ua_services_session.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280
  1. /* This Source Code Form is subject to the terms of the Mozilla Public
  2. * License, v. 2.0. If a copy of the MPL was not distributed with this
  3. * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
  4. #include "ua_services.h"
  5. #include "ua_server_internal.h"
  6. #include "ua_session_manager.h"
  7. #include "ua_types_generated_handling.h"
  8. /* Create a signed nonce */
  9. static UA_StatusCode
  10. nonceAndSignCreateSessionResponse(UA_Server *server, UA_SecureChannel *channel,
  11. UA_Session *session,
  12. const UA_CreateSessionRequest *request,
  13. UA_CreateSessionResponse *response) {
  14. if(channel->securityMode != UA_MESSAGESECURITYMODE_SIGN &&
  15. channel->securityMode != UA_MESSAGESECURITYMODE_SIGNANDENCRYPT)
  16. return UA_STATUSCODE_GOOD;
  17. const UA_SecurityPolicy *const securityPolicy = channel->securityPolicy;
  18. UA_SignatureData *signatureData = &response->serverSignature;
  19. /* Generate Nonce
  20. * FIXME: remove magic number??? */
  21. UA_StatusCode retval = UA_SecureChannel_generateNonce(channel, 32, &response->serverNonce);
  22. retval |= UA_ByteString_copy(&response->serverNonce, &session->serverNonce);
  23. if(retval != UA_STATUSCODE_GOOD) {
  24. UA_SessionManager_removeSession(&server->sessionManager, &session->authenticationToken);
  25. return retval;
  26. }
  27. size_t signatureSize = securityPolicy->asymmetricModule.cryptoModule.
  28. getLocalSignatureSize(securityPolicy, channel->channelContext);
  29. retval |= UA_ByteString_allocBuffer(&signatureData->signature, signatureSize);
  30. if(retval != UA_STATUSCODE_GOOD) {
  31. UA_SessionManager_removeSession(&server->sessionManager, &session->authenticationToken);
  32. return retval;
  33. }
  34. UA_ByteString dataToSign;
  35. retval |= UA_ByteString_allocBuffer(&dataToSign,
  36. request->clientCertificate.length +
  37. request->clientNonce.length);
  38. if(retval != UA_STATUSCODE_GOOD) {
  39. UA_SignatureData_deleteMembers(signatureData);
  40. UA_SessionManager_removeSession(&server->sessionManager, &session->authenticationToken);
  41. return retval;
  42. }
  43. memcpy(dataToSign.data, request->clientCertificate.data, request->clientCertificate.length);
  44. memcpy(dataToSign.data + request->clientCertificate.length,
  45. request->clientNonce.data, request->clientNonce.length);
  46. retval |= UA_String_copy(&securityPolicy->asymmetricModule.cryptoModule.
  47. signatureAlgorithmUri, &signatureData->algorithm);
  48. retval |= securityPolicy->asymmetricModule.cryptoModule.
  49. sign(securityPolicy, channel->channelContext, &dataToSign, &signatureData->signature);
  50. UA_ByteString_deleteMembers(&dataToSign);
  51. if(retval != UA_STATUSCODE_GOOD) {
  52. UA_SignatureData_deleteMembers(signatureData);
  53. UA_SessionManager_removeSession(&server->sessionManager, &session->authenticationToken);
  54. }
  55. return retval;
  56. }
  57. void Service_CreateSession(UA_Server *server, UA_SecureChannel *channel,
  58. const UA_CreateSessionRequest *request,
  59. UA_CreateSessionResponse *response) {
  60. if(channel == NULL) {
  61. response->responseHeader.serviceResult = UA_STATUSCODE_BADINTERNALERROR;
  62. return;
  63. }
  64. if(channel->connection == NULL) {
  65. response->responseHeader.serviceResult = UA_STATUSCODE_BADINTERNALERROR;
  66. return;
  67. }
  68. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel, "Trying to create session");
  69. if(channel->securityMode == UA_MESSAGESECURITYMODE_SIGN ||
  70. channel->securityMode == UA_MESSAGESECURITYMODE_SIGNANDENCRYPT) {
  71. if(!UA_ByteString_equal(&request->clientCertificate,
  72. &channel->remoteCertificate)) {
  73. response->responseHeader.serviceResult = UA_STATUSCODE_BADCERTIFICATEINVALID;
  74. return;
  75. }
  76. }
  77. if(channel->securityToken.channelId == 0) {
  78. response->responseHeader.serviceResult =
  79. UA_STATUSCODE_BADSECURECHANNELIDINVALID;
  80. return;
  81. }
  82. if(!UA_ByteString_equal(&channel->securityPolicy->policyUri,
  83. &UA_SECURITY_POLICY_NONE_URI) &&
  84. request->clientNonce.length < 32) {
  85. response->responseHeader.serviceResult = UA_STATUSCODE_BADNONCEINVALID;
  86. return;
  87. }
