How do you enable secure CoAP? #28875
Replies: 3 comments 4 replies
-
Just to provide some more feedback, it's mbedTLS that hardcodes the DTLS version in the initial handshake to DTLS 1.0: |
Beta Was this translation helpful? Give feedback.
-
Hi, I am trying to use secure COAP and got an issue when compiling: In prj.conf, I already added CONFIG_OPENTHREAD_COAPS=y. Please feel free to let me know if you have any suggestions. Best regards, |
Beta Was this translation helpful? Give feedback.
-
Maybe some late additional specification background information about the DTLS 1.0: [RFC6347 - 4.2.1. Denial-of-Service Countermeasures](https://datatracker.ietf.org/doc/html/rfc6347#section-4.2.1)
The idea behind that seems to be to not negotiate the version until the peer's address is verified. Especially, don't send an alert as "deny version" to a peer without verifying its address first. During a "redesign" of that part in Eclipse/Californium in summer 2020, I also did a small research later in 2020 as follow up of reported issues about that change. Eclipse/Californium - HelloVerifyRequest Results in November 2020:
I asked also the IETF/TLS mailing list but could not get an answer there. Finally I decided to make Californium flexible at that, means: send the client the version back, which the client itself is using. That approach seems to be the one with the lowest troubles and works quite well since end of 2020. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
(resurfacing the question for Slack)
I'm trying to use
coaps
when interacting with my cloud server and the only examples are insecure CoAP. Part of the issue is configuring DTLS 1.2. @rlubos pointed us to the LwM2M code:However, when we tried to able a similar configuration, the client sends DTLS 1.0 (which our server currently doesn't like.) More from Robert:
Anyone have pointers on how to implement secure CoAP?
Beta Was this translation helpful? Give feedback.
All reactions