BADSESSIONIDINVALID);
  459. }
  460. UA_Session_init(&anonymousSession);
  461. anonymousSession.sessionId = UA_NODEID_GUID(0, UA_GUID_NULL);
  462. anonymousSession.header.channel = channel;
  463. session = &anonymousSession;
  464. }
  465. /* Trying to use a non-activated session? */
  466. if(sessionRequired && !session->activated) {
  467. UA_LOG_WARNING_SESSION(server->config.logger, session,
  468. "Calling service %i on a non-activated session",
  469. requestType->binaryEncodingId);
  470. UA_SessionManager_removeSession(&server->sessionManager,
  471. &session->header.authenticationToken);
  472. UA_deleteMembers(request, requestType);
  473. return sendServiceFault(channel, msg, requestPos, responseType,
  474. requestId, UA_STATUSCODE_BADSESSIONNOTACTIVATED);
  475. }
  476. /* The session is bound to another channel */
  477. if(session != &anonymousSession && session->header.channel != channel) {
  478. UA_LOG_WARNING_CHANNEL(server->config.logger, channel,
  479. "Client tries to use a Session that is not "
  480. "bound to this SecureChannel");
  481. UA_deleteMembers(request, requestType);
  482. return sendServiceFault(channel, msg, requestPos, responseType,
  483. requestId, UA_STATUSCODE_BADSESSIONNOTACTIVATED);
  484. }
  485. /* Update the session lifetime */
  486. UA_Session_updateLifetime(session);
  487. #ifdef UA_ENABLE_SUBSCRIPTIONS
  488. /* The publish request is not answered immediately */
  489. if(requestType == &UA_TYPES[UA_TYPES_PUBLISHREQUEST]) {
  490. Service_Publish(server, session,
  491. (const UA_PublishRequest*)request, requestId);
  492. UA_deleteMembers(request, requestType);
  493. return UA_STATUSCODE_GOOD;
  494. }
  495. #endif
  496. send_response:
  497. /* Prepare the ResponseHeader */
  498. ((UA_ResponseHeader*)response)->requestHandle = requestHeader->requestHandle;
  499. ((UA_ResponseHeader*)response)->timestamp = UA_DateTime_now();
  500. /* Start the message */
  501. UA_NodeId typeId = UA_NODEID_NUMERIC(0, responseType->binaryEncodingId);
  502. UA_MessageContext mc;
  503. retval = UA_MessageContext_begin(&mc, channel, requestId, UA_MESSAGETYPE_MSG);
  504. if(retval != UA_STATUSCODE_GOOD)
  505. goto cleanup;
  506. /* Assert's required for clang-analyzer */
  507. UA_assert(mc.buf_pos == &mc.messageBuffer.data[UA_SECURE_MESSAGE_HEADER_LENGTH]);
  508. UA_assert(mc.buf_end <= &mc.messageBuffer.data[mc.messageBuffer.length]);
  509. retval = UA_MessageContext_encode(&mc, &typeId, &UA_TYPES[UA_TYPES_NODEID]);
  510. if(retval != UA_STATUSCODE_GOOD)
  511. goto cleanup;
  512. switch(serviceType) {
  513. case UA_SERVICETYPE_CUSTOM:
  514. /* Was processed before...*/
  515. retval = UA_MessageContext_encode(&mc, response, responseType);
  516. break;
  517. case UA_SERVICETYPE_INSITU:
  518. retval = serviceInsitu
  519. (server, session, &mc, request, (UA_ResponseHeader*)response);
  520. break;
  521. case UA_SERVICETYPE_NORMAL:
  522. default:
  523. service(server, session, request, response);
  524. retval = UA_MessageContext_encode(&mc, response, responseType);
  525. break;
  526. }
  527. /* Finish sending the message */
  528. if(retval != UA_STATUSCODE_GOOD) {
  529. UA_MessageContext_abort(&mc);
  530. goto cleanup;
  531. }
  532. retval = UA_MessageContext_finish(&mc);
  533. cleanup:
  534. if(retval != UA_STATUSCODE_GOOD)
  535. UA_LOG_INFO_CHANNEL(server->config.logger, channel,
  536. "Could not send the message over the SecureChannel "
  537. "with StatusCode %s", UA_StatusCode_name(retval));
  538. /* Clean up */
  539. UA_deleteMembers(request, requestType);
  540. UA_deleteMembers(response, responseType);
  541. return retval;
  542. }
  543. /* Takes decoded messages starting at the nodeid of the content type. */
  544. static UA_StatusCode
  545. processSecureChannelMessage(void *application, UA_SecureChannel *channel,
