I am using both OC_NONSECURE and OC_SECURE flags when registering the
resources and attempting a GET request with the OcResource I get from the
OnResourceFound callback. Odd, isn't it?

Thank you,
A. Lapprand

Em dom, 24 de dez de 2017 às 23:46, Tonny Tzeng <tonny.tz...@gmail.com>
escreveu:

> What flags did you pass to the registerResource() function? note that if
> you want to communicate over non-secure endpoint, you need to pass
> OC_NONSECURE flag explicitly while registering the resource. The
> simpleserver server doesn't work in non-secure mode for the same reason, no
> passing OC_SECURE flag doesn't imply the use of non-secured endpoint. Hope
> this helps.
>
> Regards,
> Tonny
>
> On 25 December 2017 at 10:09, Arthur Barros Lapprand <a...@cin.ufpe.br>
> wrote:
>
>> Hi all,
>>
>> I got to test the ACLs Rami provided while changing the server json by
>> adding these ACEs:
>>
>> {
>>     "aceid": 6,
>>     "subject": {"conntype": "anon-clear"},
>>     "resources":[
>>         { "href":"*"}
>>     ],
>>     "permission": 14
>> },
>> {
>>     "aceid": 7,
>>     "subject": {"conntype": "auth-crypt"},
>>     "resources":[
>>         { "href":"*"}
>>     ],
>>     "permission": 14
>> }
>>
>> So in theory I guess my server should respond to any request. Sadly that 
>> didn't
>> work so now I'm somewhat confused. I noticed the UNAUTHORIZED_REQ message
>>  is sent to the client by a COAP host (not COAPS). Maybe I'm compiling 
>> IoTivity
>>  with the wrong scons settings? Also, how do I know my client is using 
>> COAPS? I've
>> seen someone asking this recently but I don't remember where. Is it also 
>> obligatory
>> for me to do the pairing/onboarding/credentials stuff aside setting them 
>> through the json?
>>
>> Thank you,
>>
>> A. Lapprand
>>
>>
>> Em qui, 21 de dez de 2017 às 15:11, Rami Alshafi <ralsh...@vtmgroup.com>
>> escreveu:
>>
>>> That’s a mistake! Thanks for pointing that out! I will fix it. The “1”
>>> at the beginning should not be there J
>>>
>>> Thanks,
>>>
>>> -Rami
>>>
>>>
>>>
>>> *From:* Arthur Barros Lapprand [mailto:a...@cin.ufpe.br]
>>> *Sent:* Thursday, December 21, 2017 8:02 AM
>>> *To:* Rami Alshafi <ralsh...@vtmgroup.com>
>>> *Subject:* Re: FW: [dev] Android SECURED mode
>>>
>>>
>>>
>>> Hi,
>>>
>>> I just noticed the sample you linked has "rowneruuid":
>>> "132323232-3232-3232-3232-323232323232" in the pstat section. Is there an
>>> explanation to that "1" at the beginning of the id? shouldn't it be the
>>> same as the client's id?
>>>
>>> Thanks again,
>>>
>>> A. Lapprand
>>>
>>>
>>>
>>> Em qui, 21 de dez de 2017 às 10:18, Arthur Barros Lapprand <
>>> a...@cin.ufpe.br> escreveu:
>>>
>>> Hi Rami,
>>>
>>> Sorry for the delayed answer. I'm pretty overcrumbed these days so I
>>> can't test it right now, but the email was very useful! Like I said to the
>>> others I'll give feedback once I manage to test those suggestions.
>>>
>>> Thank you,
>>>
>>> A. Lapprand
>>>
>>>
>>>
>>> Em ter, 19 de dez de 2017 às 15:42, Rami Alshafi <ralsh...@vtmgroup.com>
>>> escreveu:
>>>
>>> Arthur,
>>>
>>> I meant to send this e-mail to you but I just learned it did not make to
>>> you. Hopefully, this one will.
>>>
>>> Thanks,
>>>
>>> -Rami
>>>
>>>
>>>
>>> *From:* Wouter van der Beek (wovander) [mailto:wovan...@cisco.com]
>>> *Sent:* Tuesday, December 19, 2017 5:22 AM
>>> *To:* Rami Alshafi <ralsh...@vtmgroup.com>
>>> *Subject:* RE: [dev] Android SECURED mode
>>>
>>>
>>>
>>> This is email is now on the dmtools reflector and not on the iotivity
>>> reflector..
