<html>
<body>
<div style="font-family: Verdana, Arial, Helvetica, Sans-Serif;">
<table bgcolor="#f9f3c9" width="100%" cellpadding="8" style="border: 1px #c9c399 solid;">
<tr>
<td>
This is an automatically generated e-mail. To reply, visit:
<a href="https://reviewboard.asterisk.org/r/1741/">https://reviewboard.asterisk.org/r/1741/</a>
</td>
</tr>
</table>
<br />
<p>Ship it!</p>
<pre style="white-space: pre-wrap; white-space: -moz-pre-wrap; white-space: -pre-wrap; white-space: -o-pre-wrap; word-wrap: break-word;">So this all looks fine to me.
I still think you could have gotten the change into 1.8 or 10 without changing the API call, but since it's highly unlikely anything out there is actually a consumer of the API, I suppose I can let this slide.</pre>
<br />
<p>- Mark</p>
<br />
<p>On February 23rd, 2012, 9:32 a.m., Matt Jordan wrote:</p>
<table bgcolor="#fefadf" width="100%" cellspacing="0" cellpadding="8" style="background-image: url('https://reviewboard.asterisk.org/media/rb/images/review_request_box_top_bg.png'); background-position: left top; background-repeat: repeat-x; border: 1px black solid;">
<tr>
<td>
<div>Review request for Asterisk Developers, Joshua Colp, Mark Michelson, and otherwiseguy.</div>
<div>By Matt Jordan.</div>
<p style="color: grey;"><i>Updated Feb. 23, 2012, 9:32 a.m.</i></p>
<h1 style="color: #575012; font-size: 10pt; margin-top: 1.5em;">Description </h1>
<table width="100%" bgcolor="#ffffff" cellspacing="0" cellpadding="10" style="border: 1px solid #b8b5a0">
<tr>
<td>
<pre style="margin: 0; padding: 0; white-space: pre-wrap; white-space: -moz-pre-wrap; white-space: -pre-wrap; white-space: -o-pre-wrap; word-wrap: break-word;">Currently, when using res_srtp, once the SRTP policy has been added to the current session the policy is locked into place. Any attempt to replace an existing policy, which would be needed if the remote endpoint negotiated a new cryptographic key, is instead rejected in res_srtp. We thus need to have a mechanism to replace an existing policy associated with either a local or remote endpoint.
If we needed to change the key for a local policy (which we don't do, but its a hypothetical situation), changing the crytographic key is easy. The old stream associated with the local SSRC is removed, and a new stream is added. The libsrtp library has straightforward calls for this.
However, for the remote policy, it isn't as easy. Because our remote policy uses a wildcard type to match on any inbound SSRC value, it can't be replaced. The libsrtp library explicitly disallows changing wildcard policies (as the policies are applied to all streams matching the respective inbound/outbound direction, so replacing a wildcard policy would entail replacing all streams associated with that policy). As such, the only thing that can be done is to deallocate the old session and create a new session.
The replaces one problem with another - while we can replace the old session with a new session and a new remote policy, we would effectively destroy our local policy / stream when we do that. Currently, there is not an imposed order on when the local/remote policies are added (and in fact, we add the local one before the remote one currently). Thus, when replacing an SRTP session with a new one, the order in which things are done has to be:
1) Destroy the old SRTP session
2) Create a new SRTP session and add one of the two policies
3) Add the other policy
If we don't add both policies at the same time, we could end up in a situation where we set the local policy, and then set the remote policy, blowing out the previously added local policy. Good times.
This patch does the following:
1) It combines the adding of remote/local policies onto an SRTP session. Although this changes the rtp_engine API, in effect its minor, as the two were always added at the same time anyway by users of the API. This allows us to control the order in which things are added in res_srtp, and users of the API don't have to worry.
2) It adds a new virtual method to the res_srtp API, replace. This combines the destroy/create methods.
3) We now check for the type of stream we are adding. If we are adding a policy for a specific SSRC, we replace the existing stream. If we are adding a policy for a wildcard, we bail out if we already have a policy existing for that wildcard; otherwise we add it.
This patch does some other cleanup in unprotect and unload module, including toning down the log statements and shutting down the libsrtp library on unload.</pre>
</td>
</tr>
</table>
<h1 style="color: #575012; font-size: 10pt; margin-top: 1.5em;">Testing </h1>
<table width="100%" bgcolor="#ffffff" cellspacing="0" cellpadding="10" style="border: 1px solid #b8b5a0">
<tr>
<td>
<pre style="margin: 0; padding: 0; white-space: pre-wrap; white-space: -moz-pre-wrap; white-space: -pre-wrap; white-space: -o-pre-wrap; word-wrap: break-word;">Made sure that the initial patch didn't break the SRTP test in the TestSuite. Made sure that the module could be loaded and unloaded.
More testing is needed to make sure that the whole thing actually works.</pre>
</td>
</tr>
</table>
<h1 style="color: #575012; font-size: 10pt; margin-top: 1.5em;">Diffs</b> </h1>
<ul style="margin-left: 3em; padding-left: 0;">
<li>/branches/1.8/channels/sip/sdp_crypto.c <span style="color: grey">(356289)</span></li>
<li>/branches/1.8/include/asterisk/res_srtp.h <span style="color: grey">(356289)</span></li>
<li>/branches/1.8/include/asterisk/rtp_engine.h <span style="color: grey">(356289)</span></li>
<li>/branches/1.8/main/rtp_engine.c <span style="color: grey">(356289)</span></li>
<li>/branches/1.8/res/res_srtp.c <span style="color: grey">(356289)</span></li>
</ul>
<p><a href="https://reviewboard.asterisk.org/r/1741/diff/" style="margin-left: 3em;">View Diff</a></p>
</td>
</tr>
</table>
</div>
</body>
</html>