  546. UA_MessageType messagetype, UA_UInt32 requestId,
  547. const UA_ByteString *message) {
  548. UA_Server *server = (UA_Server*)application;
  549. UA_StatusCode retval = UA_STATUSCODE_GOOD;
  550. switch(messagetype) {
  551. case UA_MESSAGETYPE_OPN:
  552. UA_LOG_TRACE_CHANNEL(server->config.logger, channel,
  553. "Process an OPN on an open channel");
  554. retval = processOPN(server, channel, requestId, message);
  555. break;
  556. case UA_MESSAGETYPE_MSG:
  557. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Process a MSG");
  558. retval = processMSG(server, channel, requestId, message);
  559. break;
  560. case UA_MESSAGETYPE_CLO:
  561. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Process a CLO");
  562. Service_CloseSecureChannel(server, channel);
  563. break;
  564. default:
  565. UA_LOG_TRACE_CHANNEL(server->config.logger, channel, "Invalid message type");
  566. retval = UA_STATUSCODE_BADTCPMESSAGETYPEINVALID;
  567. break;
  568. }
  569. return retval;
  570. }
  571. static UA_StatusCode
  572. createSecureChannel(void *application, UA_Connection *connection,
  573. UA_AsymmetricAlgorithmSecurityHeader *asymHeader) {
  574. UA_Server *server = (UA_Server*)application;
  575. /* Iterate over available endpoints and choose the correct one */
  576. UA_Endpoint *endpoint = NULL;
  577. UA_StatusCode retval = UA_STATUSCODE_GOOD;
  578. for(size_t i = 0; i < server->config.endpointsSize; ++i) {
  579. UA_Endpoint *endpointCandidate = &server->config.endpoints[i];
  580. if(!UA_ByteString_equal(&asymHeader->securityPolicyUri,
  581. &endpointCandidate->securityPolicy.policyUri))
  582. continue;
  583. retval = endpointCandidate->securityPolicy.asymmetricModule.
  584. compareCertificateThumbprint(&endpointCandidate->securityPolicy,
  585. &asymHeader->receiverCertificateThumbprint);
  586. if(retval != UA_STATUSCODE_GOOD)
  587. continue;
  588. /* We found the correct endpoint (except for security mode) The endpoint
  589. * needs to be changed by the client / server to match the security
  590. * mode. The server does this in the securechannel manager */
  591. endpoint = endpointCandidate;
  592. break;
  593. }
  594. if(!endpoint)
  595. return UA_STATUSCODE_BADSECURITYPOLICYREJECTED;
  596. /* Create a new channel */
  597. return UA_SecureChannelManager_create(&server->secureChannelManager, connection,
  598. &endpoint->securityPolicy, asymHeader);
  599. }
  600. static UA_StatusCode
  601. processCompleteChunkWithoutChannel(UA_Server *server, UA_Connection *connection,
  602. UA_ByteString *message) {
  603. /* Process chunk without a channel; must be OPN */
  604. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  605. "Connection %i | No channel attached to the connection. "
  606. "Process the chunk directly", connection->sockfd);
  607. size_t offset = 0;
  608. UA_TcpMessageHeader tcpMessageHeader;
  609. UA_StatusCode retval =
  610. UA_TcpMessageHeader_decodeBinary(message, &offset, &tcpMessageHeader);
  611. if(retval != UA_STATUSCODE_GOOD)
  612. return retval;
  613. // Only HEL and OPN messages possible without a channel (on the server side)
  614. switch(tcpMessageHeader.messageTypeAndChunkType & 0x00ffffff) {
  615. case UA_MESSAGETYPE_HEL:
  616. retval = processHEL(server, connection, message, &offset);
  617. break;
  618. case UA_MESSAGETYPE_OPN:
  619. {
  620. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  621. "Connection %i | Process OPN message", connection->sockfd);
  622. /* Called before HEL */
  623. if(connection->state != UA_CONNECTION_ESTABLISHED) {
  624. retval = UA_STATUSCODE_BADCOMMUNICATIONERROR;
  625. break;
  626. }
  627. // Decode the asymmetric algorithm security header since it is not encrypted and
  628. // needed to decide what security policy to use.
  629. UA_AsymmetricAlgorithmSecurityHeader asymHeader;
  630. UA_AsymmetricAlgorithmSecurityHeader_init(&asymHeader);
  631. size_t messageHeaderOffset = UA_SECURE_CONVERSATION_MESSAGE_HEADER_LENGTH;
  632. retval = UA_AsymmetricAlgorithmSecurityHeader_decodeBinary(message,
  633. &messageHeaderOffset,
  634. &asymHeader);
  635. if(retval != UA_STATUSCODE_GOOD)
  636. break;
  637. retval = createSecureChannel(server, connection, &asymHeader);
  638. UA_AsymmetricAlgorithmSecurityHeader_deleteMembers(&asymHeader);
  639. if(retval != UA_STATUSCODE_GOOD)
  640. break;
  641. retval = UA_SecureChannel_processChunk(connection->channel, message,
  642. processSecureChannelMessage,
  643. server);
  644. if(retval != UA_STATUSCODE_GOOD)
  645. break;
  646. break;
  647. }
  648. default:
  649. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  650. "Connection %i | Expected OPN or HEL message on a connection "
  651. "without a SecureChannel", connection->sockfd);
  652. retval = UA_STATUSCODE_BADTCPMESSAGETYPEINVALID;
  653. break;
  654. }
  655. return retval;
  656. }
  657. static UA_StatusCode
  658. processCompleteChunk(void *const application,
  659. UA_Connection *const connection,
  660. UA_ByteString *const chunk) {
  661. UA_Server *const server = (UA_Server*)application;
  662. #ifdef UA_DEBUG_DUMP_PKGS_FILE
  663. UA_debug_dumpCompleteChunk(server, connection, chunk);
  664. #endif
  665. if(!connection->channel)
  666. return processCompleteChunkWithoutChannel(server, connection, chunk);
  667. return UA_SecureChannel_processChunk(connection->channel, chunk,
  668. processSecureChannelMessage,
  669. server);
  670. }
  671. static void
  672. processBinaryMessage(UA_Server *server, UA_Connection *connection,
  673. UA_ByteString *message) {
  674. UA_LOG_TRACE(server->config.logger, UA_LOGCATEGORY_NETWORK,
  675. "Connection %i | Received a packet.", connection->sockfd);
  676. #ifdef UA_DEBUG_DUMP_PKGS
  677. UA_dump_hex_pkg(message->data, message->length);
  678. #endif
  679. UA_StatusCode retval = UA_Connection_processChunks(connection, server,
  680. processCompleteChunk, message);
  681. if(retval != UA_STATUSCODE_GOOD) {
  682. UA_LOG_INFO(server->config.logger, UA_LOGCATEGORY_NETWORK,
  683. "Connection %i | Processing the message failed with "
  684. "error %s", connection->sockfd, UA_StatusCode_name(retval));
  685. /* Send an ERR message and close the connection */
  686. UA_TcpErrorMessage error;
  687. error.error = retval;
  688. error.reason = UA_STRING_NULL;
  689. UA_Connection_sendError(connection, &error);
  690. connection->close(connection);
  691. }
  692. }
  693. #ifndef UA_ENABLE_MULTITHREADING
  694. void
  695. UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection,
  696. UA_ByteString *message) {
  697. processBinaryMessage(server, connection, message);
  698. }
  699. #else
  700. typedef struct {
  701. UA_Connection *connection;
  702. UA_ByteString message;
  703. } ConnectionMessage;
  704. static void
  705. workerProcessBinaryMessage(UA_Server *server, ConnectionMessage *cm) {
  706. processBinaryMessage(server, cm->connection, &cm->message);
  707. UA_free(cm);
  708. }
  709. void
  710. UA_Server_processBinaryMessage(UA_Server *server, UA_Connection *connection,
  711. UA_ByteString *message) {
  712. /* Allocate the memory for the callback data */
  713. ConnectionMessage *cm = (ConnectionMessage*)UA_malloc(sizeof(ConnectionMessage));
  714. /* If malloc failed, execute immediately */
  715. if(!cm) {
  716. processBinaryMessage(server, connection, message);
  717. return;
  718. }
  719. /* Dispatch to the workers */
  720. cm->connection = connection;
  721. cm->message = *message;
  722. UA_Server_workerCallback(server, (UA_ServerCallback)workerProcessBinaryMessage, cm);
  723. }
  724. static void
  725. deleteConnectionTrampoline(UA_Server *server, void *data) {
  726. UA_Connection *connection = (UA_Connection*)data;
  727. connection->free(connection);
  728. }
  729. #endif
  730. void
  731. UA_Server_removeConnection(UA_Server *server, UA_Connection *connection) {
  732. UA_Connection_detachSecureChannel(connection);
  733. #ifndef UA_ENABLE_MULTITHREADING
  734. connection->free(connection);
  735. #else
  736. UA_Server_delayedCallback(server, deleteConnectionTrampoline, connection);
  737. #endif
  738. }