-
Notifications
You must be signed in to change notification settings - Fork 157
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Client example error - Expected and actual key signature do not match #32
Comments
I download and compiled the latest OpenSSL (1.1.0j) and it appears to not be affected by this problem. I am not sure if this is a bug in OpenSSL or some other subtle incompatibility that was resolved in 1.1.0+. |
@diagonalfish thanks for the report! I will run I can also help debug quicker if you can
|
Yes, it is the default in the current version of CentOS 7 (7.6.1810 at time of writing). The full package version is openssl-1.0.2k-16.el7. |
Here is a spew of all the variables you wanted to see: https://gist.github.com/diagonalfish/ed5c393f73b5b76444ba66f5285b37f1 pcap's a bit harder because I'm communicating on localhost but here's the OpenSSL debug output which includes packet hex dumps: https://gist.github.com/diagonalfish/836cac3938221c10a4f966995b6ca927 |
Perfect, thank you @diagonalfish I was able to reproduce this, and will be working on this. I will update you when I know the exact issue and then when I push a fix. Thanks for using Pion DTLS! |
I was able to get OpenSSL as a client and Pion DTLS working as a server with this patch
I will get this patch into master. We should conditionally support getting/setting extensions like Still working on pion DTLS as a client. This is probably the most frustrating part, it is just in hash verification, if you do this everything works. You can do this if you want to be unblocked, but definitely don't ship with this. I am sure this is just an off-by-one somewhere, but really tough to debug this part with OpenSSL.
|
Sorry - was out last week and didn't see this. I appreciate the work you've put into this so far. If there's anything else I can do to help let me know. |
Library when initially written was only used for pion-WebRTC, where we always wanted SRTP. This puts it behind configuration so we can start up a Client/Server without SRTP Relates to: #32
Library when initially written was only used for pion-WebRTC, where we always wanted SRTP. This puts it behind configuration so we can start up a Client/Server without SRTP Relates to: #32
Hey good news @diagonalfish this is all fixed! Can you try out my branch when you get a chance? #37 I will merge into master if it all works, thanks! |
Can confirm that the issue-32 branch solves the problem. Excellent :) |
Library when initially written was only used for pion-WebRTC, where we always wanted SRTP. This puts it behind configuration so we can start up a Client/Server without SRTP Relates to: #32
Library when initially written was only used for pion-WebRTC, where we always wanted SRTP. This puts it behind configuration so we can start up a Client/Server without SRTP Relates to: #32
Fantastic, merged! Thanks again for the bug report. If there is every anything else I am all ears, hopefully the package is easy to use :) Also feel free to join us in Slack! Most people are talking about pions/webrtc but always happy to help debug/discuss anything. |
Hello.
Following the instructions in the readme to create a certificate and key and testing out the client example, I get the following error with the latest version of the library (as of today):
I'm on CentOS 7. My OpenSSL version is 1.0.2k-fips, and I'm on Go 1.11.2.
The text was updated successfully, but these errors were encountered: