<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[wolfSSL - Embedded SSL Library — ECC extensions not sent in DTLS]]></title>
		<link>https://www.wolfssl.com/forums/topic692-ecc-extensions-not-sent-in-dtls.html</link>
		<atom:link href="https://www.wolfssl.com/forums/feed-rss-topic692.xml" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in ECC extensions not sent in DTLS.]]></description>
		<lastBuildDate>Wed, 02 Sep 2015 21:56:09 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[Re: ECC extensions not sent in DTLS]]></title>
			<link>https://www.wolfssl.com/forums/post2176.html#p2176</link>
			<description><![CDATA[<p>Hi Simon,</p><p>I tried connecting to the example Scandium server using Eclipse across a local host connection and saw Scandium send all of DTLS 1.2 flight 4 at once for a grand size of 1,985 bytes. Then the scenario you described earlier. The reason for this is our MTU size for DTLS is set to a conservative 1,500 but is not large enough to handle that size. This is a larger size than what is expected to be sent. A temporary fix for this is to adjust the size in wolfssl/internal.h about line 811 setting MAX_MTU to be 2500 rather than 1500. After doing that I was then able to get farther in the handshake.</p><p>Regards,<br />Jacob</p>]]></description>
			<author><![CDATA[null@example.com (Jacob)]]></author>
			<pubDate>Wed, 02 Sep 2015 21:56:09 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post2176.html#p2176</guid>
		</item>
		<item>
			<title><![CDATA[Re: ECC extensions not sent in DTLS]]></title>
			<link>https://www.wolfssl.com/forums/post2170.html#p2170</link>
			<description><![CDATA[<p>Re,<br />&nbsp; Scandium now supports that a client does not send &quot;Supported Elliptic Curves&quot; and &quot;Supported Point Formats&quot; extension.<br />&nbsp; So I taked time to retest that with wolfssl.<br />&nbsp; I successfully passed the ClientHello message but I still encountered the same problem as I described previously.<br />&nbsp; I also tested what you proposed about modifying the client.c example.<br />&nbsp; But In all case,&nbsp; the client never answer after the &quot;Server Hello Done&quot; from the server... no error in output even when debug mod is activated.<br />Too bad :&#039;( !<br />Simon</p>]]></description>
			<author><![CDATA[null@example.com (sbernard)]]></author>
			<pubDate>Mon, 31 Aug 2015 14:21:40 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post2170.html#p2170</guid>
		</item>
		<item>
			<title><![CDATA[Re: ECC extensions not sent in DTLS]]></title>
			<link>https://www.wolfssl.com/forums/post2121.html#p2121</link>
			<description><![CDATA[<p>Hi sbernard,</p><p>To answer the question about Supported Elliptic Curves after enabling them as a configure option they then need to be added to the client ssl struct. In example,</p><div class="quotebox"><blockquote><p>code to init ssl struct ....</p><p>&nbsp; &nbsp; if (wolfSSL_UseSupportedCurve(ssl, WOLFSSL_ECC_SECP160R1) != SSL_SUCCESS)<br />&nbsp; &nbsp; &nbsp; &nbsp; printf(&quot;handle error\n);</p><p>&nbsp; &nbsp;...code to make connection and then clean up</p></blockquote></div><p>If using the example wolfSSL client this function call can be added in at line 788 of the current one. As soon as one has been added then the client sends out the ECC curve extension. With wireshark there should then be Extension: elliptic_curves when looking at the client hello. Just as farther info when using, all available curve options are</p><div class="quotebox"><blockquote><p>WOLFSSL_ECC_SECP160R1 = 0x10,<br /> WOLFSSL_ECC_SECP192R1 = 0x13,<br /> WOLFSSL_ECC_SECP224R1 = 0x15,<br /> WOLFSSL_ECC_SECP256R1 = 0x17,<br /> WOLFSSL_ECC_SECP384R1 = 0x18,<br /> WOLFSSL_ECC_SECP521R1 = 0x19</p></blockquote></div><p>Unfortunately the ECC Point Format Extension has not yet been added. There is some internal code started for it but it has gotten pushed to the back burner.</p><p>Regards,<br />Jacob</p>]]></description>
			<author><![CDATA[null@example.com (Jacob)]]></author>
			<pubDate>Wed, 29 Jul 2015 20:13:38 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post2121.html#p2121</guid>
		</item>
		<item>
			<title><![CDATA[Re: ECC extensions not sent in DTLS]]></title>
			<link>https://www.wolfssl.com/forums/post2119.html#p2119</link>
			<description><![CDATA[<p>OK I tested with the option you proposed and a wolfssl client and server, and it works !</p><p>1) You didn&#039;t answered about the &quot;Supported Elliptic Curves&quot; and &quot;Supported Point Formats&quot; extension issue.<br />2) I workaround the &quot;Supported Elliptic Curves&quot; and &quot;Supported Point Formats&quot; extension issue by modifying scandium code, but I encountered another issue this time the handshake go to Server Hello Done, but the wolfssl client never answer<br /></p><div class="codebox"><pre><code>C=&gt; Client Hello
S=&gt; Hello Verify Request
C=&gt; Client Hello
