-
Notifications
You must be signed in to change notification settings - Fork 837
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dtls1.3: Fix issues when --enable-dtls13 enabled #7456
Conversation
Can one of the admins verify this patch? |
Fixed issue with running |
configure.ac
Outdated
@@ -794,6 +794,9 @@ then | |||
then | |||
test "$enable_tls13" = "" && enable_tls13=yes | |||
test "$enable_rsapss" = "" && enable_rsapss=yes | |||
test "$enable_dtls13" = "" && enable_dtls13=yes |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please remove this from the default build.
We are looking for interoperability targets before making it part of the distribution.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Understood. However, I assume that you want all 3 additions to be removed rather than just hte single line highlighted.
For reference, using WolfSSL in the libcoap implementation, it interoperates with OpenSSL, GnuTLS and MbedTLS.
There is a change required for TinyDTLS as it is doing a hash across the whole ClientHello (ignoring Cookie) (including Extensions) and needs updating to be following https://datatracker.ietf.org/doc/html/rfc6347#section-4.2.1 where only the (version, random, session_id, cipher_suites, compression_method) should be hashed.
When responding to a HelloVerifyRequest, the client MUST use the same parameter values (version, random, session_id, cipher_suites, compression_method) as it did in the original ClientHello. The server SHOULD use those values to generate its cookie and verify that they are correct upon cookie receipt.
See eclipse-tinydtls/tinydtls#230 for that pending fix.
In all the cases above, DTLS1.3 is not supported, and so there is a WolfSSL downgrade.
Changes to configure.ac removed and code pushed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @mrdeep1!
I've approved the code changes.
Fixed issue reported by scan-build when DTLS13 is enabled. Fix compile issue when WOLFSSL_DTLS_CH_FRAG is enabled. Fix running of scripts/dtlscid.test by removing 'set -e' as bwrap command may not be there.
Description
Fixed issue reported by scan-build when DTLS13 is enabled.
Fix compile issue when WOLFSSL_DTLS_CH_FRAG is enabled.
Fix running of scripts/dtlscid.test by removing 'set -e' as bwrap
command may not be there.
Testing
Temporarily make this change
Running
./configure --enable-all
and reviewedAM_FLAGS
inMakefile
as well as runningscan-build make
.Checklist