[asterisk-bugs] [JIRA] (ASTERISK-23099) Asterisk WSS ( Secure WebSocket) patch
Thava Iyer (JIRA)
noreply at issues.asterisk.org
Sun Jan 5 19:29:03 CST 2014
Thava Iyer created ASTERISK-23099:
-------------------------------------
Summary: Asterisk WSS ( Secure WebSocket) patch
Key: ASTERISK-23099
URL: https://issues.asterisk.org/jira/browse/ASTERISK-23099
Project: Asterisk
Issue Type: Improvement
Security Level: None
Components: Resources/res_http_websocket
Affects Versions: 11.5.1
Environment: Linux, Chrome
Reporter: Thava Iyer
Severity: Trivial
Asterisk websocket interface (res/res_http_websocket.c) works well for normal websockets (ws) but fails on secure - websockets (wss). The ast_websocket_read() function, first reads the header (14) bytes using first fread() call and then , for the remaining payload, in a while loop, it first polls the raw-socket for the date before further reads. In the normal websocket, it is fine. But for the secure-websocket case, the underlying ssl_read() would have read the whole data, in the first fread() call (of course to decrypt ) and emptied the socket. This would make the ast_websocket_read() to fail, thus, the sip_websocket_callback() would just waits for data on the socket.
This enables to read the whole available data at first and then wait for any fragmented packets. This enables the secure-websocket connections to work properly.
This has been tested with Chrome 31.0.1650.63.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.asterisk.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
More information about the asterisk-bugs
mailing list