-
Notifications
You must be signed in to change notification settings - Fork 407
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bootstrap Server: configuring SecurityStore with X509 #1200
Comments
You may consider the LwM2M spec. I'm not sure, but it may be required to support PSK to be compliant. (Just to mention: I guess, without the (upcoming) RFC9146 you won't get too happy with x509. We will see ... ) |
@boaks how it looks like in previous Leshan versions like 1.3.2? Do you have any implementation provided for this case? |
Well, in LWM2M spec there is no need to support all modes. You can support only X509 or only PSK or only Raw Keys if you want to. BTW, I just realized that in the
And now it depends also on CIPHER SUITES. In my case when in the configuration I'm using only recommended for X509: |
Noop, I don't have any implementation. I mainly use the leshan master to check, if it still works with newer Californium versions. I only run the unit tests. I don't have a setup to run the demo-servers anymore. When I prepared PR #1073 to migrate Leshan to Californium 3.0 (new Configuration), I tried to keep the old function. If you have doubts, you may check the leshan version before that commit. PR #1130 is also a candidate. But I don't know, if using the leshan server without PSK was possible before using the new Californium Configuration. If that is the case, and it's considered by the leshan team as compliant, I will check, if I can provide a new PR. |
Too long ago when I was familiar with LwM2M ;-).
That makes sense. So it works for you? |
Yes, also agree it makes sense. And yes - it works for me but in SNAPSHOT version. Any chance for the |
I was just about to ask if this could be same issue than : #1126
The spec says that :
So I understand this is not mandatory. |
Waiting you can play / test with nightly as I said with #1191 (comment) I can release a 2.0.0-M6 but maybe it is better you finished what you tried to achieve with the nightly. Once you validate it works for yo, I release a 2.0.0-M6. Does it make sense ? |
So I validated the X509 configuration with |
Do you plan to test some other point before the release ? |
I've tested the full flow in my project. All my integration tests passed, so no regression. Also tested the X509 CN with endpoint name matching after adding |
Thx @gerardolenski 🙏 So, I will release the 2.0.0-M6 in the week does that sounds good to you ? |
Great. Many thanks |
@gerardolenski @Frendzel the 2.0.0-M6 is now available. |
(Should we close this issue ?) |
Many thanks! |
Hi guys,
I'm using Leshan v
2.0.0.-M5
. I have the correct configuration of the DTLS-based security with X509 Certificate mode in Bootstrap Server - meaning I configured only the possibility of using X509 certificates, not PSK which I don't want to support, and also with disabled unsecured COAP endpoints.Now I'm trying to add the
SecurityStore
to the configuration to enable validation if the endpoint client name matches the X509 certificate common name. Unfortunately, after adding this component I got the exception:I checked that the problem is in the
LeshanBootstrapServerBuilder.class
in line 257:To be honest I quite don't get why you are trying to set
AdvancedPskStore
always when the SecurityStore was added to the configuration. Can you please help with that?The text was updated successfully, but these errors were encountered: