Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(623)

Side by Side Diff: webrtc/p2p/base/dtlstransportchannel.cc

Issue 2163683003: Relanding: Allow the DTLS fingerprint verification to occur after the handshake. (Closed) Base URL: https://chromium.googlesource.com/external/webrtc.git@master
Patch Set: Fixing comment line wrapping. Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright 2011 The WebRTC Project Authors. All rights reserved. 2 * Copyright 2011 The WebRTC Project Authors. All rights reserved.
3 * 3 *
4 * Use of this source code is governed by a BSD-style license 4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source 5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found 6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may 7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree. 8 * be found in the AUTHORS file in the root of the source tree.
9 */ 9 */
10 10
(...skipping 161 matching lines...) Expand 10 before | Expand all | Expand 10 after
172 LOG(LS_ERROR) << "Not changing max. protocol version " 172 LOG(LS_ERROR) << "Not changing max. protocol version "
173 << "while DTLS is negotiating"; 173 << "while DTLS is negotiating";
174 return false; 174 return false;
175 } 175 }
176 176
177 ssl_max_version_ = version; 177 ssl_max_version_ = version;
178 return true; 178 return true;
179 } 179 }
180 180
181 bool DtlsTransportChannelWrapper::SetSslRole(rtc::SSLRole role) { 181 bool DtlsTransportChannelWrapper::SetSslRole(rtc::SSLRole role) {
182 if (dtls_state() == DTLS_TRANSPORT_CONNECTED) { 182 if (dtls_) {
183 if (ssl_role_ != role) { 183 if (ssl_role_ != role) {
184 LOG(LS_ERROR) << "SSL Role can't be reversed after the session is setup."; 184 LOG(LS_ERROR) << "SSL Role can't be reversed after the session is setup.";
185 return false; 185 return false;
186 } 186 }
187 return true; 187 return true;
188 } 188 }
189 189
190 ssl_role_ = role; 190 ssl_role_ = role;
191 return true; 191 return true;
192 } 192 }
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after
228 } 228 }
229 229
230 // Otherwise, we must have a local certificate before setting remote 230 // Otherwise, we must have a local certificate before setting remote
231 // fingerprint. 231 // fingerprint.
232 if (!dtls_active_) { 232 if (!dtls_active_) {
233 LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state."; 233 LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state.";
234 return false; 234 return false;
235 } 235 }
236 236
237 // At this point we know we are doing DTLS 237 // At this point we know we are doing DTLS
238 bool fingerprint_changing = remote_fingerprint_value_.size() > 0u;
238 remote_fingerprint_value_ = std::move(remote_fingerprint_value); 239 remote_fingerprint_value_ = std::move(remote_fingerprint_value);
239 remote_fingerprint_algorithm_ = digest_alg; 240 remote_fingerprint_algorithm_ = digest_alg;
240 241
241 if (dtls_) { 242 // If the fingerprint is changing, start a completely new DTLS association.
243 if (dtls_ && fingerprint_changing) {
242 // If the fingerprint is changing, we'll tear down the DTLS association and 244 // If the fingerprint is changing, we'll tear down the DTLS association and
243 // create a new one, resetting our state. 245 // create a new one, resetting our state.
244 dtls_.reset(nullptr); 246 dtls_.reset(nullptr);
245 set_dtls_state(DTLS_TRANSPORT_NEW); 247 set_dtls_state(DTLS_TRANSPORT_NEW);
246 set_writable(false); 248 set_writable(false);
247 } 249 }
248 250
249 if (!SetupDtls()) { 251 if (dtls_) {
250 set_dtls_state(DTLS_TRANSPORT_FAILED); 252 // This can occur if DTLS is set up before a remote fingerprint is
251 return false; 253 // received. For instance, if we set up DTLS due to receiving an early
254 // ClientHello.
255 if (!dtls_->SetPeerCertificateDigest(
256 remote_fingerprint_algorithm_,
257 reinterpret_cast<unsigned char*>(remote_fingerprint_value_.data()),
258 remote_fingerprint_value_.size())) {
259 LOG_J(LS_ERROR, this) << "Couldn't set DTLS certificate digest.";
mattdr-at-webrtc.org 2016/07/20 00:50:27 should we set DTLS state here too?
Taylor Brandstetter 2016/07/20 17:36:52 If this has an immediate effect and succeeds, we'l
260 return false;
261 }
262 } else {
263 if (!SetupDtls()) {
264 set_dtls_state(DTLS_TRANSPORT_FAILED);
265 return false;
266 }
252 } 267 }
253 268
254 return true; 269 return true;
255 } 270 }
256 271
257 std::unique_ptr<rtc::SSLCertificate> 272 std::unique_ptr<rtc::SSLCertificate>
258 DtlsTransportChannelWrapper::GetRemoteSSLCertificate() const { 273 DtlsTransportChannelWrapper::GetRemoteSSLCertificate() const {
259 if (!dtls_) { 274 if (!dtls_) {
260 return nullptr; 275 return nullptr;
261 } 276 }
(...skipping 11 matching lines...) Expand all
273 return false; 288 return false;
274 } 289 }
275 290
276 downward_ = downward; 291 downward_ = downward;
277 292
278 dtls_->SetIdentity(local_certificate_->identity()->GetReference()); 293 dtls_->SetIdentity(local_certificate_->identity()->GetReference());
279 dtls_->SetMode(rtc::SSL_MODE_DTLS); 294 dtls_->SetMode(rtc::SSL_MODE_DTLS);
280 dtls_->SetMaxProtocolVersion(ssl_max_version_); 295 dtls_->SetMaxProtocolVersion(ssl_max_version_);
281 dtls_->SetServerRole(ssl_role_); 296 dtls_->SetServerRole(ssl_role_);
282 dtls_->SignalEvent.connect(this, &DtlsTransportChannelWrapper::OnDtlsEvent); 297 dtls_->SignalEvent.connect(this, &DtlsTransportChannelWrapper::OnDtlsEvent);
283 if (!dtls_->SetPeerCertificateDigest( 298 if (remote_fingerprint_value_.size() &&
299 !dtls_->SetPeerCertificateDigest(
284 remote_fingerprint_algorithm_, 300 remote_fingerprint_algorithm_,
285 reinterpret_cast<unsigned char*>(remote_fingerprint_value_.data()), 301 reinterpret_cast<unsigned char*>(remote_fingerprint_value_.data()),
286 remote_fingerprint_value_.size())) { 302 remote_fingerprint_value_.size())) {
287 LOG_J(LS_ERROR, this) << "Couldn't set DTLS certificate digest."; 303 LOG_J(LS_ERROR, this) << "Couldn't set DTLS certificate digest.";
288 return false; 304 return false;
289 } 305 }
290 306
291 // Set up DTLS-SRTP, if it's been enabled. 307 // Set up DTLS-SRTP, if it's been enabled.
292 if (!srtp_ciphers_.empty()) { 308 if (!srtp_ciphers_.empty()) {
293 if (!dtls_->SetDtlsSrtpCryptoSuites(srtp_ciphers_)) { 309 if (!dtls_->SetDtlsSrtpCryptoSuites(srtp_ciphers_)) {
(...skipping 98 matching lines...) Expand 10 before | Expand all | Expand 10 after
392 case DTLS_TRANSPORT_FAILED: 408 case DTLS_TRANSPORT_FAILED:
393 case DTLS_TRANSPORT_CLOSED: 409 case DTLS_TRANSPORT_CLOSED:
394 // Can't send anything when we're closed. 410 // Can't send anything when we're closed.
395 return -1; 411 return -1;
396 default: 412 default:
397 ASSERT(false); 413 ASSERT(false);
398 return -1; 414 return -1;
399 } 415 }
400 } 416 }
401 417
418 bool DtlsTransportChannelWrapper::IsDtlsConnected() {
419 return dtls_ && dtls_->IsTlsConnected();
420 }
421
402 // The state transition logic here is as follows: 422 // The state transition logic here is as follows:
403 // (1) If we're not doing DTLS-SRTP, then the state is just the 423 // (1) If we're not doing DTLS-SRTP, then the state is just the
404 // state of the underlying impl() 424 // state of the underlying impl()
405 // (2) If we're doing DTLS-SRTP: 425 // (2) If we're doing DTLS-SRTP:
406 // - Prior to the DTLS handshake, the state is neither receiving nor 426 // - Prior to the DTLS handshake, the state is neither receiving nor
407 // writable 427 // writable
408 // - When the impl goes writable for the first time we 428 // - When the impl goes writable for the first time we
409 // start the DTLS handshake 429 // start the DTLS handshake
410 // - Once the DTLS handshake completes, the state is that of the 430 // - Once the DTLS handshake completes, the state is that of the
411 // impl again 431 // impl again
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after
472 LOG_J(LS_INFO, this) << "Packet received before DTLS started."; 492 LOG_J(LS_INFO, this) << "Packet received before DTLS started.";
473 } else { 493 } else {
474 LOG_J(LS_WARNING, this) << "Packet received before we know if we are " 494 LOG_J(LS_WARNING, this) << "Packet received before we know if we are "
475 << "doing DTLS or not."; 495 << "doing DTLS or not.";
476 } 496 }
477 // Cache a client hello packet received before DTLS has actually started. 497 // Cache a client hello packet received before DTLS has actually started.
478 if (IsDtlsClientHelloPacket(data, size)) { 498 if (IsDtlsClientHelloPacket(data, size)) {
479 LOG_J(LS_INFO, this) << "Caching DTLS ClientHello packet until DTLS is " 499 LOG_J(LS_INFO, this) << "Caching DTLS ClientHello packet until DTLS is "
480 << "started."; 500 << "started.";
481 cached_client_hello_.SetData(data, size); 501 cached_client_hello_.SetData(data, size);
502 // If we haven't started setting up DTLS yet (because we don't have a
503 // remote fingerprint/role), we can use the client hello as a clue that
504 // the peer has chosen the client role, and proceed with the handshake.
505 // The fingerprint will be verified when it's set.
506 if (!dtls_ && local_certificate_) {
mattdr-at-webrtc.org 2016/07/20 00:50:27 What does checking local_certificate protect again
Taylor Brandstetter 2016/07/20 17:36:52 SetupDtls requires the local certificate. You migh
507 SetSslRole(rtc::SSL_SERVER);
508 SetupDtls();
509 }
482 } else { 510 } else {
483 LOG_J(LS_INFO, this) << "Not a DTLS ClientHello packet; dropping."; 511 LOG_J(LS_INFO, this) << "Not a DTLS ClientHello packet; dropping.";
484 } 512 }
485 break; 513 break;
486 514
487 case DTLS_TRANSPORT_CONNECTING: 515 case DTLS_TRANSPORT_CONNECTING:
488 case DTLS_TRANSPORT_CONNECTED: 516 case DTLS_TRANSPORT_CONNECTED:
489 // We should only get DTLS or SRTP packets; STUN's already been demuxed. 517 // We should only get DTLS or SRTP packets; STUN's already been demuxed.
490 // Is this potentially a DTLS packet? 518 // Is this potentially a DTLS packet?
491 if (IsDtlsPacket(data, size)) { 519 if (IsDtlsPacket(data, size)) {
(...skipping 178 matching lines...) Expand 10 before | Expand all | Expand 10 after
670 last_sent_packet_id, ready_to_send); 698 last_sent_packet_id, ready_to_send);
671 } 699 }
672 700
673 void DtlsTransportChannelWrapper::OnChannelStateChanged( 701 void DtlsTransportChannelWrapper::OnChannelStateChanged(
674 TransportChannelImpl* channel) { 702 TransportChannelImpl* channel) {
675 ASSERT(channel == channel_); 703 ASSERT(channel == channel_);
676 SignalStateChanged(this); 704 SignalStateChanged(this);
677 } 705 }
678 706
679 } // namespace cricket 707 } // namespace cricket
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698