Hi Steve,

It’s possible that the wildcard changes caused this to (correctly, I’m afraid!) 
quit working.  If you send me a log file from the Server, with some idea of 
where the “CA_UNAUTHORIZED” happens (e.g. “on the 2nd GET to the /csr Resource, 
it fails”) I can verify whether the access control layer is rejecting the 
request based on no matching ACE in the /acl2.

Or, a quicker black box test would be to try adding an explicit /acl2 entry for 
the /csr (or whichever SVR you’re accessing), since “*” no longer applies to 
SVRs… the provisioningclient shouldn’t have been depending on that “*” access 
but maybe it is after onboarding is done and it closes the OBT session (and 
loses “OTM session access”).  E.g. instead of:

{
                "aceid": 3,
                "subject": { "uuid": "10101010-1010-1010-1010-101010101010" }, 
// where this is the UUID of the provisioningclient, say
                "resources": [{ "wc": "*" }],
                "permission": 15
            },


Add

{
                "aceid": 3,
                "subject": { "uuid": "10101010-1010-1010-1010-101010101010" },
                "resources": [
                   { "href": "/oic/sec/acl2" },
                    { "href": "/oic/sec/cred" },
                    { "href": "/oic/sec/doxm",
                    { "href": "/oic/sec/pstat" } //etc
                ],
                "permission": 15
            },



From: iotivity-dev-boun...@lists.iotivity.org 
[mailto:iotivity-dev-boun...@lists.iotivity.org] On Behalf Of Steve Saunders
Sent: Saturday, March 17, 2018 8:27 PM
To: iotivity-dev <iotivity-dev@lists.iotivity.org>
Subject: [dev] Provisioningclient GET tests recently broken

Hi All,

Recently (within the last week I believe) changes have been merged which causes 
some (or maybe all) of the provisioningclient resource GET tests to fail.

For example, option 62 GET CSR … provisioningclient goes into an infinite retry 
loop.  I did a little bit of investigation and found that the function

            OCHandleResponse(endPoint, responseInfo)

Is receiving responseInfo->result = CA_UNAUTHORIZED_REQ and 
responseInfo->info.payload = NULL;

I found this because when I rebased my in progress work for the new 
security_profiles resource my provisioningtest testing started to fail, and I 
have lost my primary means of testing.

It is a pretty big deal for me to lose this with one week to get my stuff done 
by Bangkok IPR start ... does anybody know what is going on?

Kind Regards
Steve

PS:

I looked through the devlist emails, and found this, perhaps some related code 
was added to address the concern below, but may have broken provisioningclient?

Looks like current implementation of provisioning client doesn't check doxm.sct 
value from server and use PSK credential type by default.

Best regards,
Aleksey Volkov





_______________________________________________
iotivity-dev mailing list
iotivity-dev@lists.iotivity.org
https://lists.iotivity.org/mailman/listinfo/iotivity-dev

Reply via email to