Documentos de Académico
Documentos de Profesional
Documentos de Cultura
ii
Release 1.02.2
Specification
Type:
Industry Standard
Specification
Comments:
Title:
OPC Unified
Architecture
Date:
Errata :
Version:
Release 1.02.2
Software:
Source:
MS-Word
OPC UA 1.02.2 Specification
Errata.doc
Author:
OPC Foundation
Status:
Release
Release 1.02.2
iii
ii
Release 1.02.2
CONTENTS
Page
FOREWORD .......................................................................................................................... v
AGREEMENT OF USE ........................................................................................................... v
1
Scope .............................................................................................................................. 1
Release 1.02.2
iii
FIGURES
No table of figures entries found.
iv
TABLES
No table of figures entries found.
Release 1.02.2
Release 1.02.2
OPC FOUNDATION
____________
UNIFIED ARCHITECTURE
FOREWORD
This specification is the specification for developers of OPC UA applications. The specification is a result of an analysis
and design process to develop a standard interface to facilitate the development of applications by multiple vendors that
shall inter-operate seamlessly together.
Copyright 2006-2013, OPC Foundation, Inc.
AGREEMENT OF USE
COPYRIGHT RESTRICTIONS
Any unauthorized use of this specification may violate copyright laws, trademark laws, and communications regulations and
statutes. This document contains information which is protected by copyright. All Rights Reserved. No part of this work
covered by copyright herein may be reproduced or used in any form or by any means --graphic, electronic, or mechanical,
including photocopying, recording, taping, or information storage and retrieval systems --without permission of the copyright
owner.
OPC Foundation members and non-members are prohibited from copying and redistributing this specification. All copies
must
be
obtained
on
an
individual
basis,
directly
from
the
OPC
Foundation
Web
site
http://www.opcfoundation.org .
HTU
UTH
PATENTS
The attention of adopters is directed to the possibility that compliance with or adoption of OPC specifications may require
use of an invention covered by patent rights. OPC shall not be responsible for identifying patents for which a license may
be required by any OPC specification, or for conducting legal inquiries into the legal validity or scope of those patents that
are brought to its attention. OPC specifications are prospective and advisory only. Prospective users are responsible for
protecting themselves against liability for infringement of patents.
WARRANTY AND LIABILITY DISCLAIMERS
WHILE THIS PUBLICATION IS BELIEVED TO BE ACCURATE, IT IS PROVIDED "AS IS" AND MAY CONTAIN ERRORS OR
MISPRINTS. THE OPC FOUDATION MAKES NO WARRANTY OF ANY KIND, EXPRESSED OR IMPLIED, WITH REGARD
TO THIS PUBLICATION, INCLUDING BUT NOT LIMITED TO ANY WARRANTY OF TITLE OR OWNERSHIP, IMPLIED
WARRANTY OF MERCHANTABILITY OR WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE OR USE. IN NO
EVENT SHALL THE OPC FOUNDATION BE LIABLE FOR ERRORS CONTAINED HEREIN OR FOR DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, CONSEQUENTIAL, RELIANCE OR COVER DAMAGES, INCLUDING LOSS OF PROFITS,
REVENUE, DATA OR USE, INCURRED BY ANY USER OR ANY THIRD PARTY IN CONNECTION WITH THE
FURNISHING, PERFORMANCE, OR USE OF THIS MATERIAL, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
The entire risk as to the quality and performance of software developed using this specification is borne by you.
RESTRICTED RIGHTS LEGEND
This Specification is provided with Restricted Rights. Use, duplication or disclosure by the U.S. government is subject to
restrictions as set forth in (a) this Agreement pursuant to DFARs 227.7202 -3(a); (b) subparagraph (c)(1)(i) of the Rights in
Technical Data and Computer Software clause at DF ARs 252.227-7013; or (c) the Commercial Computer Software
Restricted Rights clause at FAR 52.227 -19 subdivision (c)(1) and (2), as applicable. Contractor / manufacturer are the OPC
Foundation,. 16101 N. 82nd Street, Suite 3B, Scottsdale, AZ, 85260 -1830
vi
Release 1.02.2
COMPLIANCE
The OPC Foundation shall at all times be the sole entity that may authorize developers, suppliers and sellers of hardware
and software to use certification marks, trademarks or other special designations to indicate compliance with these
materials. Products developed using this specification may claim compliance or conformance with this specification if and
only if the software satisfactorily meets the certification requirements set by the OPC Foundation. Products that do not
meet these requirements may claim only that the product was based on this specification and must not claim compliance or
conformance with this specification.
TRADEMARKS
Most computer and software brand names have trademarks or registered trademarks. The individual trademarks ha ve not
been listed here.
GENERAL PROVISIONS
Should any provision of this Agreement be held to be void, invalid, unenforceable or illegal by a court, the validity and
enforceability of the other provisions shall not be affected thereby.
This Agreement shall be governed by and construed under the laws of the State of Minnesota, excluding its choice or law
rules.
This Agreement embodies the entire understanding between the parties with respect to, and supersedes any prior
understanding or agreement (oral or written) relating to, this specification.
ISSUE REPORTING
The OPC Foundation strives to maintain the highest quality standards for its published specifications, hence they undergo
constant review and refinement. Readers are encouraged to report any issues and view any existing errata here:
http://www.opcfoundation.org/errata
HTU
UTH
Release 1.02.2
Scope
This Errata document contains all of the known corrections to OPC UA Specification Parts 1 through
13 for version 1.02. This document is updated regularly when issues are found between major
releases of the Specification.
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002198
Problem Statement
Solution
CreateSession,
5.4.3
GetEndpoints
and
5.5.2
The new 1.02 requirement to not provide an application instance certificate for
securityPolicyUri is NONE was removed since it created different
interoperability issues with V1.01 clients.
