Description
- Type: Non-conformance Bug
- Priority: Minor
Non-conformance Bug
Version: development branch
Expected behavior
The DTLS 1.2 RFC specifies the following requirement regarding the wrapping of record sequence number :
As in TLS, implementations MUST either abandon an association or rehandshake prior to allowing the sequence number to wrap.
Actual behavior
When TinyDTLS receives a CH2 with the record sequence set to the highest possible value (i.e. FF FF FF FF FF FF), it repeats the record sequence number in the SH and then it increments the record sequence for SHD which results in wrapping the sequence number (i.e. SHD.sequence_number = 0).
I have attached the handshake trace for the mentioned non-conformance.
rseq_wrapping.zip
Description
Non-conformance Bug
Version: development branch
Expected behavior
The DTLS 1.2 RFC specifies the following requirement regarding the
wrapping of record sequence number:Actual behavior
When TinyDTLS receives a
CH2with the record sequence set to the highest possible value (i.e. FF FF FF FF FF FF), it repeats the record sequence number in theSHand then it increments the record sequence forSHDwhich results in wrapping the sequence number (i.e.SHD.sequence_number = 0).I have attached the handshake trace for the mentioned non-conformance.
rseq_wrapping.zip