Scan Modes
A UDS scan usually covers multiple phases:
Searching for ECUs on the relevant transport: Discovery Scan
Searching for UDS sessions on the found ECUs: Session Scan
Searching for UDS services on the found ECUs: Service Scan
Searching for UDS identifiers in discovered UDS services: Identifier Scan
Additional service specific scans, such as Memory Scan, Fuzzing, …
Discovery Scan
Discovery scans are specific for the underlying transport, such as DoIP or ISO-TP.
The idea is crafting a valid UDS payload which is valid and at least some answer is expected.
A well working payload is 1001
which is a request to the DiagnosticSessionControl service.
This request instructs an ECU to change to the so called DefaultSession.
The DiagnosticSessionControl service and the DefaultSession should be always available, thus this payload is a good candidate for a discovery scan.
Payloads different from 1001
can be used as well; for instance 1003
to enable the ExtendedDiagnosticSession (session id 0x03
).
Another well working example is 3E00
, the TesterPresent service.
The addressing of the ECU is provided by the underlying transport protocol. Most of the time there are two addresses: the tester address and the ECU address. The basic idea of a discovery scan is sending a valid UDS payload to all valid ECU addresses with a fixed tester address. When a valid answer is received an ECU has been found.
DoIP
The Diagnostics Over Internet Protocol (DoIP) is a application level protocol on top of TCP enabling tunneling UDS messages. As an advantage all features of modern operating systems can be used. Furthermore, no custom hardware, such as expensive CAN bus adapters are required.
Note
The user needs to provide a DHCP server enabling the communication stack on the DoIP gateway’s side.
DoIP has three parameters which are required to establish a communication channel to an ECU:
SourceAddress: In the automotive chargon also called tester address. It is often static and set to
0x0e00
.TargetAddress: This is the address of a present ECU. This parameter needs to be discovered.
RoutingActivationType: DoIP provides further optional layers of authentication which can e.g. be vendor specific. Since
gallia
needs UDS endpoints this is most likelyWWH_OB
, which is a symbolic identifier for the constant0x01
. Optionally, the RoutingActivationType can be scanned in order to find vendor specific routing methods.
Assuming DHCP and the networking setup is running properly, the DoIP connection establishment looks like the following:
TCP connect to the DoIP gateway. The IP address of the gateway is set by the mentioned user controlled DHCP server.
Sending a RoutingActivationRequest; the gateway must acknowledge this.
UDS requests can be tunneled to arbitrary ECUs using appropriate DoIP
DiagnosticMessage
packets.
The mentioned DiagnosticMessage
packets contain a SourceAddress
, a TargetAddress
, and a UserData
field.
For the discovery scan on DoIP first step 1. and 2. from the described connection establishment process are performed.
Subsequently, a valid UDS message (c.f. previous section) is the put in the UserData
field and the TargetAddress
field is iterated.
When a valid answer is received an ECU has been found; when the gateway sends a NACK or just timeouts, no ECU is available on the tried TargetAddress
.
ISO-TP
ISO-TP is a standard for a transport protocol on top of the CAN bus system. The CAN bus is a field bus which acts as a broadcast medium; any connected participant can read all messages. On the CAN bus there is no concept of a connection. Typically, there are cyclic messages on the CAN bus which are important for selected participants. However, in order to implement a connection channel for the UDS protocol (which is required by law to be present in vecicles) the ISO-TP standard comes into play. In contrast to DoIP special CAN hardware is required. The ISO-TP protocol and the interaction with CAN interfaces is handled by the networking stack of the Linux kernel.
For a discovery scan it is important to distinguish whether the tester is connected to a filtered interface (e.g. the OBD connector) or to an unfiltered interface (e.g. an internal CAN bus).
In order to not confuse the discovery scanner, the so called idle traffic needs to be observed.
The idle traffic consists of the mentioned cyclic messages of the can bus.
Since there is no concept of a connection on the CAN bus itself and the parameters for the ISO-TP connection are unknown at the very first stage, an educated guess for a deny list is required.
