Hi Gregg,

For sure the file is read. It works when the file contents indicate a
pre-shared key type of security. When it is changed to certificate based I
get the handshake error.

Caveat: I'm using statically configured stuff - no dynamic provisioning,
> each side is already provisioned.


I have tried both. In your case, do you use pre-shared key (PSK) or
certificates? If the second, could you share the code?


On Mon, Dec 31, 2018 at 10:55 PM Gregg Reynolds <d...@mobileink.com> wrote:

> Fwiw, I got this error, and it was because I did not provide the cbor file
> that gets read. Check the logs to make sure your cbor files actually get
> read successfully. It could be something as simple as a bad path.
>
> Hth
>
> Gregg
>
> On Mon, Dec 31, 2018, 4:02 AM Khaled Elsayed <khaledi...@gmail.com wrote:
>
>> Hi Reporting on this:
>>
>>> So, I will re-visit this and test the following:
>>> 1) non-provisioned sampleserver_mfg  with proper certificate chain
>>> 2)  provisioningclient  with proper certificate chain provisions the
>>> sampleserver
>>> (I re-confirm 1 and 2 already work great either with sample code and
>>> certificates and also using my newly created certificates)
>>> 3) Third client with proper certificates chain accesses the
>>> sampleserver_mfg resources.
>>> I have a feeling this will work. Will let you guys know tomorrow.
>>
>>
>> Did not work. My feeling was wrong. Glad it did not. It would not be
>> logical if it works actually. Still the same issue. The provisioningclient
>> works all right and now owns the server_mfg. If a second client uses a
>> certificate to communicate with the server_mfg something needs to be called
>> to init the ciphersuite associated with the DTLS connection.
>>
>> 56:55.797 DEBUG: OIC_SRM_CREDL: In InitCipherSuiteListInternal
>> 56:55.797 DEBUG: OIC_SRM_CREDL: Out InitCipherSuiteListInternal
>> 56:55.797 DEBUG: OIC_SRM_PKIX_INTERFACE: Out InitCipherSuiteList
>> 56:55.797 DEBUG: OIC_CA_NET_SSL: Supported ciphersuites:
>> 56:55.797 ERROR: OIC_CA_NET_SSL: *No ciphersuites configured, secure
>> connections will fail*
>> 56:55.797 DEBUG: OIC_CA_NET_SSL: Out SetupCipher
>> 56:55.797 ERROR: OIC_CA_NET_SSL: Failed to set up cipher
>> 56:55.797 DEBUG: OIC_CA_NET_SSL: In DeleteSslEndPoint
>> 56:55.797 DEBUG: MBED_TLS: => free
>> 56:55.797 DEBUG: MBED_TLS: <= free
>> 56:55.797 DEBUG: OIC_CA_NET_SSL: In DeleteCacheList
>> 56:55.797 DEBUG: OIC_CA_NET_SSL: Out DeleteCacheList
>> 56:55.797 DEBUG: OIC_CA_NET_SSL: Out DeleteSslEndPoint
>> 56:55.797 ERROR: OIC_CA_NET_SSL: *TLS handshake failed*
>> 56:55.797 ERROR: OIC_CA_IP_ADAP: CAencryptSsl failed!
>>
>>
>>
>> On Sun, Dec 30, 2018 at 3:57 PM Khaled Elsayed via Lists.Iotivity.Org
>> <khaledieee=gmail....@lists.iotivity.org> wrote:
>>
>>> Hi Gregg. I am not using any new code. Just the code in
>>> ~/iotivity/examples/OCFSecure and also the code in and the code in
>>> resource/csdk/security/provisioning/sample. I just created new
>>> certificates/private keys and json files for a client and server. The
>>> certificates and json files work great for the provisioningclient  and
>>> sampleserver_mfg. So, I don't have a bug in the certificate and their usage
>>> in the json files. My problem is if I get one client and one server which
>>> are pre-provisioned ad their json uses certificate chain based
>>> authentication, the secure DTLS is not established. I suspect that this is
>>> probably just the model. the server should be provisioned first with a
>>> certificate holding client after which it can provide access. But I am not
>>> sure why or if this interpretation is correct.
>>>
>>> So, I will re-visit this and test the following:
>>> 1) non-provisioned sampleserver_mfg  with proper certificate chain
>>> 2)  provisioningclient  with proper certificate chain provisions the
>>> sampleserver
>>> (I re-confirm 1 and 2 already work great either with sample code and
>>> certificates and also using my newly created certificates)
>>> 3) Third client with proper certificates chain accesses the
>>> sampleserver_mfg resources.
>>> I have a feeling this will work. Will let you guys know tomorrow.
>>>
>>> I generate the certificates and keys using the utility certgenerator
>>> that also comes with the provisioning code. It is a very straight-forward
>>> tool. Then I process the output further with openssl to put the
>>> certificates in DER format to fill the JSON files.
>>>
>>> Let me know if there is anything else you need to restart on this.
>>>
>>> BR,
>>>
>>> Khaled
>>>
>>>
>>>
>>> On Thu, Dec 27, 2018 at 10:40 PM Gregg Reynolds <d...@mobileink.com>
>>> wrote:
>>>
>>>>
>>>>
>>>> On Mon, Dec 10, 2018, 1:02 AM Khaled Elsayed <khaledi...@gmail.com
>>>> wrote:
>>>>
>>>>> Hi Gregg,
>>>>>
>>>>> No unfortunately. I will have a second look today but If I could not,
>>>>> I will proceed using the non-certificate based shared key credential
>>>>> supporting a limited number of clients for the time being
>>>>>
>>>>
>>>> Do you have any code you can share? I'm gearing up to work on this
>>>> sorta stuff in January.
>>>>
>>>> G
>>>>
>>>>> _._,_
>>>>>
>>>>>> 
>>>
>>>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#10111): 
https://lists.iotivity.org/g/iotivity-dev/message/10111
Mute This Topic: https://lists.iotivity.org/mt/28611921/21656
Group Owner: iotivity-dev+ow...@lists.iotivity.org
Unsubscribe: https://lists.iotivity.org/g/iotivity-dev/unsub  
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to