  88. ////////////////////// TODO: Compare application URI with certificate uri (decode certificate)
  89. /* Allocate the response */
  90. response->serverEndpoints = (UA_EndpointDescription*)
  91. UA_Array_new(server->config.endpointsSize,
  92. &UA_TYPES[UA_TYPES_ENDPOINTDESCRIPTION]);
  93. if(!response->serverEndpoints) {
  94. response->responseHeader.serviceResult = UA_STATUSCODE_BADOUTOFMEMORY;
  95. return;
  96. }
  97. response->serverEndpointsSize = server->config.endpointsSize;
  98. /* Copy the server's endpointdescriptions into the response */
  99. for(size_t i = 0; i < server->config.endpointsSize; ++i)
  100. response->responseHeader.serviceResult |=
  101. UA_EndpointDescription_copy(&server->config.endpoints[0].endpointDescription,
  102. &response->serverEndpoints[i]);
  103. if(response->responseHeader.serviceResult != UA_STATUSCODE_GOOD)
  104. return;
  105. /* Mirror back the endpointUrl */
  106. for(size_t i = 0; i < response->serverEndpointsSize; ++i) {
  107. UA_String_deleteMembers(&response->serverEndpoints[i].endpointUrl);
  108. UA_String_copy(&request->endpointUrl,
  109. &response->serverEndpoints[i].endpointUrl);
  110. }
  111. UA_Session *newSession;
  112. response->responseHeader.serviceResult =
  113. UA_SessionManager_createSession(&server->sessionManager,
  114. channel, request, &newSession);
  115. if(response->responseHeader.serviceResult != UA_STATUSCODE_GOOD) {
  116. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  117. "Processing CreateSessionRequest failed");
  118. return;
  119. }
  120. /* Fill the session with more information */
  121. newSession->maxResponseMessageSize = request->maxResponseMessageSize;
  122. newSession->maxRequestMessageSize =
  123. channel->connection->localConf.maxMessageSize;
  124. response->responseHeader.serviceResult |=
  125. UA_ApplicationDescription_copy(&request->clientDescription,
  126. &newSession->clientDescription);
  127. /* Prepare the response */
  128. response->sessionId = newSession->sessionId;
  129. response->revisedSessionTimeout = (UA_Double)newSession->timeout;
  130. response->authenticationToken = newSession->authenticationToken;
  131. response->responseHeader.serviceResult =
  132. UA_String_copy(&request->sessionName, &newSession->sessionName);
  133. if(server->config.endpointsSize > 0)
  134. response->responseHeader.serviceResult |=
  135. UA_ByteString_copy(&channel->securityPolicy->localCertificate,
  136. &response->serverCertificate);
  137. /* Create a signed nonce */
  138. response->responseHeader.serviceResult =
  139. nonceAndSignCreateSessionResponse(server, channel, newSession, request, response);
  140. /* Failure -> remove the session */
  141. if(response->responseHeader.serviceResult != UA_STATUSCODE_GOOD) {
  142. UA_SessionManager_removeSession(&server->sessionManager, &newSession->authenticationToken);
  143. return;
  144. }
  145. UA_LOG_DEBUG_CHANNEL(server->config.logger, channel,
  146. "Session " UA_PRINTF_GUID_FORMAT " created",
  147. UA_PRINTF_GUID_DATA(newSession->sessionId.identifier.guid));
  148. }
  149. static void
  150. checkSignature(const UA_Server *server,
  151. const UA_SecureChannel *channel,
  152. UA_Session *session,
  153. const UA_ActivateSessionRequest *request,
  154. UA_ActivateSessionResponse *response) {
  155. if(channel->securityMode == UA_MESSAGESECURITYMODE_SIGN ||
  156. channel->securityMode == UA_MESSAGESECURITYMODE_SIGNANDENCRYPT) {
  157. const UA_SecurityPolicy *const securityPolicy = channel->securityPolicy;
  158. const UA_ByteString *const localCertificate = &securityPolicy->localCertificate;
  159. UA_ByteString dataToVerify;
  160. UA_StatusCode retval = UA_ByteString_allocBuffer(&dataToVerify,
  161. localCertificate->length + session->serverNonce.length);
  162. if(retval != UA_STATUSCODE_GOOD) {
  163. response->responseHeader.serviceResult = retval;
  164. UA_LOG_DEBUG_SESSION(server->config.logger, session,
  165. "Failed to allocate buffer for signature verification! %#10x", retval);
  166. return;
  167. }
  168. memcpy(dataToVerify.data, localCertificate->data, localCertificate->length);
  169. memcpy(dataToVerify.data + localCertificate->length,
  170. session->serverNonce.data, session->serverNonce.length);
  171. retval = securityPolicy->asymmetricModule.cryptoModule.