>>>
>>> Hence Arthur can’t see this email
>>>
>>>
>>>
>>> *From:* Rami Alshafi [mailto:ralsh...@vtmgroup.com
>>> <ralsh...@vtmgroup.com>]
>>> *Sent:* 18 December 2017 18:43
>>> *To:* Wouter van der Beek (wovander) <wovan...@cisco.com>;
>>> dmtools...@members.openconnectivity.org
>>> *Subject:* RE: [dev] Android SECURED mode
>>>
>>>
>>>
>>> Arthur,
>>>
>>> Please reference my sample applications at
>>> https://gerrit.iotivity.org/gerrit/#/c/22513/
>>> <https://urlf.duocircle.io/?url=https%3A%2F%2Fgerrit.iotivity.org%2Fgerrit%2F%23%2Fc%2F22513%2F&id=31d5&rcpt=ralsh...@vtmgroup.com&tss=1513689724&msgid=99c3285a-e4bf-11e7-8fcd-5f906d21262c&html=1&h=b068c5c2>
>>>
>>> For convenience, I will explain the server’s SVR database.
>>>
>>> There are 4 main sections which are ACL, Pstat, Doxm and Cred.
>>>
>>> Assuming your client cannot onboard devices, the server\device needs to
>>> be in RFNOP state which is reflected in the following settings.
>>>
>>> The ACL must have an ACE giving the client the right permissions
>>>
>>>                 Aceid: whatever number
>>>
>>>                 Subject: set it to {“uuid”: The uuid of the client}
>>>
>>>                 Resources: information of the resource like its href and
>>> interface and resource type.
>>>
>>>                 Permission: this is bitmask
>>>
>>> Set the rowneruuid of the ACL to the uuid of the client
>>>
>>> In the pstat section, set the dos.s to 3 and isop to true and cm to 0
>>> and the rowneruuid to the uuid of the client
>>>
>>> In the doxm section, set the owned flag to true and the devowneruuid and
>>> rowneruuid to the uuid of the client.
>>>
>>> Assuming you want to use the “justworks” security model, set the cred
>>> section like in the sample applications.
>>>
>>> Thanks,
>>>
>>> -Rami
>>>
>>>
>>>
>>> *From:* dmtools...@members.openconnectivity.org [
>>> mailto:dmtools...@members.openconnectivity.org
>>> <dmtools...@members.openconnectivity.org>] *On Behalf Of *Wouter van
>>> der Beek (wovander)
>>> *Sent:* Monday, December 18, 2017 2:38 AM
>>> *To:* dmtools...@members.openconnectivity.org
>>> *Subject:* [OCF dmtools_tg] FW: [dev] Android SECURED mode
>>>
>>>
>>>
>>> FYI
>>>
>>>
>>>
>>> *From:* iotivity-dev-boun...@lists.iotivity.org [
>>> mailto:iotivity-dev-boun...@lists.iotivity.org
>>> <iotivity-dev-boun...@lists.iotivity.org>] *On Behalf Of *Tonny Tzeng
>>> *Sent:* 17 December 2017 08:16
>>> *To:* Max Kholmyansky <max...@gmail.com>
>>> *Cc:* iotivity <iotivity-dev@lists.iotivity.org>
>>>
>>>
>>> *Subject:* Re: [dev] Android SECURED mode
>>>
>>>
>>>
>>> Hi,
>>>
>>>
>>>
>>> We just posted an article at 01.org
>>> <https://urlf.duocircle.io/?url=https%3A%2F%2F01.org%2Fblogs%2Fttzeng%2F2017%2Fsecurely-accessing-iot-devices-based-javascript&id=31d5&rcpt=ralsh...@vtmgroup.com&tss=1513593475&msgid=8131ebd8-e3df-11e7-8fcd-5f906d21262c&html=1&h=7e525f59>
>>>  talking
>>> few security concept in IoTivity. Though we were using iotivity-node as an
>>> example, I think the following steps would get your Client accesses to the
>>> Server securely:
>>>
>>> (1) your Server need to register the resource with
>>> ResourceProperty.SECURE flag in order to use the secured endpoint;
>>>
>>> (2) allow the "auth-crypt" connection requests in the SVD dB;
>>>
>>> (3) use an Onboarding Tool to establish ownership with both the Client
>>> and the Server;
>>>
>>> (4) mutual install the credentials of each other by pairing the devices
>>> with the OBT
>>>
>>>
>>>
>>> Regards,
>>>
>>> Tonny
>>>
>>>
>>>
>>> On 17 December 2017 at 14:38, Max Kholmyansky <max...@gmail.com> wrote:
>>>
>>> Hi Arthur,
>>>
>>>
>>>
>>> You should be able to communicate between the client and the server on
>>> Android, using SECURED=1 library.