Release 1.02.2
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002534
Problem Statement
Solution
The rule to stop certificate checks if a trusted certificate is found was removed
since trusted CA certificates may be revoked by their issuers and therefore a
full check of the certificate chain is required .
The certificate validation steps in Table 101 got reorder ed to first check
Certificate Structure, Signature and Trust List. If one of the tree checks fails
the unspecific status Bad_SecurityChecksFailed is returned. It the certificate
is trusted, the remaining checks will return the specific error as defined in
V1.02.
Table 101 Certificate Validation Steps
Step
Certificate
Structure
Signature
Error/AuditEvent
Bad_SecurityChecksFailed
AuditCertificateInvalidEventType
Bad_SecurityChecksFailed
AuditCertificateInvalidEventType
Trust List
Check
Bad_SecurityChecksFailed
AuditCertificateUntrustedEventType
Validity
Period
Bad_CertificateTimeInvalid
Bad_CertificateIssuerTimeInvalid
AuditCertificateExpiredEventType
Host Name
Bad_CertificateHostNameInvalid
AuditCertificateDataMismatchEventType
URI
Bad_CertificateUriInvalid
AuditCertificateDataMismatchEventType
Certificate
Usage
Bad_CertificateUseNotAllowed
Bad_CertificateIssuerUseNotAllowed
AuditCertificateMismatchEventType
Description
The Certificate structure is verified.
This error may not be suppressed.
A Certificate with an invalid signature
shall always be rejected.
A Certificate signature is invalid if the
Issuer Certificate is unknown. A selfsigned Certificate is its own issuer.
If the Application Instance Certificate
is not trusted and none of the CA
Certificates in the chain is trusted,
the result of the Certificate validation
shall be Bad_SecurityChecksFailed.
The current time shall be after the
start of the validity period and before
the end.
This error may be suppressed.
The HostName in the URL used to
connect to the Server shall be the
same as one of the HostNames
specified in the Certificate.
This check is skipped for CA
Certificates.
This error may be suppressed.
Application and Software Certificates
contain an application or product URI
that shall match the URI specified in
the ApplicationDescription provided
with the Certificate.
This check is skipped for CA
Certificates.
This error may not be suppressed.
The gatewayServerUri is used to
validate an Application Certificate
when connecting to a Gateway
Server (see Part 4 clause 7.1).
Each Certificate has a set of uses for
the Certificate (see Part 6). These
uses shall match use requested for
the Certificate (i.e. Application,
Software or CA).
This error may be suppressed unless
the Certificate indicates that the
Release 1.02.2
Find
Revocation
List
Bad_CertificateRevocationUnknown
Bad_CertificateIssuerRevocationUnknown
AuditCertificateRevokedEventType
Revocation
Check
Bad_CertificateRevoked
Bad_CertificateIssuerRevoked
AuditCertificateRevokedEventType
usage is mandatory.
Each CA Certificate may have a
revocation list. This check fails if this
list is not available (i.e. a network
interruption prevents the application
from accessing the list). No error is
reported if the Administrator disables
revocation checks for a CA
Certificate.
This error may be suppressed.
The Certificate has been revoked
and may not be used.
This error may not be suppressed.
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002107
Problem Statement
Solution
5.12.3 ModifyMonitoredItems
Replaced: Changes to the sampling interval and filter take effect at the
beginning of the next sampling interval (the next time the sampling timer
expires).
With: Changes to the MonitoredItem settings shall be applied immediately by
the Server. They take effect as soon as practical but not later than twice the
new revisedSamplingInterval.
5.13.3 ModifySubscription
Replaced: Changes to the publishing interval become effective the next time
the publishing timer expires.
With: Changes to the Subscription settings shall be applied immediately by
the Server. They take effect as soon as practical but not later than twice the
new revisedPublishingInterval.
Release 1.02.2
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0001731
Problem Statement
Solution
To ensure all Servers side stacks behave the same way and slow embedded
clients have no communication interruption, the should use was changed to
shall use. The update rule is now:
Servers shall use the existing SecurityToken to secure outgoing Messages
until the SecurityToken expires or the Server receives a Message secured
with a new SecurityToken.
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002484
Problem Statement
Clients can create secure channels without security for discovery on a server.
Misbehaving clients or a denial of service attack can use all possible secure
channels.
Solution
Release 1.02.2
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002494
Problem Statement
V1.02 does not specify what happens with queued values if the sampling
queue size is reduced.
Solution
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002360
Problem Statement
V1.02 does add additional requirements for FindServers for redundant servers
but FindServers definition is inconsistent with the definition in r edundancy.
Solution
Release 1.02.2
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002190
Problem Statement
V1.02 specifies a URL which is not consistent with the publish ed WSDL for
the SOAP actions.
Solution
Clause 7.2.2 now uses the URL prefix for actions that is used in the WSDL
(http://opcfoundation.org/UA/2008/02/Services.wsdl).
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002304
Problem Statement
V1.02 is missing an attribute that allows a link between a Method Node and
the InstanceDeclaration in the associated TypeDefinition.
Solution
Type
Description
All of the fields from the UAInstance type described in Part 6 clause E.6.
MethodDeclarationId
NodeId
Release 1.02.2
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002312
Problem Statement
V1.02 specifies ExtraPadding byte at the beginning of the padding which only
works for single byte padding values.
Solution
Topic
Errata Version
1.02.1
Spec Reference
Mantis Reference
0002504
Problem Statement
Solution
Clause 6.7.6 now states that Certificate Trust shall be checked first.
The other steps are the same. This allows more specific error codes to be
returned only to trusted Clients.