No description
Find a file
2022-07-13 08:44:18 +05:30
docs/api update uci schema to add enable parameter 2022-06-21 19:59:02 +05:30
gitlab-ci Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
inc Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
schemas update uci schema to add enable parameter 2022-06-21 19:59:02 +05:30
test Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
.clang-format update clang-format and gitignore 2021-06-25 11:46:39 +01:00
.gitignore Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
.gitlab-ci.yml Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
backupSession.c Fix compilation warning on gcc-11 2022-06-06 13:33:00 +00:00
common.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
config.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
configure.ac Fix compilation warning on gcc-11 2022-06-06 13:33:00 +00:00
cwmp.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
cwmp_cli.c Ticket refs #7501: icwmp: Fix static code warnings with cppcheck-2.7 2022-03-09 09:08:06 +01:00
cwmp_du_state.c Code cleanup and optimize 2022-05-02 20:07:23 +05:30
cwmp_uci.c Fix compilation warning on gcc-11 2022-06-06 13:33:00 +00:00
cwmp_zlib.c Ticket refs #7501: icwmp: Fix static code warnings with cppcheck-2.7 2022-03-09 09:08:06 +01:00
datamodel_interface.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
diagnostic.c Code cleanup and optimize 2022-05-02 20:07:23 +05:30
digauth.c Fix connection req handling 2022-06-29 15:20:26 +00:00
download.c Code cleanup and optimize 2022-05-02 20:07:23 +05:30
event.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
heartbeat.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
http.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
LICENSE COPYING -> LICENSE 2021-04-20 18:34:00 +02:00
log.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
Makefile.am Ticket refs #7896: icwmp: Implement Heartbeat event 2022-05-23 13:06:35 +00:00
netlink.c Fix random crash 2022-05-19 22:44:44 +05:30
notifications.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
README.md Add HTTPS documentation 2022-06-28 10:41:15 +01:00
reboot.c Ticket refs #7501: icwmp: Fix static code warnings with cppcheck-2.7 2022-03-09 09:08:06 +01:00
rpc_soap.c Consider the Inform RPC ACS method always supported by the ACS 2022-07-06 15:29:10 +01:00
sched_inform.c Ticket refs #7501: icwmp: Fix static code warnings with cppcheck-2.7 2022-03-09 09:08:06 +01:00
session.c Ticket refs #7896: icwmp: Implement Heartbeat event 2022-05-23 13:06:35 +00:00
ssl_utils.c Use openssl compatibility layer for wolfssl variant 2022-06-07 19:47:36 +05:30
ubus_utils.c Fix icwmpd infinite restarts 2022-07-13 08:44:18 +05:30
upload.c Use common function to get time 2022-04-29 11:58:22 +01:00
xml.c code reorganize 2022-05-05 11:49:55 +00:00

CWMP Agent

icwmpd is a client implementation of TR-069/CWMP protocol.

It is written in C programming language and depends on a number of libraries of OpenWrt for building and running.

Good to Know

The icwmpd client is :

  • Tested with several ACS such as Axiros, AVSytem, GenieACS, OpenACS, etc...
  • Supports all required TR069 RPCs.
  • Supports all DataModel of TR family such as TR-181, TR-104, TR-143, TR-157, etc...
  • Supports all types of connection requests such as HTTP, XMPP, STUN.
  • Supports integrated file transfer such as HTTP, HTTPS, FTP.

Configuration File

The icwmpd UCI configuration is located in '/etc/config/cwmp', and contains 3 sections: 'acs', 'cpe' and 'lwn'.

config acs 'acs'
	option userid 'iopsys'
	option dhcp_discovery 'enable'
	option compression 'Disabled'
	option retry_min_wait_interval '5'
	option retry_interval_multiplier '2000'

config cpe 'cpe'
	option default_wan_interface 'wan'
	option userid 'iopsys'
	option exec_download '0'
	
config lwn 'lwn'
	option enable '1'
	option hostname ''
	option port ''

Note: icwmpd depends on usp.raw for all datamodel parameters, some DeviceId related parameters can be overwritten by writing them directly on /etc/config/cwmp file.

uci set cwmp.cpe.manufacturer="ABC"
uci set cwmp.cpe.manufacturer_oui="XXX"
uci set cwmp.cpe.product_class="TEST_CLASS"
uci set cwmp.cpe.serial_number="1234567890"
uci set cwmp.cpe.software_version="X.Y.Z"
uci set cwmp.cpe.model_name="MODELXXX"
uci set cwmp.cpe.description="This is a test device"
uci commit cwmp

Complete UCI for cwmp configuration available in link or raw schema

RPCs Method supported

The following tables provides a summary of all methods, and indicates the conditions under which implementation of each RPC method defined in Annex A is REQUIRED or OPTIONAL.

