[asterisk-dev] Deprecating res_crypto and replacement

asterisk at phreaknet.org asterisk at phreaknet.org
Tue Mar 29 18:32:00 CDT 2022


On 3/29/2022 7:09 PM, Joshua C. Colp wrote:
> On Tue, Mar 29, 2022 at 7:46 PM Philip Prindeville 
> <philipp_subx at redfish-solutions.com 
> <mailto:philipp_subx at redfish-solutions.com>> wrote:
>
>     Hi,
>
>     I'm working on replacing res_crypto for a variety of reasons. 
>     It's a poor API that's inflexible.  It uses cryptographically
>     deprecated methods and key sizes.  It doesn't support ECC.  It
>     isn't forward compatible with Openssl-3.0.  It doesn't have any
>     test case coverage. etc.
>
>
> My opinion is that a minimum of changes should be done to allow 
> res_crypto to continue to exist. It's not a module that is really used 
> except in legacy things and func_aes. I'm not even sure how much 
> func_aes is used really. The only time res_crypto has really been used 
> is in legacy modules that did their own crypto kind of thing. I don't 
> think updating res_crypto for the sake of it is worthwhile as of this 
> time.
>
>     I've identified that:
>
>     func/func_aes
>     chan/chan_iax2
>     pbx/pbx_dundi
>     pbx/dundi-parser
>
>     use res_crypto.  Is there out-of-tree stuff that requires it as well?
>
>     Anyway, I'm working on the requirements for the replacement here:
>
>     https://wiki.asterisk.org/wiki/pages/viewpage.action?pageId=49153311
>
>
> The page is not accessible.
>
>     And feedback is appreciated.
>
>
> Both chan_iax2 and pbx_dundi are effectively in a maintenance mode. 
> The chan_iax2 module sees some changes as a result of community 
> members still using it, but few. The pbx_dundi module never sees 
> changes. I would be extremely hesitant in any changes to them to take 
> advantage of any changes for the sake of it due to the possibility of 
> regressions, and also any protocol changes that would have to occur if 
> they were expanded for more recent cryptography. The func_aes module 
> would be the only thing I could vaguely see using any improvements but 
> there's nothing to say that it couldn't just be changed to not use 
> res_crypto.

Personally, as an active user of chan_iax2 that has submitted 
improvements to it (with no plans to stop using it), better encryption 
than 1024-bit AES would certainly be welcome from my perspective, as an 
end user. The encryption capabilities of chan_iax2 are pretty nice, but 
they could be better.
I brought this up last year and the feeling at the time was that 
res_crypto should be left alone. 2048-bit or 4096-bit support, whether 
by enhancing res_crypto or something else altogether, would certainly be 
"nice", but if Sangoma wants to stay away from that, that might be that...

NA



More information about the asterisk-dev mailing list