-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bionic: FastRTPS security tests fail #46
Comments
CI jobs here Associated PRs to review: #47 ros2/system_tests#265 Context for review: This extension is now necessary with OpenSSL 1.1. Ready for review |
@mikaelarguedas , In addition to I don't think I ever read about any certificate extension requirements in the DDS security spec unlike the IETF's TLS spec, but perhaps OMG thought those would be self evident. |
Yeah I considered it but went for the minimal fix for now as this seems to match the extensions currently used but the DDS vendors we target. we can definitely consider other common extensions later on. Regarding path length I didnt make assumptions on it, as currently it's always one but mostly because the certificate setup is still pretty primitive. But we could think of scenarios where this doesnt apply at which point it will mostly be putting an arbitrary number. Then enforcing a length of
Yeah I had the same feeling and figured I'll take a closer look at the spec to see if it was just assumed good practice. I don't recall the spec covering certificate extensions at all but I haven't read 1.1 yet so maybe this is now covered. |
To be conservative with the length, I think you'd want to set this is 0, |
On Bionic default openssl/libssl is 1.1.0:
With Connext
no support for 1.1.0 so we need to install custom version of 1.0.2 provided by RTI
With FastRTPS: it fails with "Invalid CA error".
Combinations tested:
Path forward
As I don't see forcing the use of openssl 1.0.2 as a viable path forward for bionic (as it conflicts with the system one and will force people to uninstall a ton of stuff), we need to figure out how to tweak certificate and key generation in sros2 to allow that use case.
A lead to explore is that is looks that our certificates are SSLv1 and fail, certs used in Fast-RTPS testing are SSLv3 and pass.
related to ros2/ros2#481
The text was updated successfully, but these errors were encountered: