Hi Erwin,
Thanks for the report. I found the bug and submitted a patch (#2628). You can
also download it from our website at
http://sctp.fh-muenster.de/dtls-patches.html and it would be very helpful if
you can confirm that the patch fixes your issue.
Robin
On Oct 12, 2011, at 11:33 PM, Erwin
Hi Flo,
On Sep 28, 2011, at 5:37 PM, Flo Wohlfart wrote:
> Is it safe to call SSL_write() in thread B, while thread A is blocking
> at DTLSv1_listen() for the same SSL connection?
>
> Here comes an example for better understanding:
>
> THREAD A:
> ...
> while (DTLSv1_listen(ssl, &client_addr) <
Hi Neo,
On Jun 1, 2011, at 4:02 AM, Neo Liu wrote:
> On Tue, May 31, 2011 at 6:41 PM, Michael Tüxen
> wrote:
>
> What about using SSL_tls1_key_extractor()?
>
> I didn't this function in OpenSSL source.
> I can get master secret from SSL_SESSION->master_key, but how can I find the
> PRF api u
Hi Sebastian,
On Jan 24, 2011, at 2:27 PM, Sebastian Proca wrote:
> I'm using Ubuntu 10.04 with 2.6.32-27 kernel.
> So, I've been following your advice and put wireshark to check the packages
> on the lo "wire". Besides the "Destination unreachable(Host unreachable)"
> message that I receive I
Hi Sebastian,
On Jan 19, 2011, at 11:50 AM, Sebastian Proca wrote:
> Thank you for your help! I understand now the way that this application
> should be used. Yet, I didn't manage to obtain a working dtls session.
> After I start the server :
>
> # ./dtls_udp_echo
>
> I start the client, but I
Hi Sebastian,
On Jan 17, 2011, at 4:12 PM, Sebastian Proca wrote:
> It's strange for me how comes that, depending on the specified arguments, I
> get two different errors:
>
> I case :
>
> # ./dtls_udp_echo 127.0.0.1
> SSL_connect: Connection refused
> error::lib(0):func(0):reason(0)
>
Hi David,
Which version of OpenSSL are you using? The current 0.9.8 stable is
*very* buggy and also in 1.0.0 beta 3 are still several known bugs.
You should either use the development version in the CVS repository or
apply our patches from sctp.fh-muenster.de to have them fixed. You can
a
I was able to solve the problem, the session cache was activated and
stored all the sessions and a bug in DTLS caused that twice as much
sessions as necessary have been created. The bug will be fixed with an
updated version of bugfix #2028.
- Robin
Am 02.09.2009 um 10:47 schrieb Robin
Hi all,
I have written an DTLS echo server and client for testing purposes. In
this case I want to test my new DTLSv1_listen() function, which waits
for new connections with responding to ClientHellos with
HelloVerifyRequest messages until a ClientHello with a valid cookie
arrives. The SSL
On Feb 3, 2009, at 11:27 PM, Russell, Joshua wrote:
I am trying to get a sample DTLS application working. The following
indications are provided when I try to connect with the client:
After a successful call to dtls_connect(), I receive SSL_ERR_SYSCALL
when attempting to write from the cl
On Jan 26, 2009, at 5:24 PM, Daniel Mentz wrote:
I'm surprised that you can use accept() on UDP sockets. I checked
the man pages of a Debian GNU/Linux system. They say that you can
use accept() only with connection-based socket types (SOCK_STREAM,
SOCK_SEQPACKET). Is this something specifi
On Jan 22, 2009, at 5:11 PM, Wes Hardaker wrote:
RS> As a workaround you can use connected UDP sockets. Just use
accept()
RS> and connect() as you would with TCP connections and create new
BIO and
RS> SSL objects for every connection. I have tested that and it works
RS> pretty well so far.
On Jan 22, 2009, at 7:47 AM, David Woodhouse wrote:
Is there anyone who actually cares about DTLS and getting patches
applied?
Very good question. I hope someone will apply at least the bugfixes
soon. I have several patches adding new features in the pipe, but they
understandably rely on
Hi Wes,
The biggest issue comes from needing to deal with multiple clients
trying to talk through the same UDP port, which isn't handled by at
least the 0.9.8i code at least.
Using multiple connections with one socket is still not implemented as
the OpenSSL architecture and API does not supp
:01 PM, Robin Seggelmann wrote:
Hi Michael,
unfortunately, you're wrong. You need my patches to perform
renegotiations at all, since the current implementation is broken
in this respect. Technically, the abbreviated handshake is
supported, but OpenSSL does not provide any API to initia
Hi Michael,
unfortunately, you're wrong. You need my patches to perform
renegotiations at all, since the current implementation is broken in
this respect. Technically, the abbreviated handshake is supported, but
OpenSSL does not provide any API to initiate it without reconnecting.
The func
16 matches
Mail list logo