Methods for CPE responding

Method name CPE requirement Supported
GetRPCMethods REQUIRED Yes
SetParameterValues REQUIRED Yes
GetParameterValues REQUIRED Yes
GetParameterNames REQUIRED Yes
SetParameterAttributes REQUIRED Yes
GetParameterAttributes REQUIRED Yes
AddObject REQUIRED Yes
DeleteObject REQUIRED Yes
Reboot REQUIRED Yes
Download REQUIRED Yes
ScheduleDownload OPTIONAL Yes
Upload OPTIONAL Yes
FactoryReset OPTIONAL Yes
GetQueuedTransfers OPTIONAL No
GetAllQueuedTransfers OPTIONAL No
CancelTransfer OPTIONAL Yes
ScheduleInform OPTIONAL Yes
ChangeDUState OPTIONAL Yes
SetVouchers OPTIONAL No
GetOptions OPTIONAL No

Methods for CPE calling

Method name CPE requirement Supported
GetRPCMethods OPTIONAL Yes
Inform REQUIRED Yes
TransferComplete REQUIRED Yes
AutonomousTransferComplete OPTIONAL No
DUStateChangeComplete OPTIONAL Yes
AutonomousDUStateChangeComplete OPTIONAL No
RequestDownload OPTIONAL No
Kicked OPTIONAL No

Concepts and Workflow

In OpenWRT integration, icwmpd depends on procd based init script /etc/init.d/icwmpd to start it in boot-up. Once started, it reads the initial configuration from UCI and if configured connects to the ACS.

Provisioning of the ACS URL can be done in icwmpd with a firmware default uci value, or it can be done dynamically using DHCP Option 43 on the configured default_wan_interface.

ACS Session workflow could be checked with sniffer packets tool such as Wireshark or tcpdump. In addition to that, icwmpd give provision to configure a log file in uci. A snapshot of log description is listed below for demonstration(Content of the log can vary based on configuration):

24-12-2019, 10:21:18 [INFO]    STARTING ICWMP with PID :7762
24-12-2019, 10:21:18 [INFO]    Periodic event is enabled. Interval period = 180000s
24-12-2019, 10:21:18 [INFO]    Periodic time is Unknown
24-12-2019, 10:21:18 [INFO]    Connection Request server initiated with the port: 7547
24-12-2019, 10:21:18 [INFO]    Start session
24-12-2019, 10:21:18 [INFO]    ACS url: http://genieacs:7547
24-12-2019, 10:21:18 [INFO]    Preparing the Inform RPC message to send to the ACS
24-12-2019, 10:21:18 [INFO]    Send the Inform RPC message to the ACS
24-12-2019, 10:21:19 [INFO]    Get the InformResponse message from the ACS
24-12-2019, 10:21:19 [INFO]    Send empty message to the ACS
24-12-2019, 10:21:19 [INFO]    Receive HTTP 204 No Content
24-12-2019, 10:21:19 [INFO]    End session
24-12-2019, 10:21:19 [INFO]    Waiting the next session

Further, it provides different log level that can be configured in uci config cwmp.cpe.log_severity to get more verbose log to no logs.

uBus

icwmpd provides some RPCs support over ubus and some debug utilities those can be accessed using tr069 ubus object. So, it must be launched on startup after ubusd.

Note: For more info on the tr069 ubus schema see link or raw schema

tr069 ubus examples

Please note, the output shown in below examples are just for demonstration purpose, the actual output shall vary as per the cwmp configuration and state. The schema for UBUS is available at link or raw schema

root@iopsys:~# ubus -v list tr069
'tr069' @aadff65c
        "command":{"command":"String"}
        "status":{}
        "inform":{"GetRPCMethods":"Boolean","event":"String"}
root@iopsys:~#

Each object registered with the 'tr069' namespace has a specific functionality.