>>>
>>>
>>>
>>> First, to set your "di" (client or server) - you need to specify the
>>> "di" value inside the DAT file (containing security information) - you can
>>> look at the samples. I never succeeded with setting the "di" using API, and
>>> I don't know if it's supported.
>>>
>>>
>>>
>>> Second, even using SECURED=1, in the server, you can allow any client
>>> (even not authenticated) to access any resource.
>>>
>>> The relevant ACL entry looks like: (you may need to change the "aceid"):
>>>
>>> {
>>>
>>>     *"aceid"*: 5,
>>>     *"subject"*: { *"conntype"*: *"anon-clear" *},
>>>     *"resources"*: [
>>>         { *"href"*: *"*" *}
>>>     ],
>>>     *"permission"*: 14
>>> }
>>>
>>> This is definitely not the way to configure it in production, but it should 
>>> allow you to keep developing, without caring about access permissions for a 
>>> while.
>>>
>>>
>>>
>>> Max
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> On Thu, Dec 14, 2017 at 8:54 PM, Arthur Barros Lapprand <
>>> a...@cin.ufpe.br> wrote:
>>>
>>> Hi all,
>>>
>>> I have a few beginner-leveled questions about secure mode in Android.
>>> Let me explain the situation:
>>>
>>> I have created two apps (one for Server/Controlee and the other for the
>>> Client/Controller) and I'm able to FIND and GET/POST/OBSERVE them without
>>> problems. As this is a simple example, I now want to do the same things but
>>> with SECURED=1. I should note that I am usually running both apps in the
>>> same device (not the emulator, but my cellphone).
>>>
>>> So I started looking everywhere and discovered I could do this with a
>>> local ACL and supposedly everything would be ok. Turns out it didn't, which
>>> is why I am here. So my questions are:
>>>
>>> - Do I need anything else to use the SECURED flag in Android apart from
>>> registering resource as secure and passing the ACL to the PlatformConfig
>>> and configure it?
>>>
>>> - I read that when configuring the Platform with an ACL the DeviceID
>>> should be set with the ID inside it. So as it failed I tried debugging the
>>> ID, which led me to confusion about PlatformID and DeviceID. When loading
>>> the ACL the DeviceID comes as a random byte[]. However, I can set the
>>> DeviceID in the code and retrieve it just fine. The thing is, the ID
>>> recieved by the Client (ServerID) isn't the same I set in the code. I'm not
>>> sure if it's something about the encoding tricking me or if it's something
>>> else. Can someone please shed me some light?
>>>
>>>
>>>
>>> In short, the Client can find the resources (they are registered with
>>> SECURE type) but can't make a correct GET/POST/OBSERVE request, returning
>>> UNAUTHORIZED_REQ. Any tips about this flag and Android are welcome.
>>>
>>> Sorry for the long post, thank you in advance!
>>>
>>>
>>>
>>> _______________________________________________
>>> iotivity-dev mailing list
>>> iotivity-dev@lists.iotivity.org
>>> https://lists.iotivity.org/mailman/listinfo/iotivity-dev
>>> <https://urlf.duocircle.io/?url=https%3A%2F%2Flists.iotivity.org%2Fmailman%2Flistinfo%2Fiotivity-dev&id=31d5&rcpt=ralsh...@vtmgroup.com&tss=1513593475&msgid=8131ebd8-e3df-11e7-8fcd-5f906d21262c&html=1&h=0ab5454f>
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> iotivity-dev mailing list
>>> iotivity-dev@lists.iotivity.org
>>> https://lists.iotivity.org/mailman/listinfo/iotivity-dev
>>> <https://urlf.duocircle.io/?url=https%3A%2F%2Flists.iotivity.org%2Fmailman%2Flistinfo%2Fiotivity-dev&id=31d5&rcpt=ralsh...@vtmgroup.com&tss=1513593475&msgid=8131ebd8-e3df-11e7-8fcd-5f906d21262c&html=1&h=0ab5454f>
>>>
>>>
>>>
>>>
>
_______________________________________________
iotivity-dev mailing list
iotivity-dev@lists.iotivity.org
https://lists.iotivity.org/mailman/listinfo/iotivity-dev

Reply via email to