[asterisk-bugs] [JIRA] (ASTERISK-25265) [patch]DTLS Failure when calling WebRTC-peer on Firefox 39 - add ECDH support and fallback to prime256v1

Richard Mudgett (JIRA) noreply at issues.asterisk.org
Wed Jul 29 10:58:33 CDT 2015


    [ https://issues.asterisk.org/jira/browse/ASTERISK-25265?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=227097#comment-227097 ] 

Richard Mudgett edited comment on ASTERISK-25265 at 7/29/15 10:57 AM:
----------------------------------------------------------------------

Glad it helped you!  I ran in to this problem myself just last week and that's how I found your report.  I wouldn't be surprised if Chrome makes the same change eventually.  The only difference between what is attached here and what is on Gerrit is indentation.  

A couple other patches you might be interested in (these are things that got me with 13.1-cert2)

ASTERISK-24711 - Installing Asterisk with a new version of OpenSSL (what is included in an up to date Ubuntu 14.04 for example) results in a broken DTLS handshake.  This patch fixes it.  If you haven't applied this patch and your distro updates OpenSSL, you'll run in to this.

ASTERISK-25096 - Websocket related segfault.  I ran in to this when a client would go in to sleep mode and then wake up.  It would instantly segfault Asterisk.  It was a big patch (I just pulled the latest patch from Gerrit), but it works.  

With those 2 patches and the patch for ECDH support, 13.1-cert2 has been pretty solid for me so far.  


was (Author: mwduncan):
Glad it helped you!  I ran in to this problem myself just last week and that's how I found your report.  I wouldn't be surprised if Chrome makes the same change eventually.  The only difference between what is attached here and what is on Gerrit is indentation.  

A couple other patches you might be interested in (these are things that got me with 13.1-cert2)

https://issues.asterisk.org/jira/browse/ASTERISK-24711 - Installing Asterisk with a new version of OpenSSL (what is included in an up to date Ubuntu 14.04 for example) results in a broken DTLS handshake.  This patch fixes it.  If you haven't applied this patch and your distro updates OpenSSL, you'll run in to this.

https://issues.asterisk.org/jira/browse/ASTERISK-25096 - Websocket related segfault.  I ran in to this when a client would go in to sleep mode and then wake up.  It would instantly segfault Asterisk.  It was a big patch (I just pulled the latest patch from Gerrit), but it works.  

With those 2 patches and the patch for ECDH support, 13.1-cert2 has been pretty solid for me so far.  

> [patch]DTLS Failure when calling WebRTC-peer on Firefox 39 - add ECDH support and fallback to prime256v1
> --------------------------------------------------------------------------------------------------------
>
>                 Key: ASTERISK-25265
>                 URL: https://issues.asterisk.org/jira/browse/ASTERISK-25265
>             Project: Asterisk
>          Issue Type: Bug
>      Security Level: None
>          Components: Core/BuildSystem, Resources/res_rtp_asterisk
>    Affects Versions: SVN, 13.1.0
>            Reporter: Stefan Engström
>         Attachments: asterisk-ecdh.patch
>
>
> This issue has already been reported by http://forums.asterisk.org/viewtopic.php?f=1&t=95417
> Whenever calling a webrtc peer which uses firefox version 39 (or 40 beta), I get  error messages like "res_rtp_asterisk.c: DTLS failure occurred on RTP instance '0x7fefe800e9e8' due to reason 'no shared cipher', terminating" after the SDP exchange, and the call terminates.
> Hopefully you can reproduce it yourself on the latest version of asterisk by using
> http://www.sipml5.org/call.htm (I'm not sure if asterisk is doing anything wrong or just firefox/sipml5)
> I will provide more info if it's not easily reproducable.



--
This message was sent by Atlassian JIRA
(v6.2#6252)



More information about the asterisk-bugs mailing list