S=&gt; Server Hello, Certificate, Server Key Exchange, Certificate Request, Server Hello Done</code></pre></div><p>I compare the 2 wireshark captures (wolf/wolf and wolf/scandium) and I don&#039;t see any problems <img src="https://www.wolfssl.com/forums/img/smilies/hmm.png" width="15" height="15" alt="hmm" />.<br />I tried to launch wolfssl in debug mode and it seems to be in a strange state :&nbsp; <br /></p><div class="codebox"><pre><code>connect state: HELLO_AGAIN_REPLY
wolfSSL Entering EmbedReceiveFrom()
wolfSSL Entering wolfSSL_get_using_nonblock
wolfSSL Leaving wolfSSL_get_using_nonblock, return 0
received record layer msg
wolfSSL Entering DoDtlsHandShakeMsg()
wolfSSL Entering DoHandShakeMsgType
processing server hello
wolfSSL Entering VerifyClientSuite
wolfSSL Leaving DoHandShakeMsgType(), return 0
wolfSSL Leaving DoDtlsHandShakeMsg(), return 0
More records in input
growing input buffer

wolfSSL Entering EmbedReceiveFrom()
wolfSSL Entering wolfSSL_get_using_nonblock
wolfSSL Leaving wolfSSL_get_using_nonblock, return 0
Embed Receive From error
wolfSSL Entering wolfSSL_get_using_nonblock
wolfSSL Leaving wolfSSL_get_using_nonblock, return 0
    Socket timeout
wolfSSL Entering EmbedReceiveFrom()
wolfSSL Entering wolfSSL_get_using_nonblock
wolfSSL Leaving wolfSSL_get_using_nonblock, return 0
Embed Receive From error
wolfSSL Entering wolfSSL_get_using_nonblock
wolfSSL Leaving wolfSSL_get_using_nonblock, return 0
    Socket timeout
... ... ... ....
wolfSSL Entering EmbedReceiveFrom()
wolfSSL Entering wolfSSL_get_using_nonblock
wolfSSL Leaving wolfSSL_get_using_nonblock, return 0
Embed Receive From error
wolfSSL Entering wolfSSL_get_using_nonblock
wolfSSL Leaving wolfSSL_get_using_nonblock, return 0
    Socket timeout</code></pre></div>]]></description>
			<author><![CDATA[null@example.com (sbernard)]]></author>
			<pubDate>Tue, 28 Jul 2015 13:53:45 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post2119.html#p2119</guid>
		</item>
		<item>
			<title><![CDATA[Re: ECC extensions not sent in DTLS]]></title>
			<link>https://www.wolfssl.com/forums/post2116.html#p2116</link>
			<description><![CDATA[<p>Hi sbernard,</p><p>Try using the following options. I am providing flags for both server and client in the case you would like to test wolfSSL internally before testing an external connection:</p><p>For <strong>TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8</strong></p><p>Server options:</p><div class="codebox"><pre><code>./examples/server/server -u -v 3 -l ECDHE-ECDSA-AES128-CCM-8 -c ./certs/server-ecc.pem -k ./certs/ecc-key.pem</code></pre></div><p>Client options: </p><div class="codebox"><pre><code>./examples/client/client -u -v 3 -l ECDHE-ECDSA-AES128-CCM-8 -A ./certs/server-ecc.pem</code></pre></div><p>To read more about these options and flags please use:<br /></p><div class="codebox"><pre><code>./examples/server/server -help</code></pre></div>]]></description>
			<author><![CDATA[null@example.com (Kaleb J. Himes)]]></author>
			<pubDate>Mon, 27 Jul 2015 17:13:00 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post2116.html#p2116</guid>
		</item>
		<item>
			<title><![CDATA[ECC extensions not sent in DTLS]]></title>
			<link>https://www.wolfssl.com/forums/post2114.html#p2114</link>
			<description><![CDATA[<p>Hi, <br />&nbsp; As I said in my <a href="http://www.yassl.com/forums/topic691-tlspskwithaes128cbcsha256-not-available-with-dtls.html">previous post</a>. I tried to connect wolfssl(3.6.0) to Eclipse Scandium(master).<br />&nbsp; As I failed to use PSK, I tried to use RPK with Elliptic curves using <strong>TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8</strong> cipher suite.<br />&nbsp; So I tried to configure wolfssl like this : <br /></p><div class="codebox"><pre><code>./configure --enable-dtls --enable-aesccm --enable-supportedcurves --enable-scep
./examples/client/client -h 127.0.0.1 -p 5684 -u -v 3</code></pre></div><p>(I also tried adding --enable-tlsx)<br />But in all case, wolfssl did not add the &quot;Supported Elliptic Curves&quot; and &quot;Supported Point Formats&quot; extension in Client_Hello.<br />This is not really mandatory as the spec say : <em>&quot;A TLS client that proposes ECC cipher suites in its ClientHello message SHOULD include these extensions</em>&quot;<br />But, Scandium refuse to continue handshake, if those extensions are not present for ECC, I think this is mainly a scandium issue (I will open it). But I think wolfssl should add this extension as the <a href="https://tools.ietf.org/html/rfc4492#section-4">specification</a> recommend it.</p><p>The same <a href="http://rt.openssl.org/Ticket/Display.html?id=3449&amp;user=guest&amp;pass=guest">issue</a> was present in openssl in the past, it was fixed now.</p><p>Simon</p>]]></description>
			<author><![CDATA[null@example.com (sbernard)]]></author>
			<pubDate>Mon, 27 Jul 2015 15:58:58 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post2114.html#p2114</guid>
		</item>
	</channel>
</rss>
