[asterisk-bugs] [Asterisk 0018643]: SRTP unprotect: authentication failure when RTP sequence number switches from 65535 -> 0
Asterisk Bug Tracker
noreply at bugs.digium.com
Wed May 25 09:14:59 CDT 2011
A NOTE has been added to this issue.
======================================================================
https://issues.asterisk.org/view.php?id=18643
======================================================================
Reported By: marcelloceschia
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 18643
Category: Channels/chan_sip/SRTP
Reproducibility: always
Severity: major
Priority: normal
Status: acknowledged
Asterisk Version: 1.8.2.1
JIRA: SWP-2945
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
======================================================================
Date Submitted: 2011-01-19 06:53 CST
Last Modified: 2011-05-25 09:14 CDT
======================================================================
Summary: SRTP unprotect: authentication failure when RTP
sequence number switches from 65535 -> 0
Description:
[Jan 19 09:29:34] WARNING[9825] res_srtp.c: SRTP unprotect: authentication
failure
Useragent : Nokia RM-530 052.005
Prim.Transp. : TLS
======================================================================
----------------------------------------------------------------------
(0135374) michaesc (reporter) - 2011-05-25 09:14
https://issues.asterisk.org/view.php?id=18643#c135374
----------------------------------------------------------------------
This isn't limited to Nokia user agents. My test of SRTP using SDES over
TLS led to the same failure (one way audio) with a Snom 8.4.31 user agent.
The test lasted about 1 1/2 hours before the one way audio began.
Issue History
Date Modified Username Field Change
======================================================================
2011-05-25 09:14 michaesc Note Added: 0135374
======================================================================
More information about the asterisk-bugs
mailing list