Closed Bug 823684 Opened 12 years ago Closed 11 years ago

SRTP_AES128_CM_HMAC_SHA1_32 deviating from RFC

Categories

(Core :: WebRTC: Networking, defect)

x86
macOS
defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 829624

People

(Reporter: martin, Unassigned)

Details

(Whiteboard: [WebRTC], [blocking-webrtc-])

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:20.0) Gecko/20121220 Firefox/20.0 Build ID: 20121220030912 Steps to reproduce: Do a WebRTC PeerConnection to a peer that only advertises/accepts SRTP_AES128_CM_HMAC_SHA1_32 in the DTLS handshake. Actual results: Mozilla sends data where both RTP and RTCP packets have 32 bit HMAC checksums. Expected results: According to http://tools.ietf.org/html/rfc5764#section-4.1.2, SRTP_AES128_CM_HMAC_SHA1_32 should have 80 bit checksums for RTCP (while it has 32 bit checksums for RTP).
Whiteboard: [WebRTC], [blocking-webrtc-]
FWIW, Chrome (which implements DTLS-SRTP in the latest canary) implements SRTP_AES128_CM_HMAC_SHA1_32 correctly according to the spcec, with 80 bit HMAC for RTCP.
Resolved shortly after the last comment here in bug 829624
Status: UNCONFIRMED → RESOLVED
Closed: 11 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.