  • To get the status of cwmp client, use the status ubus method:
root@iopsys:~# ubus call tr069 status
{
        "cwmp": {
                "status": "up",
                "start_time": "2021-07-29T09:29:02+02:00",
                "acs_url": "http://genieacs:7547"
        },
        "last_session": {
                "status": "success",
                "start_time": "2021-07-29T09:29:59+02:00",
                "end_time": "2021-07-29T09:30:00+02:00"
        },
        "next_session": {
                "status": "waiting",
                "start_time": "2021-07-29T09:59:59+02:00",
                "end_time": "N/A"
        },
        "statistics": {
                "success_sessions": 2,
                "failure_sessions": 0,
                "total_sessions": 2
        }
}
root@iopsys:~#
  • To trigger a new session to ACS with the event '6 CONNECTION REQUEST' or '8 DIAGNOSTICS COMPLETE', etc.., use the inform ubus method with the appropriate event argument:
root@iopsys:~# ubus call tr069 inform '{"event":"6 connection request"}'
{
	"status": 1,
	"info": "Session started"
}
root@iopsys:~#
root@iopsys:~# ubus call tr069 inform '{"event":"8 diagnostics complete"}'
{
	"status": 1,
	"info": "Session started"
}
root@iopsys:~#
root@iopsys:~# ubus call tr069 inform '{"GetRPCMethods":"1"}'
{
	"status": 1,
	"info": "Session started"
}
root@iopsys:~#
  • To reload the icwmpd config, use the command ubus method with reload argument:
root@iopsys:~# ubus call tr069 command '{"command":"reload"}'
{
	"status": 1,
	"info": "icwmpd config reloaded"
}
root@iopsys:~#

icwmpd command line

icwmpd command line options are described with --help option as below:

root@iopsys:~# icwmpd --help
Usage: icwmpd [OPTIONS]
 -b, --boot-event                                    (CWMP daemon) Start CWMP with BOOT event
 -g, --get-rpc-methods                               (CWMP daemon) Start CWMP with GetRPCMethods request to ACS
 -c, --cli                                           CWMP CLI
 -h, --help                                          Display this help text
 -v, --version                                       Display the version

icwmpd CLI

The icwmpd CLI is a debug utility and can be invoked using -c (--cli) command line option.

Different options of this CLI are described with help command as below:

root@iopsys:~# icwmpd -c help
Valid commands:
        help                                    => show this help
        get [path-expr]                         => get parameter values
        get_names [path-expr] [next-level]      => get parameter names
        set [path-expr] [value]                 => set parameter value
        add [object]                            => add object
        del [object]                            => delete object
        get_notif [path-expr]                   => get parameter notifications

Note: icwmpd CLI is a debug utility and hence it is advised to use for debug and development purpose only. icwmpd CLI utility is independent of icwmpd daemon.

icwmp CLI command success result is displayed in the terminal as following:

root@iopsys:~# icwmpd -c get Device.DeviceInfo.UpTime
Device.DeviceInfo.UpTime => 91472
root@iopsys:~# icwmpd -c set Device.WiFi.SSID.1.SSID wifi1_ssid
Set value is successfully done
Device.WiFi.SSID.1.SSID => wifi1_ssid

In the case of fault the result is displayed as following:

root@iopsys:~# icwmpd -c get Device.DeviceInfo.UpTme
Fault 9005: Invalid parameter name
root@iopsys:~# icwmpd -c set
Fault 9003: Invalid arguments
root@iopsys:~# icwmpd -c set Device.WiFi.SSID.1.SSID
Fault 9003: Invalid arguments

SPV Response and restart services

In case icwmpd receives from the ACS SetParameterValues Request, it will use the uspd setm_values ubus method for all requested parameters.

Basing on setm_values response the icwmp will do the following:

  • in case of fault icwmp aborts the set of all parameters and then sends Response to the ACS with FAULT 9003 including all parameters faults as defined in TR069 standard.
  • in case of success icwmp commits the set of all parameters, without applying them so without restarting services, and then sends a success Response to the ACS including the status code 1.
  • All restart services are done in the CWMP end session in order to prevent any session interruption.
  • icwmp always returns 1 as status value in case of success SPV because all restart services are done in the end session.

icwmpd forced inform parameters

As per the cwmp inform requirements, cwmp client has list of parameters defined internally. The list contains below parameters:

Parameter name
Device.RootDataModelVersion
Device.DeviceInfo.HardwareVersion
Device.DeviceInfo.SoftwareVersion
Device.DeviceInfo.ProvisioningCode
Device.ManagementServer.ParameterKey
Device.ManagementServer.ConnectionRequestURL
Device.ManagementServer.AliasBasedAddressing

In addition to the above defined forced inform parameters as specified in datamodel standard, icwmp gives the possibility to add other datamodel parameters as forced inform parameters, by defining them in a JSON file.