Typically, gallia
waits for a few seconds and observes the CAN bus traffic.
Subsequently, a deny filter is configured which filters out all CAN IDs seen in the idle traffic.
ISO-TP provides multiple different addressing methods:
normal addressing with normal CAN IDs,
normal addressing with extended CAN IDs,
extended addressing with normal CAN IDs,
extended addressing with extended CAN IDs,
the mentioned schemes but with CAN-FD below,
…
Note
For the detailed explanation of all these addressing modes we refer to the relevant ISO standard documents or further documents or presentations which are available online.
The tester needs to make assuptions about what addressing scheme is used; otherwise the scan does not yield any results. ISO-TP provides the following parameters:
source can_id:
Without extended addressing: Often set to an address with a static offset to the destination can_id.
Extended addressing: Often set to a static value, e.g.
0x6f1
; a.k.a. tester address.
destination can_id:
Without extended addressing: Address of the ECU
Extended addressing: Somehow part of the ECU address, e.g.
0x600 | ext_address
extended source address: When extended addressing is in use, often set to a static value, e.g.
0xf1
.extended destination address: When extended addressing is in use, it is the address of the ECU.
The discovery procedure is dependend on the used addressing scheme. From a high level perspective, the destination id is iterated and a valid payload is sent. If a valid answer is received, an ECU has been found.
Session Scan
UDS has the concept of sessions. Different sessions can for example offer different services. A session is identified by a 1 byte session ID. The UDS standard defines a set of well known session IDs, but vendors are free to add their own sessions. Some sessions might only be available from a specific ECU state (e.g. current session, enabled/configured ECU features, coding, …). Most of those preconditions cannot be detected automatically and might require vendor specific knowledge.
The session scan tries to find all available session transitions.
Starting from the default session (0x01), all session IDs are iterated and enabling the relevant session is tried.
If the ECU replies with a positive response, the session is available.
In case of a negative response, the session is considered not available from the current state.
To detect sessions, which are only reachable from a session different to the default session, a recursive approach is used.
The scan for new sessions starts at each previously identified session.
The maximum depth is limited to avoid endless scans in case of transition cycles, such as 0x01 -> 0x03 -> 0x05 -> 0x03
.
The scan is finished, if no new session transition is found.
Service Scan
The service scan operates at the UDS protocol level. UDS provides several endpoints called services. Each service has an identifier and a specific list of arguments or sub-functions.
In order to identify available services, a reverse matching is applied.
According to the UDS standard, ECUs reply with the error codes serviceNotSupported
or serviceNotSupportedInActiveSession
when an unimplemented service is requested.
Therefore, each service which responds with a different error code is considered available.
To address the different services and their varying length of arguments and sub-functions the scanner automatically appends \x00
bytes if the received response was incorrectMessageLengthOrInvalidFormat
.
Identifier Scan
The identifier scan operates at the UDS protocol level; to be more specific it operates at the level of a specific UDS service. Most UDS services need identifiers is input arguments. For instance, the ReadDataByIdentifier service requires a data identifier input for the requested ressource. In order to find out the available identifiers for a specific service the Identifier Scan is employed.
In order to identify available data identifiers, a reverse matching is applied.
According to the UDS standard, ECUs reply with the error codes serviceNotSupported
or serviceNotSupportedInActiveSession
when an unimplemented service is requested.
If the ECU responds with any of serviceNotSupported
, serviceNotSupportedInActiveSession
,subFunctionNotSupported
, subFunctionNotSupportedInActiveSession
, or requestOutOfRange
the identifier is considered not available.
A few services such as RoutineControl offer a subFunction
as well.
SubFunction arguments can be discovered with the same technique but the error codes for the reverse matching are different.
For discovering available subFunctions the following error codes indicate the subFunction is not available: serviceNotSupported
, serviceNotSupportedInActiveSession
, subFunctionNotSupported
, or subFunctionNotSupportedInActiveSession
.
Each identifier or subFunction which responds with a different error code is considered available.
Memory Scan
TODO