Hi
Simon,
First
results:
Openssl
1.1.1 uses 1.0, mbedtls uses 1.2 for that
HelloVerifyRequest.
Both
clients works with 1.2 or 1.0
From
your previous mail:
The server MUST use the same
version number in the HelloVerifyRequest that it would use when
sending a ServerHello.
That’s
interesting … and doesn’t fit. So I will write to
the ietf-tls-list.
Mit freundlichen Grüßen / Best regards
Achim Kraus
Bosch IoT Hub - Product Area IoT Platform
(IOC/PAP-HU)
Bosch.IO GmbH | Stuttgarter Straße 130 | 71332
Waiblingen |
GERMANY | www.bosch.io
Sitz: Berlin, Registergericht: Amtsgericht
Charlottenburg; HRB 148411 B
Aufsichtsratsvorsitzender: Dr.-Ing. Thorsten Lücke;
Geschäftsführung: Dr. Stefan Ferber, Dr. Aleksandar
Mitrovic, Yvonne Reckling
As you are here Achim, I will not open a
dedicated issue in californium.
Let discuss about it here.
My first point : I'm not sure this is a good idea to
change default behavior in a minor version release. In
this particular case we could maybe considered this as
a bug fix (But I'm not sure of this as this is just a
SHOULD and not a MUST).
My second point : About the RFC, it says :
1. TLS 1.2 server implementations SHOULD use DTLS
2. version 1.0 regardless of the version of TLS that is expected to be
3. negotiated. DTLS 1.2 and 1.0 clients MUST use the version solely to
4. indicate packet formatting (which is the same in both DTLS 1.2 and
5. 1.0) and not as part of version negotiation. In particular, DTLS 1.2
6. clients MUST NOT assume that because the server uses version 1.0 in
7. the HelloVerifyRequest that the server is not DTLS 1.2 or that it
8. will eventually negotiate DTLS 1.0 rather than DTLS 1.2.
9. The server MUST use the same
10. version number in the HelloVerifyRequest that it would use when
11. sending a ServerHello.
So
I'm not sure to understand this correctly ? Does it
means that a DTLS 1.2 server SHOULD use 1.2 version in
hello_verfiy_request ? Using 1.0 version is only for
server which support 1.0 to 1.2 ?
(I suppose you have another understanding else you
didn't implement this ? or maybe you just missed the
second sentence ?)
Mark,
no matter how this discussion will end, your
device seems to not respect this part of the RFC :
In particular, DTLS 1.2
clients MUST NOT assume that because the server uses version 1.0 in
the HelloVerifyRequest that the server is not DTLS 1.2 or that it
will eventually negotiate DTLS 1.0 rather than DTLS 1.2.
So you should report this.
Simon
Le
23/11/2020 à 16:48, Kraus Achim (IOC/PAP-HU) a
écrit :
Hi
together,
there
is a
DtlsConfiguration.Builder.setProtocolVersionForHelloVerifyRequests.
That
may help out.
It’s
always not too easy, to fix something according
a RFC, if some implementations are used to
behave different ;-).
Mit
freundlichen Grüßen / Best regards
Achim Kraus
Bosch IoT Hub - Product Area IoT Platform
(IOC/PAP-HU)
Bosch.IO GmbH | Stuttgarter Straße 130 | 71332
Waiblingen |
GERMANY | www.bosch.io
Sitz: Berlin, Registergericht: Amtsgericht
Charlottenburg; HRB 148411 B
Aufsichtsratsvorsitzender: Dr.-Ing. Thorsten
Lücke; Geschäftsführung: Dr. Stefan Ferber, Dr.
Aleksandar Mitrovic, Yvonne Reckling
I bet this could be
because of :
https://github.com/eclipse/californium/pull/1397
See :
https://tools.ietf.org/html/rfc6347#section-4.2.1
The default VERSION value changes which change
default behavior, but this changes follow a RFC
recommendation so I'm not sure if this will(or
even should) be changed back ? (My guess is
probably not)
This is possible to change it using the API, see :
https://github.com/eclipse/californium/pull/1397/files#diff-3c57eeacb63a45e50c11737e09d3e166367773a093f2cb216e3ece81f2477597R1606
(but this will probably not changed on the
sandbox)
Le
23/11/2020 à 16:17, Simon Bernard a écrit :
We succeed to get a capture. I joined it.
