Hi Gregg,

No unfortunately. I will have a second look today but If I could not, I
will proceed using the non-certificate based shared key credential
supporting a limited number of clients for the time being.

On Sun, Dec 9, 2018 at 11:18 PM Gregg Reynolds <d...@mobileink.com> wrote:

> Did you ever get this figured out?
>
> I've seen "*No ciphersuites configured**" but sadly don't remember how I
> resolved it.*
>
> *G*
>
> On Wed, Dec 5, 2018, 9:34 AM Khaled Elsayed <khaledi...@gmail.com wrote:
>
>> Hi,
>>
>> I am trying to get certificate-based credential management to work
>> between a provisioned server and a client. So, I worked a bit more with the
>> provisionclient and sampleserver_mfg. I created new certificates via the
>> crtgenerator application. I configured the json files with the new
>> certificates and private keys for both application. The provisioning
>> worked. This is the good news proving that these certificates and json
>> files do work.
>>
>> The bad news is if I want to apply the certificate based
>> authentication/credntial in other examples not including provisioning, it
>> does not work. I use the sample client and server in the examples/OCFSecure
>> folder. The client and server initiate properly and reads the
>> cred/certificates correctly. However, when the client attempts to issues a
>> GET request over coaps, it fails.
>>
>> Obviously there is something that needs to be invoked to associate the
>> client and server so that they use the certificates to calculate the shared
>> symmetric encryption key. This seems to occur when the provisioningclient
>> starts to access the /doxm resource in the sampleserver_mfg. I could see
>> that in the log but I cannot figure out how to make the OCFSecure
>> client/server start the certificate exchange process.
>>
>> Here is the log. It complains  *No ciphersuites configured* (see below)
>> although they are to start DTLS handshake (InitiateTlsHandshake is being
>> invoked). So, what procedure should be invoked to create a cipher between
>> the two endpoints using the certificates before reaching to the point they
>> exchange coaps payloads. Thanks for any pointers.
>>
>> 48:53.275 INFO: OIC_CA_MSG_HANDLE: CASendUnicastData type : 1
>>
>> 48:53.275 DEBUG: OIC_CA_INF_CTR: unicast message to adapter
>>
>> 48:53.275 DEBUG: OIC_UQUEUE: Queue Count : 1
>>
>> 48:53.275 INFO: OIC_CA_PRTCL_MSG: adapter value of CoAP/TCP is 1
>>
>> 48:53.275 DEBUG: OIC_CA_RETRANS: sent pdu, msgtype=1, msgid=60490
>>
>> 48:53.275 DEBUG: OIC_CA_RETRANS: not supported message type
>>
>> 48:53.275 DEBUG: OIC_CA_MSG_HANDLE: CADestroyData IN
>>
>> 48:53.275 DEBUG: OIC_CA_MSG_HANDLE: CADestroyData OUT
>>
>> 48:53.275 DEBUG: OIC_CA_QING: wait..
>>
>> 48:53.275 DEBUG: OIC_CA_QING: wake up..
>>
>> 48:53.275 DEBUG: OIC_CA_IP_ADAP: DTLS encrypt called
>>
>> 48:53.275 DEBUG: OIC_CA_NET_SSL: In CAencryptSsl
>>
>> 48:53.275 DEBUG: OIC_CA_NET_SSL: Port 39115
>>
>> 48:53.275 DEBUG: OIC_CA_NET_SSL: Data to be encrypted dataLen [30]
>>
>> 48:53.275 DEBUG: OIC_CA_NET_SSL: In GetSslPeer
>>
>> 48:53.275 DEBUG: OIC_CA_NET_SSL: Return NULL
>>
>> 48:53.275 DEBUG: OIC_CA_NET_SSL: Out GetSslPeer
>>
>> 48:53.279 DEBUG: OIC_CA_NET_SSL: In InitiateTlsHandshake
>>
>> 48:53.279 DEBUG: OIC_CA_NET_SSL: In NewSslEndPoint
>>
>> 48:53.279 DEBUG: MBED_TLS: set_timer to 0 ms
>>
>> 48:53.279 DEBUG: OIC_CA_NET_SSL: New [client role] endpoint added [
>> 10.0.0.2:39115]
>>
>> 48:53.279 DEBUG: OIC_CA_NET_SSL: Out NewSslEndPoint
>>
>> 48:53.279 DEBUG: OIC_CA_NET_SSL: In SetupCipher
>>
>> 48:53.279 DEBUG: OIC_SRM_PKIX_INTERFACE: In InitCipherSuiteList
>>
>> 48:53.279 DEBUG: OIC_SRM_CREDL: In InitCipherSuiteListInternal
>>
>> 48:53.279 DEBUG: OIC_SRM_CREDL: Out InitCipherSuiteListInternal
>>
>> 48:53.279 DEBUG: OIC_SRM_PKIX_INTERFACE: Out InitCipherSuiteList
>>
>> 48:53.279 DEBUG: OIC_CA_NET_SSL: Supported ciphersuites:
>>
>> *48:53.279 ERROR: OIC_CA_NET_SSL: No ciphersuites configured, secure
>> connections will fail*
>>
>> 48:53.279 DEBUG: OIC_CA_NET_SSL: Out SetupCipher
>>
>> 48:53.279 ERROR: OIC_CA_NET_SSL: Failed to set up cipher
>>
>> 48:53.279 DEBUG: OIC_CA_NET_SSL: In DeleteSslEndPoint
>>
>>
>>
>> On Tue, Nov 27, 2018 at 9:16 AM Khaled Elsayed <khaledi...@gmail.com>
>> wrote:
>>
>>> Thanks Mats for the pointer. Very handy tool.  Nicely done Rami.
>>>
>>> Khaled
>>>
>>>
>>>
>>> On Mon, Nov 26, 2018 at 5:21 PM Mats Wichmann <m...@wichmann.us> wrote:
>>>
>>>> On 11/26/18 7:53 AM, Khaled Elsayed wrote:
>>>> > Hi Nathan
>>>> >
>>>> > Just wanted to confirm that json2cbor from iotivity-2.0.0 and latest
>>>> master
>>>> > both fail when an ACE contains a roletype entry.
>>>> >
>>>> > For the provisioning client example, is there anyway to inspect the
>>>> .dat
>>>> > files that are modified after the provisioning is performed?
>>>> Something like
>>>> > a cbor2json if there is such a tool.
>>>> >
>>>> > Thanks
>>>> >
>>>> > Khaled
>>>>
>>>> https://github.com/alshafi/iotivity-tool
>>>>
>>>> should be able to do this - it converts in both directions.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> 
>>
>>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#10062): 
https://lists.iotivity.org/g/iotivity-dev/message/10062
Mute This Topic: https://lists.iotivity.org/mt/28611921/21656
Group Owner: iotivity-dev+ow...@lists.iotivity.org
Unsubscribe: https://lists.iotivity.org/g/iotivity-dev/unsub  
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to