I've made some progress: It's a case-sensitivity comparison issue in Firefox.
Fingerprint hash "SHA-256" lead to "BAD certificate" while "sha-256" works (at 
least I receive the encrypted message).

On Tuesday, January 8, 2013 11:25:08 PM UTC+1, Mamadou Diop wrote:
> About the DTLS issue, I've opened a ticket on the tracker: 
> https://bugzilla.mozilla.org/show_bug.cgi?id=828027
> 
> 
> 
> I'm not security expert but Wireshark shows the "server hello", "certificate" 
> and "server hello Done" as a single UDP packet (pkt #337 in the pcap file). I 
> thought each part is like an attribute and could be stacked as they contain 
> "length" field.
> 
> For the fingerprint, I know that the checking is up to the application itself 
> (not done by OpenSSL) but what happens if we ask OpenSSL to verify the certs 
> using "SSL_set_verify(ssl, (SSL_VERIFY_PEER | 
> SSL_VERIFY_FAIL_IF_NO_PEER_CERT, .)" ?
> 
> 
> 
> On Tuesday, January 8, 2013 10:40:50 PM UTC+1, Eric Rescorla wrote:
> 
> > On Tue, Jan 8, 2013 at 10:33 AM, Mamadou Diop <[email protected]> wrote:
> 
> > 
> 
> > 
> 
> > 
> 
> > >
> 
> > 
> 
> > > I'm using Nightly 20.0a1 on Windows Vista and 8. The issues are:
> 
> > 
> 
> > >
> 
> > 
> 
> > > 1) The RTP profile for audio and video medias are not correct. Firefox
> 
> > 
> 
> > > uses "RTP/SAVPF" instead of "UDP/TLS/RTP/SAVPF".
> 
> > 
> 
> > >
> 
> > 
> 
> > 
> 
> > 
> 
> > We're aware of this, but it's low priority. You'll need to fix it in the
> 
> > 
> 
> > SDP for now.
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > > 2) Both "window.mozRTCSessionDescription" and
> 
> > 
> 
> > > "window.RTCSessionDescription" are defined but any attempt to create an 
> > > SDP
> 
> > 
> 
> > > with "window.RTCSessionDescription" fails.
> 
> > 
> 
> > >
> 
> > 
> 
> > 
> 
> > 
> 
> > Yes, don't use the second one.
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > > 3) The initial SDP created using PeerConnection::createOffer() or
> 
> > 
> 
> > > PeerConnection::createAnswer() contains all ICE candidates (not an issue 
> > > of
> 
> > 
> 
> > > course) and I guess this is why "onicecandidate" callback is never called.
> 
> > 
> 
> > > The problem is that there is no way to known if ICE gathering is finished
> 
> > 
> 
> > > or not. When using XMPP this is not a problem as it's possible to send
> 
> > 
> 
> > > candidates alone but with SIP this is not allowed.
> 
> > 
> 
> > >
> 
> > 
> 
> > 
> 
> > 
> 
> > File a bug and we'll add a dummy call. In the meantime, of course
> 
> > 
> 
> > you can just simulate the callback conditionally on you being
> 
> > 
> 
> > Firefox (you need a polyfill in any case to handle prefixing).
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > > 4) Firefox fails to recover from ICE role conflict when it has lower
> 
> > 
> 
> > > priority.
> 
> > 
> 
> > >
> 
> > 
> 
> > 
> 
> > 
> 
> > Hmm... This code is supposed to work, but that doesn't mean there
> 
> > 
> 
> > isn't a defect. If you can set logging to high using the following
> 
> > 
> 
> > environment
> 
> > 
> 
> > variables:
> 
> > 
> 
> > 
> 
> > 
> 
> > R_LOG_LEVEL=9
> 
> > 
> 
> > R_LOG_DESTINATION=stderr
> 
> > 
> 
> > 
> 
> > 
> 
> > And then file a bug with the ICE output, we can investigate.
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > > 5) In response to the DTLSv1 hello message from my SIP gateway to Firefox,
> 
> > 
> 
> > > I receive an error (Level: Fatal, Description: Bad Certificate). I'm sure
> 
> > 
> 
> > > that certificates are correct, they are used for both HTTPS and WSS (off
> 
> > 
> 
> > > course not only why I say it's correct).
> 
> > 
> 
> > >
> 
> > 
> 
> > 
> 
> > 
> 
> > I'd need to know more about what you are doing here. DTLSv1 hello messages
> 
> > 
> 
> > don't contain
> 
> > 
> 
> > certificates at all, so at this point the server should be sending a
> 
> > 
> 
> > CertificateRequest
> 
> > 
> 
> > message to you and shouldn't have seen your certificate yet. Note, however,
> 
> > 
> 
> > that
> 
> > 
> 
> > the test for whether a certificate is valid in this context is whether it
> 
> > 
> 
> > matches the digests
> 
> > 
> 
> > provided in the handshake, not whether it is valid for HTTPS.
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > > 6) ...to be continued
> 
> > 
> 
> > >
> 
> > 
> 
> > > I also want to patch some other issue in Firefox. Where could I found the
> 
> > 
> 
> > > source code to rebuild firefox?
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > 
> 
> > https://developer.mozilla.org/en-US/docs/Developer_Guide/Source_Code/Mercurial
> 
> > 
> 
> > 
> 
> > 
> 
> > -Ekr

_______________________________________________
dev-media mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-media

Reply via email to