About the DTLS issue, I've opened a ticket on the tracker: 
https://bugzilla.mozilla.org/show_bug.cgi?id=828027

I'm not security expert but Wireshark shows the "server hello", "certificate" 
and "server hello Done" as a single UDP packet (pkt #337 in the pcap file). I 
thought each part is like an attribute and could be stacked as they contain 
"length" field.
For the fingerprint, I know that the checking is up to the application itself 
(not done by OpenSSL) but what happens if we ask OpenSSL to verify the certs 
using "SSL_set_verify(ssl, (SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, 
.)" ?

On Tuesday, January 8, 2013 10:40:50 PM UTC+1, Eric Rescorla wrote:
> On Tue, Jan 8, 2013 at 10:33 AM, Mamadou Diop <[email protected]> wrote:
> 
> 
> 
> >
> 
> > I'm using Nightly 20.0a1 on Windows Vista and 8. The issues are:
> 
> >
> 
> > 1) The RTP profile for audio and video medias are not correct. Firefox
> 
> > uses "RTP/SAVPF" instead of "UDP/TLS/RTP/SAVPF".
> 
> >
> 
> 
> 
> We're aware of this, but it's low priority. You'll need to fix it in the
> 
> SDP for now.
> 
> 
> 
> 
> 
> 
> 
> > 2) Both "window.mozRTCSessionDescription" and
> 
> > "window.RTCSessionDescription" are defined but any attempt to create an SDP
> 
> > with "window.RTCSessionDescription" fails.
> 
> >
> 
> 
> 
> Yes, don't use the second one.
> 
> 
> 
> 
> 
> 
> 
> > 3) The initial SDP created using PeerConnection::createOffer() or
> 
> > PeerConnection::createAnswer() contains all ICE candidates (not an issue of
> 
> > course) and I guess this is why "onicecandidate" callback is never called.
> 
> > The problem is that there is no way to known if ICE gathering is finished
> 
> > or not. When using XMPP this is not a problem as it's possible to send
> 
> > candidates alone but with SIP this is not allowed.
> 
> >
> 
> 
> 
> File a bug and we'll add a dummy call. In the meantime, of course
> 
> you can just simulate the callback conditionally on you being
> 
> Firefox (you need a polyfill in any case to handle prefixing).
> 
> 
> 
> 
> 
> 
> 
> > 4) Firefox fails to recover from ICE role conflict when it has lower
> 
> > priority.
> 
> >
> 
> 
> 
> Hmm... This code is supposed to work, but that doesn't mean there
> 
> isn't a defect. If you can set logging to high using the following
> 
> environment
> 
> variables:
> 
> 
> 
> R_LOG_LEVEL=9
> 
> R_LOG_DESTINATION=stderr
> 
> 
> 
> And then file a bug with the ICE output, we can investigate.
> 
> 
> 
> 
> 
> 
> 
> > 5) In response to the DTLSv1 hello message from my SIP gateway to Firefox,
> 
> > I receive an error (Level: Fatal, Description: Bad Certificate). I'm sure
> 
> > that certificates are correct, they are used for both HTTPS and WSS (off
> 
> > course not only why I say it's correct).
> 
> >
> 
> 
> 
> I'd need to know more about what you are doing here. DTLSv1 hello messages
> 
> don't contain
> 
> certificates at all, so at this point the server should be sending a
> 
> CertificateRequest
> 
> message to you and shouldn't have seen your certificate yet. Note, however,
> 
> that
> 
> the test for whether a certificate is valid in this context is whether it
> 
> matches the digests
> 
> provided in the handshake, not whether it is valid for HTTPS.
> 
> 
> 
> 
> 
> 
> 
> > 6) ...to be continued
> 
> >
> 
> > I also want to patch some other issue in Firefox. Where could I found the
> 
> > source code to rebuild firefox?
> 
> 
> 
> 
> 
> https://developer.mozilla.org/en-US/docs/Developer_Guide/Source_Code/Mercurial
> 
> 
> 
> -Ekr
_______________________________________________
dev-media mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-media

Reply via email to