Is it safe to replace the hostname of endpoint URL returned by the OPC UA server?|OPC UA Standard|Forum|OPC Foundation

Avatar
Search
Forum Scope


Match



Forum Options



Minimum search word length is 3 characters - maximum search word length is 84 characters
Lost password?
sp_Feed sp_PrintTopic sp_TopicIcon
Is it safe to replace the hostname of endpoint URL returned by the OPC UA server?
Avatar
Srijith Vijay
Member
Members
Forum Posts: 6
Member Since:
05/12/2021
sp_UserOfflineSmall Offline
1
03/26/2024 - 21:29
sp_Permalink sp_Print

Hi,

I have an OPC UA client that has trouble connecting to an OPC UA servers that is behind a NAT/Firewall. This happens because the hostname in the endpoint URL, returned by the server in the `GetServerEndpointResponse`, is different/unreachable from the hostname in the discovery URL used in the `GetEndpointRequest`.

Should I configure my OPC UA client to allow replacing the hostname in the endpoint URL with the hostname of the discovery URL like other OPC UA clients do? Are there things to consider from a security perspective if I decide to enable this feature in my OPC UA client?

A Server may have multiple HostNames. For this reason, the Client shall pass the URL it used to connect to the Endpoint to this Service. The implementation of this Service shall use this information to return responses that are accessible to the Client via the provided URL.

Note that Servers may not be aware of all HostNames which can be used to access the Server (i.e. a NAT firewall) so Clients need to handle the case where the URL used to access the Server is different from the HostNames in the Certificate.

I am not sure what approach to take based on the above two points in the OPC Foundation doc.

Thanks,
Srijith

Avatar
Randy Armstrong
Admin
Forum Posts: 1564
Member Since:
05/30/2017
sp_UserOfflineSmall Offline
2
03/27/2024 - 11:08
sp_Permalink sp_Print

If the server is known to be accessible behind a firewall the server should be issued a certificate that includes the DNS names beyond the firewall.

If this does not happen the client may ignore a domain mismatch but the client needs to be aware that there is a possible security risk.

If the client has also been configure out of band to trust the server certificate then this risk is minimal. If the client is deciding to trust the server by inspecting the certificate provided by the server then the risk is very high.

Forum Timezone: America/Phoenix
Most Users Ever Online: 510
Currently Online:
Guest(s) 48
Currently Browsing this Page:
1 Guest(s)
Top Posters:
Forum Stats:
Groups: 2
Forums: 10
Topics: 1435
Posts: 4855