Your device sounds to not answer to
HELLO_VERIFY_REQUEST from the server.
I guess there is some changes about this at
Californium side. I will open a ticket to
discuss about this. Please do not hesitate to
join the discussion.
Le
23/11/2020 à 15:36, Simon Bernard a écrit :
Hi,
You can eventually run leshan-server-demo
locally and so run wireshark at server side.
Or Eventually, I can try to do a capture at
server side. (as there is not so much traffic)
I'm currently running a tcpdump on the
sandbox. If you make your device communicate
now I can see the exchange.
(This will maybe be complicated to synchronize
ourself, I will let the tcpdump capturing for
the next hour but I will stop it before the
end of the day)
Simon
Le
23/11/2020 à 15:00, Mark Lugovskoy a écrit :
Hi,
I
tried to connect using this sequence of
commands from GSM modem:
AT#LWM2MINJKEYS=0,1,"mark123456","mark123456","0987654321"
AT#LWM2MSTS=0,999,"coaps://leshan.eclipseprojects.io:5784",1
at#reboot
AT#LWM2MENA=1
With
this sequence, I managed to connect
until Thursday after noon. In the
evening I already couldn’t connect.
I
pretty much use my GSM modem as black
box, so I can’t provide much more
details. I also don’t have Wireshark.
I’ll
try to find more information that you
asked.
Thank
you,
Mark
From:
Thomas LE ROUX [mailto:thomas.leroux@xxxxxxxx]
Sent: Monday, November 23, 2020
3:33 PM
To: leshan developer discussions
<leshan-dev@xxxxxxxxxxx>
Cc: Mark Lugovskoy <mark.lugovskoy-ext@xxxxxxx>
Subject: Re: [leshan-dev] A
question regarding Leshan demo web site
There
must be something wrong with either
your computer's networking options,
the sequence of command you used,
registration to the server (wrong key,
or a device with the same identity is
registered with a wrong key. You can
check this out at
https://leshan.eclipseprojects.io/#/security) or something else.
Hi,
Is
there some problem with this
server?
It should not. But you maybe found a
bug ?
Thursday I integrated in master
(and so applied on Leshan sandbox)
some commits about integration of
the new Californium version, there
is maybe a regression with this.
(Californium itself or my
modifications)
This could help if you provide
more context. (which client used ?
DTLS or not ?, if DTLS, rpk psk or
x509 ? providing wireshark capture
or log could help too)
If you prefer you can use github
issue ? (Mailing list is fine too)
Simon
Le
23/11/2020 à 13:17, Mark Lugovskoy
a écrit :
Hi,
Last
week I connected with my device
successfully to the demo LESHAN
server:
https://leshan.eclipseprojects.io/#/clients.
But
since Thursday I can’t connect
to it, with the same sequence of
commands that I used before.
Is
there some problem with this
server?
Thank
you,
Mark
_______________________________________________
leshan-dev mailing list
leshan-dev@xxxxxxxxxxx
To unsubscribe from this list, visit https://www.eclipse.org/mailman/listinfo/leshan-dev
_______________________________________________
leshan-dev mailing list
leshan-dev@xxxxxxxxxxx
To unsubscribe from this list, visit
https://www.eclipse.org/mailman/listinfo/leshan-dev
_______________________________________________
leshan-dev mailing list
leshan-dev@xxxxxxxxxxx
To unsubscribe from this list, visit https://www.eclipse.org/mailman/listinfo/leshan-dev
_______________________________________________
leshan-dev mailing list
leshan-dev@xxxxxxxxxxx
To unsubscribe from this list, visit https://www.eclipse.org/mailman/listinfo/leshan-dev