Additional inform parameters can be configured in a JSON file as below:

root@iopsys:~# cat /etc/icwmpd/inform.json
{
  "forced_inform":[
    "Device.DeviceInfo.X_IOPSYS_EU_BaseMACAddress",
    "Device.DeviceInfo.UpTime"
    ]
}
root@iopsys:~#

And then the path of the JSON file can be set in the UCI option: cwmp.cpe.forced_inform_json like below:

root@iopsys:~# uci set cwmp.cpe.forced_inform_json=/etc/icwmpd/inform.json
root@iopsys:~# uci commit cwmp
root@iopsys:~# /etc/init.d/icwmpd restart
  • It is required to restart icwmp service after the changes to use the new forced inform parameters
  • This JSON file shouldn't contain duplicate parameters or parameters of the standard inform parameters specified in the datamodel
  • Forced inform parameters defined in JSON should be leaf elements

Boot inform parameters

In addition to the above defined forced inform parameters as specified in datamodel standard and forced inform parameters specified by the customer in a json file (defined in previous section), icwmp gives also possibility to add Boot Inform parameter by defining them in a JSON file.

Boot inform parameters will appear in inform messages that includes '0 BOOTSTRAP' or '1 BOOT' events.

inform parameters can be configured in a JSON file as below:

root@iopsys:~# cat /etc/icwmpd/inform.json
{
  "boot_inform":[
    "Device.DeviceInfo.UpTime"
    ]
}
root@iopsys:~#

And then the path of the JSON file can be set in the UCI option: cwmp.cpe.boot_inform_json like below:

root@iopsys:~# uci set cwmp.cpe.boot_inform_json=/etc/icwmpd/inform.json
root@iopsys:~# uci commit cwmp
root@iopsys:~# /etc/init.d/icwmpd restart
  • It is required to restart icwmp service after the changes to use the new boot inform parameters
  • This JSON file shouldn't contain duplicate parameters or parameters of the standard inform parameters specified in the datamodel
  • Boot inform parameters defined in JSON should be leaf elements
  • Boot inform parameters appears only in BOOT or BOOTSTRAP inform message.

Notification management

icwmpd support below notification types, which can be configured from an ACS on the datamodel parameters

  • 0 = Notification off
  • 1 = Passive notification
  • 2 = Active notification
  • 3 = Passive lightweight notification
  • 4 = Passive notification with passive lightweight notification
  • 5 = Active lightweight notification
  • 6 = Passive notification with active lightweight notification

Along with this it does provide some debug utilities to get the notification from the device root shell as well

root@iopsys:~# icwmpd -c get_notif Device.Users.User.1.Username
Device.Users.User.1.Username => passive

To fulfill the requirement of forced active notification parameters, icwmpd internally maintains a list of forced active parameters specified in TR181. The list contains below parameters:

Parameter name Notification
Device.DeviceInfo.SoftwareVersion 2
Device.DeviceInfo.ProvisioningCode 2

So, Creation of any other type of notification on the above parameters results in a cwmp fault 9009.

Along with this icwmpd support configuration of notification parameters using a JSON file. Users can include this json file in there firmware to override the existing notification parameters, or add new notifications from the firmware itself.

Below is the schema/format of the JSON file:

root@iopsys:~# cat /etc/icwmpd/inform.json
{
  "custom_notification": [
    {
      "parameter": "Device.Users.",
      "notify_type": "2"
    },
    {
      "parameter": "Device.WiFi.SSID.1.SSID",
      "notify_type": "1"
    }
  ]
}

Note: In the Above example, parameter has to be defined with a valid datamodel parameter name and notify_type needs to be the notification type (number as present in the above table). Both the parameters are required.

