Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [cf-dev] 2.0.0-M6 release and plan for 2.0.0 ?

Hi,

> About self-signed certificate, I agree with you, I don't see any advantage too.
> My intention was just to support the LWM2M spec. And as I understand it, this mode is part of the spec
> (more than that it seems this is the only one...)

LWM2M, TS 1.0.1, 7.1.9
>The public key infrastructure supports different deployment modes, as discussed in [RFC6698], and this
> specification supports the domain issued certificate mode whereby the Server Public Key Resource specifies the
> exact certificate that should be used for the DTLS server, and the certificate does not need to be signed by a valid
> CA. This allows for the use of self-signed certificates. Other modes are not supported.

My understanding is, that the server public key is just binary compared to the stored one in the resource (therefore "exact"). This allows the use of self-signed certs, but also allows the use of ca-signed certs.
The only supported mode is then this "exact" matching (and "only" does NOT refer to "self-" nor "ca-signed").
FMPOV the major limitation of that "exact" mode is, that it doesn't allow to replace the ca-signed server cert with a new ca-signed cert without bootstrap the client. (That may cause some issues, especially, when the cert of the bootstrap server must be exchanged :-). ) AFAIK, there was a longer discussion about the cert usage, but though LWM2M TS 1.0 should not be extended too much, this definition was the agreed solution.

Mit freundlichen Grüßen / Best regards 

Achim Kraus

(INST/ECS4) 
Bosch Software Innovations GmbH | Stuttgarter Straße 130 | 71332 Waiblingen | GERMANY | http://www.bosch-si.com 

Sitz: Berlin, Registergericht: Amtsgericht Charlottenburg; HRB 148411 B
Aufsichtsratsvorsitzender: Dr.-Ing. Thorsten Lücke; Geschäftsführung: Dr.-Ing. Rainer Kallenbach, Michael Hahn



From: Simon Bernard [mailto:contact@xxxxxxxxxxxxxxx] 
Sent: Mittwoch, 29. November 2017 15:13
To: Californium (Cf) developer discussions <cf-dev@xxxxxxxxxxx>; Kraus Achim (INST/ECS4) <Achim.Kraus@xxxxxxxxxxxx>
Subject: Re: [cf-dev] 2.0.0-M6 release and plan for 2.0.0 ?

Ok, so I will do the 2.0.0-M6 release this Friday, if there is no object until this.
About self-signed certificate, I agree with you, I don't see any advantage too.
My intention was just to support the LWM2M spec. And as I understand it, this mode is part of the spec (more than that it seems this is the only one...)
See §7.1.9 X.509 certificates of the LWM2M specification : 
"this specification supports the domain issued certificate mode whereby the Server Public Key Resource specifies the exact certificate that
should be used for the DTLS server, and the certificate does not need to be signed by a valid CA. This allows for the use of
self-signed certificates. Other modes are not supported."
Did I missed something ?
> If so, what did you not like about the handling?
I didn't say I don't like it :), I said it seems to me that scandium don't like it but I don't go deeper about this.

Le 29/11/2017 à 14:01, Kraus Achim (INST/ECS4) a écrit :
Hi,

  1) I would like to release a 2.0.0-M6 release for californium.
  Do you have issues or PRs you want to see integrated in this milestones release ?

Though it's required to update leshan, my stuff (plugtest + android) can be easy moved to afterwards. 
So no objection for 2.0.0-M6 from my side.

  2) About the 2.0.0 plan : 
https://github.com/eclipse/californium/milestone/3
     I think #174 and #104 could be closed thx to Achim's great work.
    I see #173 is assign to Achim, do you have update about it ?

I updated the issue #173 with a comment. That issue is currently my most concern about the 2.0.0 release :-):
But right now I'm too busy to work on that, so I postponed my 2 cents ;-(. 

    #442 seems already/almost done.

The library part of californium is done, but my changes (too many and too dirty right now) for cf-android are still open. But neither 2.0.0-M6 nor 2.0.0 should depend on that cf-android app.

      Personally, I would like to add
https://github.com/eclipse/californium/issues/484 to the plan.

OK.

      Another point, I would like to explore : verifying how Scandium handle self-signed certificate.
      Last time I checked it does not really like it.

I'm not sure, which advantage a "self-signed x509 certificate" should have over a RPK, when using DTLS.
Is your intention to support a "clientside DTLS implementation", which doesn't offer RPK and therefore using such a "self-signed x509 certificate" is intended? 
If so, what did you not like about the handling?

My experience (but only TLS):
Server side: if the client's self-signed certs are added to the servers trusts, the "certificate_authorities" may get beasty large. Therefore I implemented a special X509ExtendedTrustManager, which returns an empty list for AcceptedIssuers, because according RFC5246, 7.4.4, page 54, 

"the certificate_authorities list is empty, then the client MAY
send any certificate of the appropriate ClientCertificateType,
unless there is some external arrangement to the contrary:"
  
That empty list shrinks the handshake data. It works, if that list is not required to select the right client cert to be used.

Scandium, as far as I understood, also sends that "certificate_authorities". Maybe adding some configuration to also use an empty list for that "certificate_authorities" in DTLS may improve the support for self-signed certs.

Mit freundlichen Grüßen / Best regards

 Achim Kraus

(INST/ECS4) 
Bosch Software Innovations GmbH | Stuttgarter Straße 130 | 71332 Waiblingen | GERMANY | http://www.bosch-si.com

Sitz: Berlin, Registergericht: Amtsgericht Charlottenburg; HRB 148411 B 
Aufsichtsratsvorsitzender: Dr.-Ing. Thorsten Lücke; Geschäftsführung: Dr.-Ing. Rainer Kallenbach, Michael Hahn 



-----Original Message-----
From: mailto:cf-dev-bounces@xxxxxxxxxxx [mailto:cf-dev-bounces@xxxxxxxxxxx] On Behalf Of Simon Bernard
Sent: Dienstag, 28. November 2017 16:16
To: Californium (Cf) developer discussions mailto:cf-dev@xxxxxxxxxxx
Subject: [cf-dev] 2.0.0-M6 release and plan for 2.0.0 ?

Hi,

   1) I would like to release a 2.0.0-M6 release for californium.
   Do you have issues or PRs you want to see integrated in this milestones release ?

   2) About the 2.0.0 plan : 
https://github.com/eclipse/californium/milestone/3

      I think #174 and #104 could be closed thx to Achim's great work.
      I see #173 is assign to Achim, do you have update about it ?
      #442 seems already/almost done.

       Personally, I would like to add
https://github.com/eclipse/californium/issues/484 to the plan.
       Another point, I would like to explore : verifying how Scandium handle self-signed certificate. Last time I checked it does not really like it.

Simon

_______________________________________________
cf-dev mailing list
mailto:cf-dev@xxxxxxxxxxx
To change your delivery options, retrieve your password, or unsubscribe from this list, visit https://dev.eclipse.org/mailman/listinfo/cf-dev
_______________________________________________
cf-dev mailing list
mailto:cf-dev@xxxxxxxxxxx
To change your delivery options, retrieve your password, or unsubscribe from this list, visit
https://dev.eclipse.org/mailman/listinfo/cf-dev


Back to the top