  172. verify(securityPolicy, channel->channelContext, &dataToVerify,
  173. &request->clientSignature.signature);
  174. if(retval != UA_STATUSCODE_GOOD) {
  175. response->responseHeader.serviceResult = retval;
  176. UA_LOG_DEBUG_SESSION(server->config.logger, session,
  177. "Failed to verify the client signature! %#10x", retval);
  178. UA_ByteString_deleteMembers(&dataToVerify);
  179. return;
  180. }
  181. retval = UA_SecureChannel_generateNonce(channel, 32, &response->serverNonce);
  182. retval |= UA_ByteString_copy(&response->serverNonce, &session->serverNonce);
  183. if(retval != UA_STATUSCODE_GOOD) {
  184. response->responseHeader.serviceResult = retval;
  185. UA_LOG_DEBUG_SESSION(server->config.logger, session,
  186. "Failed to generate a new nonce! %#10x", retval);
  187. UA_ByteString_deleteMembers(&dataToVerify);
  188. return;
  189. }
  190. UA_ByteString_deleteMembers(&dataToVerify);
  191. }
  192. }
  193. void
  194. Service_ActivateSession(UA_Server *server, UA_SecureChannel *channel,
  195. UA_Session *session, const UA_ActivateSessionRequest *request,
  196. UA_ActivateSessionResponse *response) {
  197. if(session->validTill < UA_DateTime_nowMonotonic()) {
  198. UA_LOG_INFO_SESSION(server->config.logger, session,
  199. "ActivateSession: SecureChannel %i wants "
  200. "to activate, but the session has timed out",
  201. channel->securityToken.channelId);
  202. response->responseHeader.serviceResult =
  203. UA_STATUSCODE_BADSESSIONIDINVALID;
  204. return;
  205. }
  206. checkSignature(server, channel, session, request, response);
  207. if(response->responseHeader.serviceResult != UA_STATUSCODE_GOOD)
  208. return;
  209. /* Callback into userland access control */
  210. response->responseHeader.serviceResult =
  211. server->config.accessControl.activateSession(&session->sessionId,
  212. &request->userIdentityToken,
  213. &session->sessionHandle);
  214. if(response->responseHeader.serviceResult != UA_STATUSCODE_GOOD)
  215. return;
  216. /* Detach the old SecureChannel */
  217. if(session->channel && session->channel != channel) {
  218. UA_LOG_INFO_SESSION(server->config.logger, session,
  219. "ActivateSession: Detach from old channel");
  220. UA_SecureChannel_detachSession(session->channel, session);
  221. }
  222. /* Attach to the SecureChannel and activate */
  223. UA_SecureChannel_attachSession(channel, session);
  224. session->activated = true;
  225. UA_Session_updateLifetime(session);
  226. UA_LOG_INFO_SESSION(server->config.logger, session,
  227. "ActivateSession: Session activated");
  228. }
  229. void
  230. Service_CloseSession(UA_Server *server, UA_Session *session,
  231. const UA_CloseSessionRequest *request,
  232. UA_CloseSessionResponse *response) {
  233. UA_LOG_INFO_SESSION(server->config.logger, session, "CloseSession");
  234. /* Callback into userland access control */
  235. server->config.accessControl.closeSession(&session->sessionId,
  236. session->sessionHandle);
  237. response->responseHeader.serviceResult =
  238. UA_SessionManager_removeSession(&server->sessionManager,
  239. &session->authenticationToken);
  240. }