-
Notifications
You must be signed in to change notification settings - Fork 368
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Scandium fails to process DTLS some handshakes #592
Comments
Would it be possible to get the wireshark logs? |
I will try to produce them today. |
The logging was changed last year to slf4j. Using
you can provide your own logback config.
would enable the scandium logging. |
Just for posternity: I also needed to do: to get the goddness running. |
What's that? |
It is apparently needed to initialize Log4j. Otherwise the outputs go to /dev/null im my deployment. |
I cannot attach the logs. I've put them here: |
Just use drag and drop to attach files :-) |
Just as hint for further logs: If you filter the packets in wireshark using "dtls" and then "file -> export specified packets ..." you can easily export just the relevant set of messages. The message 51852 client => server contains 3 handshake message (identity clientA). Your scandium log shows:
So I guess, you use different PSK secret keys. Sometimes the secret key must be provided direct or as hex or as base64. So can you check, which bytes scandium is using for the secret key? |
I'm getting "Something went really wrong, and we can't process that file." |
My dtls.zip? |
Or when you drap and drop? |
Anyway, please check the bytes used by your secret key. |
When I try to select the zip (not using dnd). I'm checking the PSK as we speak. |
PSK confirmed to be same on both sides. |
hold on, someone has been doing a your-hex-is-my-string-which-gives-me another-hex conversion .... |
:-) That approach is one of the favourite for failures in PSK :-) |
This issues applies to both 1.0.6 and to 2.0.0-M7, it probably applies to other versions as well.
I have a failure to process the following DTLS handshake using PSK:
Client Hello
Hello Verify Request
Client Hello
Server Hello, Server Hello Done
Client key Exchange
Change Cipher Spec
Encrypted Handshake Message
Note how the Client key Exchange, Change Cipher Spec and Encrypted Handshake Message are not sent in the same message. The handshake works if they are, but the DTLS spec. allows sending them in separate messages.
I am not sure that this is the problem but so far it looks like the only difference, and I have two other DTLS implementations next to me communicating just fine with one another (but not with me).
The text was updated successfully, but these errors were encountered: