Closed hoihochan closed 2 weeks ago
Attention: Patch coverage is 50.00000%
with 4 lines
in your changes missing coverage. Please review.
Project coverage is 78.23%. Comparing base (
98a05d6
) to head (d2d2fee
). Report is 3 commits behind head on master.
Files with missing lines | Patch % | Lines |
---|---|---|
crypto.go | 50.00% | 2 Missing and 2 partials :warning: |
:umbrella: View full report in Codecov by Sentry.
:loudspeaker: Have feedback on the report? Share it here.
Thank you so much @hoihochan !
How was the library otherwise? Any things I can improve/change?
Thank you so much @hoihochan !
How was the library otherwise? Any things I can improve/change?
It's been good. We had an old fork of the library with this fix and I wanted to upstream the change so we can use the upstream library.
When I get time I would like to help on https://github.com/pion/dtls/issues/524
I would love your help!
Reach out if you need anything. Really appreciate any help :)
Both
verifyKeySignature()
andverifyCertificateVerify()
has a bug when handling RSA signature as it looks at the signature algorithm of the certificate to determine whether to verify with RSA PKCSv1.5. This will cause issues if the certificate's issuing CA uses something other than RSA (e.g. ECDSA) to sign the certificate.Since DTLS v1.2 does not support RSA-PSS [1], we can just use RSA PKCSv1.5 verification directly if the public key of the certificate is RSA.
[1] https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-16