After defining the JSON file with all the required parameters, this information required to update cwmp uci as below:

root@iopsys:~# uci set cwmp.cpe.custom_notify_json=/etc/icwmpd/inform.json
root@iopsys:~# uci commit cwmp
root@iopsys:~# /etc/init.d/icwmpd restart
  • ACS can manage the attributes of parameter added by custom_notification as it does for the other parameters
  • After firmware upgrade, for the 1st bootup, the custom_notify_json has higher priority, latter on ACS configured attributes get priority.
  • Addition of custom notification parameters is one time activity after upgrade, once done It can only be managed through ACS.
  • Parameters with wildcard not supported currently. So parameter like Device.WiFi.SSID.*. will be skipped

How to configure icwmp client for HTTPS connection to ACS

In order to keep the connection secure, most customers use HTTPS to connect to ACS.

In this case we need to have an ACS that supports HTTPS, And for that we use GenieACS as an example because it's an open source and supports HTTPS.

Find below the required steps to configure GenieACS server and icwmp client to support HTTPS

Generating the private key and certificate

  1. Generate a private key for the CA:
root@75f824228409:/opt/genieacs# openssl genrsa 2048 > ca-key.pem
Generating RSA private key, 2048 bit long modulus (2 primes)
...................................................................................+++++
...........................+++++
e is 65537 (0x010001)
  1. Generate the X509 certificate for the CA:
root@75f824228409:/opt/genieacs# openssl req -new -x509 -nodes -days 365000 -key ca-key.pem -out ca-cert.pem
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:SE
State or Province Name (full name) [Some-State]:Stockholm
Locality Name (eg, city) []:Stockholm
Organization Name (eg, company) [Internet Widgits Pty Ltd]:IOPSYS
Organizational Unit Name (eg, section) []:IOPSYS
Common Name (e.g. server FQDN or YOUR name) []:genieacs
Email Address []:dev@iopsys.eu
root@75f824228409:/opt/genieacs# 

Note: When generating the certificate, you must fill the Common Name filed with the correct URL server (for example here 'genieacs') otherwise you will get an error later when trying to connect to the ACS.

Installing and Configuring GenieACS environment variables

  1. Install GenieACS

You can follow the steps described in this link in order to install GenieACS.

  1. Configure GenieACS environment variables to support HTTPS

GenieACS offers a list of environment variables to configure the different features, you can see all the information in detail in this link.

In fact, the most important to us are these two variables below to configure the SSL functionality.

GENIEACS_CWMP_SSL_CERT=/path/to/certificate/file/ca-cert.pem
GENIEACS_CWMP_SSL_KEY=/path/to/certificate/key/file/ca-key.pem

Checking the generated Certificate

You can use openssl command to check if there is any error in generated certificate.

openssl s_client -connect genieacs:7547 -CAfile ca-cert.pem

Configuring DUT to support HTTPS

  1. Copy the generated certificate under the needed path (default path is '/etc/ssl/certs/')
scp /path/of/certificate/ca-cert.pem root@192.168.1.1:/etc/ssl/certs
  1. Set 'ssl_capath' option in cwmp config with certificate directory path (default path is '/etc/ssl/certs/')
uci set cwmp.acs.url='https://genieacs:7547'
uci set cwmp.acs.ssl_capath="/etc/ssl/certs"
ubus call uci commit '{"config":"cwmp"}'

Now, all required configuration are ready and you can start a cwmp connection using HTTPS.

Dependencies

To successfully build icwmp, the following libraries are needed:

Dependency Link License
libuci https://git.openwrt.org/project/uci.git LGPL 2.1
libubox https://git.openwrt.org/project/libubox.git BSD
libubus https://git.openwrt.org/project/ubus.git LGPL 2.1
libjson-c https://s3.amazonaws.com/json-c_releases MIT
libwolfssl https://github.com/wolfSSL/wolfssl GPL-2.0
libcurl https://dl.uxnr.de/mirror/curl MIT
mxml https://github.com/michaelrsweet/mxml GPL-2.0

Runtime dependencies:

Dependency Link License
ubus https://git.openwrt.org/project/ubus.git LGPL 2.1
bbf https://dev.iopsys.eu/iopsys/bbf.git LGPLv2.1
uspd https://dev.iopsys.eu/iopsys/uspd.git GPL v2.0

icwmpd gets the datamodel from the DUT via ubus using uspd, and also it registers tr069 ubus namespace to expose some debug and cwmp client rpc funtionalities, so it is required to start it after starting ubusd and uspd.