You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
WolfSSL partially supports the connection identifier extension (https://www.rfc-editor.org/rfc/rfc9146.html).
However, the extension is currently not usable as intended, as a a connection endpoint cannot be recognized purely by connection id. Currently wolfSSL identifies connecting peers purely by their adress and port.
The goal of the extension would be to enable an endpoint to change its ip adress and or port whithout the need of a new handshake.
Reproduction steps
In user_settings.h, enable DTLS and the extension:
#define WOLFSSL_DTLS
#define WOLFSSL_DTLS_CID
Connect to the wolfSSL example server using DTLS and with connection id enabled (--cid XX) and do a handshake
On the client: reopen your udp connection to change source port
try sending messages to the server again
the wolfSSL server will report a unknown peer and discard the messages
Thanks for reaching out.
Yes, you are right, Connection ID support is partial, you can find more detail in the PR that added the support #5453 .
Complete support is in the feature request stage at this point.
The current status may still be useful if the other endpoint is the one that wants to differentiate using the ConnectionID.
Contact Details
[email protected]
Version
5.5.0
Description
WolfSSL partially supports the connection identifier extension (https://www.rfc-editor.org/rfc/rfc9146.html).
However, the extension is currently not usable as intended, as a a connection endpoint cannot be recognized purely by connection id. Currently wolfSSL identifies connecting peers purely by their adress and port.
The goal of the extension would be to enable an endpoint to change its ip adress and or port whithout the need of a new handshake.
Reproduction steps
In user_settings.h, enable DTLS and the extension:
--cid XX
) and do a handshakeRelevant log output
wolfSSL Entering EmbedReceiveFrom() wolfSSL Entering wolfSSL_dtls_get_using_nonblock Ignored packet from invalid peer wolfSSL error occurred, error = -323
The text was updated successfully, but these errors were encountered: